

To attack target network, one first needs to find target network. To perform successful penetration tests against wireless networks, one needs to be familiar with the use of many of these tools and their specific roles in the pen testing process. Collection provides an incredible suite of wireless network discovery and penetration test tools. With no installation whatsoever, the analysis platform is started directly from the CD-ROM and is fully accessible within minutes. It is distributed freely under the GPL 2.0 license. This chapter discusses performing wireless penetration tests using the Auditor Security Collection, which is a Live-System based on KNOPPIX containing over 300 open source security tools.
#Istumbler license Bluetooth#
iStumbler has a far smaller feature set than KisMAC, but is extremely easy to use and also includes Bluetooth functionality. While KisMAC is outstanding, it isn't the only WLAN discovery tool available for OS X. The tools available for these types of attacks on other OSes are either difficult to use or are so restricted that working with KisMAC's point-and-click attack method is a welcome change. It provides many of the most popular attacks and offers penetration testers easy point-and-click options for some attacks that are traditionally more difficult on other OSes. In addition to its power as a WarDriving application, KisMAC is also a very powerful tool for WLAN penetration testing. The ease of setup and configuration and KisMAC stands out as one of, if not the top WarDriving application available. Because it offers the option of both active and passive scanning and a large number of supported chipsets, it is perfect for WarDriving. KisMAC is the most popular WarDriving application for OS X. There are also several outstanding tools for the wireless hacker available for OS X. There are fantastic tools available for Linux. When people think of WarDriving and attacking wireless networks, Linux is usually the first OS that comes to mind.
