Do You Know Who is on your Bluetooth Wireless Network? BlueAuditor Does!
BlueAuditor -Scan and Monitors Bluetooth devices in a wireless network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring. Bluetooth devices in a wireless network. It can discover and track any Bluetooth device within a distance between 1 and 100 meters and display key information about each device being detected as well as the services device provided.
With the growing popularity of the Bluetooth technology, BlueAuditor will enable network administrators to effectively audit their wireless networks against security vulnerabilities associated with the use of Bluetooth devices.
BlueAuditor enables the user to save the data of the detected Bluetooth devices in an .xml file and supports the most Microsoft Bluetooth drivers available on the market. All the mentioned features are provided with a user friendly graphical interface
BluetoothDrivers and Installation Process
BlueAuditor only works with the Windows provided Bluetooth drivers. If you have purchased a new USB Bluetooth adapter then you should install it by simply plugging it in. Windows XP Service Pack 2 or Vista should automatically detect the adapter and install the appropriate drivers without you needing to install any software from a CDROM.
You will need a Bluetooth adapter which is supported by the Windows XP built-in Bluetooth drivers. This includes any of the following adapters:
Alps Integrated Bluetooth Device
Alps Bluetooth USB Adapter
Belkin Bluetooth Adapter
Blutonium BCM2035 Bluetooth 2.4 GHz Single Chip Transceiver
Brain Boxes USB Bluetooth Adapter BL-554
BCM2033 Bluetooth 2.4 GHz Single Chip Transceiver
Generic Bluetooth Radio
CSR Nanosira WHQL Reference Radio
CSR Nanosira-Multimedia WHQL Reference Radio
FIC Bluetooth Wireless Adapter
GVC Bluetooth Wireless Adapter
Silicon Wave Bluetooth Wireless Adapter
Sony Bluetooth USB Adapter
Dell TrueMobile Bluetooth Module
Dell Wireless 350 Bluetooth Module
Bluetooth USB Adapter (BT-51x serial)
HP USB BT Transceiver [1.2]
IBM Integrated Bluetooth II
IBM Integrated Bluetooth III
Microsoft Wireless Transceiver for Bluetooth
Microsoft Wireless Transceiver for Bluetooth 2.0
Motion Computing USB Bluetooth Device
TDK Bluetooth USB Adapter
TOSHIBA Integrated Bluetooth
TOSHIBA Integrated Bluetooth 2
TOSHIBA Integrated Bluetooth 3
TOSHIBA Bluetooth Adapter
Zeevo Bluetooth Solution
Bluetooth is an industrial specification for PANs "wireless personal area networks". Bluetooth provides a way to connect and exchange information between devices like personal digital assistants (PDAs), mobile phones, laptops, PCs, printers and digital cameras via a secure, low-cost, globally available short range radio frequency.
Bluetooth devices transmit on the 2.4 gigahertz (GHz) radio frequency. Bluetooth devices operate on frequency band between 2.4 to 2.4835 GHz. To avoid interference with other devices operating on the same band, the technology uses a frequency hopping algorithm with 1600 frequency hops per second. The time during which devices operate in a certain frequency is called a time slot and is 625 microseconds in duration. Units in a piconet change frequency at the same time on command from the master unit, based on a pseudo-random hopping sequence. The frequency band is broken up into 79 channels spaced 1 MHz apart. Data is transmitted in frames, which can span 1, 3 or 5 slots.
There are many programs available today that are designed to communicate with devices through COM ports (also called serial ports). With Bluetooth COM ports, Windows XP can allow these programs to communicate using Bluetooth wireless technology. For example, you can synchronize your calendar and contact information on your personal digital assistant (PDA) with your computer by using Bluetooth COM ports.
Many Bluetooth devices are not automatically discoverable. To make each device discoverable, you must attach or turn on the Bluetooth radio adapter for your Windows XP computer, and then set up your device so that Windows XP can find it.
When you make a Bluetooth enabled device discoverable, the device sends radio signals to advertise its location, which enables your computer to recognize the Bluetooth device
WEP " Wired
Equivalent Privacy " is designed to provide protection by encrypting wireless data as it traverses the airwaves. WEP uses the symmetric cryptography system called RC4 with a user specified key (64 bits and 128 bits) to protect the data. As a result, WEP alone is not enough to protect your data, and coming sections will address this fact with practical solutions such as dynamic WEP, IPSec, and 801.1x authentication. When using WEP, use a 128-bit key. The programs that can crack WEP need to collect a large number of encrypted data to figure out your key. WEP is not flawless, but it is a big deterrent considering there are probably other, more inviting, none WEP networks nearby. Some wireless vendors sell devices that change the encryption key after a set amount of time. Changing the key every 20 minutes would make it just about impossible to break.
Most wireless products now on the market support the WPA " Wi-Fi Protected Access " encryption protocol, which is considered much stronger, though some older access points have to be replaced to support it. The adoption of the 802.11i standard (marketed as WPA2) makes available a rather better security scheme, when properly configured. As of mid-2005, both Microsoft Windows XP and Mac OS X support WPA2, but on newer equipment only.
WPAN "Wireless Personal Area Network" is small, in the range of about 10 meters (30 feet). Infrared Data Association (IrDA) and Bluetooth are the main WPAN wireless technologies. The devices that take advantage of a WPAN include PDAs, printers, cameras, cell phones, and access points, to name a few. Bluetooth uses radio waves to transmit data and supports higher data transmission rates (11 Mbps) and uses the 2.4 GHz ISM bandwidth
WLAN "Wireless Local Area Network" is greater
than WPAN, most 802.11b implementations will have a speed of 1 Mbps and
a range of about 500 meters (1500 feet). With a closer proximity to the AP "Access Point", speeds of up to 11 Mbps can be reached. IEEE 802.11b makes use of the 2.4 GHz ISM band and provides speeds from 1
Mbps up to 11 Mbps, with the range about 1500 feet. This standard uses DSSS "Direct Sequence Spread Spectrum" to encode data before
transferring it. IEEE 802.11, 802.11a, 802.11b, and 802.11g use CSMA/CA "Carrier Sense Multiple Access / Collision Avoidance" as the protocol in
the data link layer.
Wi-Fi is based on the IEEE 802.11 specifications. There are currently four deployed 802.11
variations: 802.11a, 802.11b, 802.11g, and 802.11n. The b specification was used in the first Wi-Fi products. The g and n variants are the ones most often sold as of 2005.
Wireless hackers are commonly referred to as "war drivers" and "war walkers". The first item you'll want to consider when working with Wireless Network Security is identification. Change your SSID to something other than the manufacturer's default and disable broadcasting of your SSID. Many basic wireless scanners will not detect a hidden SSID. Check your wireless network hardware manual for more information on how to do this.
The Wireless Network attack methodology is as follows:
Footprint the Wireless Network
Attacking a wireless network begins with finding it and then goes on to the methods for discovering and footprinting the wireless network in an active or passive way.
An attacker can use the passive way to detect the existence of an AP by sniffing the packets from the airwaves, which will reveal the AP, SSID and STAs that are live.
In the active method, the STA sends out a probe request with the SSID to see if an AP responds. If the STA doesn't have the SSID in the beginning, the STA will send the probe request with an empty SSID, most APs will respond to it with their own SSID in a probe response packet. AP can be configured to ignore a probe request with an empty SSID.
Brute Force Attack
WEP uses the symmetric cryptography system called RC4 with a user specified key (64 bits and 128 bits) to protect the data. The user can use a shared secret key. The real key to encrypt the data with RC4 algorithm is generated by a pseudo random number generator, but flaws in pseudo random number generator can cause the real key space to be less than 64 bits or 128 bits. The flaw actually reduces the key space of the 64-bit key to 22 bits. Therefore, it is possible for an attacker to collect enough information to try to discover the key offline. A weakness in the random key generator of the RC4 algorithm used in WEP can permit an attacker to collect enough packets with Initiation vectors ( 3-byte random number generated by the computer ) that match certain patterns to recover the user-chosen key from the Initiation vectors
NetStumbler displays wireless access points, SSIDs, channels, whether
WEP encryption is enabled and signal strength. NetStumbler can connect
with GPS technology to accurately log the precise location of access
ApSniff is a wireless (802.11) access point sniffer for Windows 2000. It
enables you to list all access points broadcasting beacon signals at
your location. Useful for helping you set new access points making sure
you do not have interfering APs, and helping you set-up wireless clients
by providing you with the client configuration information. Requires
WLAN cards of Prism 2 chipset. It works with a DLINK DWL-650 and linksys
Prismstumbler is a wireless LAN (WLAN) discovery tool which scans for
beacon frames from access points. Prismstumbler operates by constantly
switching channels and monitors any frames received on the currently
Airsnort is a wireless LAN (WLAN) tool which cracks WEP encryption keys.
AirSnort passively monitors wireless transmissions and automatically
computes the encryption key when enough packets have been gathered.
WifiScanner is a tool that has been designed to discover wireless node (
i.e access point and wireless clients). It is distributed under the GPL
License. It work with CISCOR card and prism card with hostap driver or
wlan-ng driver. An IDS system is integrated to detect anomaly like MAC
Wellenreiter is a GTK / Perl program that makes the discovery and
auditing of 802.11b wireless networks much easier. All three major
wireless cards (Prism2 , Lucent, and Cisco) are supported. It has an
embedded statistics engine for the common parameters provided by
wireless drivers. Its scanner window can be used to discover
access-points, networks, and ad-hoc cards. It detects ssid broadcasting
or non-broadcasting networks in every channel. Non-broadcasting networks
could be uncovered automatically. The manufacturer and WEP is
WepLab is a tool designed to teach how WEP works, what different
vulnerabilities has, and how they can be used in practice to break a WEP
protected wireless network. So far, WepLab more than a Wep Key Cracker,
is a Wep Security Analyzer designed from an educational point of view.
BTscanner is a tool that extracts as much information as possible from a
Bluetooth device without the requirement to pair. A detailed information
screen extracts HCI and SDP information, and maintains an open
connection to monitor the RSSI and link quality. BTScanner is based on
the BlueZ Bluetooth stack, which is included with recent Linux kernels,
and the BlueZ tSolset. Using the information gathered from these
sources, it is possible to make educated guesses as to the host device
The polar opposite of hiding your network by disabling SSID broadcasts-
Black Alchemy's Fake AP generates thousands of counterfeit 802.11b
access points. As part of a honeypot or as an instrument of your site
security plan, Fake AP confuses Wardrivers, NetStumblers, Script
Kiddies, and other scanners.
Kismet is an 802.11 wireless network detector, sniffer,
and intrusion detection system. Kismet identifies networks by
passively collecting packets and detecting standard named
networks, detecting hidden networks, and inferring the presence of non beaconing networks via data traffic.
Mognet is a free, open source wireless ethernet sniffer / analyzer
written in Java. It is licensed under the GNU General Public License. It
was designed with handheld devices like the iPaq in mind, but will run
just as well on a desktop or laptop.
Nsauditor - Network Security Auditor
Nsauditor Network Security Auditor is a network security scanner that allows to
audit and monitor remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Nsauditor is a complete networking utilities package that includes a wide range of tools for network security auditing, scanning, monitoring and more. The program includes more than 45 network tools for scanning, sniffing, enumerating and gaining access to machines and contains a built-in database of known network security vulnerabilities, which allows you to select the items for scanning and add custom entries. Nsauditor can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios, RPC, SQL and SNMP information, open ports. Reports can be generated in HTML and XML format. Overall, this is a very complete package for
a surprisingly low price.
Product Key Explorer recovers and displays product key for Windows 7, Windows Vista, Windows XP, MS Office, Adobe CS, CS3, CS4, CS5, SQL Server and more than 1000 popular software products installed on your local or remote network computers.In order to install or reinstall Microsoft Office, Windows, or other commercial software, you must have access to a product serial key (CD Key) for that product. Product Key Explorer retrieves serial keys from network computers and allows to protect your company from having pirated software on your network. With this software you will be able to track the number of software licenses installed in your business, find and recover a lost or forgotten product keys, save and keep an up-to-date backup of all your software license keys in a central location. Excellent tool for network administrators, or businesses undergoing a software license compliancy.
You can save product keys as Tab Delimited Txt File (.txt), Excel Workbook (.xls), CSV Comma Delimited (.csv), Access Database (.mdb), SQLLite3 Database, Web Page (.html) or XML Data (.xml) file, Print or Copy to Clipboard.