This Metasploit module sniffs passwords like dsniff did in the past.
5e46658a2cd22c9f758515628024007cf0c0b1e7958d7a248a1807601ea0f2c8
Ekahau Real-Time Location System suffers from RC4 cipher stream reuse and weak key derivation flaws. The message payload of the affected solution is always encrypted using the same RC4 cipher stream. When combining two encrypted messages with an XOR operation, the cipher stream will cancel out. With this, an attacker is able to recover the bitwise difference of two plain texts. The 128 bit RC4 key used in the Ekahau setup is trivially derived from the three least significant bytes of the MAC address. The key derivation scheme can be recovered from publicly available program code or any Ekahau tag's EEPROM.
a6ce7b1308744e978d9de9d7f014e08f9af93014056f5d15361dbdf486a9720c
BlackBerry Z10 suffers from a storage and access file-exchange authentication bypass vulnerability.
6ad030936de3e1297588702bfb5cc320dc713c579986b035aa88719f4f3bf757
iPhones running OS 3 have a usability feature where Safari is launched immediately when joining a network. This allows rogue access points a known vector of attack.
f048f1ea52e449199ae2c08e3b737c937896e873aa379fa8eee444f3b52c3198
27 Mhz Wireless Keyboard Analysis Report aka "We know what you typed last summer".
4031665158f89095b76522ddf109f7e9470a039ede93a4d0567d8c5498ed3f04
Brief whitepaper discussing research performed analyzing whether or not a 30 dollar Bluetooth dongle could be transformed into a full blown Bluetooth sniffer.
f3a4af82e005cae51da0d0956e317435cb453b6bea93a309c7b3d0a113cfc977
Wyd is a password profiling tool that is able to parse different types of files and generate a wordlist out of them which can be used for a wordlist attack on passwords. It is very effective to get reasonable passwords from websites or filesystems.
70085fcfa8bfff41d6b6bb4522d9437ad62262ab39fa98d3d8076d54bb06dcb9
Wyd is a tool for password profiling. The general idea is to personalize or profile the available data about a "target" person or system and generate a wordlist of possible passwords/passphrases out of available information. Instead of just using the command 'strings' to extract all the printable characters out of all type of files, we wanted to eliminate as much false-positives as possible. The goal was to exclude as much "unusable" data as possible to get an effective list of possible passwords/passphrases. It is very effective to get reasonable passwords from websites or filesystems.
3581d74785a5071ea404d0bbe59de4768ac89952f157729de10a21ab0abb2277
Hotspotter is a utility that passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names. If the probed network name matches a common hotspot name, Hotspotter will act as an access point to allow the client to authenticate and associate. Once associated, Hotspotter can be configured to run a command, possibly a script to kick off a DHCP daemon and other scanning against the new victim.
575cd3fb0edc9d59df108628351b17282b025240555382eb2e1631f856179f28
Hotspotter is a utility that passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names. If the probed network name matches a common hotspot name, Hotspotter will act as an access point to allow the client to authenticate and associate. Once associated, Hotspotter can be configured to run a command, possibly a script to kick off a DHCP daemon and other scanning against the new victim.
2cab48a6655bc38f9dda95aae013520c8eefeb150ff4e5f15e8d4c057170dfce
CDPsniffer is a small perl Cisco discovery protocol (CDP) decoding sniffer. It sniffs the network traffic, picks out the CDP packets and prints out the decoded protocol contents.
b56dd366d3ff75bcbc91aede8e906e21d5092deb3490fe962f2f3869a524da01
Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.
c516ea342b2470327fe3ac93c60d52d7e904708f1d0b9311e7cf6162147c1290
Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.
1b7fd54fe9783cb5628608cd06f03db29b2a574fe5ce177b9968b69def8f5761
Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.
15ea9497bbc295093a3cd7a2813f0cad7fe685ab4d05301b98a8db1f1684f5a5
Wellenreiter is a GTK/Perl program that makes the discovery and the auditing of 802.11b wireless-networks much easier. It has an embedded statistics engine for the common parameters provided by the wireless drivers, enabling you to view details about the consistency and signal strength of the network. A scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks in every channel, automatically switching frequencies. Wellenreiter can run on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs).
e29aefc4d0b5d3e41b50de9616f26d4aab71735ee8853e32525eec13011918a8
Wellenreiter is a GTK/Perl program that makes the discovery and the auditing of 802.11b wireless-networks much easier. It has an embedded statistics engine for the common parameters provided by the wireless drivers, enabling you to view details about the consistency and signal strength of the network. A scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks in every channel, automatically switching frequencies. Wellenreiter can run on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs).
b40851db96e46b4817e4d858df01930ebfc9ab68ce7d8225f0429584dcf000e8
Wellenreiter is a GTK/Perl program that makes the discovery and the auditing of 802.11b wireless-networks much easier. It has an embedded statistics engine for the common parameters provided by the wireless drivers, enabling you to view details about the consistency and signal strength of the network. A scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks in every channel, automatically switching frequencies. Wellenreiter can run on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs).
c9b6dc3395ff1b64fbe2b8c00b21bac822f84ceb255603b81ce306b90c3453cd