• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

OSWA Assistant – Wireless Hacking & Auditing LiveCD Toolkit

June 9, 2008

Views: 50,125

The OSWA-Assistant is a no-Operating-System-required standalone toolkit which is solely focused on wireless auditing. As a result, in addition to the usual WiFi (802.11) auditing tools, it also covers Bluetooth and RFID auditing. Using the toolkit is as easy as popping it into your computer’s CDROM and making your computer boot from it!

This toolkit is a contribution to the wireless security/auditing community and, as the “Assistant” moniker implies, and is designed for the following groups of people:

  • IT-security auditors and professionals who need to execute technical wireless security testing against wireless infrastructure and clients;
  • IT professionals who have responsibility for ensuring the secure operation and administration of their organization’s wireless networks;
  • SME (Small & Medium Enterprise) and SOHO (SmallOffice-HomeOffice) businesses who do not have either the technical expertise or the resources to employ such expertise to audit their wireless networks;
  • Non-technical-users who run wireless networks at home and who would like to audit the security of their wireless home networks and laptops but don’t know how.

You can download OSWA Assistant here:

oswa-assistant.iso

Or read more here.

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Hacking Tools, Networking Hacking Tools, Wireless Hacking Tagged With: hacking wifi, hacking-livecd, hacking-wireless, livecd, Network Hacking, security-livecd, wifi, wifi-hacking, wifi-security, Wireless Hacking, wireless-security



Reader Interactions

Comments

  1. the BMX guy says

    June 9, 2008 at 11:28 am

    Nice thing to have, especially if you are like with only a basic understanding of how WiFi works and the need to be secure. Downloaded. Thank you :)

  2. Bogwitch says

    June 9, 2008 at 12:33 pm

    I’m downloading a copy as I write this.
    It looks as though most, if not all of the tools listed are included in BackTrack 3 but the main difference is this has an easy to use GUI type menu. I think it’s a good idea that non-professionals are empowered to audit their own WiFi networks but it also means that some of the dumbest skiddies are also thus empowered.

  3. razta says

    June 9, 2008 at 12:40 pm

    WOW! Fast download speeds on the iso! Gona give it a try, hope it supports my wireless card.

  4. Navin says

    June 9, 2008 at 1:41 pm

    I agree Bogwitch but isn’t tht what the all technologies are about??

    1>Provide the same tools to EVERYONE,
    2>Bad guy discovers a flaw and exploits it,
    3>Good guy stops bad guy frm doing so…..

    Repeat step 2 and 3 till perfect (feel free to drool) “unhackable” system is developed!!

    Right??

  5. Bogwitch says

    June 9, 2008 at 2:10 pm

    I wasn’t saying that it is a good or a bad thing that anyine can use this, just “Watch out, skiddies have this too!”

  6. Petester says

    June 10, 2008 at 8:22 pm

    Anyone checked this out yet?

    I’m interested in knowing what the patched driver stability out of the box is like.
    BT3 works real sweet for me :)

    I’ll test it later, should be interesting.

  7. Rightful says

    June 11, 2008 at 3:44 am

    Beware people script kiddies obtained another sniper in their arsenal of tools.
    And Navin your flow should be like this
    1->Provide Same tools for Everyone
    2-> “Bad” guys Discover and Exploits it
    -> Script Kiddies use it
    3) Good guys scamble to fix the mess made by Script Kiddies

    Loop results to infinity and beyond. Systems are still hackable due to mistakes by humans not machines/systems/sentinel/what ever.

    In overall nice tool.

  8. Pantagruel says

    June 11, 2008 at 9:37 am

    As with most of the pen-test tools, this one can be used or abused, hence the ethical bit. It’s the same discussion about the kitchen knife, you can cut up the turkey just as easily as your victim.

    SKiddies are quite easily deterred by keeping your server well maintained and patched. They usually go away when encountering a ban/block for their IP, they simply lack the brains to adjust or are plain lazy.

  9. razta says

    June 11, 2008 at 10:36 pm

    Damn Live CD dident have my video card drivers! I’ll test it in the laptop.

  10. GEONOSIUS says

    June 20, 2008 at 12:23 am

    Buy only laptop with atheros wireless card.Any Atheros monitoring MODE and inject packet JUST FUCKED WITH BT3 FIRST THE KEY 512 BIT WPA PSK III NEW WPA KEY T-Telecom captured packed size 14gbyte finished in 28 days
    i love Bt3 and Auditor

  11. Petester says

    June 20, 2008 at 9:42 am

    I’ve road tested the BT3 Final Pre-release version and can confirm that drivers are patched perfectly for:

    Atheros MAD WIFI
    Realtek RT2500
    Alfa-networks AWUS036H USB Interface (my personal fav)
    …..not tested any others yet…

    All work great and packet inject perfectly.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

AI-Powered Malware - The Next Evolution in Cyber Threats

AI-Powered Malware – The Next Evolution in Cyber Threats

Views: 279

Introduction Artificial Intelligence (AI) is reshaping cybersecurity on both sides of the … ...More about AI-Powered Malware – The Next Evolution in Cyber Threats

Falco - Real-Time Threat Detection for Linux and Containers

Falco – Real-Time Threat Detection for Linux and Containers

Views: 378

Security visibility inside containers, Kubernetes, and cloud workloads remains among the hardest … ...More about Falco – Real-Time Threat Detection for Linux and Containers

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 703

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 605

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 646

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 487

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (230)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,299,711)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,113)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,648)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,695)
  • Password List Download Best Word List – Most Common Passwords (933,536)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,183)
  • Hack Tools/Exploits (673,305)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,198)

Search

Recent Posts

  • AI-Powered Malware – The Next Evolution in Cyber Threats May 21, 2025
  • Falco – Real-Time Threat Detection for Linux and Containers May 19, 2025
  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy