packet sniffer

(redirected from Wireless sniffer)

packet sniffer

(networking, tool)
A network monitoring tool that captures data packets and decodes them using built-in knowledge of common protocols. Sniffers are used to debug and monitor networking problems.
References in periodicals archive ?
Today, ElcomSoft is integrating a wireless sniffer into Elcomsoft Wireless Security Auditor.
An integrated wireless sniffer now displays all available wireless networks complete with channel numbers, MAC-addresses, SSID, speed, load and encryption parameters and can attempt to connect to any available network and initiate a password recovery attack.
This comprehensive set of tools includes a wireless sniffer, a packet capture tool, a Wired Equivalent Privacy (WEP) key generator, and a WEP cracker.
Because the WEP secret key is static, a hacker using a wireless sniffer (a device that retrieves and stores network packets) can crack it within one second after 100 MB to 1 GIG data has been sniffed.
The least expensive, and least effective, way of doing this is to buy a wireless sniffer handheld and walk the perimeter of the network.
Silicon Labs also offers a Desktop Network Analyzer that, unlike traditional wireless sniffers, provides full visibility of all wireless networking activity by using the EM34x wireless SoC's packet trace port.
When problems arise, these products act like wireless sniffers to quickly isolate and resolve problems.
Several new and ongoing threats pose risks for people accessing the Internet via public WiFi networks, including "Evil Twin" access points, WiPhishing scams and wireless sniffers -- all of which are designed to access personal information from unknowing victims.
Additionally, the software connects to "non-broadcast" Wi-Fi networks, which allows a hot spot operator to obscure their Wi-Fi access points from ordinary wireless sniffers, protecting it from unauthorized use.
Timely sessions include How Hackers Hide; Protecting XP From Hackers; Sniffing the Air: Wireless Sniffers as Threats and Tools; Penetration Testing: A How-To Guide; Securing Voice Over IP; Creating a Secure .

Full browser ?