CIP Cyber

WiFi Penetration Testing Tools

Table of Contents

WiFi or wireless penetration testing is
an important aspect of any security audit project, organizations are
facing serious threats from their insecure WiFi network. A
compromised wifi puts the entire network at risks. Consider the
recent darkhotel attack, where the top business executives were the
target and the attacker were targeting them by hacking into the
insecure hotel WiFI network. The moral of the story is that, “the
organizations should include a WiFi penetration testing process in
their regular security procedure”.
There is the little difference between
a network vulnerability assessment tool and WiFi vulnerability scanners, so here is the quick list of the tools that could be very
useful while performing WiFi penetration testing.

Aircrack-ng

Aircrack-ng is an 802.11 WEP and
WPA-PSK keys cracking program that can recover keys once enough data
packets have been captured. It implements the standard FMS attack
along with some optimizations like KoreK attacks, as well as the
all-new PTW attack, thus making the attack much faster compared to
other WEP cracking tools. In fact, Aircrack-ng is a set of tools for
auditing wireless networks.

Kismet

Kismet is an 802.11 layer2 wireless
network detector, sniffer, and intrusion detection system. Kismet
will work with any wireless card which supports raw monitoring
(rfmon) mode, and (with appropriate hardware) can sniff 802.11b,
802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins
which allow sniffing other media such as DECT.

Netstumbler

Netstumbler is the best known Windows
tool for finding open wireless access points (“wardriving“).
They also distribute a WinCE version for PDAs and such named
MiniStumbler. The tool is currently free but Windows-only and no
source code is provided. It uses a more active approach to finding
WAPs than passive sniffers such as Kismet or KisMAC.

InSSIDer

inSSIDer is a wireless network scanner
for Windows, OS X, and Android. It was designed to overcome
limitations of NetStumbler, namely not working well on 64-bit Windows
and Windows Vista. inSSIDer can find open wireless access points,
track signal strength over time, and save logs with GPS records.

KisMAC

This popular wireless stumbler for Mac
OS X offers many of the features of its namesake Kismet, though the
codebase is entirely different. Unlike console-based Kismet, KisMAC
offers a pretty GUI and was around before Kismet was ported to OS X.
It also offers mapping, Pcap-format import and logging, and even some
decryption and deauthentication attacks.
Bonus Tools
Kali Linux the
successor of backtrack linux has most of the tools configured already
but if you need to configure the additional tools then it could be
done easily. Beyond the tools mentioned above, we have some important
and relevant tools that should be mentioned, so here we go:

Reaver-WPS

Reaver performs a
brute force attack against an access point’s WiFi Protected Setup pin
number. Once the WPS pin is found, the WPA PSK can be recovered and
alternately the AP’s wireless settings can be reconfigured.

Fern WiFi Cracker

Fern wifi cracker
is a wireless security auditing application that is written in python
and uses python-qt4. This application uses the aircrack-ng suite of
tools.
If your favorite
tool is not given above, then let us know with a reason to add it to
the list 🙂
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Sunset: Dusk VM walkthrough

Sunset: dusk is a vulnerable by design Debian based machine created by whitecrOwz. It is available on https://www.vulnhub.com This machine is ranked as a beginner

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings