Sniffing, Interception, and Monitoring

Much in the same way that an attacker can sniff network traffic on a wire, an attacker can also passively intercept wireless network traffic. Then, through packet analysis, he might be able to determine login IDs and passwords and collect other sensitive data using wireless packet sniffers. The ease with which intruders can penetrate a wireless network is now being made easier with the release of several software applications that allow intruders to passively collect data for real-time or later analysis. This kind of analysis can compromise the network.

Examples of wireless sniffing software include Airopeek, AirSnort, NetStumbler, and WEPCrack. AirSnort is an application that utilizes known WEP flaws to ...

Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.