Airsnort
Airsnort
|
|
---|---|
Basic data
|
|
developer | Blake Hegerle, Jeremy Bruestle |
Current version | 0.2.7e (January 9, 2005) |
operating system | GNU / Linux , Windows |
category | Wi - Sniffer |
License | GPL |
German speaking | No |
Others | Development stopped |
airsnort.shmoo.com |
Airsnort is a free software for recording data packets and calculating keys in 802.11b - wireless networks .
Airsnort is published by a group called "The Shmoo Group" and is available for Linux and Windows operating systems .
There is no direct connection to the IDS Snort program from Sourcefire - despite the similar name and the adopted mascot (Snort: a piglet with a large, snorting nose; Airsnort: the same piglet with wings).
function
Airsnort uses a weak point in the WEP encryption algorithm described by Scott Fluhrer, Itsik Mantin and Adi Shamir . The software uses a network card to passively record data packets from the wireless network, from which the associated key is calculated. It takes a few minutes.
When the first version was released on August 14, 2001 , Airsnort was one of the first end-user programs to exploit this vulnerability.
In the meantime the development of the program has been stopped.
See also
Web links
- Airsnort homepage
- Scott Fluhrer, Itsik Mantin, and Adi Shamir: "Weaknesses in the Key Scheduling Algorithm of RC4" ( Memento from June 11, 2009 in the Internet Archive ) ( PDF ; 297 kB)
- Michael Ossmann: "WEP: Dead again" - a report on various tools for calculating WEP keys
- "Airsnort under Windows" - instructions in German ( PDF ; 126 kB)
- Under construction: AirSnort for OpenWRT ( Memento from April 20, 2014 in the Internet Archive )