Search results for "wep"

Advertisements


wifite – Mass Wifi WEP/WPA Key Cracking Tool

23 September 2010 | 131,337 views

wifite is created to to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. Features sorts targets by power (in dB); cracks closest access points first all WPA handshakes are backed up (to […]

Continue Reading


WEPBuster – Wireless Security Assessment Tool – WEP Cracking

04 June 2009 | 60,819 views

WEPBuster basically seems to be a toolkit that attempts to automate the tasks done by the various parts of the aircrack-ng suite. The end goal of course is to crack the WEP key of a given Wireless network. Features The main part of this is the autonomous nature of the toolkit, it can crack all […]

Continue Reading


Confused by WEP, WPA, TKIP, AES & Other Wireless Security Acronyms?

03 December 2008 | 101,000 views

I found an interesting article today which sums up most of the acryonyms involved in wireless networks and wireless security and explain them all in brief. It may clear things up for some people who get overwhelmed by all the jargon, especially with the recent news hitting the mainstream about WPA being partially cracked. Users […]

Continue Reading


Russix – LiveCD Linux Distro for Wireless Penetration Testing & WEP Cracking

19 February 2008 | 125,504 views

It looks like it might be time to update our very well received list of the 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) since we have Russix now and Backtrack new version is on the way out. Russix is a Slax based Wireless Live Linux. It has been designed to be light […]

Continue Reading


aircrack-ng – WEP and WPA-PSK Key Cracking Program

01 October 2007 | 131,867 views

aircrack is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, thus making the attack much faster compared to other WEP cracking tools. In fact, aircrack is a set of tools for […]

Continue Reading


aircrack-ptw – Fast WEP Cracking Tool for Wireless Hacking

25 September 2007 | 144,435 views

WEP is a protocol for securing wireless LANs. WEP stands for “Wired Equivalent Privacy” which means it should provide the level of protection a wired LAN has. WEP therefore uses the RC4 stream to encrypt data which is transmitted over the air, using usually a single secret key (called the root key or WEP key) […]

Continue Reading


Wep0ff – Wireless WEP Key Cracker Tool

19 January 2007 | 512,621 views

Wep0ff is new tool to crack WEP-key without access to AP by mount fake access point attack against WEP-based wireless clients. It uses combination of fragmentation and evil twin attacks to generate traffic which can be used for KoreK-style WEP-key recovery. This tool can be used to mount fake access point attack against WEP-based wireless […]

Continue Reading


EvilAP Defender – Detect Evil Twin Attacks

18 April 2015 | 1,177 views

EvilAP_Defender is an application that helps wireless network administrators to discover and prevent Evil Access Points (AP) from attacking wireless users. The application can be run in regular intervals to protect your wireless network and detect Evil Twin attacks. By configuring the tool you can get notifications sent to your email whenever an evil access […]

Continue Reading


U.S. State Department Hacked

18 November 2014 | 1,554 views

So the U.S. government has been getting fairly hammered lately with breaches/attacks hitting the White House, USPS (Postal Service) and NOAA. The latest victim of this onslaught has been the State Department, which had to totally shut down their email systems on November 14th after discovering various ‘areas of concern’. I wonder who’s going to […]

Continue Reading


Moscrack – Cluster Cracking Tool For WPA Keys

26 May 2014 | 4,627 views

Moscrack is a PERL application designed to facilitate cracking WPA keys in parallel on a group of computers. This is accomplished by use of either Mosix clustering software, SSH or RSH access to a number of nodes. With Moscrack’s new plugin framework, hash cracking has become possible. SHA256/512, DES, MD5 and *Blowfish Unix password hashes […]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·

Advertisements