
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Wireless Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/wireless/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.technig.com/tag/wireless/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Sat, 23 May 2020 01:11:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>Wireless Archives - TECHNIG</title>
	<link>https://www.technig.com/tag/wireless/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>5 Steps to Secure your Home Wireless Network</title>
		<link>https://www.technig.com/5-steps-to-secure-your-home-wireless-network/</link>
					<comments>https://www.technig.com/5-steps-to-secure-your-home-wireless-network/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 01 Dec 2016 02:10:21 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Secure Wi-Fi]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[Wireless Configuration]]></category>
		<category><![CDATA[Wireless Router]]></category>
		<category><![CDATA[WPA2]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=246</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2014/11/Configure-and-Secure-Wireless-Network.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure and Secure Wireless Network" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2014/11/Configure-and-Secure-Wireless-Network.jpg 840w, https://www.technig.com/wp-content/uploads/2014/11/Configure-and-Secure-Wireless-Network-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2014/11/Configure-and-Secure-Wireless-Network-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>Almost all houses are equipped with Wireless Network equipment nowadays, but most users do not know enough about the security of Wireless Network. If we search around a bit, carefully we find many Wifi Network with the default name. When the SSID (Service Set Identifier) is by default or factory name, maybe the password is also. So let&#8217;s see some steps of securing a [&#8230;]</p>
<p>The post <a href="https://www.technig.com/5-steps-to-secure-your-home-wireless-network/">5 Steps to Secure your Home Wireless Network</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2014/11/Configure-and-Secure-Wireless-Network.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure and Secure Wireless Network" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2014/11/Configure-and-Secure-Wireless-Network.jpg 840w, https://www.technig.com/wp-content/uploads/2014/11/Configure-and-Secure-Wireless-Network-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2014/11/Configure-and-Secure-Wireless-Network-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>Almost all houses are equipped with Wireless Network equipment nowadays, but most users do not know enough about the security of Wireless Network. If we search around a bit, carefully we find many Wifi Network with the default name. When the SSID (Service Set Identifier) is by default or factory name, maybe the password is also.</p>
<p>So let&#8217;s see some steps of securing a home Wireless network to protect our network from being hacked by hackers or neighbour kids;).</p>
<h2><strong>1. Find a Good WAP for Home Wireless Network </strong></h2>
<p>Buying a good branded Wireless Access Point (AP) which support newly strong wireless security protocols with flexible features and try to install and configure it correctly. If you don&#8217;t know how to install, configure and secure the WAP, ask someone expert or read the Guide Notes. Be careful, don&#8217;t use it by default.</p>
<h3><strong>2. Change the Default SSID of Access Point</strong></h3>
<p>Change the default name and hide it by turning off SSID broadcasting and connect all wireless devices manually. When a Wireless Network SSID is hidden the wireless access point doesn&#8217;t broadcast its name around, and no one can find and guess it simply. But it&#8217;s possible to find with wireless Hacking tools.</p>
<figure id="attachment_247" aria-describedby="caption-attachment-247" style="width: 864px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2016/11/Systems-Security-Certified-Practitioner.jpg/wp-content/uploads/2014/11/Wireless-Name.png"><img decoding="async" class="wp-image-247 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Wireless-Name.png" alt="Wireless Name" width="864" height="378" srcset="https://www.technig.com/wp-content/uploads/2014/11/Wireless-Name.png 864w, https://www.technig.com/wp-content/uploads/2014/11/Wireless-Name-300x131.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Wireless-Name-768x336.png 768w" sizes="(max-width: 864px) 100vw, 864px" /></a><figcaption id="caption-attachment-247" class="wp-caption-text">Wireless Name</figcaption></figure>
<h3><strong>3. Enable Security with WPA2 and Strong Password</strong></h3>
<p>Enable Security options of  Wireless Access Point with a most strong wireless security protocol like WPA2 (Wi-Fi Protected Access II) and set a complex password. A complex password contains Number, Symbols, lower case letter and upper case letter.</p>
<figure id="attachment_248" aria-describedby="caption-attachment-248" style="width: 867px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Wi-Fi-Protected-Access.png"><img decoding="async" class="wp-image-248 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Wi-Fi-Protected-Access.png" alt="Wi-Fi Protected Access" width="867" height="190" srcset="https://www.technig.com/wp-content/uploads/2014/11/Wi-Fi-Protected-Access.png 867w, https://www.technig.com/wp-content/uploads/2014/11/Wi-Fi-Protected-Access-300x66.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Wi-Fi-Protected-Access-768x168.png 768w" sizes="(max-width: 867px) 100vw, 867px" /></a><figcaption id="caption-attachment-248" class="wp-caption-text">Wi-Fi Protected Access</figcaption></figure>
<h4><strong>4. Enable MAC Address Filtering</strong></h4>
<p>MAC Filtering (Media Access Controller) prevent unknown devices from being connected to WAP without your permission. You see tow option, Deny and Allow, the deny option will deny the clients specified by any enabled entries in the list to access. Allow option will permit the clients specified by any enabled entries in the list to access the WAP.</p>
<figure id="attachment_249" aria-describedby="caption-attachment-249" style="width: 854px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Wi-Fi-MAC-Address-filtering.png"><img loading="lazy" decoding="async" class="wp-image-249 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Wi-Fi-MAC-Address-filtering.png" alt="Wi-Fi MAC Address filtering" width="854" height="486" srcset="https://www.technig.com/wp-content/uploads/2014/11/Wi-Fi-MAC-Address-filtering.png 854w, https://www.technig.com/wp-content/uploads/2014/11/Wi-Fi-MAC-Address-filtering-300x171.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Wi-Fi-MAC-Address-filtering-768x437.png 768w" sizes="(max-width: 854px) 100vw, 854px" /></a><figcaption id="caption-attachment-249" class="wp-caption-text">Wi-Fi MAC Address filtering</figcaption></figure>
<p><span style="color: #339966;"><strong>Note:</strong> </span>You can find the MAC address of your connected devices from the DHCP section of WAP and get the others from its network settings or using soft tools to find them. The easiest way to get the MAC address of all devices, first connect them to WAP and then check the DHCP Clients List.</p>
<figure id="attachment_250" aria-describedby="caption-attachment-250" style="width: 855px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/DHCP-Clients-list.png"><img loading="lazy" decoding="async" class="wp-image-250 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/DHCP-Clients-list.png" alt="DHCP Clients list" width="855" height="183" srcset="https://www.technig.com/wp-content/uploads/2014/11/DHCP-Clients-list.png 855w, https://www.technig.com/wp-content/uploads/2014/11/DHCP-Clients-list-300x64.png 300w, https://www.technig.com/wp-content/uploads/2014/11/DHCP-Clients-list-768x164.png 768w" sizes="(max-width: 855px) 100vw, 855px" /></a><figcaption id="caption-attachment-250" class="wp-caption-text">DHCP Clients list</figcaption></figure>
<h3><strong>5. Change the Interface default username and password</strong></h3>
<p>Change the factory default username and password of the web-based interface of Wireless Access Point and set a different username and secure password. Each manufacturer Wireless Routers has a simple username and password like Admin, pass or 12345 to ease access for the first time.</p>
<figure id="attachment_251" aria-describedby="caption-attachment-251" style="width: 852px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Change-Wireless-Access-Point-default-password.png"><img loading="lazy" decoding="async" class="wp-image-251 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Change-Wireless-Access-Point-default-password.png" alt="Change Wireless Access Point default password" width="852" height="505" srcset="https://www.technig.com/wp-content/uploads/2014/11/Change-Wireless-Access-Point-default-password.png 852w, https://www.technig.com/wp-content/uploads/2014/11/Change-Wireless-Access-Point-default-password-300x178.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Change-Wireless-Access-Point-default-password-768x455.png 768w" sizes="(max-width: 852px) 100vw, 852px" /></a><figcaption id="caption-attachment-251" class="wp-caption-text">Change Wireless Access Point default password</figcaption></figure>
<p><strong>Optionally</strong>, you can configure DHCP (Dynamic Host Configuration Protocol) to limit the range of IP address from DHCP scope.</p>
<figure id="attachment_252" aria-describedby="caption-attachment-252" style="width: 862px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/DHCP-Scope.png"><img loading="lazy" decoding="async" class="wp-image-252 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/DHCP-Scope.png" alt="DHCP Scope" width="862" height="255" srcset="https://www.technig.com/wp-content/uploads/2014/11/DHCP-Scope.png 862w, https://www.technig.com/wp-content/uploads/2014/11/DHCP-Scope-300x89.png 300w, https://www.technig.com/wp-content/uploads/2014/11/DHCP-Scope-768x227.png 768w" sizes="(max-width: 862px) 100vw, 862px" /></a><figcaption id="caption-attachment-252" class="wp-caption-text">DHCP Scope</figcaption></figure>
<p>Finally, you must keep Wireless Access Point in a secure area or in a box and locked to prevent from being reset to factory settings. Don&#8217;t forget to check it up sometime and update your knowledge about Information Security.</p>
<p>So it is enough for Securing a SOHO (small office or home) network. If you don&#8217;t know the basic Wireless Access point configuration, I recommend you to read the <strong><a href="https://www.technig.com/how-to-setup-a-home-wireless-network/">How to Setup My Home Wireless </a>Network? </strong>article.</p>
<p>The post <a href="https://www.technig.com/5-steps-to-secure-your-home-wireless-network/">5 Steps to Secure your Home Wireless Network</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/5-steps-to-secure-your-home-wireless-network/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">246</post-id>	</item>
		<item>
		<title>10 Most Popular Wireless Hacking Tools</title>
		<link>https://www.technig.com/popular-wireless-hacking-tools/</link>
					<comments>https://www.technig.com/popular-wireless-hacking-tools/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Sat, 17 Oct 2015 19:05:41 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[Wireless Hacking Tools]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=3748</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="860" height="494" src="https://www.technig.com/wp-content/uploads/2015/10/Popular-Wireless-Hacking-Tools-.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Popular Wireless Hacking Tools" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/10/Popular-Wireless-Hacking-Tools-.png 860w, https://www.technig.com/wp-content/uploads/2015/10/Popular-Wireless-Hacking-Tools--300x172.png 300w, https://www.technig.com/wp-content/uploads/2015/10/Popular-Wireless-Hacking-Tools--768x441.png 768w, https://www.technig.com/wp-content/uploads/2015/10/Popular-Wireless-Hacking-Tools--750x430.png 750w" sizes="(max-width: 860px) 100vw, 860px" /></div>
<p>Wireless Hacking Tools for all platforms. The Wireless security and configuration. Here is the list of most popular Wireless Hacking Tools for Wireless Penetration testing. These tools are most well known wireless hacking tools in Linux and Windows environment. These tools are using for wireless network penetration testing and troubleshooting. If you want to study about wireless [&#8230;]</p>
<p>The post <a href="https://www.technig.com/popular-wireless-hacking-tools/">10 Most Popular Wireless Hacking Tools</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="860" height="494" src="https://www.technig.com/wp-content/uploads/2015/10/Popular-Wireless-Hacking-Tools-.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Popular Wireless Hacking Tools" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/10/Popular-Wireless-Hacking-Tools-.png 860w, https://www.technig.com/wp-content/uploads/2015/10/Popular-Wireless-Hacking-Tools--300x172.png 300w, https://www.technig.com/wp-content/uploads/2015/10/Popular-Wireless-Hacking-Tools--768x441.png 768w, https://www.technig.com/wp-content/uploads/2015/10/Popular-Wireless-Hacking-Tools--750x430.png 750w" sizes="(max-width: 860px) 100vw, 860px" /></div><p>Wireless Hacking Tools for all platforms. The Wireless security and configuration. Here is the list of most popular Wireless Hacking Tools for Wireless Penetration testing. These tools are most well known wireless hacking tools in Linux and Windows environment. These tools are using for wireless network penetration testing and troubleshooting.</p>
<p>If you want to study about wireless security and hacking, the best online tutorials are on udemy website and offensive security Wifu course.</p>
<h2>10 Popular Wireless Hacking Tools</h2>
<figure id="attachment_3750" aria-describedby="caption-attachment-3750" style="width: 226px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/10/aircrack-ng-Wireless-Password-Cracking-Tools-.jpg"><img loading="lazy" decoding="async" class="wp-image-3750 size-full" src="https://www.technig.com/wp-content/uploads/2015/10/aircrack-ng-Wireless-Password-Cracking-Tools-.jpg" alt="aircrack-ng Wireless Password Cracking Tools" width="226" height="110" /></a><figcaption id="caption-attachment-3750" class="wp-caption-text">aircrack-ng Wireless Hacking Tools</figcaption></figure>
<h3><strong>#1. Aircrack-ng</strong></h3>
<p>Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.</p>
<p>In fact, Aircrack-ng is a set of tools for auditing wireless networks.</p>
<figure id="attachment_3751" aria-describedby="caption-attachment-3751" style="width: 184px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/10/Fern-Wifi-Cracker-Tools.png"><img loading="lazy" decoding="async" class="wp-image-3751 size-full" src="https://www.technig.com/wp-content/uploads/2015/10/Fern-Wifi-Cracker-Tools.png" alt="Fern Wifi Cracker Tools" width="184" height="213" /></a><figcaption id="caption-attachment-3751" class="wp-caption-text">Fern Wifi Cracking Tools</figcaption></figure>
<h3><strong>#2. Fern Wi-fi Cracker </strong></h3>
<p>Fern Wifi Cracker is a Wireless security auditing and attack software program written using thePython Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network-based attacks on wireless or ethernet based networks.</p>
<figure id="attachment_3754" aria-describedby="caption-attachment-3754" style="width: 245px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/10/Kismet-Wi-Fi-Cracking-Tool.png"><img loading="lazy" decoding="async" class="wp-image-3754 size-full" src="https://www.technig.com/wp-content/uploads/2015/10/Kismet-Wi-Fi-Cracking-Tool.png" alt="Kismet Wi-Fi Cracking Tool" width="245" height="100" /></a><figcaption id="caption-attachment-3754" class="wp-caption-text">Kismet Wi-Fi Cracking Tool</figcaption></figure>
<h3><strong>#3. Kismet </strong></h3>
<p>Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT</p>
<p><strong>Features:</strong></p>
<ul style="list-style-type: circle;">
<li>802.11b, 802.11g, 802.11a, 802.11n sniffing</li>
<li>Standard PCAP file logging (Wireshark, Tcpdump, etc)</li>
<li>Client/Server modular architecture</li>
<li>Multi-card and channel hopping support</li>
<li>Runtime WEP decoding</li>
<li>Tun/Tap virtual network interface drivers for realtime export of packets</li>
<li>Hidden SSID decloaking</li>
<li>Distributed remote sniffing with Kismet drones</li>
<li>XML logging for integration with other tools</li>
<li>Linux, OSX, Windows, and BSD support (devices and drivers permitting)</li>
</ul>
<figure id="attachment_3756" aria-describedby="caption-attachment-3756" style="width: 340px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/10/Reaver-Brute-force-attack-against-Wifi-Protected-Setup.jpg"><img loading="lazy" decoding="async" class="wp-image-3756 size-full" src="https://www.technig.com/wp-content/uploads/2015/10/Reaver-Brute-force-attack-against-Wifi-Protected-Setup.jpg" alt="Reaver Brute force attack against Wifi Protected Setup" width="340" height="70" srcset="https://www.technig.com/wp-content/uploads/2015/10/Reaver-Brute-force-attack-against-Wifi-Protected-Setup.jpg 340w, https://www.technig.com/wp-content/uploads/2015/10/Reaver-Brute-force-attack-against-Wifi-Protected-Setup-300x62.jpg 300w" sizes="(max-width: 340px) 100vw, 340px" /></a><figcaption id="caption-attachment-3756" class="wp-caption-text">Reaver Brute force attack against Wifi Protected Setup</figcaption></figure>
<h3><strong>#4. Reaver</strong></h3>
<p>Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in <a href="https://www.technig.com/wp-content/uploads/2015/10/viehboeck_wps.pdf" target="_blank" rel="noopener noreferrer">reaver help pdf</a> file.</p>
<p>Reaver has been designed to be a robust and practical attack against WPS and has been tested against a wide variety of access points and WPS implementations.</p>
<p>On average Reaver will recover the target AP&#8217;s plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase</p>
<p><strong>Download:</strong> <a href="https://code.google.com/p/reaver-wps/downloads/list" target="_blank" rel="noopener noreferrer">Reaver Wi-Fi cracking </a></p>
<figure id="attachment_3759" aria-describedby="caption-attachment-3759" style="width: 399px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/10/Wifite-automated-wireless-auditor.jpg"><img loading="lazy" decoding="async" class="wp-image-3759 size-full" src="https://www.technig.com/wp-content/uploads/2015/10/Wifite-automated-wireless-auditor.jpg" alt="Wifite automated wireless auditor" width="399" height="138" srcset="https://www.technig.com/wp-content/uploads/2015/10/Wifite-automated-wireless-auditor.jpg 399w, https://www.technig.com/wp-content/uploads/2015/10/Wifite-automated-wireless-auditor-300x104.jpg 300w" sizes="(max-width: 399px) 100vw, 399px" /></a><figcaption id="caption-attachment-3759" class="wp-caption-text">Wifite automated wireless auditor</figcaption></figure>
<h3>#5. Wifite</h3>
<p>To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the &#8220;set it and forget it&#8221; wireless auditing tool.</p>
<p><strong>Features: </strong></p>
<ul style="list-style-type: circle;">
<li>sorts targets by signal strength (in dB); cracks closest access points first</li>
<li>automatically de-authenticates clients of hidden networks to reveal SSIDs</li>
<li>numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)</li>
<li>customizable settings (timeouts, packets/sec, etc)</li>
<li>&#8220;anonymous&#8221; feature; changes MAC to a random address before attacking, then changes back when attacks are complete</li>
<li>all captured WPA handshakes are backed up to wifite.py&#8217;s current directory</li>
<li>smart WPA de-authentication; cycles between all clients and broadcast deauths</li>
<li>stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit</li>
<li>displays session summary at exit; shows any cracked keys</li>
<li>all passwords saved to cracked.txt</li>
<li>built-in updater: <tt>./wifite.py -upgrade</tt></li>
</ul>
<p><strong>Download:</strong> <a href="https://github.com/derv82/wifite" target="_blank" rel="noopener noreferrer">Wifite </a>from github. See the <a href="https://www.technig.com/5-ways-to-hack-wireless-network/" target="_blank" rel="noopener noreferrer">Ways to Hack Wireless Network</a> article.</p>
<figure id="attachment_3760" aria-describedby="caption-attachment-3760" style="width: 204px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/10/coWPATTY.png"><img loading="lazy" decoding="async" class="wp-image-3760 size-full" src="https://www.technig.com/wp-content/uploads/2015/10/coWPATTY.png" alt="coWPATTY" width="204" height="48" /></a><figcaption id="caption-attachment-3760" class="wp-caption-text">coWPATTY</figcaption></figure>
<h3>#6. Cowpatty</h3>
<p>Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal). Many enterprise networks deploy PSK-based authentication mechanisms for WPA/WPA2 since it is much easier than establishing the necessary RADIUS, supplicant and certificate authority architecture needed for WPA-Enterprise authentication. Cowpatty can implement an accelerated attack if a precomputed PMK file is available for the SSID that is being assessed. It&#8217;s a good Wireless hacking tool.</p>
<figure id="attachment_3762" aria-describedby="caption-attachment-3762" style="width: 214px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/10/inSSIDer.png"><img loading="lazy" decoding="async" class="wp-image-3762 size-full" src="https://www.technig.com/wp-content/uploads/2015/10/inSSIDer.png" alt="inSSIDer" width="214" height="84" /></a><figcaption id="caption-attachment-3762" class="wp-caption-text">inSSIDer</figcaption></figure>
<h3>#7. NetStumbler and InSSIDer</h3>
<p>NetStumbler (also known as Network Stumbler) is a tool for Windows that facilitates detection of Wireless LANsusing the 802.11b, 802.11a and 802.11g WLAN standards. It runs on Microsoft Windows operating systems from Windows 2000 to Windows XP. A trimmed-down version called MiniStumbler is available for the handheld Windows CE operating system.</p>
<p>It&#8217;s an old tool but the new one is InSSIDer. It was created as an alternative to Network Stumbler for the current generation of Windows operating system.</p>
<p><strong>Some Features of InSSIDer:</strong></p>
<ul style="list-style-type: circle;">
<li>Gathers information from wireless card and software</li>
<li>Help choose the best wireless channel available</li>
<li>Wi-Fi network information such as SSID, MAC, vendor, data rate, signal strength, and security</li>
<li>Graphs signal strength over time</li>
<li>Shows which Wi-Fi network channels overlap</li>
<li>GPS support &#8211; Wireless Hacking Tools</li>
<li>Export to Netstumbler (.ns1) files</li>
<li>KML logging</li>
</ul>
<p><strong>Download:</strong> <a href="https://www.netstumbler.com/downloads/" target="_blank" rel="noopener noreferrer">Network Stumbler</a> and <a href="https://www.inssider.com/downloads/" target="_blank" rel="noopener noreferrer">InSSIDer </a>Wi-Fi Scanner tools</p>
<p>There more tools but these are the most popular Wireless hacking tools. If I forgot to bring some valuable Wireless password cracking tools, please let me know and I will add to this lists of Wireless Hacking Tools.</p>
<p>Anyway as I told you the best platform for Wireless penetration testing is Kali Linux. So you can see the list of pre-installed Wireless Hacking tools in Kali Linux on the screenshot.</p>
<figure id="attachment_3763" aria-describedby="caption-attachment-3763" style="width: 667px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/10/Wireless-Cracking-Tools.jpg"><img loading="lazy" decoding="async" class="wp-image-3763 size-full" src="https://www.technig.com/wp-content/uploads/2015/10/Wireless-Cracking-Tools.jpg" alt="Popular Wireless Hacking Tools" width="667" height="711" srcset="https://www.technig.com/wp-content/uploads/2015/10/Wireless-Cracking-Tools.jpg 667w, https://www.technig.com/wp-content/uploads/2015/10/Wireless-Cracking-Tools-281x300.jpg 281w" sizes="(max-width: 667px) 100vw, 667px" /></a><figcaption id="caption-attachment-3763" class="wp-caption-text">Popular Wireless Hacking Tools</figcaption></figure>
<p>Hope you enjoy the Wireless hacking with these tools in Kali Linux. Just comment us your questions and suggestions about most popular wireless hacking tools.</p>
<p><strong>Related Search: </strong></p>
<p>Best Wifi Hacking Tools. wifi hacking tools for windows 10 free download.<br />
wifi hacking tools free download.<br />
wifi hacking tools for android.<br />
best wifi hacker for android.<br />
wifi hack tools.<br />
wifi hacking software.<br />
wifi hack tool apk.<br />
wifi hacking software free download full version.</p>
<p>The post <a href="https://www.technig.com/popular-wireless-hacking-tools/">10 Most Popular Wireless Hacking Tools</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/popular-wireless-hacking-tools/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3748</post-id>	</item>
	</channel>
</rss>
