Anti-Hacker Tool Kit, Third Edition

 < Day Day Up > 


AiroPeek, from http://www.wildpackets.com/products/airopeek, actually lets you peek into the data transmitted across a wireless network. It goes beyond the capability of NetStumbler by displaying, for example, web traffic. This aspect of AiroPeek places it into the category of a packet capture tool such as tcpdump.

Implementation

The most important prerequisite for AiroPeek is obtaining a wireless card with the correct firmware that permits promiscuous mode. AiroPeek supports Cisco Systems 340 Series, Cisco Systems 350, Symbol Spectrum24 11 Mbps DS, Nortel Networks e-mobility 802.11 WLAN, Intel PRO/Wireless 2011 LAN, 3Com AirConnect 11 Mbps WLAN, and Lucent ORiNOCO PC (Silver/Gold) cards. For cards that require a specific firmware, the drivers are available from the WildPackets web site.

When you first launch AiroPeek, you will be prompted for an adapter to use for capturing data. Simply highlight the correct card and click OK. Figure 17-2 shows an example of this window.

click to expand Figure 17-2: Select a wireless adapter

AiroPeek is now ready to capture packets. Select Capture from the main menu. A screen similar to the one shown in Figure 17-3 greets you. Now most wireless traffic that passes within range of your wireless card can be captured.

click to expand Figure 17-3: Capture wireless traffic

If multiple wireless networks are in the area or a large amount of traffic is occurring, you can use triggers to narrow down the amount of data collected.

Tip 

You can decrypt WEP-protected traffic if you know the correct WEP key. Set the key by choosing Tools | Options | 802.11 | WEP Key Set | Edit Key Sets.

From this point on, AiroPeek is just another network sniffer. Use it to validate that traffic is being encrypted or to determine how much network information from the wired network leaks to the wireless network. Here are some typical scenarios:


 < Day Day Up > 

Категории