Monitor mode This is a critical aspect of wireless testing. After the data is sent, the attacker keeps the connection open. The EliteBook is heavier but still much more portable than a standard laptop. Nowadays things are a lot more straightforward and tools like Kismet are more mature. Cracking of WEP and WPA keys, both by brute force, and exploiting flaws such as weak scheduling and poorly generated keys is supported when a card capable of monitor mode is used, and packet reinjection can be done with a supported card Prism2 and some Ralink cards. You can get this at https: Airpwn  is a wireless attack tool for
You will not be able to stop the sniffing of your traffic; however, you can prevent the attacker from being able to decipher the traffic.
Wireless Penetration Testing Checklist – A Detailed Cheat Sheet
Another type of DoS attack is radio frequency jamming. Attackers strive to compromise one or more of the three main security principles. You can get this at https: Any attack on wireless networks or access points which provides substantial information is referred to as wireless hacking. These tools also are considered confidentiality attack tools. Once everything is set up, we need to know what the purpose of the wireless survey is.