четверг, 18 июля 2019 г.

Why You Should Use a WiFi Channel Scanner

If you are experiencing slow data transmission speeds or dropped connections, a likely cause is interference that is impacting the channel that your router is using. Through the use of a WiFi channel scanner app, you can monitor the channels that you and neighboring routers are using and perhaps change channels.

Many users never change their router channel, leaving it at the manufacturer’s default setting. This may not be the best channel for optimal performance of your WiFi network. Logging into your router lets you change the channel that it will use to transmit its signal. Changing it randomly may solve your issues, but you are far more likely to succeed with the information gleaned from scanning the channels.

In areas where there are a  number of routers with overlapping ranges, moving to an unused channel can dramatically improve the reliability and speed of your WiFi network. Apartment dwellers are particularly prone to having their networks impacted by other routers. Let’s find out how to use a WiFi scanner app to locate the best channel for you to use.

вторник, 28 мая 2019 г.

How to Get Free WiFi

You may want to take advantage of this phenomena and are wondering how you can find free WiFi near your location. There are ads available that can help you in your quest. If you are using a Mac laptop to search for WiFi, the KisMAC application is one option you can try.


KisMAC is an open-source tool that runs on the Mac operating system. It serves a number of functions related to WiFi networks. You can use it as a stumbler to help you locate nearby WiFi hotspots and obtain information regarding their security. The lack of security on a given network lets you directly join the network. If the network turns out to be secured by a password, the tool’s WiFi sniffing capabilities can help you crack the password if you so desire.

вторник, 30 апреля 2019 г.

What is Network Security?

Network security tools

Wireless Network Defensive Tools


Defending a wireless network from attacks by unauthorized users often demands taking preventative measures to thwart their efforts. In many cases, the same tools used by hackers to attempt to subvert your security can be employed to strengthen the safety of your network.

Subjecting your network to an investigation and attempting to crack it will necessitate the use of the same tools that malicious intruders will be wielding. They will allow you to test the strength of your network security and identify flaws that need to be addressed. If you can break into your own network, rest assured, so can the hackers. Here are some tools that can help in that effort.

KisMac2 is an open-source, wireless network discovery tool developed for the Mac OS X operating system. It is a powerful app that can be used to crack WEP and WPA keys using brute force attacks and packet re-injection.


It can scan for networks in active or passive mode and can be helpful in identifying weaknesses in your WiFi network.

Aircrack enables you to identify weak points in your wireless network’s security. You can attempt to crack your encryption password and test the capabilities of your WiFi cards and drivers.


Replay attacks on your network and export packet data to text files for later analysis. It’s a versatile tool that can help prevent rogue access to your wireless network.

NetStumbler is a WiFi stumbler for Windows computers. It automatically scans for wireless networks as soon as launched and supports many available network cards. The free utility has an interface which is reminiscent of Windows Explorer making it easy to navigate.


It can help you find rogue access points and coverage issues with your WiFi network that need to be addressed to enhance security.

пятница, 22 марта 2019 г.

Hardware Tools for Wardriving

What is Wardriving?

Wardriving is commonly perpetrated by individuals driving around in a vehicle while using software and hardware that assists them in locating unsecured networks. The use of a vehicle is not required, and wardrivers can also scan for networks to attack when on foot, on a bicycle, or even by using aircraft. Whatever method of transportation is used, the goal is to secretly penetrate WiFI networks.

Hardware Tools for Wardriving

There are several hardware components that are required in order to practice wardriving.

A mobile device
You need a mobile computing platform in order to conduct wardriving activities. This includes laptops, tablets, smartphones, and other devices such as the Raspberry Pi. These perform overall management of the process and are used to subvert encryption.

Wireless network card and antenna
These are a critical part of the wardriving setup. The wardriver may use the card and antenna built into their mobile device or may opt for additional hardware in order to increase their scanning power. This component provides the ability to remotely monitor the discovered networks.

GPS system
The GPS system is used to determine the exact location of the WiFi routers that have been located. Many of the mobile devices used for wardriving have built-in GPS capabilities.

Software WiFi Sniffers

There are many different software applications that serve the purpose of WiFi sniffing. You can download these tools for just about any operating system. Some of these tools have advanced features that allow you to do more than just locate the nearest wireless network.

Tools such as Wireshark and Network Miner serve as WiFi sniffers for the Windows platform. Users can download tools such as aircrack-ng or Zanti to perform WiFi sniffing on an Android device. There are many applications that enable WiFi sniffing on a Mac as well. We are going to use a free WiFi sniffer named KisMAC to see how you go about capturing WiFi traffic.

четверг, 17 января 2019 г.

How to Hack WiFi with KisMAC

The convenience and flexibility of WiFi networks make them a logical choice when providing Internet access for your home or business. There are a few issues that come along with the mobility that a WiFi network furnishes its users. They are:
Reliability
An Internet connection made with an Ethernet cable is more reliable than a connection made through WiFi. If you use WiFi at all, you have probably experienced the frustration of suddenly losing connectivity. This happens much more frequently with WiFi networks than on a cabled network.
Security
Perhaps the most troubling aspect of using WiFi networks it the security risks posed by a WiFi password hack. If an intruder was compromising your cabled network, there would be physical signs of the unauthorized access. If someone were trying to hack your WiFi password, there is a good chance you would never be aware that an attempt was made. An unscrupulous individual who understood how to hack WiFi passwords could be using your network to enact their own Internet access or gain entry into your network and electronic resources.

Protecting Yourself From a WiFi Hack

We believe that the best way to protect yourself against an intruder who wants to hack your WiFi is to know how to hack a WiFi password yourself. We are going to present a method to do just that by using your Mac computer and a freeware application called KisMAC.
We will be giving you a step-by-step overview of the steps required to use this method and will essentially show you how to hack into WiFi. We are not presenting this information with the intention of allowing others to hack into your Wifi. If that was their intention, there are plenty of other sites that will teach them what they want to know. Our aim is to show that it is feasible that your network could be under attack at this moment without any indication that someone is trying to hack your access password.
It’s better to be armed with this knowledge than to pretend there are no potential dangers inherent in having a wireless network. So let’s take a look at how to hack into WiFi using some simple tools.

How to Hack WiFi Passwords

There are three popular security protocols that can be used to secure your wireless network. They are WEP, WPA, and WPA2. Wired Equivalent Privacy (WEP) is the weakest of the protocols. WiFi Protected Access (WPA) is stronger, followed by WPA2. All of these methods of securing a wireless network can be subverted using the tools we will describe below.
We again want to emphasize that this information is to inform individuals or network administrators regarding the potential that the security of their wireless network can be compromised. Please don’t take our explanation of how to hack WiFi networks as an invitation to attack nearby targets. To do so is a violation of privacy and can lead to criminal charges.
To break into a secured wireless network you need to know the password. If you don’t have the password, you need to use a method known as a “brute force” attack in order to obtain access to the network. This type of attack is very time-consuming and it is not guaranteed to work.
It preys on the fact that many wireless routers and networks are protected by very weak passwords. In some cases, there is no password or the user simply relies on the default, which can easily be found by knowing the model of the router in question.

Steps to Hack WiFi Passwords

In addition to the aforementioned KisMAC application, you will also use a collection of Linux tools known as Aircrack-ng. You also need a password file that contains the actual password of the network you are attacking. Files containing thousands or millions of the most commonly used passwords are available for download on the Internet.