CIP Cyber

Xiaopan OS Wireless Pentesting Distribution

Table of Contents

P { margin-bottom: 0.08in; }A:link { }

http://www.ehacking.net/2014/02/xiaopan-os-wireless-pentesting.htmlXiaopan OS is an easy to use security
and penetration testing with a collection of wireless security and
forensics tools. It includes a number of advanced tools for network
administrators, security professionals and home users to test the
strength of their wireless networks and eliminate any
vulnerabilities.

Based on the Tiny Core Linux (TCL)
operating system (OS), it has a slick graphical user interface (GUI)
requiring no need for typing Linux commands. Xiaopan OS is Windows,
Mac and Linux compatible and users can simply install and boot this
~70mb OS through a USB pen drive or in a virtual machine (VM)
environment.

Some of the tools included are
Inflator, Aircrack-ng, Minidwep GTK, XFE, wifite and feeding bottle.
Supported cards include RTL8187L, RT3070, AR9271 and many more.

Features

  • Run in Parallels Desktop / VMware / VirtualBox
  • Compatible with Yumi Boot / LiLi USB Creator
  • Run on Live CD
  • Packages include: Minidwep, Aircrack, Inflator, Reaver, Feeding Bottle, Wifite
  • 70mb ISO
  • Based on TinyCore Linux
  • Recommended minimum requirements: Pentium 2 or better, 128mb of ram + some swap
  • Recommended: Wireless USB card that supports monitor mode and injection
  • Windows / Linux / Mac Compatible
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Sunset: Dusk VM walkthrough

Sunset: dusk is a vulnerable by design Debian based machine created by whitecrOwz. It is available on https://www.vulnhub.com This machine is ranked as a beginner

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings