1. WPSPIN. WPS PIN Wireless Auditor.

    The main features are the wireless network scanner, generator default PIN for WPS-enabled routers, and wireless open networks.

    Default PIN generator for routers with WPS active, invoking WiFi settings, wpa_cli, Bully, Reaver and Reavermod.

    The scanner basic functionality are autoscan, normal scan on demand, looking for types of networks, search for WPS, search for WPS WPA, search for WPS WPA2, a network connection status and a description of wireless networks.

    In order to connected to open networks click on the open network, for other wireless networks invoke to setup wifi.

    Default PIN generator for routers with WPS active, invoking WiFi settings. WPA command-line client generator to allow interact with wpa_supplicant through wpa_cli. Instruction execution generator for Bully, Reaver or Reavermod programs, and allows the direct implementation in the bcmon application or Terminal application.

    Original algorithms discovered by Zaochesung (ComputePIN), Stefan Viehböck (easyboxPIN) and Craig Heffner (D-Link), added default PIN known routers.

    BSSID manually entered PIN to generate the default format: XX:XX:XX:XX:XX:XX. Manual entry of PIN for verification by the methods available (WiFi, wpa_cli, Bully, Reaver and Reavermod) with format: 7 or 8 numbers NNNNNNNn.

    Select the interface Wireless (wlan0 or eth0) for generating program instruction for wpa_cli. Select the interface Wireless (wlan0 ,eth0 or mon0) to generate instruction for Bully, Reaver and Reavermod programs.

    WPA command-line client generator to allow interact with wpa_supplicant via wpa_cli. Must be root to execute the program wpa_cli.

    Download wpa_cli program in blog http://WPSPIN.blogspot.com, copy wpa_cli program in the folder /system/bin, and grant execute permissions. Wpa_cli program by Jouni Malinen.

    Instruction generator running for Bully, Reaver or Reavermod programs, and allows direct execution in the bcmon application, or the Terminal application. Need to be root, Monitor mode, and have installed the bcmon and Terminal applications.

    Download Bully, Reaver and Reavermod programs in blog http://WPSPIN.blogspot.com. With bcmon application, copy programs in the folder /data/data/com.bcmon.bcmon/file/tools, and grant execute permissions. For Terminal application, copy programs in the folder /system/bin, and grant execute permissions.

    Bcmon application by Omri Ildis, Yuval Ofir and Ruby Feinstein http://bcmon.blogspot.com.
    Application Terminal Emulator for Android by Jack Palevich http://github.com/jackpal/Android-Terminal-Emulator.
    Bully program thanks to Brian Purcell http://github.com/bdpurcell/bully.
    Reaver program by Craig Heffner http://code.google.com/p/reaver-wps.

    Simple way to check vulnerability of your own WPS WiFi-Access Point.

    Disclaimer

    The use of this product wireless analysis software should be a basic tool for professionals and individuals who are eager to know the security level of wireless facilities is strictly forbidden to use it to commit criminal acts of intrusion on wireless networks of which we do not own or do not have permissions to analyze their security.

    http://WPSPIN.blogspot.com
    http://Buckynet.blogspot.com

    # vimeo.com/132710058 Uploaded
  2. WPSPIN. WPS PIN Wireless Auditor.

    The main features are the wireless network scanner, generator default PIN for WPS-enabled routers, and wireless open networks.

    Default PIN generator for routers with WPS active, invoking WiFi settings, wpa_cli, Bully, Reaver and Reavermod.

    The scanner basic functionality are autoscan, normal scan on demand, looking for types of networks, search for WPS, search for WPS WPA, search for WPS WPA2, a network connection status and a description of wireless networks.

    In order to connected to open networks click on the open network, for other wireless networks invoke to setup wifi.

    Default PIN generator for routers with WPS active, invoking WiFi settings. WPA command-line client generator to allow interact with wpa_supplicant through wpa_cli. Instruction execution generator for Bully, Reaver or Reavermod programs, and allows the direct implementation in the bcmon application or Terminal application.

    Original algorithms discovered by Zaochesung (ComputePIN), Stefan Viehböck (easyboxPIN) and Craig Heffner (D-Link), added default PIN known routers.

    BSSID manually entered PIN to generate the default format: XX:XX:XX:XX:XX:XX. Manual entry of PIN for verification by the methods available (WiFi, wpa_cli, Bully, Reaver and Reavermod) with format: 7 or 8 numbers NNNNNNNn.

    Select the interface Wireless (wlan0 or eth0) for generating program instruction for wpa_cli. Select the interface Wireless (wlan0 ,eth0 or mon0) to generate instruction for Bully, Reaver and Reavermod programs.

    WPA command-line client generator to allow interact with wpa_supplicant via wpa_cli. Must be root to execute the program wpa_cli.

    Download wpa_cli program in blog http://WPSPIN.blogspot.com, copy wpa_cli program in the folder /system/bin, and grant execute permissions. Wpa_cli program by Jouni Malinen.

    Instruction generator running for Bully, Reaver or Reavermod programs, and allows direct execution in the bcmon application, or the Terminal application. Need to be root, Monitor mode, and have installed the bcmon and Terminal applications.

    Download Bully, Reaver and Reavermod programs in blog http://WPSPIN.blogspot.com. With bcmon application, copy programs in the folder /data/data/com.bcmon.bcmon/file/tools, and grant execute permissions. For Terminal application, copy programs in the folder /system/bin, and grant execute permissions.

    Bcmon application by Omri Ildis, Yuval Ofir and Ruby Feinstein http://bcmon.blogspot.com.
    Application Terminal Emulator for Android by Jack Palevich http://github.com/jackpal/Android-Terminal-Emulator.
    Bully program thanks to Brian Purcell http://github.com/bdpurcell/bully.
    Reaver program by Craig Heffner http://code.google.com/p/reaver-wps.

    Simple way to check vulnerability of your own WPS WiFi-Access Point.

    Disclaimer

    The use of this product wireless analysis software should be a basic tool for professionals and individuals who are eager to know the security level of wireless facilities is strictly forbidden to use it to commit criminal acts of intrusion on wireless networks of which we do not own or do not have permissions to analyze their security.

    http://WPSPIN.blogspot.com
    http://Buckynet.blogspot.com

    # vimeo.com/132710059 Uploaded
  3. WPSPIN. WPS PIN Wireless Auditor.

    The main features are the wireless network scanner, generator default PIN for WPS-enabled routers, and wireless open networks.

    Default PIN generator for routers with WPS active, invoking WiFi settings, wpa_cli, Bully, Reaver and Reavermod.

    The scanner basic functionality are autoscan, normal scan on demand, looking for types of networks, search for WPS, search for WPS WPA, search for WPS WPA2, a network connection status and a description of wireless networks.

    In order to connected to open networks click on the open network, for other wireless networks invoke to setup wifi.

    Default PIN generator for routers with WPS active, invoking WiFi settings. WPA command-line client generator to allow interact with wpa_supplicant through wpa_cli. Instruction execution generator for Bully, Reaver or Reavermod programs, and allows the direct implementation in the bcmon application or Terminal application.

    Original algorithms discovered by Zaochesung (ComputePIN), Stefan Viehböck (easyboxPIN) and Craig Heffner (D-Link), added default PIN known routers.

    BSSID manually entered PIN to generate the default format: XX:XX:XX:XX:XX:XX. Manual entry of PIN for verification by the methods available (WiFi, wpa_cli, Bully, Reaver and Reavermod) with format: 7 or 8 numbers NNNNNNNn.

    Select the interface Wireless (wlan0 or eth0) for generating program instruction for wpa_cli. Select the interface Wireless (wlan0 ,eth0 or mon0) to generate instruction for Bully, Reaver and Reavermod programs.

    WPA command-line client generator to allow interact with wpa_supplicant via wpa_cli. Must be root to execute the program wpa_cli.

    Download wpa_cli program in blog http://WPSPIN.blogspot.com, copy wpa_cli program in the folder /system/bin, and grant execute permissions. Wpa_cli program by Jouni Malinen.

    Instruction generator running for Bully, Reaver or Reavermod programs, and allows direct execution in the bcmon application, or the Terminal application. Need to be root, Monitor mode, and have installed the bcmon and Terminal applications.

    Download Bully, Reaver and Reavermod programs in blog http://WPSPIN.blogspot.com. With bcmon application, copy programs in the folder /data/data/com.bcmon.bcmon/file/tools, and grant execute permissions. For Terminal application, copy programs in the folder /system/bin, and grant execute permissions.

    Bcmon application by Omri Ildis, Yuval Ofir and Ruby Feinstein http://bcmon.blogspot.com.
    Application Terminal Emulator for Android by Jack Palevich http://github.com/jackpal/Android-Terminal-Emulator.
    Bully program thanks to Brian Purcell http://github.com/bdpurcell/bully.
    Reaver program by Craig Heffner http://code.google.com/p/reaver-wps.

    Simple way to check vulnerability of your own WPS WiFi-Access Point.

    Disclaimer

    The use of this product wireless analysis software should be a basic tool for professionals and individuals who are eager to know the security level of wireless facilities is strictly forbidden to use it to commit criminal acts of intrusion on wireless networks of which we do not own or do not have permissions to analyze their security.

    http://WPSPIN.blogspot.com
    http://Buckynet.blogspot.com

    # vimeo.com/132710061 Uploaded
  4. WPSPIN. WPS PIN Wireless Auditor.

    The main features are the wireless network scanner, generator default PIN for WPS-enabled routers, and wireless open networks.

    Default PIN generator for routers with WPS active, invoking WiFi settings, wpa_cli, Bully, Reaver and Reavermod.

    The scanner basic functionality are autoscan, normal scan on demand, looking for types of networks, search for WPS, search for WPS WPA, search for WPS WPA2, a network connection status and a description of wireless networks.

    In order to connected to open networks click on the open network, for other wireless networks invoke to setup wifi.

    Default PIN generator for routers with WPS active, invoking WiFi settings. WPA command-line client generator to allow interact with wpa_supplicant through wpa_cli. Instruction execution generator for Bully, Reaver or Reavermod programs, and allows the direct implementation in the bcmon application or Terminal application.

    Original algorithms discovered by Zaochesung (ComputePIN), Stefan Viehböck (easyboxPIN) and Craig Heffner (D-Link), added default PIN known routers.

    BSSID manually entered PIN to generate the default format: XX:XX:XX:XX:XX:XX. Manual entry of PIN for verification by the methods available (WiFi, wpa_cli, Bully, Reaver and Reavermod) with format: 7 or 8 numbers NNNNNNNn.

    Select the interface Wireless (wlan0 or eth0) for generating program instruction for wpa_cli. Select the interface Wireless (wlan0 ,eth0 or mon0) to generate instruction for Bully, Reaver and Reavermod programs.

    WPA command-line client generator to allow interact with wpa_supplicant via wpa_cli. Must be root to execute the program wpa_cli.

    Download wpa_cli program in blog http://WPSPIN.blogspot.com, copy wpa_cli program in the folder /system/bin, and grant execute permissions. Wpa_cli program by Jouni Malinen.

    Instruction generator running for Bully, Reaver or Reavermod programs, and allows direct execution in the bcmon application, or the Terminal application. Need to be root, Monitor mode, and have installed the bcmon and Terminal applications.

    Download Bully, Reaver and Reavermod programs in blog http://WPSPIN.blogspot.com. With bcmon application, copy programs in the folder /data/data/com.bcmon.bcmon/file/tools, and grant execute permissions. For Terminal application, copy programs in the folder /system/bin, and grant execute permissions.

    Bcmon application by Omri Ildis, Yuval Ofir and Ruby Feinstein http://bcmon.blogspot.com.
    Application Terminal Emulator for Android by Jack Palevich http://github.com/jackpal/Android-Terminal-Emulator.
    Bully program thanks to Brian Purcell http://github.com/bdpurcell/bully.
    Reaver program by Craig Heffner http://code.google.com/p/reaver-wps.

    Simple way to check vulnerability of your own WPS WiFi-Access Point.

    Disclaimer

    The use of this product wireless analysis software should be a basic tool for professionals and individuals who are eager to know the security level of wireless facilities is strictly forbidden to use it to commit criminal acts of intrusion on wireless networks of which we do not own or do not have permissions to analyze their security.

    http://WPSPIN.blogspot.com
    http://Buckynet.blogspot.com

    # vimeo.com/132710062 Uploaded
  5. SWardriving. Wireless Wi-Fi Wardriving.

    Excellent for WarDriving, Warbiking, Warwalking, Warjogging, Warrailing, Wartraining, BusWardriving, and to scan lots of hotspots. If you Wardriving, you will not escape the location of any wireless network.

    The main functions are:

    * SQLite Database to track and locate Wireless Networks.
    * Wireless Wi-Fi networks statistics stored in the Database.
    * Update GPS data received every second.
    * Accelerated Scanner on nearby Wireless Wi-Fi Networks.
    * Statistics on nearby Wireless Wi-Fi networks.
    * Notification service running in the background.
    * Export KML files in the SD (for importing into Google Maps/Earth, Wigle, ...)
    * Export CSV files in the SD (separated by commas to Excel, OpenOffice/LibreOffice, ...)
    * Total elimination of the data contained in the Database.

    The application uses data from GPS and Wireless Wi-Fi network scanner in combination to locate access points Wi-Fi, then save the necessary data in a database which can then be exported to a KML or CSV.

    To obtain the necessary data Wireless Wi-Fi network, you must wait for the device to determine the current location through GPS.

    The Google Play Store version does NOT contain any functionality to perform criminal acts of intrusion on protected Wireless Wi-Fi networks. This is NOT a hacker app.

    Disclaimer

    The use of this product wireless analysis software should be a basic tool for professionals and individuals who are eager to know the security level of wireless facilities is strictly forbidden to use it to commit criminal acts of intrusion on wireless networks of which we do not own or do not have permissions to analyze their security.

    # vimeo.com/132703068 Uploaded

Buckynet

buckynet

Apps para Android y Blackberry.

Browse This Channel

Shout Box

Heads up: the shoutbox will be retiring soon. It’s tired of working, and can’t wait to relax. You can still send a message to the channel owner, though!

Channels are a simple, beautiful way to showcase and watch videos. Browse more Channels.