Can be used to set up a rogue access point (evil twin attack).
Can be used to capture 802.11a/b/g traffic.
Can be run on Windows, Linux, iOS and Android platforms.
The suite of tools can be used to perform the following: monitoring (capturing of network traffic), attack (carry out de-authentication attacks and replay attacks), testing (testing of hardware wireless capabilities) and cracking (WEP, WPA and WPA2 pre-shared keys). It is used to crack and recover WEP/WPA/WPA2 keys. Aircrack-ng is a wireless security framework with a suite of tools used to capture wireless traffic. This is the most widely used wireless password cracking tool. The tools have been categorized into the following for ease of use: Top 8 tools on Kali Linux for wireless attacks
REPLAY CAPTURE SUITE CRACK HOW TO
Helps key stakeholders to assess the current state of the Wi-Fi environment and make decisions on how to address the risks the vulnerabilities identified pose to the organization.
Helps organizations to meet audit and compliance requirements.
Helps to identify any unauthorized access points or rogue devices in your network.
Evaluates the adequacy of the security controls already in place.
Helps to identify all the access points and assesses the vulnerabilities and security risks it presents to your IT environment and the business at large.
Helps to provide an understanding of how the wireless network is configured and how it fits into the rest of your IT environment.
Some of the benefits of performing a wireless security environment include: Inadequate configuration and existing vulnerabilities of the wireless network (and its underlying infrastructure) can lead to your IT infrastructure and business being compromised. Most organizations today have implemented wireless networking however, they do not perform a security assessment on the wireless network. Why carry out a wireless security assessment?