WEP is a protocol for securing wireless LANs. WEP stands for “Wired Equivalent Privacy” which means it should provide the level of protection a wired LAN has. WEP therefore uses the RC4 stream to encrypt data which is transmitted over the air, using usually a single secret key (called the root key or WEP key) […]
Network Hacking
IPAudit – Network Activity Monitor with Web Interface
[ad] IPAudit monitors network activity on a network by host, protocol and port. It listens to a network device in promiscuous mode, and records every connection between two ip addresses. A unique connection is determined by the ip addresses of the two machines, the protocol used between them, and the port numbers (if they are […]
Driftnet – View Images From Live Network Traffic
[ad] Inspired by EtherPEG, Driftnet is a program which listens to network traffic and picks out images from TCP streams it observes. Fun to run on a host which sees lots of web traffic. EtherPEG was a program that sniffed for JPEGs passing by on the AirPort networks at MacHack, and showed them on the […]
rtpBreak – RTP Analysis & Hacking Tool
[ad] rtpBreak detects, reconstructs and analyzes any RTP [rfc1889] session through heuristics over the UDP network traffic. It works well with SIP, H.323, SCCP and any other signaling protocol. In particular, it doesn’t require the presence of RTCP packets (voipong needs them) that aren’t always transmitted from the recent VoIP clients. The RTP sessions are […]
LLDP – Link Layer Discovery Protocol Fuzzer
[ad] The first Link Layer Discovery Protocol Fuzzer is now available, test cases are also ready to be used along with the tool. The fuzzing architecure makes it easy to extend the tool with new test cases and more LLDP compliant devices arise. LLDP is a Layer 2 protocol which allows network devices to advertise […]