Skip to main content

Top 10 WiFi Penetration Testing Tools Used by Hackers

Many people come in search of us for WiFi penetration testing tools. This post is especially for those who is in need of WiFi hacking tools.
Note: We are not responsible for any damage that cause you. Make sure you use these tools for experiment purposes only in controlled environment.
1.Aircrack
Aircrack-ng is the next generation of Aircrack with lots of new features and  mainly used by hackers to hack WiFi connections. Aircrack-ng is an 802.11 WPA-PSK and WEP  keys cracking program that can recover keys. Aircrack-ng cracks WEP keys using the FMS attack, PTW attack, and dictionary attacks, and WPA using dictionary attacks.
2.AirSnort
AirSnort supports both Windows and Linux operating system  but there is no longer updates for this tool. It is popular tool for decrypting WEP encryption on a Wi-Fi 802.11b network. This tool might be outdated, but still you can download it free on sourceforge.
3.Kismet
Kismet another great software used as network detector, packet sniffer for 802.11 a/b/g/n layers. This software support Linux, OSX, Windows and BSD platforms. It identifies networks by collecting packets and detecting standard named networks and detecting hidden networks.
4.Cain and Able
Cain and Able best, recommended and popular tool for password sniffing. It recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks and more options. It can also recover wireless network keys by analyzing routing protocols.
5.WireShark
Wireshark is a free and open-source packet analyzer. It can capture live data from Ethernet, IEEE 802.11, ATM, Bluetooth, USB and many others. It supports Linux, Windows, OSX, Solaries, FreeBSD and others.
6.CommView for Wi-Fi
CommView for WiFi is a powerful wireless network monitor and analyzer.It works on 802.11 a/b/g/n/ac networks. It supports Windows 7/8/8.1/10 both 64 and 32 bit versions. It scans the air for WiFi stations and access points. It can view detailed IP connections statistics: IP addresses, ports, sessions, and much more!
7. Airjack
AirJack is a device driver (or suit of device drivers) for 802.11(a/b/g) raw frame injection and reception. It is ment as a development tool for all manor of 802.11 applications that need to access the raw protocol.
8.inSSIDer
inSSIDer, free tool which displays every wireless hotspot’s MAC address, encryption, signal strength and channel. This tool was opensource long back but now it cost $19.99. This software received award as “Best Opensource Software in Networking”.
9.WepAttack
Wepattack is an open source Linux tool for 802.11WEP keys. This tool is based on dictionary attack on WEP keys in WLAN networks.
10.NetStumbler
Last but not the least, NetStumbler is also called as Network Stumbler used in Windows to detect Wireless LANs using 802.11 b/a/g networks. Down version of the tool is available and also knows as MiniStumbler
Note: We cannot provide links for the above penetration testing tools, because of few reasons, so kindly google it.


NOTE: This is for educational purpose only we are not responsible for any type of inconvenience caused by reader. 

Comments

Popular posts from this blog

Social Engineering Toolkit (SET)

Social Engineering Toolkit  (SET) is an advanced,  multifunctional, and easy-to-use computer-assisted social engineering toolset, created by the founders of  TrustedSec (https://www.trustedsec.com/). It helps you prepare the most effective way to exploit client-side application vulnerabilities and makes a fascinating attempt to capture the target's confidential information (for example, e-mail passwords). Some of the most efficient and useful attack methods employed by SET include targeted phishing e-mails with a malicious file attachment, Java applet attacks, browser-based exploitation, gathering website credentials, creating infectious portable media (USB/ DVD/CD), mass-mailer attacks, and other similar multiattack web vectors. This combination of attack methods provides you with a powerful platform to utilize and select the most persuasive technique that could perform an advanced attack against the human element.

 To start SET, navigate to  Applications  |  Kali Linux  |  Expl…

Cracking Wifi Using :Fern(GUI)

Fern(GUI)

As a part of Kali linux , fern can be directly used from kali linux , i would be recommending the use of kali because while using other linux environments it could be a trouble because while using fern it automatically detects the path of aircrack-ng and python installed , while in other environments it is needed to set it manually...so follow the following steps :-->

1.) Download kali linux iso and make a bootable pendrive .....if you dont know how to make bootable pendrive  then follow the steps given in blog of trinity rescue kit

Kali linux iso (amd64) recommended -->here
Link to trinity rescue kit blog --> here


 2.)Open Kali linux Goto Applications-->Wireless Attack--> Fern

3.)Select Interface card wlan0

4.)Double click any where in GUI

5.)Select enable x-terms ...so that you can view that happening ...while through a automated program...

6.)Click on select network

7.)Choose the type of network that is WEP/WPA

8.)I would recommend to add dictonary file .…

Deep Web - Part 1

What is deep web ?

Deep web Aka Invisible web Aka Hidden web are parts of the world wide web whose contents are not indexed by standard search engines.
LEVELS OF WORLD WIDE WEB :
SURFACE WEBBERGIE WEBDEEP WEBCHARTER WEBMARIANAS WEB SURFACE WEB :
The surface web also known as Visible web , Clearnet , Indexed web or Lightnet is that portion of the world wide web that is readily available to the general public and searchable with standard web search engines. Level of web where vast majority of internet users are connected to and which is accessible in any nation that does not block internet access.E.g: Social media sites like Facebook, informational websites like Wikipedia, general websites, etc

BERGIE WEB :

It is the part of world wide web that is not indexed by search-engines,which is directly accessible and no proxy required. E.g: Google locked results, recently web crawled old content, pirated media, pornography etc
DEEP WEB:
Deep web Aka Invisible web Aka Hidden web are parts of the wo…