Objective:
|
There is no shortage of wireless tools for the attacker or the ethical hacker performing a security assessment or a pen test. Over time, tools come and go as technologies change and vulnerabilities are fixed. Therefore, it is important to understand what the tools do and where they fit in the methodology of a security assessment. Just listing all the available tools could easily fill a Chapter; therefore, some of the more well-known tools are discussed here:
Figure 9.4. NetStumbler.
Many types of tools are available for wireless networks. You need to know the names of the tools and their functions to successfully pass the CEH exam.
Name |
Platform |
Purpose |
---|---|---|
NetStumbler |
Windows |
Wireless LAN detection |
Mognet |
Java |
Wireless sniffer |
WaveStumbler |
Linux |
Wireless LAN detection and sniffer |
Aeropeek |
Windows |
Sniffer and analyzer |
AirSnort |
Linux |
WEP cracking |
Kismet |
Linux |
Sniffer and wireless detector |
Void11 |
Linux |
Wireless DoS tool |
THC-Wardrive |
Linux |
Wireless WAP mapping tool |
AirTraf |
Linux |
Sniffer |
Airsnarf |
Linux |
Rogue access point |
Aircrack |
Linux |
WEP cracking tool kit |
Securing Wireless Networks |
Part I: Exam Preparation
The Business Aspects of Penetration Testing
The Technical Foundations of Hacking
Footprinting and Scanning
Enumeration and System Hacking
Linux and Automated Security Assessment Tools
Trojans and Backdoors
Sniffers, Session Hijacking, and Denial of Service
Web Server Hacking, Web Applications, and Database Attacks
Wireless Technologies, Security, and Attacks
IDS, Firewalls, and Honeypots
Buffer Overflows, Viruses, and Worms
Cryptographic Attacks and Defenses
Physical Security and Social Engineering
Part II: Final Review
Part III: Appendixes
Appendix A. Using the ExamGear Special Edition Software