![Page 1: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/1.jpg)
Wireless Tools
Training materials for wireless trainers
![Page 2: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/2.jpg)
2
Goals
‣ The goal of this talk is to provide an introduction to a few software tools that will help you to:
‣ monitor your WiFi network to identify problems
‣ perform security audits and prevent attacks
‣ observe the ongoing performance of your network and plan for future needs
‣ detect interference
![Page 3: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/3.jpg)
3
Types of wireless tools
‣Network ESSID scannersWireless protocol analyzersEncryption cracking tools
‣Wireless device auditing and management
‣“War driving” tools: network mapping
‣Spectrum analysis
![Page 4: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/4.jpg)
4
Built-in wireless clients
![Page 5: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/5.jpg)
5
NetStumblerhttp://www.stumbler.net/
![Page 6: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/6.jpg)
6
http://www.vistumbler.net/
![Page 7: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/7.jpg)
7
Kismethttp://www.kismetwireless.net/
![Page 8: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/8.jpg)
8
KisMAChttp://www.kismac-ng.org/
![Page 9: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/9.jpg)
9
Handheld wireless clients
9
![Page 10: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/10.jpg)
10
+
10
![Page 11: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/11.jpg)
11
=extremely powerful wireless protocol analyzer
![Page 12: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/12.jpg)
12
![Page 13: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/13.jpg)
13
‣WPA2-PSK Rainbow Tables: 1 million common passwords x 1,000 common SSIDs. 40 GB of lookup tables available on DVDs.
http://www.renderlab.net/projects/WPA-tables/
http://www.willhackforsushi.com/Cowpatty.html
‣ Implementation of an offline dictionary attack against WPA-PSK and WPA2-PSK networks
13
![Page 14: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/14.jpg)
14
http://www.etherpeg.org/Etherpeg
![Page 15: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/15.jpg)
15
http://www.ex-parrot.com/~chris/driftnet/Driftnet
![Page 16: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/16.jpg)
16
‣Network and port scanner
‣Rogue AP detection
‣Scans any number of ports on any number of hosts
‣Sophisticated stealth scanning
‣ Idle, undetectable service “scanning”
‣Available for all platforms
http://nmap.org/
![Page 17: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/17.jpg)
17
http://www.mikrotik.com/thedude.phpThe Dude
‣ The Dude network monitor is a network auditing and monitoring tool by MikroTik.
‣ The Dude automatically scans devices within specified subnets, draws a map of the networks monitors services and sends alerts when there are problems.
‣ Only available for Windows.
![Page 18: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/18.jpg)
18
http://www.metageek.net/
Wi-Spy spectrum analyzer
![Page 19: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/19.jpg)
19
Chanalyzer
![Page 20: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/20.jpg)
20
Spectools
![Page 21: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/21.jpg)
21
EaKiuhttp://www.metageek.net/
![Page 22: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/22.jpg)
22
http://www.ubnt.com/
Ubiquiti AirView
![Page 23: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/23.jpg)
23
Conclusion‣Network ESSID scanners will find neighboring WiFi
networks and provide basic information about them.Wireless protocol analyzers log captured data for later analysis.Encryption cracking tools can be used to test the security of your own networks.
‣Wireless device auditing and management tools automate the process of managing access points on your network.
‣“War driving” tools allow you to plot the physical range of your network on a map.
‣Spectrum analysis tools can show you sources of radio interference not necessarily caused by WiFi.
23
![Page 24: Wireless Tools Training materials for wireless trainers](https://reader038.vdocuments.mx/reader038/viewer/2022110101/56649ed95503460f94be77bd/html5/thumbnails/24.jpg)
For more details about the topics presented in this lecture, please see the book Wireless Networking in the Developing World, available as free download in many languages at:
http://wndw.net/
For more details about the topics presented in this lecture, please see the book Wireless Networking in the Developing World, available as free download in many languages at:
http://wndw.net/
Thank you for your attentionThank you for your attention