Thursday, March 15, 2012

wirless hack

Wireshark

On September midweek wireshark has been listed as most important open source program which can help a network Administrator for the windows platform. It is available for all platforms including Mac OS and Linux. The windows version works with ease and can help you to perfectly determine all the loop holes in your wireless network. In short, you can count it as something which can provide you better security if used under ethical aspect and it can be lethal if used for ethical means. All manuals and working principles are provide with the program.

Kismet

A very simple yet effective program to find hidden wireless networks. There is nothing that a network admin can do to hide wireless channel from this program.It can easily identify802.11n,802.11g, 802.11a,  and 802.11b channels. All one can do is to provide a tough encryption (wep + wpa) so that the network is hard to break in. Though there are tools which can break it as well if cunningly exploited.

Network Miner

It is a very rarely used tool but I loved the way it functions. Many professional users are very much aware of it but wont easily share it up with all. It was developed as Forensic Analytic tool for Netresec, but every ethical tool has been blended to work for unethical purpose by hackers.
It supports a lot of features including Geo IP localization, command line scripting and OS fingerprinting. There are two version available for this tool – Free and Professional.  A little bit of digging in Google can help you find a full version.

Net Stumbler

A very old program and I guess the development has been discontinued after 2009. You can download the program form the official website. The best thing about this program is that it can help you with many things under one graphical user interface. Though it is not as much as efficient as the other tools listed in here but it is a good starter kit for beginners.
It was very popularly used for war driving during the last part of the decade. The tool is not much lethal for modern day encryption but it is definitely competent enough to challenge the wireless network.

Yersinia

The current version supports Cisco VTP DoS exploit. It is best suited to find some major flaws in the network protocol and rectify/exploit them. It is used by many ethical hackers to test the deployed network architecture. It can be used to test and compromise DHCP, Inter-switch Link protocol and VLAN Trunking protocol. If you are serious about learning the steps of wireless hacking, this tool can definitely be your helping and learning guide.

Nmap

Network Mapper is an open source program available under GPL. It was designed as security auditor and later implemented by many hackers for reverse engineering purpose. The basic steps are very easy to understand and it can be a good tool to carry out post process tasks after carrying out the wireless attack. It has a bunch of versatile functions and almost all of the functions can be easily used by any starter to pro hacker.

Air Snort

If there is any tool which can be used to test and penetrate any wireless network, we are definitely talking about Air Snort. It can sniff fragments of packets from the wireless channel and can easily arrange them to break the hash key to compromise the network. The only protection from this tool is to change your Authentication key frequently and manage an access list for granting the access permission.

How to clear Log files and Cache after the Attack

Wireless hacking tools are easy to download and implement but you might become a victim if a trace back is done. To ensure that you are always protected from ping back do remember to implement these feel safe steps:
  1. Change You MAC address before you start testing/ exploiting any network.
  2. Do not use or surf sites which can help identify your where about.
  3. Do not use Gmail, yahoo or any such sites which requires user-name, password.
  4. Clear all temporary file and cookies after you are done testing/ exploiting wireless networks.
  5. Clear all logs from the router settings by simply clearing them from the router settings. Different routers have different settings for storing log files. You will have to manually scan all the features to find this thing.
  6. Use Log deleter to ease your trouble.
  7. Follow the rules and regulations defined in your country and stay out of trouble.
Some people might find this article as negatively inclined, but in this field of ethics and exploitation you must learn what evil steps are so that you can counterfeit them to build a more secure network. Be curious, be wise.

0 comments:

Post a Comment