![]() ![]() (If a free stumbling app doesn’t cut it, check out our review of more robust commercial options) It also features graphs showing signals by channel, history and usage rating, and it has a signal meter feature to help find access points. You can export the access point list (in XML format) by sending it to email or another app or take a snapshot of the screens. It lists the basic details for access points on the 2.4-GHz band and on supported devices on the 5-GHz band as well. One mobile option is Wifi Analyzer, a free Android app you can use for finding access points on your Android-based smartphone or tablet. If you don’t want to lug around a laptop and have a mobile device, consider using the AirPort Utility on your iOS device or a download an app on your Android. It supports GPS logging and live tracking within the application using Google Earth. Vistumbler supports AP names to help distinguish them, which also helps to detect rogue access points. It's highly customizable and offers flexible configuration options. It also displays graphs of signal levels and channel usage. One example of a stumbler is Vistumbler, an open source Windows application that displays basic AP details, including the exact authentication and encryption methods, and can reveal the SSID and signal level. Even if there are APs set with hidden or non-broadcasted service set identifiers (SSID), some stumblers can quickly reveal them. Or, walking through a property with a stumbler might reveal rogue APs set up by employees or others that could be opening your network to attack. Using a stumbler, you might find networks using weak security protocols, such as WEP or the original version of WPA. They allow you to see nearby access points (AP) and their details, such as signal level, security/encryption type, and media access control (MAC) address. Though typically passive tools, they serve an important purpose. General purpose Wi-Fi stumblers are the simplest tools to add to your pen testing kit. Understanding potential Wi-Fi vulnerabilities can help you to better protect the networks you manage and ensure safer connections when you access other wireless networks. Rather, ethical hacking and legitimate Wi-Fi penetration testing – done in cooperation with the network owner – can help you learn more about the strengths and limitations of wireless security. That doesn’t mean you should infiltrate a company’s network or snoop on a neighbor’s setup. One way to bolster your understanding of Wi-Fi security is to do some hacking yourself. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |