# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]


 Wireless Attacks and Penetration Testing part 2

"Our first task is to figure out how to gain access to the WEP-protected wireless network. Using AirSnort, named after the venerable intrusion detection system Snort, you can passively monitor transmissions across a wireless network and, from that monitoring, derive the encryption key for a WEP-protected network once you have an adequate base of packets."
Story

 (Submitted by Noel Wed Jun 16, 2004 )

  


Our content can be syndicated: Main page Mac Page

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author