Tools to Sniff Wireless Connection

Posted on 2007-08-07
Last Modified: 2013-11-09
We configure Wireless routers and send them to our customers. The wireless routers are configured with WPK-PSK TKIP encryption. We are trying to hack into the wireless connection to determine how secure they are.

Are there any wireless hacking tools and sniffer out there to do this?
Question by:phreesia
    LVL 4

    Expert Comment

    Nmap is a really good way to check open ports, etc, and they have a GUI version if you want that instead of the command line version. NetCat is a good way to bannergrab and get information from that. Putty is a good telnet type application. You can lookup how to use them on Google. I'm sorry I can't give you 'hacking tools' per se, it's just too dangerous to put that information out there. That and most good hackers write their own programs anyway.

    Author Comment

    I've looked on those people that wrote their hacking program however they seemed to be written for Linux. Have you seen one for windows? and how do I search for it? We need to see if our wireless is breakable and I think the only way to find out is to try to hack into them
    LVL 4

    Accepted Solution

    Since it appears that you are reputable in the aspect of wireless networking, you can e-mail me with your specific questions, as I don't really like putting that sort of information out for all the world to see. It is djmounce553 (AT) gmail (DOT) com

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    IT, Stop Being Called Into Every Meeting

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    Last Mile Wireless The term last mile wireless is a bit deceptive as it can be much more than a mile. It is also called WiMax and 802.16. It generally refers to relatively short distance point-to-point / point-to-multipoint secure wireless connecti…
    DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
    Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now