From: Carney, Mark (Mark.Carney@fishnetsecurity.com)
Date: Fri Sep 24 2004 - 12:55:30 EDT
Chuck,
I would suggest the following toolsets/tools for 802.11 and bluetooth discovery.
Toolsets:
1) Auditor Security Collection
2) Knoppix STD Distro
Tools:
802.11 --
1) Kismet
2) NetStumbler
3) Wellenreiter
4) asleap (if client is running Cisco LEAP)
5) AirSnort, Webattack, or dwepcrack (if client is running WEP)
6) Macchanger (to spoof mac address)
7) AirTraf
BlueTooth --
1) sdptool
2) pand
3) l2ping
4) btscanner
5) Redfang
6) BlueSniff
More wireless tools, go to www.wi-foo.com/index-3.html,
http://www.networkintrusion.co.uk/wireless.htm, or www.wardriving.com/code.php
These should at least be a good start for wireless tools on the free side. Commercial tools are also
available for
802.11 assessments, such as AiroPeek NX, AirMagnet, or Network Instruments, and one for Bluetooth from
AirDefense called
BlueWatch.
Mark
Mark Carney, CISSP, MBA, CCNA, CCSA
Consulting Services, Team Leader
FishNet Security
Direct Phone: 816.701.2029
Office Phone: 816.421.6611
Toll Free: 888.732.9406
Fax: 816.474.0394
http://www.fishnetsecurity.com
-----Original Message-----
From: Chuck Fullerton [mailto:chuckf69@ceinetworks.com]
Sent: Friday, September 24, 2004 3:59 AM
To: RoF@yahoo; Pen-Test
Subject: Wireless Scanning
Everyone,
I'm currently looking for a tool (or compliment of tools) to perform
Wireless Scanning during a Pen test. My plan is to Scan first for the
presence of 802.11(whatever), bluetooth, spycams, bugs, etc. Once these are
detected, then each of the items found can have their security tested. My
goal of being able to do this is to Take a good security audit methodology
(such as the OSSTMM) and scale it down for small to medium business
effectively.
Can any one recommend tools that they have used to detect these items?
Chuck Fullerton
CEH,OPST,CISSP,CSS1,CCNP,CCDA,CNA,A+
------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------
The information transmitted in this e-mail is intended only for the addressee and may contain confidential and/or privileged material.
Any interception, review, retransmission, dissemination, or other use of, or taking of any action upon this information by persons or entities
other than the intended recipient is prohibited by law and may subject them to criminal or civil liability. If you received this communication
in error, please contact us immediately at 816.421.6611, and delete the communication from any computer or network system.
------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:06 EDT