HOME SUPPORT pRODUCTS CONTACT US
 
Wireless Network Security Tools
  Do You Know Who is on your Bluetooth Wireless Network? BlueAuditor Does!

BlueAuditor - Wireless Network Security Tools

BlueAuditor - Scan and Monitors Bluetooth devices in a wireless network

BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring. Bluetooth devices in a wireless network. It can discover and track any Bluetooth device within a distance between 1 and 100 meters and display key information about each device being detected as well as the services device provided.

With the growing popularity of the Bluetooth technology, BlueAuditor will enable network administrators to effectively audit their wireless networks against security vulnerabilities associated with the use of Bluetooth devices.

BlueAuditor enables the user to save the data of the detected Bluetooth devices in an .xml file and supports the most Microsoft Bluetooth drivers available on the market. All the mentioned features are provided with a user friendly graphical interface

Bluetooth Drivers and Installation Process

BlueAuditor only works with the Windows provided Bluetooth drivers. If you have purchased a new USB Bluetooth adapter then you should install it by simply plugging it in. Windows XP Service Pack 2 or Vista should automatically detect the adapter and install the appropriate drivers without you needing to install any software from a CDROM.

Free to Try 15 Days Full version for only $19.50
Buy Now | Download BlueAuditor | More Information
 
Bluetooth Adapter

 

BlueAuditor Awards

SoftRating.com Gold Award - Best All-In-One Password Recovery Solution

You will need a Bluetooth adapter which is supported by the Windows XP built-in Bluetooth drivers. This includes any of the following adapters:

Alps Integrated Bluetooth Device
Alps Bluetooth USB Adapter
Belkin Bluetooth Adapter
Blutonium BCM2035 Bluetooth 2.4 GHz Single Chip Transceiver
Brain Boxes USB Bluetooth Adapter BL-554
BCM2033 Bluetooth 2.4 GHz Single Chip Transceiver
Generic Bluetooth Radio
CSR Nanosira
CSR Nanosira WHQL Reference Radio
CSR Nanosira-Multimedia
CSR Nanosira-Multimedia WHQL Reference Radio
FIC Bluetooth Wireless Adapter
GVC Bluetooth Wireless Adapter
Silicon Wave Bluetooth Wireless Adapter
Sony Bluetooth USB Adapter
Dell TrueMobile Bluetooth Module
Dell Wireless 350 Bluetooth Module
Bluetooth USB Adapter (BT-51x serial)
HP USB BT Transceiver [1.2]
IBM Integrated Bluetooth II
IBM Integrated Bluetooth III
Microsoft Wireless Transceiver for Bluetooth
Microsoft Wireless Transceiver for Bluetooth 2.0
Motion Computing USB Bluetooth Device
TDK Bluetooth USB Adapter
TOSHIBA Integrated Bluetooth
TOSHIBA Integrated Bluetooth 2
TOSHIBA Integrated Bluetooth 3
TOSHIBA Bluetooth Adapter
Zeevo Bluetooth Solution

 
 
  Network Tools
FreeSysInfo Version 1.1 Network Tools Product Page
12/26/05 442 KB Windows 2000/XP/2003 Freeware(0 $.)
FreeSysInfo allows you to discover system and network information
FreeSysInfo allows you to discover system and network information on your local machine or network computer. The tool used WMI ( Windows Management Instrumentation ) to discover full NDIS information, wireless network status and type, network adapters, system processes and services, serial communications and display information, hardware and connections status, user and system accounts, proxy settings, shared resource information and more. The tool is designed with a user-friendly interface and is easy to use.
Author : Nsasoft llc. http://www.nsauditor.com/
 
 
What Is Bluetooth?
Bluetooth is an industrial specification for PANs "wireless personal area networks". Bluetooth provides a way to connect and exchange information between devices like personal digital assistants (PDAs), mobile phones, laptops, PCs, printers and digital cameras via a secure, low-cost, globally available short range radio frequency.

Bluetooth devices transmit on the 2.4 gigahertz (GHz) radio frequency. Bluetooth devices operate on frequency band between 2.4 to 2.4835 GHz. To avoid interference with other devices operating on the same band, the technology uses a frequency hopping algorithm with 1600 frequency hops per second. The time during which devices operate in a certain frequency is called a time slot and is 625 microseconds in duration. Units in a piconet change frequency at the same time on command from the master unit, based on a pseudo-random hopping sequence. The frequency band is broken up into 79 channels spaced 1 MHz apart. Data is transmitted in frames, which can span 1, 3 or 5 slots.

There are many programs available today that are designed to communicate with devices through COM ports (also called serial ports). With Bluetooth COM ports, Windows XP can allow these programs to communicate using Bluetooth wireless technology. For example, you can synchronize your calendar and contact information on your personal digital assistant (PDA) with your computer by using Bluetooth COM ports.

Many Bluetooth devices are not automatically discoverable. To make each device discoverable, you must attach or turn on the Bluetooth radio adapter for your Windows XP computer, and then set up your device so that Windows XP can find it.

When you make a Bluetooth enabled device discoverable, the device sends radio signals to advertise its location, which enables your computer to recognize the Bluetooth device

 
 
  Wireless Encryption

WEP " Wired Equivalent Privacy " is designed to provide protection by encrypting wireless data as it traverses the airwaves. WEP uses the symmetric cryptography system called RC4 with a user specified key (64 bits and 128 bits) to protect the data. As a result, WEP alone is not enough to protect your data, and coming sections will address this fact with practical solutions such as dynamic WEP, IPSec, and 801.1x authentication. When using WEP, use a 128-bit key. The programs that can crack WEP need to collect a large number of encrypted data to figure out your key. WEP is not flawless, but it is a big deterrent considering there are probably other, more inviting, none WEP networks nearby. Some wireless vendors sell devices that change the encryption key after a set amount of time. Changing the key every 20 minutes would make it just about impossible to break.

Most wireless products now on the market support the WPA " Wi-Fi Protected Access " encryption protocol, which is considered much stronger, though some older access points have to be replaced to support it. The adoption of the 802.11i standard (marketed as WPA2) makes available a rather better security scheme, when properly configured. As of mid-2005, both Microsoft Windows XP and Mac OS X support WPA2, but on newer equipment only.

 
 
  WPAN
WPAN "Wireless Personal Area Network" is small, in the range of about 10 meters (30 feet). Infrared Data Association (IrDA) and Bluetooth are the main WPAN wireless technologies. The devices that take advantage of a WPAN include PDAs, printers, cameras, cell phones, and access points, to name a few. Bluetooth uses radio waves to transmit data and supports higher data transmission rates (11 Mbps) and uses the 2.4 GHz ISM bandwidth
 
 
  WLAN
WLAN "Wireless Local Area Network" is greater than WPAN, most 802.11b implementations will have a speed of 1 Mbps and a range of about 500 meters (1500 feet). With a closer proximity to the AP "Access Point", speeds of up to 11 Mbps can be reached. IEEE 802.11b makes use of the 2.4 GHz ISM band and provides speeds from 1 Mbps up to 11 Mbps, with the range about 1500 feet. This standard uses DSSS "Direct Sequence Spread Spectrum" to encode data before transferring it. IEEE 802.11, 802.11a, 802.11b, and 802.11g use CSMA/CA "Carrier Sense Multiple Access / Collision Avoidance" as the protocol in the data link layer.
 
 
  Wi-Fi Specifications
Wi-Fi is based on the IEEE 802.11 specifications. There are currently four deployed 802.11 variations: 802.11a, 802.11b, 802.11g, and 802.11n. The b specification was used in the first Wi-Fi products. The g and n variants are the ones most often sold as of 2005.
Specification Speed Frequency Band Compatible with
802.11b 11 Mb/s 2.4 GHz b
802.11a 54 Mb/s 5 GHz a
802.11g 54 Mb/s 2.4 GHz b, g
802.11n 100 Mb/s 2.4 GHz b, g, n
 
 
  Wireless Network Attack Methodology
Wireless hackers are commonly referred to as "war drivers" and "war walkers". The first item you'll want to consider when working with Wireless Network Security is identification. Change your SSID to something other than the manufacturer's default and disable broadcasting of your SSID. Many basic wireless scanners will not detect a hidden SSID. Check your wireless network hardware manual for more information on how to do this.

The Wireless Network attack methodology is as follows:

Footprint the Wireless Network

Attacking a wireless network begins with finding it and then goes on to the methods for discovering and footprinting the wireless network in an active or passive way.

Passive method

An attacker can use the passive way to detect the existence of an AP by sniffing the packets from the airwaves, which will reveal the AP, SSID and STAs that are live.

Active method

In the active method, the STA sends out a probe request with the SSID to see if an AP responds. If the STA doesn't have the SSID in the beginning, the STA will send the probe request with an empty SSID, most APs will respond to it with their own SSID in a probe response packet. AP can be configured to ignore a probe request with an empty SSID.

Brute Force Attack

WEP uses the symmetric cryptography system called RC4 with a user specified key (64 bits and 128 bits) to protect the data. The user can use a shared secret key. The real key to encrypt the data with RC4 algorithm is generated by a pseudo random number generator, but flaws in pseudo random number generator can cause the real key space to be less than 64 bits or 128 bits. The flaw actually reduces the key space of the 64-bit key to 22 bits. Therefore, it is possible for an attacker to collect enough information to try to discover the key offline. A weakness in the random key generator of the RC4 algorithm used in WEP can permit an attacker to collect enough packets with Initiation vectors ( 3-byte random number generated by the computer ) that match certain patterns to recover the user-chosen key from the Initiation vectors

 
 
  Wireless Network Security Tools

NetStumbler

NetStumbler displays wireless access points, SSIDs, channels, whether WEP encryption is enabled and signal strength. NetStumbler can connect with GPS technology to accurately log the precise location of access points.
 

ApSniff

ApSniff is a wireless (802.11) access point sniffer for Windows 2000. It enables you to list all access points broadcasting beacon signals at your location. Useful for helping you set new access points making sure you do not have interfering APs, and helping you set-up wireless clients by providing you with the client configuration information. Requires WLAN cards of Prism 2 chipset. It works with a DLINK DWL-650 and linksys WPC11.
 

PrismStumbler

Prismstumbler is a wireless LAN (WLAN) discovery tool which scans for beacon frames from access points. Prismstumbler operates by constantly switching channels and monitors any frames received on the currently selected channel.
 

WEPCrack

WEPCrack was the first of the WEP encryption cracking utilities. WEPCrack is an open-source tool used to break 802.11 WEP keys. You can also download
 

Airsnort

Airsnort is a wireless LAN (WLAN) tool which cracks WEP encryption keys. AirSnort passively monitors wireless transmissions and automatically computes the encryption key when enough packets have been gathered.
 

WifiScanner

WifiScanner is a tool that has been designed to discover wireless node ( i.e access point and wireless clients). It is distributed under the GPL License. It work with CISCOR card and prism card with hostap driver or wlan-ng driver. An IDS system is integrated to detect anomaly like MAC usurpation.
 

Wellenreiter

Wellenreiter is a GTK / Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. All three major wireless cards (Prism2 , Lucent, and Cisco) are supported. It has an embedded statistics engine for the common parameters provided by wireless drivers. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects ssid broadcasting or non-broadcasting networks in every channel. Non-broadcasting networks could be uncovered automatically. The manufacturer and WEP is automatically detected.
 

WepLab

WepLab is a tool designed to teach how WEP works, what different vulnerabilities has, and how they can be used in practice to break a WEP protected wireless network. So far, WepLab more than a Wep Key Cracker, is a Wep Security Analyzer designed from an educational point of view.
 

BTScanner

BTscanner is a tool that extracts as much information as possible from a Bluetooth device without the requirement to pair. A detailed information screen extracts HCI and SDP information, and maintains an open connection to monitor the RSSI and link quality. BTScanner is based on the BlueZ Bluetooth stack, which is included with recent Linux kernels, and the BlueZ tSolset. Using the information gathered from these sources, it is possible to make educated guesses as to the host device type.
 

FakeAP

The polar opposite of hiding your network by disabling SSID broadcasts- Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. As part of a honeypot or as an instrument of your site security plan, Fake AP confuses Wardrivers, NetStumblers, Script Kiddies, and other scanners.
 

Kismet

Kismet is an 802.11 wireless network detector, sniffer, and intrusion detection system. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting hidden networks, and inferring the presence of non beaconing networks via data traffic.
 

Mognet

Mognet is a free, open source wireless ethernet sniffer / analyzer written in Java. It is licensed under the GNU General Public License. It was designed with handheld devices like the iPaq in mind, but will run just as well on a desktop or laptop.

 

 
 
  Nsauditor - Network Security Auditor
Nsauditor - Network Security Auditor Nsauditor - Network Security Auditor

Nsauditor Network Security Auditor is a network security scanner that allows to audit and monitor remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Nsauditor is a complete networking utilities package that includes a wide range of tools for network security auditing, scanning, monitoring and more. The program includes more than 45 network tools for scanning, sniffing, enumerating and gaining access to machines and contains a built-in database of known network security vulnerabilities, which allows you to select the items for scanning and add custom entries. Nsauditor can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios, RPC, SQL and SNMP information, open ports. Reports can be generated in HTML and XML format. Overall, this is a very complete package for a surprisingly low price.

Free Trial 15 Day Full Version ($69.00)
Buy Now | Download | More Information | Awards
 
  Product Key Explorer - Product Key Auditor
Product Key Explorer Product Key Explorer - Product Key Auditor

Product Key Explorer recovers and displays product key for Windows 7, Windows Vista, Windows XP, MS Office, Adobe CS, CS3, CS4, CS5, SQL Server and more than 1000 popular software products installed on your local or remote network computers.In order to install or reinstall Microsoft Office, Windows, or other commercial software, you must have access to a product serial key (CD Key) for that product. Product Key Explorer retrieves serial keys from network computers and allows to protect your company from having pirated software on your network. With this software you will be able to track the number of software licenses installed in your business, find and recover a lost or forgotten product keys, save and keep an up-to-date backup of all your software license keys in a central location. Excellent tool for network administrators, or businesses undergoing a software license compliancy.
You can save product keys as Tab Delimited Txt File (.txt), Excel Workbook (.xls), CSV Comma Delimited (.csv), Access Database (.mdb), SQLLite3 Database, Web Page (.html) or XML Data (.xml) file, Print or Copy to Clipboard.

Free Trial 15 Day Full Version ($29.50)
Buy Now | Download | More Information
 
News Articles Topics
News & Updates
Network Bandwidth Monitor Released
Network Security Auditor Released
SpotAuditor Released
Backup Key Recovery Released
Product Key Explorer Released
How to Monitor Network Bandwidth Usage
How to Recover Lost Passwords?
How to Find & Recover Product Keys?
Network Security Auditing
Backup Key Recovery
Password Recovery
Network Security Audit
Product Key Finder
Product Key Recovery from crashed hard drive
Password Recovery Software
Network Security Systems
Home Network Security
HOME SUPPORT pRODUCTS CONTACT US NSASOFT.NET