Professional Documents
Culture Documents
0 transitional//en">
<!-- saved from url=(0048)http://www.ethicalhacker.net/content/view/16/24/ -->
<?xml version="1.0" encoding="iso-8859-1"?><html
xmlns="http://www.w3.org/1999/xhtml"><head><title>the ethical hacker network -
essential wireless hacking tools</title>
<meta content="essential wireless hacking tools" name=title>
<meta content=don name=author>
<meta
content="the ethical hacker network - your educational authority on penetration
testing and incident response., ethical hacker network, articles, columnists,
essential wireless hacking tools"
name=description>
<meta
content="hacking, hack, hacker, ethical hacking, ethical hacker, ec-council, ceh,
certified ethical hacker, pen test, pen testing, penetration testing, tiger team,
black hat, grey hat, white hat, red hat, linux, unix, windows, windows xp, windows
vista, server 2003, windows server 2003, sans, giac, cpts, certified pen testing
specialist, cpte, certified pen testing expert, gcih, giac certified incident
handler, 2600, hacker quarterly, ec council, incident response, cirt, cert, cce,
mcce, isfce, mile2, preplogic, career academy, cbt, cbt nuggets, blue hat,
microsoft, ceh, chfi, computer forensics, forensic, forensics, penetration test,
hacking for dummies, hackers, hacked, certification, cert, certificate, certified,
security, learn to hack, root kit, rootkit, exploit framework, metasploit, canvas,
core impact, cain & abel, cain and abel, password crack, tutorial, mass media,
articles, columns, features, /root, csi, computer security, sans, sans institute,
career hacking, infosec, cyber, cissp, cwna, wireless hacking, hoffman,
netstumbler, kismet, airsnort, cowpatty, asleap, ethereal"
name=keywords>
<meta content="mshtml 6.00.2900.3020" name=generator>
<meta content="index, follow" name=robots>
<script type=text/javascript><!--
function send_form(form_id){document.getelementbyid('a'+form_id).submit();}
//--></script>
<style type=text/css>hr {
clear: both; margin-top: 5px
}
.link_pos {
float: right; background-color: transparent
}
.sub_bttn {
border-top-width: 0px; padding-right: 0px; padding-left: 0px; border-left-
width: 0px; float: right; background-image: url(http://www.ethicalhacker.net);
border-bottom-width: 0px; padding-bottom: 0px; width: 120px; padding-top: 0px;
height: 18px; background-color: #000000; border-right-width: 0px
}
.dsc_bar {
clear: both; display: block
}
</style>
<link title="the ethical hacker network"
href="http://www.ethicalhacker.net/index2.php?option=com_rss&feed=rss2.0&n
o_html=1"
type=application/rss+xml rel=alternate><link
href="http://www.ethicalhacker.net/images/favicon.ico" rel="shortcut icon">
<meta http-equiv=content-type content="text/html; charset=windows-1252"><link
href="the ethical hacker network - essential wireless hacking
tools_files/template_css.css"
type=text/css rel=stylesheet><link
href="http://www.ethicalhacker.net/images/favicon.ico" rel="shortcut icon"><link
href="http://www.ethicalhacker.net/images/animated_favicon1.gif" type=image/gif
rel=icon></head>
<body>
<script
src="the ethical hacker network - essential wireless hacking
tools_files/urchin.js"
type=text/javascript>
</script>
<script type=text/javascript>
_uacct = "ua-291283-1";
urchintracker();
</script>
peltier</a> </td></tr></tbody></table></td>
<td class=searchcontainer valign=top align=left width=150>
<form action=index.php method=post>
<table cellspacing=0 cellpadding=2 border=0>
<tbody>
<tr>
<td><input class=inputbox
onblur="if(this.value=='') this.value='search...';"
onfocus="if(this.value=='search...') this.value='';" size=15
value=search... name=searchword> <input type=hidden
value=search name=option></td>
<td width=30><img height=16
src="the ethical hacker network - essential wireless hacking
tools_files/sok.gif"
width=44></td></tr></tbody></table></form></td></tr></tbody></ta
ble></td></tr></tbody></table>
<table cellspacing=0 cellpadding=0 width=956 border=0>
<tbody>
<tr>
<td align=left colspan=5>
<table class=belowmenucontainer cellspacing=0 cellpadding=0 width=904
border=0>
<tbody>
<tr>
<td></td></tr></tbody></table></td></tr>
<tr valign=top>
<td width=204>
<table cellspacing=0 cellpadding=0 width=191 align=right border=0>
<tbody>
<tr>
<td><img height=10
src="the ethical hacker network - essential wireless hacking
tools_files/spacer.gif"
width=155></td></tr>
<tr>
<td align=right> </td></tr>
<tr>
<td align=right>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>latest additions </th></tr>
<tr>
<td>
<ul class=latestnews>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/103/8/">dec
2006 free giveaway winner!</a>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/104/24/">richm
google_ad_channel = "5131148092";
google_ad_type = "text";
google_alternate_ad_url = "http://joomla.medspan.info/alternate_ad2.html";
google_alternate_color = "eff3ef";
google_color_border = "eff3ef";
google_color_bg = "eff3ef";
google_color_link = "0033ff";
google_color_url = "008000";
google_color_text = "333333";
//-->
</script>
<script language=javascript
src="the ethical hacker network - essential wireless
hacking tools_files/show_ads.js"></script>
<!-- end of google adsense by joomlaspan 1.0 --></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>who's online </th></tr>
<tr>
<td>we have 4 guests and 2 members online
</td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<td></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>eh-net news feeds </th></tr>
<tr>
<td>
<div class=syndicate>
<div class=syndicate_text align=center>latest additions
</div>
<div align=center><a
href="http://www.ethicalhacker.net/component/option,com_rs
s/feed,rss0.91/no_html,1/"><img
alt="rss 0.91"
src="the ethical hacker network - essential wireless
hacking tools_files/rss091.gif"
align=middle border=0 name=rss091></a> </div>
<div align=center><a
href="http://www.ethicalhacker.net/component/option,com_rs
s/feed,rss1.0/no_html,1/"><img
alt="rss 1.0"
src="the ethical hacker network - essential wireless
hacking tools_files/rss10.gif"
align=middle border=0 name=rss10></a> </div>
<div align=center><a
href="http://www.ethicalhacker.net/component/option,com_rs
s/feed,rss2.0/no_html,1/"><img
alt="rss 2.0"
src="the ethical hacker network - essential wireless
hacking tools_files/rss20.gif"
align=middle border=0 name=rss20></a> </div>
<div align=center><a
href="http://www.ethicalhacker.net/component/option,com_rs
s/feed,atom0.3/no_html,1/"><img
alt="atom 0.3"
src="the ethical hacker network - essential wireless
hacking tools_files/atom03.gif"
align=middle border=0 name=atom03></a>
</div></div></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>book recommendations </th></tr>
<tr>
<td>
<h4 align=center><strong>
<div align=center>
<hr>
<br>
<script type=text/javascript>
<!--
amazon_ad_tag = "thedigitalcon-20"; amazon_ad_width = "120"; amazon_ad_height =
"600";//--></script>
<script
src="the ethical hacker network - essential wireless
hacking tools_files/ads.js"
type=text/javascript>
</script>
<br>
<hr>
</div></strong></h4></td></tr></tbody></table></td></tr>
<tr>
<td
class=modulecontainer_bottom> </td></tr></tbody></table></td></tr></t
body></table></td>
<td class=cornercontainer align=right width=12><img height=12
src="the ethical hacker network - essential wireless hacking
tools_files/corner.gif"
width=12></td>
<td class=mainbodycontainer>
<table cellspacing=0 cellpadding=0 width="100%" border=0>
<tbody>
<tr>
<td><span class=pathway><span class=sitenamecontainer>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<td><a
href="http://www.ethicalhacker.net/component/option,com_banners/
task,click/bid,13/"
target=_blank></a></td></tr></tbody></table></span><br>you are
here:
<span class=pathway><a class=pathway
href="http://www.ethicalhacker.net/">home</a> <img alt=arrow
src="the ethical hacker network - essential wireless hacking
tools_files/arrow.png">
<a class=pathway
href="http://www.ethicalhacker.net/content/section/7/24/">columns</a>
<img alt=arrow
src="the ethical hacker network - essential wireless hacking
tools_files/arrow.png">
<a class=pathway
href="http://www.ethicalhacker.net/content/category/7/16/24/">hoffman<
/a>
<img alt=arrow
src="the ethical hacker network - essential wireless hacking
tools_files/arrow.png">
essential wireless hacking tools
</span></span></td></tr></tbody></table>
<table cellspacing=0 cellpadding=2 width=512 border=0>
<tbody>
<tr>
<td>
<table class=contentpaneopen>
<tbody>
<tr>
<td class=contentheading width="100%">essential wireless
hacking tools </td>
<td class=buttonheading align=right width="100%"><a title=pdf
onclick="window.open('http://www.ethicalhacker.net/index2.php?op
tion=com_content&do_pdf=1&id=16','win2','status=no,toolbar=no,scrollbars=y
es,titlebar=no,menubar=no,resizable=yes,width=640,height=480,directories=no,locati
on=no'); return false;"
href="http://www.ethicalhacker.net/index2.php?option=com_content
&do_pdf=1&id=16"
target=_blank><img alt=pdf
src="the ethical hacker network - essential wireless hacking
tools_files/pdf_button.png"
align=middle border=0 name=pdf></a> </td>
<td class=buttonheading align=right width="100%"><a
title=print
onclick="window.open('http://www.ethicalhacker.net/index2.php?op
tion=com_content&task=view&id=16&pop=1&page=0&itemid=24','win2
','status=no,toolbar=no,scrollbars=yes,titlebar=no,menubar=no,resizable=yes,width=
640,height=480,directories=no,location=no'); return false;"
href="http://www.ethicalhacker.net/index2.php?option=com_content
&task=view&id=16&pop=1&page=0&itemid=24"
target=_blank><img alt=print
src="the ethical hacker network - essential wireless hacking
tools_files/printbutton.png"
align=middle border=0 name=print></a> </td>
<td class=buttonheading align=right width="100%"><a
title=e-mail
onclick="window.open('http://www.ethicalhacker.net/index2.php?op
tion=com_content&task=emailform&id=16&itemid=24','win2','status=no,too
lbar=no,scrollbars=yes,titlebar=no,menubar=no,resizable=yes,width=400,height=250,d
irectories=no,location=no'); return false;"
href="http://www.ethicalhacker.net/index2.php?option=com_content
&task=emailform&id=16&itemid=24"
target=_blank><img alt=e-mail
src="the ethical hacker network - essential wireless hacking
tools_files/emailbutton.png"
align=middle border=0 name=e-mail></a>
</td></tr></tbody></table>
<table class=contentpaneopen>
<tbody>
<tr>
<td valign=top colspan=2><span style="font-size: 12pt"><span
style="font-size: 12pt"><span style="font-size: 8pt">
<table width="100%" border=0>
<tbody>
<tr>
<td>
<script>
digg_url =
'http://digg.com/security/essential_free_wireless_hacking_tools';</script>
<script
src="the ethical hacker network - essential wireless
hacking tools_files/diggthis.htm">
</script>
| <a
onclick="window.open('http://del.icio.us/post?v=4&noui
&jump=close&url='+encodeuricomponent(location.href)+'&title='+encodeur
icomponent(document.title), 'delicious','toolbar=no,width=700,height=400'); return
false;"
href="http://del.icio.us/post"><img height=10
alt="active image"
src="the ethical hacker network - essential wireless
hacking tools_files/delicious_sm.gif"
width=10>del.icio.us</a></td>
<td>
<p align=right><span style="font-size: 8pt">discuss in
forums
<div class=dsc_bar><a class=link_pos
href="http://www.ethicalhacker.net/component/option,com_sm
f/itemid,54/topic,83.msg180/#msg180"><img
style="border-right: 0px; border-top: 0px; border-left:
0px; border-bottom: 0px"
alt="discuss topic"
src="the ethical hacker network - essential wireless
hacking tools_files/mos_smf_discussbot.gif">
(1) </a></div></span>
<p></p></td></tr></tbody></table>
<p align=left>by daniel v. hoffman, cissp, cwna, ceh
</p></span></span></span>
<p align=left>anyone interested in gaining a deeper knowledge
of wireless security and exploiting vulnerabilities will need
a good set of base tools with which to work. fortunately,
there are an abundance of free tools available on the
internet. this list is not meant to be comprehensive in nature
but rather to provide some general guidance on recommended
tools to build your toolkit. </p><span
style="font-size: 12pt"><span style="font-size: 12pt"><span
style="font-size: 12pt"><span style="font-size: 12pt">
<h3 align=center>
<object
codebase=http://download.macromedia.com/pub/shockwave/cabs/flash
/swflash.cab#version=6,0,29,0
height=120 hspace=5 width=500 align=undefined vspace=5
classid=clsid:d27cdb6e-ae6d-11cf-96b8-444553540000><param
name="movie"
value="images/stories/columns/hoffman/anat_hack_ii_ethical.swf"><param name="src"
value="images/stories/columns/hoffman/anat_hack_ii_ethical.swf"><param name="play"
value="true"><param name="wmode" value="opaque"><param name="scale"
value=""><param name="quality" value="best"><param name="menu"
value="false"><param name="bgcolor" value=""><param name="allowscriptaccess"
value="samedomain"><param name="loop" value="true">
<embed
src="images/stories/columns/hoffman/anat_hack_ii_ethical.swf"
scale="" wmode="opaque" play="true" quality="best"
menu="false"
pluginspage="http://www.macromedia.com/go/getflashplayer"
type="application/x-shockwave-flash" width="500" height="120"
align="undefined" bgcolor="" allowscriptaccess="samedomain"
loop="true" hspace="5" vspace="5"></embed>
</object> </h3>
<h3>finding wireless networks</h3><span
style="font-size: 12pt">
<p>locating a wireless network is the first step in trying to
exploit it. there are two tools that are commonly used in this
regard: </p>
<p><a class=undefined
href="http://www.netstumbler.com/downloads/"
target=_blank>network stumbler a.k.a netstumbler</a> � this
windows based tool easily finds wireless signals being
broadcast within range � a must have. it also has ability to
determine signal/noise info that can be used for site surveys.
i actually know of one highly known public wireless hotspot
provider that uses this utility for their site surveys. </p>
<p align=center><img height=199 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/netstumbler.jpg"
width=500 border=0><br>(netstumbler screenshot) </p>
<p><a class=undefined href="http://www.kismetwireless.net/"
target=_blank>kismet</a> � one of the key functional elements
missing from netstumbler is the ability to display wireless
networks that are not broadcasting their ssid. as a potential
wireless security expert, you should realize that access
points are routinely broadcasting this info; it just isn�t
being read/deciphered. kismet will detect and display ssids
that are not being broadcast which is very critical in finding
wireless networks. </p>
<p align=center><img height=295 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/kismet.jpg"
width=491 border=0><br>(kismet screenshot) </p></span>
<h3>attaching to the found wireless network</h3><span
style="font-size: 12pt">
<p>once you�ve found a wireless network, the next step is to
try to connect to it. if the network isn�t using any type of
authentication or encryption security, you can simply connect
to the ssid. if the ssid isn�t being broadcast, you can create
a profile with the name of the ssid that is not being
broadcast. of course you found the non-broadcast ssid with
kismet, right? if the wireless network is using authentication
and/or encryption, you may need one of the following tools.
</p>
<p><a class=undefined href="http://airsnort.shmoo.com/"
target=_blank>airsnort</a> � this is a very easy to use tool
that can be used to sniff and crack wep keys. while many
people bash the use of wep, it is certainly better than using
nothing at all. something you�ll find in using this tool
is that it takes a lot of sniffed packets to crack the wep
key. there are additional tools and strategies that can be
used to force the generation of traffic on the wireless
network to shorten the amount of time needed to crack the key,
but this feature is not included in airsnort. </p>
<p align=center><img height=174 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/airsnort.jpg"
width=539 border=0><br>(screenshot of airsnort in action) </p>
<p><a class=undefined
href="http://sourceforge.net/projects/cowpatty"
target=_blank>cowpatty</a> � this tool is used as a brute
force tool for cracking wpa-psk, considered the �new wep� for
home wireless security. this program simply tries a bunch of
different options from a dictionary file to see if one ends up
matching what is defined as the pre-shared key. </p>
<p align=center><img height=283 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/cowpatty.jpg"
width=455 border=0><br>(cowpatty options screenshot) </p>
<p><a class=undefined href="http://asleap.sourceforge.net/"
target=_blank>asleap</a> � if a network is using leap, this
tool can be used to gather the authentication data that is
being passed across the network, and these sniffed credentials
can be cracked. leap doesn�t protect the authentication
like other �real� eap types, which is the main reason why leap
can be broken. </p>
<p align=center><img height=306 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/asleap.jpg"
width=491 border=0><br>(asleap options screenshot)
</p></span></span></span>
<h3>sniffing wireless data</h3><span
style="font-size: 12pt"><span style="font-size: 12pt"><span
style="font-size: 12pt">
<p>whether you are directly connected to a wireless network or
not, if there is wireless network in range, there is data
flying through the air at any given moment. you will need a
tool to be able to see this data. </p>
<p><a class=undefined href="http://www.ethereal.com/"
target=_blank>ethereal</a> � while there has been much debate
on the proper way to pronounce this utility, there is no
question that it is an extremely valuable tool. ethereal can
scan wireless and ethernet data and comes with some robust
filtering capabilities. it can also be used to sniff-out
802.11 management beacons and probes and subsequently could be
used as a tool to sniff-out non-broadcast ssids. </p>
<p align=center><img height=436 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/ethereal.jpg"
width=575 border=0><br>(screenshot of ethereal in action) </p>
<p align=center><img height=105 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/yahooim.jpg"
width=576 border=0><br>(yahoo im session being sniffed in
ethereal) </p>
<p>the aforementioned utilities, or similar ones, will be
necessities in your own wireless security toolkit. the easiest
way to become familiar with these tools is to simply use them
in a controlled lab environment. and cost is no excuse as all
of these tools are available freely on the internet.
</p></span>
<h3>protecting against these tools</h3><span
style="font-size: 12pt">
<p>just as it�s important to know how to utilize the
aforementioned tools, it is important to know best practices
on how to secure your wireless network against these tools.
</p>
<p><strong>netstumbler</strong> � do not broadcast your
ssid. ensure your wlan is protected by using advanced
authentication and encryption. </p>
<p><strong>kismet</strong> � there�s really nothing you can do
to stop kismet from finding your wlan, so ensure your wlan is
protected by using advanced authentication and encryption </p>
<p><strong>airsnort</strong> � use a 128-bit, not a 40-bit wep
encryption key. this would take longer to crack.
if your equipment supports it, use wpa or wpa2 instead of wep
(may require firmware or software update). </p>
<p><strong>cowpatty</strong> � use a long and complex wpa
pre-shared key. this type of key would have less of a
chance of residing in a dictionary file that would be used to
try and guess your key and/or would take longer. if in a
corporate scenario, don�t use wpa with pre-shared key, use a
good eap type to protect the authentication and limit the
amount of incorrect guesses that would take place before the
account is locked-out. if using certificate-like
functionality, it could also validate the remote system trying
to gain access to the wlan and not allow a rogue system
access. </p>
<p><strong>asleap</strong> � use long and complex credentials,
or better yet, switch to eap-fast or a different eap type.
</p>
<p><strong>ethereal</strong> � use encryption, so that
anything sniffed would be difficult or nearly impossible to
break. wpa2, which uses aes, is essentially unrealistic
to break by a normal hacker. even wep will encrypt the
data. when in a public wireless hotspot (which generally
do not offer encryption), use application layer encryption,
like simplite to encrypt your im sessions, or use ssl.
for corporate users, use ipsec vpn with split-tunneling
disabled. this will force all traffic leaving the
machine through an encrypted tunnel that would be encrypted
with des, 3des or aes. </p>
<p>questions or comments can be sent to daniel v. hoffman,
cissp, cwna<br>
<script language=javascript type=text/javascript>
<!--
var prefix = 'ma' + 'il' + 'to';
var path = 'hr' + 'ef' + '=';
var addy66589 = 'danielvhoffman' + '@';
addy66589 = addy66589 + 'yahoo' + '.' + 'com';
var addy_text66589 = 'danielvhoffman' + '@' +
'yahoo' + '.' + 'com';
document.write( '<a ' + path + '\'' + prefix + ':' + addy66589 + '\'>' );
document.write( addy_text66589 );
document.write( '<\/a>' );
//-->\n </script>
if ( 'z' != 'z' ) {
alert('you already voted for this item today.');
return;
}
for(var i = 0; i < radiolength; i++) {
if(radio[i].checked) {
form.submit();
check = 1;
}
}
if (check == 0) {
alert('no selection has been made, please try again');
}
}
//-->
</script>
<form name=pollxtd1
action=http://www.ethicalhacker.net/component/option,com_p
oll/
method=post>
<table class=poll cellspacing=0 cellpadding=1
width="95%" align=center border=0>
<thead>
<tr>
<td style="font-weight: bold">on election day, i:
</td></tr></thead>
<tbody>
<tr>
<td align=middle>
<table class=pollstableborder cellspacing=0
cellpadding=0 border=0>
<tbody>
<tr>
<td class=sectiontableentry2 valign=top><input
id=voteid109 type=radio alt=109 value=109
name=voteid> </td>
<td class=sectiontableentry2 valign=top><label
for=voteid109>chose a paper ballot.
</label></td></tr>
<tr>
<td class=sectiontableentry1 valign=top><input
id=voteid110 type=radio alt=110 value=110
name=voteid> </td>
<td class=sectiontableentry1 valign=top><label
for=voteid110>trusted the machines.
</label></td></tr>
<tr>
<td class=sectiontableentry2 valign=top><input
id=voteid111 type=radio alt=111 value=111
name=voteid> </td>
<td class=sectiontableentry2 valign=top><label
for=voteid111>didn't care, just voted.
</label></td></tr>
<tr>
<td class=sectiontableentry1 valign=top><input
id=voteid112 type=radio alt=112 value=112
name=voteid> </td>
<td class=sectiontableentry1 valign=top><label
for=voteid112>didn't have a choice - paper only.
</label></td></tr>
<tr>
<td class=sectiontableentry2 valign=top><input
id=voteid113 type=radio alt=113 value=113
name=voteid> </td>
<td class=sectiontableentry2 valign=top><label
for=voteid113>didn't have a choice - electronic.
</label></td></tr>
<tr>
<td class=sectiontableentry1 valign=top><input
id=voteid114 type=radio alt=114 value=114
name=voteid> </td>
<td class=sectiontableentry1 valign=top><label
for=voteid114>didn't vote.
</label></td></tr></tbody></table></td></tr>
<tr>
<td>
<div align=center><input class=button
onclick=submitbutton_poll1(); type=button value=vote name=task_button>
<input class=button
onclick="document.location.href='http://www.ethicalhacker.net/component/option,com
_poll/task,results/id,10/';" type=button value=results name=option>
</div></td></tr></tbody></table><input type=hidden
value=10 name=id> <input type=hidden value=vote
name=task> <input type=hidden value=1
name=j7253ca98cf4659b78be7f0505cb71d4b>
</form></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>support eh-net </th></tr>
<tr>
<td>
<h6 align=center><a
href="http://www.trainingcamp.com/us/info/schedule_csp.asp
?refer=csp"
target=_blank>boot camp discounts<br>for members
only<br><img title=ttc_logo_125 height=21
alt=ttc_logo_125 hspace=5
src="the ethical hacker network - essential wireless
hacking tools_files/ttc_logo_125.gif"
width=125 vspace=5 border=0><br>the training camp
/<br>infosec academy</a>
<hr>
<a href="http://www.cbtnuggets.com/cspcom"
target=_blank><img title=cbtnuggets_logo_125.jpg
style="width: 125px; height: 61px" height=61
alt=cbtnuggets_logo_125.jpg hspace=5
src="the ethical hacker network - essential wireless
hacking tools_files/cbtnuggets_logo_125.jpg"
width=125 align=middle vspace=5
border=0><br>try cbt nuggets free!</a>
<hr>
<a
href="http://www.preplogic.com/default.asp?af=digital&
bn=66"
target=_blank><br>study with preplogic</a>
<hr>
<iframe
src="the ethical hacker network - essential wireless
hacking tools_files/cagpqv0d.htm"
frameborder=0 width=120 scrolling=no
height=90></iframe><br>support eh-net
<hr>
<a class=undefined
href="http://www.careeracademy.com//index.asp?pageaction=c
ustom&id=252"
target=_blank><img title=calogo125.jpg
style="width: 125px; height: 34px" height=34
alt=calogo125.jpg hspace=5
src="the ethical hacker network - essential wireless
hacking tools_files/calogo125.jpg"
width=125 align=middle vspace=5 border=0><br>limited
time!!<br>free ceh video<br>footprinting &
recon</a></h6></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>recent forum topics </th></tr>
<tr>
<td>
<ul class=latestnews>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,957.msg2934/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> [article]-dec 2006 free giveaway winner!</a>
(4) by <a class=latestnews
title="view the profile of cutaway"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1225/">cutaway</a>