You are on page 1of 25

<!doctype html public "-//w3c//dtd html 4.

0 transitional//en">
<!-- saved from url=(0048)http://www.ethicalhacker.net/content/view/16/24/ -->
<?xml version="1.0" encoding="iso-8859-1"?><html
xmlns="http://www.w3.org/1999/xhtml"><head><title>the ethical hacker network -
essential wireless hacking tools</title>
<meta content="essential wireless hacking tools" name=title>
<meta content=don name=author>
<meta
content="the ethical hacker network - your educational authority on penetration
testing and incident response., ethical hacker network, articles, columnists,
essential wireless hacking tools"
name=description>
<meta
content="hacking, hack, hacker, ethical hacking, ethical hacker, ec-council, ceh,
certified ethical hacker, pen test, pen testing, penetration testing, tiger team,
black hat, grey hat, white hat, red hat, linux, unix, windows, windows xp, windows
vista, server 2003, windows server 2003, sans, giac, cpts, certified pen testing
specialist, cpte, certified pen testing expert, gcih, giac certified incident
handler, 2600, hacker quarterly, ec council, incident response, cirt, cert, cce,
mcce, isfce, mile2, preplogic, career academy, cbt, cbt nuggets, blue hat,
microsoft, ceh, chfi, computer forensics, forensic, forensics, penetration test,
hacking for dummies, hackers, hacked, certification, cert, certificate, certified,
security, learn to hack, root kit, rootkit, exploit framework, metasploit, canvas,
core impact, cain &amp; abel, cain and abel, password crack, tutorial, mass media,
articles, columns, features, /root, csi, computer security, sans, sans institute,
career hacking, infosec, cyber, cissp, cwna, wireless hacking, hoffman,
netstumbler, kismet, airsnort, cowpatty, asleap, ethereal"
name=keywords>
<meta content="mshtml 6.00.2900.3020" name=generator>
<meta content="index, follow" name=robots>
<script type=text/javascript><!--
function send_form(form_id){document.getelementbyid('a'+form_id).submit();}
//--></script>

<style type=text/css>hr {
clear: both; margin-top: 5px
}
.link_pos {
float: right; background-color: transparent
}
.sub_bttn {
border-top-width: 0px; padding-right: 0px; padding-left: 0px; border-left-
width: 0px; float: right; background-image: url(http://www.ethicalhacker.net);
border-bottom-width: 0px; padding-bottom: 0px; width: 120px; padding-top: 0px;
height: 18px; background-color: #000000; border-right-width: 0px
}
.dsc_bar {
clear: both; display: block
}
</style>
<link title="the ethical hacker network"
href="http://www.ethicalhacker.net/index2.php?option=com_rss&amp;feed=rss2.0&amp;n
o_html=1"
type=application/rss+xml rel=alternate><link
href="http://www.ethicalhacker.net/images/favicon.ico" rel="shortcut icon">
<meta http-equiv=content-type content="text/html; charset=windows-1252"><link
href="the ethical hacker network - essential wireless hacking
tools_files/template_css.css"
type=text/css rel=stylesheet><link
href="http://www.ethicalhacker.net/images/favicon.ico" rel="shortcut icon"><link
href="http://www.ethicalhacker.net/images/animated_favicon1.gif" type=image/gif
rel=icon></head>
<body>
<script
src="the ethical hacker network - essential wireless hacking
tools_files/urchin.js"
type=text/javascript>
</script>

<script type=text/javascript>
_uacct = "ua-291283-1";
urchintracker();
</script>

<table cellspacing=0 cellpadding=0 width=954 border=0>


<tbody>
<tr>
<td>
<table class=allmenu_container cellspacing=0 cellpadding=0 width=956>
<tbody>
<tr>
<td>
<table height=33 cellspacing=0 cellpadding=0 width="100%"
border=0><tbody>
<tr>
<td valign=bottom></td>
<td valign=bottom>
<table class=mainmenucontainer cellspacing=0 cellpadding=0
border=0>
<tbody>
<tr>
<td nowrap width=17><img height=22
src="the ethical hacker network - essential wireless
hacking tools_files/off_start.gif"
width=17></td>
<td nowrap
background="the ethical hacker network - essential wireless
hacking tools_files/off_bg.gif"><a
class=mainmenu
href="http://www.ethicalhacker.net/component/option,com_fr
ontpage/itemid,1/">home</a>
<td nowrap width=30><img height=22
src="the ethical hacker network - essential wireless
hacking tools_files/off_off.gif"
width=30></td>
<td nowrap
background="the ethical hacker network - essential wireless
hacking tools_files/off_bg.gif"><a
class=mainmenu
href="http://www.ethicalhacker.net/component/option,com_sm
f/itemid,12/action,calendar/">calendar</a>
<td nowrap width=30><img height=22
src="the ethical hacker network - essential wireless
hacking tools_files/off_off.gif"
width=30></td>
<td nowrap
background="the ethical hacker network - essential wireless
hacking tools_files/off_bg.gif"><a
class=mainmenu
href="http://www.ethicalhacker.net/content/section/1/3/">c
ertifications</a>
<td nowrap width=30><img height=22
src="the ethical hacker network - essential wireless
hacking tools_files/off_on.gif"
width=30></td>
<td nowrap
background="the ethical hacker network - essential wireless
hacking tools_files/on_bg.gif"><a
class=mainmenu id=active
href="http://www.ethicalhacker.net/content/section/7/24/">
columns</a>
<td nowrap width=30><img height=22
src="the ethical hacker network - essential wireless
hacking tools_files/on_off.gif"
width=30></td>
<td nowrap
background="the ethical hacker network - essential wireless
hacking tools_files/off_bg.gif"><a
class=mainmenu
href="http://www.ethicalhacker.net/content/section/2/2/">f
eatures</a>
<td nowrap width=30><img height=22
src="the ethical hacker network - essential wireless
hacking tools_files/off_off.gif"
width=30></td>
<td nowrap
background="the ethical hacker network - essential wireless
hacking tools_files/off_bg.gif"><a
class=mainmenu
href="http://www.ethicalhacker.net/content/section/6/27/">
resources</a>
<td nowrap width=30><img height=22
src="the ethical hacker network - essential wireless
hacking tools_files/off_off.gif"
width=30></td>
<td nowrap
background="the ethical hacker network - essential wireless
hacking tools_files/off_bg.gif"><a
class=mainmenu
href="http://www.ethicalhacker.net/component/option,com_sm
f/itemid,54/">forum</a>
<td nowrap width=30><img height=22
src="the ethical hacker network - essential wireless
hacking tools_files/off_off.gif"
width=30></td>
<td nowrap
background="the ethical hacker network - essential wireless
hacking tools_files/off_bg.gif"><a
class=mainmenu
href="http://www.ethicalhacker.net/content/section/5/8/">v
itals</a>
<td width=14><img height=22
src="the ethical hacker network - essential wireless
hacking tools_files/off_end.gif"
width=18></td></tr></tbody></table></td></tr></tbody></tab
le>
<table class=submenucontainer cellspacing=0 cellpadding=0
width=688><tbody>
<tr align=left>
<td height=30><a class=submenu
href="http://www.ethicalhacker.net/content/category/7/15/24/">ed
itor-in-chief</a>
<a class=submenusep>|</a> <a class=submenu
href="http://www.ethicalhacker.net/content/category/7/32/24/">ga
tes</a>
<a class=submenusep>|</a> <a class=submenu
href="http://www.ethicalhacker.net/content/category/7/16/24/">ho
ffman</a>
<a class=submenusep>|</a> <a class=submenu
href="http://www.ethicalhacker.net/content/category/7/33/24/">ri
chm</a>
<a class=submenusep>|</a> <a class=submenu
href="http://www.ethicalhacker.net/content/category/7/18/24/">j.

peltier</a> &nbsp;</td></tr></tbody></table></td>
<td class=searchcontainer valign=top align=left width=150>
<form action=index.php method=post>
<table cellspacing=0 cellpadding=2 border=0>
<tbody>
<tr>
<td><input class=inputbox
onblur="if(this.value=='') this.value='search...';"
onfocus="if(this.value=='search...') this.value='';" size=15
value=search... name=searchword> <input type=hidden
value=search name=option></td>
<td width=30><img height=16
src="the ethical hacker network - essential wireless hacking
tools_files/sok.gif"
width=44></td></tr></tbody></table></form></td></tr></tbody></ta
ble></td></tr></tbody></table>
<table cellspacing=0 cellpadding=0 width=956 border=0>
<tbody>
<tr>
<td align=left colspan=5>
<table class=belowmenucontainer cellspacing=0 cellpadding=0 width=904
border=0>
<tbody>
<tr>
<td></td></tr></tbody></table></td></tr>
<tr valign=top>
<td width=204>
<table cellspacing=0 cellpadding=0 width=191 align=right border=0>
<tbody>
<tr>
<td><img height=10
src="the ethical hacker network - essential wireless hacking
tools_files/spacer.gif"
width=155></td></tr>
<tr>
<td align=right>&nbsp;</td></tr>
<tr>
<td align=right>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>latest additions </th></tr>
<tr>
<td>
<ul class=latestnews>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/103/8/">dec
2006 free giveaway winner!</a>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/104/24/">richm

on bcp and free apps like spiceworks</a>


<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/102/8/">nov
2006 free giveaway winners</a>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/100/2/">a
christmas (hacking) story</a>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/101/8/">dec
2006 free giveaway sponsor - sans</a>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/98/24/">richm
takes the field</a>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/97/24/">video:

metasploit, rras and vnc</a>


<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/96/24/">video:

rainbowcrack after ms-sql/pwdump hack</a>


<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/35/3/">ceh -
certified ethical hacker</a>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/content/view/95/3/">ecsa
- ec-council certified security analyst</a>
</li></ul></td></tr></tbody></table>
<table class=leftmodulescontainer cellspacing=0 cellpadding=0
width=155 border=0>
<tbody>
<tr>
<td class=modulecontainer_top>&nbsp;</td></tr>
<tr>
<td class=modulecontainer_middle>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>eh-net login </th></tr>
<tr>
<td>
<table cellspacing=0 cellpadding=0 width="100%"
border=0>
<tbody>
<tr>
<td>welcome guest.<br></td></tr>
<tr>
<td>
<form id=login action=index.php method=post>
<table cellspacing=0 cellpadding=0 width="100%"
border=0>
<tbody>
<tr>
<td><label
for=mod_smf_login_username>username:</label><br><i
nput
class=inputbox id=mod_smf_login_username
alt=username size=12 name=username><br><label
for=mod_smf_login_password>password:</label><br><i
nput
class=inputbox id=mod_smf_login_password
type=password alt=password size=12
name=passwd><br><input class=inputbox
id=mod_smf_login_remember type=checkbox
alt="remember me" value=yes name=remember>
<label for=mod_smf_login_remember>remember
me</label><br><input class=button type=submit
value=login><br><input
type=hidden value=login name=option> <input
type=hidden value=english name=lang> <input
type=hidden value=0 name=message><input
type=hidden
value=/index.php?option=com_content&amp;task=view&
amp;id=16&amp;itemid=24
name=return>
</td></tr></tbody></table></form></td></tr>
<tr align=left>
<td><a
href="http://www.ethicalhacker.net/component/option,
com_smf/itemid,54/action,reminder/">lost
password?</a></td></tr>
<tr align=left>
<td>no account yet?&nbsp;<a
href="http://www.ethicalhacker.net/component/option,
com_smf/itemid,54/action,register/">register</a></td></tr></tbody></table></td></t
r></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>eh-net donations </th></tr>
<tr>
<td>
<center><img
src="the ethical hacker network - essential wireless
hacking tools_files/x-click-but04.gif"
border=0></center>
<center>
<form
action=/index.php?option=com_content&amp;task=view&amp;id=
16&amp;itemid=24
method=post>
<p>enter amount:<br>$<input class=inputbox size=5
name=amount><select class=inputbox name=currency_code>
<option value=cad selected>cad</option> <option
value=usd>usd</option> <option value=gbp>gbp</option>
<option value=aud>aud</option> <option
value=jpy>jpy</option> <option
value=eur>eur</option></select><input type=hidden
value=4 name=length><br><input class=button style="border-
right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px" type=submit
alt="make payments with paypal - its fast, free and secure!" value="donate now"
name=submit>
</form>
<center></center></center></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>google ads </th></tr>
<tr>
<td><!-- google adsense by joomlaspan 1.0
(http://joomla.medspan.info) -->
<script language=javascript>
<!--
google_ad_client = "pub-1421805682239901";
google_ad_width = 120;
google_ad_height = 600;
google_ad_format = "120x600_as";

google_ad_channel = "5131148092";
google_ad_type = "text";
google_alternate_ad_url = "http://joomla.medspan.info/alternate_ad2.html";

google_alternate_color = "eff3ef";

google_color_border = "eff3ef";
google_color_bg = "eff3ef";
google_color_link = "0033ff";
google_color_url = "008000";
google_color_text = "333333";
//-->
</script>

<script language=javascript
src="the ethical hacker network - essential wireless
hacking tools_files/show_ads.js"></script>
<!-- end of google adsense by joomlaspan 1.0 --></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>who's online </th></tr>
<tr>
<td>we have 4 guests and 2 members online
</td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<td></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>eh-net news feeds </th></tr>
<tr>
<td>
<div class=syndicate>
<div class=syndicate_text align=center>latest additions
</div>
<div align=center><a
href="http://www.ethicalhacker.net/component/option,com_rs
s/feed,rss0.91/no_html,1/"><img
alt="rss 0.91"
src="the ethical hacker network - essential wireless
hacking tools_files/rss091.gif"
align=middle border=0 name=rss091></a> </div>
<div align=center><a
href="http://www.ethicalhacker.net/component/option,com_rs
s/feed,rss1.0/no_html,1/"><img
alt="rss 1.0"
src="the ethical hacker network - essential wireless
hacking tools_files/rss10.gif"
align=middle border=0 name=rss10></a> </div>
<div align=center><a
href="http://www.ethicalhacker.net/component/option,com_rs
s/feed,rss2.0/no_html,1/"><img
alt="rss 2.0"
src="the ethical hacker network - essential wireless
hacking tools_files/rss20.gif"
align=middle border=0 name=rss20></a> </div>
<div align=center><a
href="http://www.ethicalhacker.net/component/option,com_rs
s/feed,atom0.3/no_html,1/"><img
alt="atom 0.3"
src="the ethical hacker network - essential wireless
hacking tools_files/atom03.gif"
align=middle border=0 name=atom03></a>
</div></div></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>book recommendations </th></tr>
<tr>
<td>
<h4 align=center><strong>
<div align=center>
<hr>
<br>
<script type=text/javascript>
<!--
amazon_ad_tag = "thedigitalcon-20"; amazon_ad_width = "120"; amazon_ad_height =
"600";//--></script>

<script
src="the ethical hacker network - essential wireless
hacking tools_files/ads.js"
type=text/javascript>
</script>
<br>
<hr>
</div></strong></h4></td></tr></tbody></table></td></tr>
<tr>
<td
class=modulecontainer_bottom>&nbsp;</td></tr></tbody></table></td></tr></t
body></table></td>
<td class=cornercontainer align=right width=12><img height=12
src="the ethical hacker network - essential wireless hacking
tools_files/corner.gif"
width=12></td>
<td class=mainbodycontainer>
<table cellspacing=0 cellpadding=0 width="100%" border=0>
<tbody>
<tr>
<td><span class=pathway><span class=sitenamecontainer>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<td><a
href="http://www.ethicalhacker.net/component/option,com_banners/
task,click/bid,13/"
target=_blank></a></td></tr></tbody></table></span><br>you are
here:
<span class=pathway><a class=pathway
href="http://www.ethicalhacker.net/">home</a> <img alt=arrow
src="the ethical hacker network - essential wireless hacking
tools_files/arrow.png">
<a class=pathway
href="http://www.ethicalhacker.net/content/section/7/24/">columns</a>
<img alt=arrow
src="the ethical hacker network - essential wireless hacking
tools_files/arrow.png">
<a class=pathway
href="http://www.ethicalhacker.net/content/category/7/16/24/">hoffman<
/a>
<img alt=arrow
src="the ethical hacker network - essential wireless hacking
tools_files/arrow.png">
essential wireless hacking tools
</span></span></td></tr></tbody></table>
<table cellspacing=0 cellpadding=2 width=512 border=0>
<tbody>
<tr>
<td>
<table class=contentpaneopen>
<tbody>
<tr>
<td class=contentheading width="100%">essential wireless
hacking tools </td>
<td class=buttonheading align=right width="100%"><a title=pdf
onclick="window.open('http://www.ethicalhacker.net/index2.php?op
tion=com_content&amp;do_pdf=1&amp;id=16','win2','status=no,toolbar=no,scrollbars=y
es,titlebar=no,menubar=no,resizable=yes,width=640,height=480,directories=no,locati
on=no'); return false;"
href="http://www.ethicalhacker.net/index2.php?option=com_content
&amp;do_pdf=1&amp;id=16"
target=_blank><img alt=pdf
src="the ethical hacker network - essential wireless hacking
tools_files/pdf_button.png"
align=middle border=0 name=pdf></a> </td>
<td class=buttonheading align=right width="100%"><a
title=print
onclick="window.open('http://www.ethicalhacker.net/index2.php?op
tion=com_content&amp;task=view&amp;id=16&amp;pop=1&amp;page=0&amp;itemid=24','win2
','status=no,toolbar=no,scrollbars=yes,titlebar=no,menubar=no,resizable=yes,width=
640,height=480,directories=no,location=no'); return false;"
href="http://www.ethicalhacker.net/index2.php?option=com_content
&amp;task=view&amp;id=16&amp;pop=1&amp;page=0&amp;itemid=24"
target=_blank><img alt=print
src="the ethical hacker network - essential wireless hacking
tools_files/printbutton.png"
align=middle border=0 name=print></a> </td>
<td class=buttonheading align=right width="100%"><a
title=e-mail
onclick="window.open('http://www.ethicalhacker.net/index2.php?op
tion=com_content&amp;task=emailform&amp;id=16&amp;itemid=24','win2','status=no,too
lbar=no,scrollbars=yes,titlebar=no,menubar=no,resizable=yes,width=400,height=250,d
irectories=no,location=no'); return false;"
href="http://www.ethicalhacker.net/index2.php?option=com_content
&amp;task=emailform&amp;id=16&amp;itemid=24"
target=_blank><img alt=e-mail
src="the ethical hacker network - essential wireless hacking
tools_files/emailbutton.png"
align=middle border=0 name=e-mail></a>
</td></tr></tbody></table>
<table class=contentpaneopen>
<tbody>
<tr>
<td valign=top colspan=2><span style="font-size: 12pt"><span
style="font-size: 12pt"><span style="font-size: 8pt">
<table width="100%" border=0>
<tbody>
<tr>
<td>
<script>
digg_url =
'http://digg.com/security/essential_free_wireless_hacking_tools';</script>

<script
src="the ethical hacker network - essential wireless
hacking tools_files/diggthis.htm">
</script>
| <a
onclick="window.open('http://del.icio.us/post?v=4&amp;noui
&amp;jump=close&amp;url='+encodeuricomponent(location.href)+'&amp;title='+encodeur
icomponent(document.title), 'delicious','toolbar=no,width=700,height=400'); return
false;"
href="http://del.icio.us/post"><img height=10
alt="active image"
src="the ethical hacker network - essential wireless
hacking tools_files/delicious_sm.gif"
width=10>del.icio.us</a></td>
<td>
<p align=right><span style="font-size: 8pt">discuss in
forums
<div class=dsc_bar><a class=link_pos
href="http://www.ethicalhacker.net/component/option,com_sm
f/itemid,54/topic,83.msg180/#msg180"><img
style="border-right: 0px; border-top: 0px; border-left:
0px; border-bottom: 0px"
alt="discuss topic"
src="the ethical hacker network - essential wireless
hacking tools_files/mos_smf_discussbot.gif">
(1) </a></div></span>
<p></p></td></tr></tbody></table>
<p align=left>by daniel v. hoffman, cissp, cwna, ceh
</p></span></span></span>
<p align=left>anyone interested in gaining a deeper knowledge
of wireless security and exploiting vulnerabilities will need
a good set of base tools with which to work. fortunately,
there are an abundance of free tools available on the
internet. this list is not meant to be comprehensive in nature
but rather to provide some general guidance on recommended
tools to build your toolkit. </p><span
style="font-size: 12pt"><span style="font-size: 12pt"><span
style="font-size: 12pt"><span style="font-size: 12pt">
<h3 align=center>
<object
codebase=http://download.macromedia.com/pub/shockwave/cabs/flash
/swflash.cab#version=6,0,29,0
height=120 hspace=5 width=500 align=undefined vspace=5
classid=clsid:d27cdb6e-ae6d-11cf-96b8-444553540000><param
name="movie"
value="images/stories/columns/hoffman/anat_hack_ii_ethical.swf"><param name="src"
value="images/stories/columns/hoffman/anat_hack_ii_ethical.swf"><param name="play"
value="true"><param name="wmode" value="opaque"><param name="scale"
value=""><param name="quality" value="best"><param name="menu"
value="false"><param name="bgcolor" value=""><param name="allowscriptaccess"
value="samedomain"><param name="loop" value="true">

<embed
src="images/stories/columns/hoffman/anat_hack_ii_ethical.swf"
scale="" wmode="opaque" play="true" quality="best"
menu="false"
pluginspage="http://www.macromedia.com/go/getflashplayer"
type="application/x-shockwave-flash" width="500" height="120"
align="undefined" bgcolor="" allowscriptaccess="samedomain"
loop="true" hspace="5" vspace="5"></embed>
</object>&nbsp;&nbsp;</h3>
<h3>finding wireless networks</h3><span
style="font-size: 12pt">
<p>locating a wireless network is the first step in trying to
exploit it. there are two tools that are commonly used in this
regard: </p>
<p><a class=undefined
href="http://www.netstumbler.com/downloads/"
target=_blank>network stumbler a.k.a netstumbler</a> � this
windows based tool easily finds wireless signals being
broadcast within range � a must have. it also has ability to
determine signal/noise info that can be used for site surveys.
i actually know of one highly known public wireless hotspot
provider that uses this utility for their site surveys. </p>
<p align=center><img height=199 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/netstumbler.jpg"
width=500 border=0><br>(netstumbler screenshot) </p>
<p><a class=undefined href="http://www.kismetwireless.net/"
target=_blank>kismet</a> � one of the key functional elements
missing from netstumbler is the ability to display wireless
networks that are not broadcasting their ssid. as a potential
wireless security expert, you should realize that access
points are routinely broadcasting this info; it just isn�t
being read/deciphered. kismet will detect and display ssids
that are not being broadcast which is very critical in finding
wireless networks. </p>
<p align=center><img height=295 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/kismet.jpg"
width=491 border=0><br>(kismet screenshot) </p></span>
<h3>attaching to the found wireless network</h3><span
style="font-size: 12pt">
<p>once you�ve found a wireless network, the next step is to
try to connect to it. if the network isn�t using any type of
authentication or encryption security, you can simply connect
to the ssid. if the ssid isn�t being broadcast, you can create
a profile with the name of the ssid that is not being
broadcast. of course you found the non-broadcast ssid with
kismet, right? if the wireless network is using authentication
and/or encryption, you may need one of the following tools.
</p>
<p><a class=undefined href="http://airsnort.shmoo.com/"
target=_blank>airsnort</a> � this is a very easy to use tool
that can be used to sniff and crack wep keys.&nbsp; while many
people bash the use of wep, it is certainly better than using
nothing at all.&nbsp; something you�ll find in using this tool
is that it takes a lot of sniffed packets to crack the wep
key. there are additional tools and strategies that can be
used to force the generation of traffic on the wireless
network to shorten the amount of time needed to crack the key,
but this feature is not included in airsnort. </p>
<p align=center><img height=174 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/airsnort.jpg"
width=539 border=0><br>(screenshot of airsnort in action) </p>
<p><a class=undefined
href="http://sourceforge.net/projects/cowpatty"
target=_blank>cowpatty</a> � this tool is used as a brute
force tool for cracking wpa-psk, considered the �new wep� for
home wireless security. this program simply tries a bunch of
different options from a dictionary file to see if one ends up
matching what is defined as the pre-shared key. </p>
<p align=center><img height=283 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/cowpatty.jpg"
width=455 border=0><br>(cowpatty options screenshot) </p>
<p><a class=undefined href="http://asleap.sourceforge.net/"
target=_blank>asleap</a> � if a network is using leap, this
tool can be used to gather the authentication data that is
being passed across the network, and these sniffed credentials
can be cracked.&nbsp; leap doesn�t protect the authentication
like other �real� eap types, which is the main reason why leap
can be broken. </p>
<p align=center><img height=306 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/asleap.jpg"
width=491 border=0><br>(asleap options&nbsp; screenshot)
</p></span></span></span>
<h3>sniffing wireless data</h3><span
style="font-size: 12pt"><span style="font-size: 12pt"><span
style="font-size: 12pt">
<p>whether you are directly connected to a wireless network or
not, if there is wireless network in range, there is data
flying through the air at any given moment. you will need a
tool to be able to see this data. </p>
<p><a class=undefined href="http://www.ethereal.com/"
target=_blank>ethereal</a> � while there has been much debate
on the proper way to pronounce this utility, there is no
question that it is an extremely valuable tool. ethereal can
scan wireless and ethernet data and comes with some robust
filtering capabilities. it can also be used to sniff-out
802.11 management beacons and probes and subsequently could be
used as a tool to sniff-out non-broadcast ssids. </p>
<p align=center><img height=436 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/ethereal.jpg"
width=575 border=0><br>(screenshot of ethereal in action) </p>
<p align=center><img height=105 alt=""
src="the ethical hacker network - essential wireless hacking
tools_files/yahooim.jpg"
width=576 border=0><br>(yahoo im session being sniffed in
ethereal) </p>
<p>the aforementioned utilities, or similar ones, will be
necessities in your own wireless security toolkit. the easiest
way to become familiar with these tools is to simply use them
in a controlled lab environment. and cost is no excuse as all
of these tools are available freely on the internet.
</p></span>
<h3>protecting against these tools</h3><span
style="font-size: 12pt">
<p>just as it�s important to know how to utilize the
aforementioned tools, it is important to know best practices
on how to secure your wireless network against these tools.
</p>
<p><strong>netstumbler</strong> � do not broadcast your
ssid.&nbsp; ensure your wlan is protected by using advanced
authentication and encryption. </p>
<p><strong>kismet</strong> � there�s really nothing you can do
to stop kismet from finding your wlan, so ensure your wlan is
protected by using advanced authentication and encryption </p>
<p><strong>airsnort</strong> � use a 128-bit, not a 40-bit wep
encryption key.&nbsp; this would take longer to crack.&nbsp;
if your equipment supports it, use wpa or wpa2 instead of wep
(may require firmware or software update). </p>
<p><strong>cowpatty</strong> � use a long and complex wpa
pre-shared key.&nbsp; this type of key would have less of a
chance of residing in a dictionary file that would be used to
try and guess your key and/or would take longer.&nbsp; if in a
corporate scenario, don�t use wpa with pre-shared key, use a
good eap type to protect the authentication and limit the
amount of incorrect guesses that would take place before the
account is locked-out.&nbsp; if using certificate-like
functionality, it could also validate the remote system trying
to gain access to the wlan and not allow a rogue system
access. </p>
<p><strong>asleap</strong> � use long and complex credentials,
or better yet, switch to eap-fast or a different eap type.
</p>
<p><strong>ethereal</strong> � use encryption, so that
anything sniffed would be difficult or nearly impossible to
break.&nbsp; wpa2, which uses aes, is essentially unrealistic
to break by a normal hacker.&nbsp; even wep will encrypt the
data.&nbsp; when in a public wireless hotspot (which generally
do not offer encryption), use application layer encryption,
like simplite to encrypt your im sessions, or use ssl.&nbsp;
for corporate users, use ipsec vpn with split-tunneling
disabled.&nbsp; this will force all traffic leaving the
machine through an encrypted tunnel that would be encrypted
with des, 3des or aes. </p>
<p>questions or comments can be sent to daniel v. hoffman,
cissp, cwna<br>
<script language=javascript type=text/javascript>
<!--
var prefix = '&#109;a' + 'i&#108;' + '&#116;o';
var path = 'hr' + 'ef' + '=';
var addy66589 = 'd&#97;n&#105;&#101;lvh&#111;ffm&#97;n' + '&#64;';
addy66589 = addy66589 + 'y&#97;h&#111;&#111;' + '&#46;' + 'c&#111;m';
var addy_text66589 = 'd&#97;n&#105;&#101;lvh&#111;ffm&#97;n' + '&#64;' +
'y&#97;h&#111;&#111;' + '&#46;' + 'c&#111;m';
document.write( '<a ' + path + '\'' + prefix + ':' + addy66589 + '\'>' );
document.write( addy_text66589 );
document.write( '<\/a>' );
//-->\n </script>

<script language=javascript type=text/javascript>


<!--
document.write( '<span style=\'display: none;\'>' );
//-->
</script>
this e-mail address is being protected from spam bots, you
need javascript enabled to view it
<script language=javascript type=text/javascript>
<!--
document.write( '</' );
document.write( 'span>' );
//-->
</script>
<span style="font-size: 12pt"><span
style="font-size:
12pt"></span></span></p></span></span></span></span></span></td></tr></tbody></tab
le><span
class=article_seperator>&nbsp;</span>
<table style="margin-top: 25px" align=center>
<tbody>
<tr>
<th class=pagenav_prev><a
href="http://www.ethicalhacker.net/content/view/25/24/">&lt;
prev</a> </th>
<td width=50>&nbsp; </td>
<th class=pagenav_next><a
href="http://www.ethicalhacker.net/content/view/4/24/">next
&gt;</a> </th></tr></tbody></table>
<div class=back_button><a href="javascript:history.go(-1)">[ back
]</a> </div></td></tr></tbody></table><span class=pathway></span></td>
<td class=greia width=17><img height=17
src="the ethical hacker network - essential wireless hacking
tools_files/spacer.gif"
width=17></td>
<td width=163>
<table cellspacing=0 cellpadding=0 width="100%" border=0>
<tbody>
<tr>
<td>
<table class=greia cellspacing=0 cellpadding=0 width=100 border=0>
<tbody>
<tr>
<td></td></tr></tbody></table></td></tr>
<tr>
<td>
<table class=leftmodulescontainer cellspacing=0 cellpadding=0
width=155 border=0>
<tbody>
<tr>
<td class=modulecontainer_top>&nbsp;</td></tr>
<tr>
<td class=modulecontainer_middle>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>polls </th></tr>
<tr>
<td>
<script language=javascript type=text/javascript>
<!--
function submitbutton_poll1() {
var form = document.pollxtd1;
var radio = form.voteid;
var radiolength = radio.length;
var check = 0;

if ( 'z' != 'z' ) {
alert('you already voted for this item today.');
return;
}
for(var i = 0; i < radiolength; i++) {
if(radio[i].checked) {
form.submit();
check = 1;
}
}
if (check == 0) {
alert('no selection has been made, please try again');
}
}
//-->
</script>

<form name=pollxtd1
action=http://www.ethicalhacker.net/component/option,com_p
oll/
method=post>
<table class=poll cellspacing=0 cellpadding=1
width="95%" align=center border=0>
<thead>
<tr>
<td style="font-weight: bold">on election day, i:
</td></tr></thead>
<tbody>
<tr>
<td align=middle>
<table class=pollstableborder cellspacing=0
cellpadding=0 border=0>
<tbody>
<tr>
<td class=sectiontableentry2 valign=top><input
id=voteid109 type=radio alt=109 value=109
name=voteid> </td>
<td class=sectiontableentry2 valign=top><label
for=voteid109>chose a paper ballot.
</label></td></tr>
<tr>
<td class=sectiontableentry1 valign=top><input
id=voteid110 type=radio alt=110 value=110
name=voteid> </td>
<td class=sectiontableentry1 valign=top><label
for=voteid110>trusted the machines.
</label></td></tr>
<tr>
<td class=sectiontableentry2 valign=top><input
id=voteid111 type=radio alt=111 value=111
name=voteid> </td>
<td class=sectiontableentry2 valign=top><label
for=voteid111>didn't care, just voted.
</label></td></tr>
<tr>
<td class=sectiontableentry1 valign=top><input
id=voteid112 type=radio alt=112 value=112
name=voteid> </td>
<td class=sectiontableentry1 valign=top><label
for=voteid112>didn't have a choice - paper only.
</label></td></tr>
<tr>
<td class=sectiontableentry2 valign=top><input
id=voteid113 type=radio alt=113 value=113
name=voteid> </td>
<td class=sectiontableentry2 valign=top><label
for=voteid113>didn't have a choice - electronic.
</label></td></tr>
<tr>
<td class=sectiontableentry1 valign=top><input
id=voteid114 type=radio alt=114 value=114
name=voteid> </td>
<td class=sectiontableentry1 valign=top><label
for=voteid114>didn't vote.
</label></td></tr></tbody></table></td></tr>
<tr>
<td>
<div align=center><input class=button
onclick=submitbutton_poll1(); type=button value=vote name=task_button>
&nbsp; <input class=button
onclick="document.location.href='http://www.ethicalhacker.net/component/option,com
_poll/task,results/id,10/';" type=button value=results name=option>
</div></td></tr></tbody></table><input type=hidden
value=10 name=id> <input type=hidden value=vote
name=task> <input type=hidden value=1
name=j7253ca98cf4659b78be7f0505cb71d4b>
</form></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>support eh-net </th></tr>
<tr>
<td>
<h6 align=center><a
href="http://www.trainingcamp.com/us/info/schedule_csp.asp
?refer=csp"
target=_blank>boot camp discounts<br>for members
only<br><img title=ttc_logo_125 height=21
alt=ttc_logo_125 hspace=5
src="the ethical hacker network - essential wireless
hacking tools_files/ttc_logo_125.gif"
width=125 vspace=5 border=0><br>the training camp
/<br>infosec academy</a>
<hr>
<a href="http://www.cbtnuggets.com/cspcom"
target=_blank><img title=cbtnuggets_logo_125.jpg
style="width: 125px; height: 61px" height=61
alt=cbtnuggets_logo_125.jpg hspace=5
src="the ethical hacker network - essential wireless
hacking tools_files/cbtnuggets_logo_125.jpg"
width=125 align=middle vspace=5
border=0><br>try&nbsp;cbt nuggets&nbsp;free!</a>
<hr>
<a
href="http://www.preplogic.com/default.asp?af=digital&amp;
bn=66"
target=_blank><br>study with preplogic</a>
<hr>
<iframe
src="the ethical hacker network - essential wireless
hacking tools_files/cagpqv0d.htm"
frameborder=0 width=120 scrolling=no
height=90></iframe><br>support eh-net
<hr>
<a class=undefined
href="http://www.careeracademy.com//index.asp?pageaction=c
ustom&amp;id=252"
target=_blank><img title=calogo125.jpg
style="width: 125px; height: 34px" height=34
alt=calogo125.jpg hspace=5
src="the ethical hacker network - essential wireless
hacking tools_files/calogo125.jpg"
width=125 align=middle vspace=5 border=0><br>limited
time!!<br>free ceh video<br>footprinting &amp;
recon</a></h6></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>recent forum topics </th></tr>
<tr>
<td>
<ul class=latestnews>
<li class=latestnews><a class=latestnews
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,957.msg2934/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> [article]-dec 2006 free giveaway winner!</a>
(4) by <a class=latestnews
title="view the profile of cutaway"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1225/">cutaway</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,956.msg2929/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> mozilla issues 9 security advisories</a> (0)
by <a class=latestnews title="view the profile of don"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1/">don</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,955.msg2928/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> the first vista vulnerability -
overblown?</a> (0) by <a class=latestnews
title="view the profile of don"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1/">don</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,951.msg2927/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> month of apple bugs</a> (2) by <a
class=latestnews title="view the profile of chrisg"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,169/">chrisg</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,952.msg2926/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> eh-net downtime</a> (2) by <a
class=latestnews title="view the profile of negrita"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,3/">negrita</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,954.msg2925/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> certification/training path</a> (1) by <a
class=latestnews title="view the profile of don"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1/">don</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,953.msg2923/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> forensic images of usb devices in
windows</a> (2) by <a class=latestnews
title="view the profile of mn_kthompson"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,854/">mn_kthompson</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,950.msg2916/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> happy new year</a> (4) by <a
class=latestnews
title="view the profile of slimjim100"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1142/">slimjim100</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,931.msg2915/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> securing your network from scratch</a> (5)
by <a class=latestnews
title="view the profile of pcsneaker"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,27/">pcsneaker</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,920.msg2914/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> skype network scanning</a> (8) by <a
class=latestnews title="view the profile of pcsneaker"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,27/">pcsneaker</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,945.msg2913/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> poll on certifications</a> (5) by <a
class=latestnews title="view the profile of pcsneaker"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,27/">pcsneaker</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,946.msg2908/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> theregister: congressional aide fired after
trying to hire hackers</a> (6) by <a class=latestnews
title="view the profile of chrisg"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,169/">chrisg</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,940.msg2907/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> bypassing signature based anti-virus
software</a> (9) by <a class=latestnews
title="view the profile of kev"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,363/">kev</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,947.msg2905/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> comptia needs your linux input</a> (3) by <a
class=latestnews title="view the profile of cutaway"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1225/">cutaway</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,387.msg2901/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> paros - web app security assessment tool</a>
(8) by <a class=latestnews
title="view the profile of jimbob"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,543/">jimbob</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,949.msg2898/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> black hat dc 2007</a> (0) by <a
class=latestnews title="view the profile of don"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1/">don</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,948.msg2897/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> dod cyber crime conf 2007</a> (0) by <a
class=latestnews title="view the profile of don"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1/">don</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,925.msg2895/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> favorite anti-virus, ips and ids</a> (7) by
<a class=latestnews
title="view the profile of psychorugger"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1350/">psychorugger</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,555.msg2894/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> linux vs windows</a> (13) by <a
class=latestnews
title="view the profile of psychorugger"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,1350/">psychorugger</a>

<li class=latestnews><a class=latestnews


href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/topic,904.msg2888/topicseen,1/#new"><img
alt=xx
src="the ethical hacker network - essential wireless
hacking tools_files/xx.gif"
border=0> is ethical hacking a growth area?</a> (5) by
<a class=latestnews title="view the profile of jimbob"
href="http://www.ethicalhacker.net/component/option,com_
smf/itemid,54/action,profile/u,543/">jimbob</a></li></ul></td></tr></tbody></table
>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>related items </th></tr>
<tr>
<td>
<ul>
<li><a
href="http://www.ethicalhacker.net/content/view/4/24/">w
ireless
hacking at 30,000 feet - without a wireless
network!</a>
<li><a
href="http://www.ethicalhacker.net/content/view/17/2/">e
nterprise
security - the battle for the final frontier</a>
<li><a
href="http://www.ethicalhacker.net/content/view/24/24/">
goals
and resolutions for 2006</a>
<li><a
href="http://www.ethicalhacker.net/content/view/25/24/">
step-by-step
hacking video</a>
<li><a
href="http://www.ethicalhacker.net/content/view/31/24/">
hacking
online banking and credit card transactions � and how
to prevent it</a>
<li><a
href="http://www.ethicalhacker.net/content/view/54/24/">
review:
ceh via self study</a>
<li><a
href="http://www.ethicalhacker.net/content/view/66/24/">
cool
and illegal wireless hotspot hacks</a>
<li><a
href="http://www.ethicalhacker.net/content/view/85/8/">s
ept
'06 free giveaway sponsor - career academy</a>
<li><a
href="http://www.ethicalhacker.net/content/view/86/8/">s
ept
'06 free giveaway winners</a>
<li><a
href="http://www.ethicalhacker.net/content/view/90/24/">
step
by step guide to the advanced mobile hacks video</a>
<li><a
href="http://www.ethicalhacker.net/content/view/93/24/">
who
is richm and what is he up to?</a>
<li><a
href="http://www.ethicalhacker.net/content/view/98/24/">
richm
takes the field</a> </li></ul></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>related forum topics </th></tr>
<tr>
<td>
<ul>
<li><a
href="http://www.ethicalhacker.net/index.php?option=com_
smf&amp;itemid=&amp;topic=908.msg2869#msg2869">re:
network world video interview with our own dan
hoffman</a>
<li><a
href="http://www.ethicalhacker.net/index.php?option=com_
smf&amp;itemid=&amp;topic=908.msg2868#msg2868">re:
network world video interview with our own dan
hoffman</a>
<li><a
href="http://www.ethicalhacker.net/index.php?option=com_
smf&amp;itemid=&amp;topic=908.msg2867#msg2867">re:
network world video interview with our own dan
hoffman</a>
<li><a
href="http://www.ethicalhacker.net/index.php?option=com_
smf&amp;itemid=&amp;topic=908.msg2864#msg2864">re:
network world video interview with our own dan
hoffman</a>
<li><a
href="http://www.ethicalhacker.net/index.php?option=com_
smf&amp;itemid=&amp;topic=908.msg2760#msg2760">re:
network world video interview with our own dan
hoffman</a>
<li><a
href="http://www.ethicalhacker.net/index.php?option=com_
smf&amp;itemid=&amp;topic=908.msg2759#msg2759">re:
network world video interview with our own dan
hoffman</a>
<li><a
href="http://www.ethicalhacker.net/index.php?option=com_
smf&amp;itemid=&amp;topic=908.msg2758#msg2758">re:
network world video interview with our own dan
hoffman</a>
<li><a
href="http://www.ethicalhacker.net/index.php?option=com_
smf&amp;itemid=&amp;topic=918.msg2729#msg2729">cissp
pre-requisites</a>
<li><a
href="http://www.ethicalhacker.net/index.php?option=com_
smf&amp;itemid=&amp;topic=908.msg2696#msg2696">re:
network world video interview with our own dan
hoffman</a>
<li><a
href="http://www.ethicalhacker.net/index.php?option=com_
smf&amp;itemid=&amp;topic=908.msg2695#msg2695">network
world video interview with our own dan hoffman</a>
</li></ul></td></tr></tbody></table>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<th valign=top>vote for eh-net </th></tr>
<tr>
<td>
<table cellspacing=2 cellpadding=2 align=center
border=1>
<tbody>
<tr>
<td>
<p align=center><a class=undefined
href="http://www.progenic.com/vote/?id=ehnet"
target=_blank>progenic.com<br><img
alt="click here to vote!"
src="the ethical hacker network - essential wireless
hacking tools_files/t100.gif"
align=middle border=0></a></p></td></tr>
<tr>
<td>
<p align=center><a
href="http://www.sadikhov.com/topsites/in.php?site=1
131147435"
target=_blank>sadikhov.com<br>top it cert
sites</a></p></td></tr>
<tr>
<td>
<p align=center><a class=undefined
href="http://www.binarica.com/cgi-
bin/rank/topsites.cgi?id=148"
target=_blank>binarica.com<br><img
title="binarica logo"
style="width: 88px; height: 31px" height=31
alt="binarica logo"
src="the ethical hacker network - essential wireless
hacking tools_files/binarica1.jpg"
width=88
border=0></a></p></td></tr></tbody></table></td></tr></tbody><
/table></td></tr>
<tr>
<td
class=modulecontainer_bottom>&nbsp;</td></tr></tbody></table></td></tr></t
body></table></td></tr>
<tr valign=top>
<td>&nbsp;</td>
<td class=cornercontainer align=right>&nbsp;</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td align=right>&nbsp;</td></tr></tbody></table>
<table cellspacing=0 cellpadding=0 width=956 border=0>
<tbody>
<tr valign=top>
<td valign=center align=right width=782>
<table class=moduletable cellspacing=0 cellpadding=0>
<tbody>
<tr>
<td><a
href="http://www.ethicalhacker.net/component/option,com_banners/task,c
lick/bid,5/"
target=_blank></a></td></tr></tbody></table></td>
<td align=right width=182 height=127><img height=127
src="the ethical hacker network - essential wireless hacking
tools_files/bottom_right.gif"
width=174></td></tr>
<tr valign=top>
<td align=right colspan=2 height=74><img height=74
src="the ethical hacker network - essential wireless hacking
tools_files/bottom.gif"
width=954></td></tr></tbody></table>
<p align=center>
<div align=center>� 2007 the ethical hacker network</div>
<div align=center><a href="http://www.joomla.org/">joomla!</a> is free software
released under the gnu/gpl license.</div>
<p></p></td></tr></table><!-- 1167799292 --></body></html>

You might also like