Friday, February 11, 2011

8 Free Alternatives to NetStumbler

NetStumbler

NetStumbler (also known as Network Stumbler) is a free/”beggarware” tool for Windows that can detect WiFi/Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards.
NetStumbler is commonly used for:
  • Recreational WarDriving
  • Verifying network configurations
  • Finding locations with poor coverage in one’s WLAN
  • Detecting causes of wireless interference
  • Detecting unauthorized (”rogue”) access points
  • Aiming directional antennas for long-haul WLAN links
  • GPS integration for mapping purposes
In addition to the freely downloadble software, NetStumbler has an online forum that contains thousands of archived posts and provides a way to get help with questions and share tips and tricks related to NetStumbler.

NetStumbler Limitations

Still, there are some limitations to NetStumbler that detract from its usefulness.
  • The software doesn’t officially work on Windows Vista (or Mac).
  • NetStumbler isn’t 100% passive. It uses Active Scanning and sends out a probe request about once a second, and reports the responses. Normally, this isn’t a big deal but this means in a 100% no wireless zone NetStumbler can be detected.
  • NetStumbler does not detect wireless stations. Access points are detected by recording which ones respond to probe requests, which also means it can not detect wireless stations since they don’t respond to probe requests.

Alternatives to NetStumbler

    MacStumbler

    MacStumbler is a utility to display information about nearby 802.11b and 802.11g wireless access points. It is mainly designed to be a tool to help find access points while traveling, or to diagnose wireless network problems. Additionally, MacStumbler can be used for “wardriving”, which involves co-ordinating with a GPS unit while traveling around to help produce a map of all access points in a given area. MacStumbler requires an Apple Airport Card and MacOS 10.1 or greater. MacStumbler doesn’t currently support any kind of PCMCIA or USB wireless device.
    MacStumbler works like NetStumbler and relies on responses to probe requests to discover access points. This implementation also prevents MacStumbler from detecting wireless stations or hidden networks because they don’t respond to probe requests. 8 Free Alternatives to NetStumbler

    iStumbler

    iStumbler is the leading wireless discovery tool for Mac OS X, providing plugins for finding AirPort networks, Bluetooth devices, and Bonjour services with your Mac.
    8 Free Alternatives to NetStumbler

    KisMAC

    KisMAC is an opensource and free stumbler/scanner application for Mac OS X. It has an advantage over MacStumbler/iStumbler/NetStumbler in that it uses monitor mode and passive scanning. KisMAC supports several third party PCMCIA cards – Orinoco, PrismII, Cisco Aironet, Atheros and PrismGT. USB Prism2 is supported as well, and USB Ralink support is in development. All of the internal AirPort hardware is supported as well.
    An awesome table comparing many of the tools mentioned in this post is available here 8 Free Alternatives to NetStumbler

    Kismet

    Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic.
    One of the biggest advantages of Kismet over NetStumbler is the ability to look at wireless data frames to detect wireless devices. This allows Kismet to detect access points and wireless stations. 8 Free Alternatives to NetStumbler

    Windows Vista netsh

    In Windows Vista the “netsh” command can be used to discover access points using the format below. netsh wlan show networks mode=bssid

    Vistumbler

    Vistumbler is an AutoIt script that uses the netsh to get wireless information. 8 Free Alternatives to NetStumbler

    Inssider

    Inssider uses Windows Native WiFi API to get wireless information. 8 Free Alternatives to NetStumbler

    DISA Wireless Discovery Device (Flying Squirrel)

    Flying Squirrel is similar to Kismet/KisMac and is the US Department of Defense’s (DoD) wireless security tool. The tool is For Official Use Only (FOUO) so no screen shot. If you have access to DoD Information Assurance Tools you can use the link below to get more info. http://iase.disa.mil/tools/index.html

“Free Public WiFi” SSID

Free Public WiFi

The “Free Public WiFi” SSID seems to be everywhere – at airports, on planes, and in hotels. Based on what the SSID spells, it seems to be the perfect solution for those seeking to connect to the Internet because it is “Free”…cost nothing…”Public”…you break no laws connecting to it…”WiFi” …a few clicks and you’ll be surfing in no time.

Viral SSID

In reality, this SSID is just one of many viral SSIDs that exist anywhere people are with laptops (almost always Microsoft Windows based laptops). In almost all cases this SSID is not a real WiFi hotspot access point but someone else’s laptop in Ad-Hoc mode advertising this SSID. Why does this SSID always appear and more importantly is it harmful if you connected to this SSID?
If you connected to the “Free Public WiFi” SSID in the past, don’t worry…in almost all cases your PC is not infected with a real virus and no data was stolen. Just remember to stop connecting to random wireless networks that you can’t verify as being trusted, especially free ones!

Blame Microsoft Wireless Zero Configuration

The answer to why this SSID seems to be everywhere can be blamed on Microsoft, more specifically a Windows feature called Wireless Auto Configuration (aka Wireless Zero Configuration). Wireless Auto Configuration “provides automatic configuration for the 802.11 adapters”. In an attempt to make it extremely easy to connect to WiFi networks, Wireless Auto Configuration does the following when an 802.11 adapter is enabled and starts to scan for WiFi networks.
1. Wireless Auto Configuration attempts to connect to the preferred networks that appear in the list of available networks in the preferred networks preference order, if the preferred networks are configured to automatically connect (the Connect when this network is within range checkbox is selected on the Connection tab for the properties of the preferred wireless network).
2. If there are no successful connections, Wireless Auto Configuration attempts to connect to the preferred networks that do not appear in the list of available networks, in the preferred networks preference order. This is done so that a Windows wireless client can connect to a hidden wireless network, one that is either not broadcasting its SSID or broadcasting an SSID of NULL. Configuring hidden wireless networks is used as a security measure to prevent malicious users from detecting and attempting a connection to a wireless network. However, the SSID is included in other types of wireless connection management frames and is easily discoverable by either capturing wireless management frames or using tools available on the Internet.
3. If there are no successful connections and there is an ad hoc network in the list of preferred networks that is available, Wireless Auto Configuration tries to connect to it.
4. If there are no successful connections and there is an ad hoc network in the list of preferred networks that is not available, Wireless Auto Configuration configures the wireless network adapter to act as the first node in the ad hoc network.

The problem occurs at step #4.

At one time or another somewhere out there someone connected to a real ad-hoc WiFi network that had the SSID “Free Public WiFi”. They added this network to their preferred network list. They then traveled to a location where this WiFi SSID didn’t exist (airport, airplane, and/or hotel). They powered on their laptop with the wireless card on and Wireless Auto Configuration took over and starting searching for WiFi networks. After trying steps 1 through 3 above, Windows gave up and configured WiFi card to ad hoc mode with the SSID “Free Public WiFi” (since it was a preferred network).

How the SSID spreads virally.

A second person in close proximity to the user above also has a wireless enabled laptop and is looking to connect to a WiFi network. They scan to see what is available and notice an SSID called “Free Public WiFi”….they connect to it not knowing that it is an ad hoc network. After a few seconds of wondering why they can’t surf the web they disconnect from the SSID, shrug their shoulders and move on with life. Now they have the viral SSID in their preferred list too. The next time they power on their laptop it starts to look for the “Free Public WiFi” SSID. This process is repeated in many locations across the US and world again and again. Soon this SSID is in preferred wireless networks lists everywhere spreads like a virus.

Can this viral SSID be stopped?

Yes, but others exist like linksys, hpsetup, tmobile, default. Any SSID that tends be the default for consumer grade access points and computers tends to become viral ad hoc SSIDs. An easy way to reduce the risk of connecting to these SSIDs is to configure Wireless Auto Configuration to only connect to access points (infrastructure networks).
1. Click on the Wireless option in the System Tray and open the Wireless Network Connection window.
 2. Click on “Change advanced settings”.
 3. In the Wireless Network Connection Properties window, click on the Wireless Networks tab.
 4. Click on the Advanced button.
 5. Click on “Access point (infrastructure) networks only”

Free Mac OS X Wifi Scanner for Snow Leopard

Free Mac OS X Wifi Scanner for Snow Leopard

WiFi Scanner is a free 802.11 wireless scanner and connection manager for Mac OS X 10.6 Snow Leopard or later. This will detect access points and clients in ad-hoc mode if the SSID is being broadcasted. It can be used for wireless site surveys, wireless discovery, and to connect to wifi networks. The tool reports signal strength in dBm and shows access point BSSID/MAC addresses.

WiFi Scanner v1.0 Screenshots

WiFi Scanner v1.0 has the two main screens shown below.
Free Mac OS X Wifi Scanner for Snow Leopard
Free Mac OS X Wifi Scanner for Snow Leopard
Free Mac OS X Wifi Scanner for Snow Leopard

WiFi Scanner User Guide

Interface Popup Button
The app supports a multiple interface scenario, whereby the machine could have several IEEE 802.11 wireless interfaces. The popup button on the top left corner of the app allows the user to select which interface should be set as the current interface. By default, the popup button will select the primary WLAN interface for the system.
Refresh Button
In the top right corner of the app, there is a push button entitled “Refresh”. This button provides different functionality depending on which tab is currently selected. If the Interface Info or Configuration tabs are selected, the button will refresh the information display in the currently selected tab. If the Scan tab is selected, the button will start a broadcast scan and block until the scan has completed.
Interface Info Tab
The tab entitled “Interface Info” contains information describing the static and dynamic state of the currently selected interface. Additionally, it allows the user to toggle interface power, disconnect from the current network, and change channels.
You will notice that you will not be able to change channels while connected to a network–this is by design. Attempting to do this would return a error. Furthermore, you will notice that when the interface is powered OFF, all the dynamic status information is cleared.
Scan Tab
The tab entitled “Scan” allows the user to scan for networks using the current interface. The scan results are shown in the table view and are automatically ordered by network name. For each network, there is several pieces of information displayed in the table row that describe that particular network.
There is a button in the checkbox left corner of the Scan tab which sets/unsets the parameter to merge the scan result with the same SSID.
And, there is a button in the bottom right corner of the Scan tab which allows the user to join the currently selected network in the table. A sheet will be presented upon clicking the Join button that will allow the user to provide the appropriate credentials for the given network.

WiFi Scanner Download

Click here to download WiFi Scanner v1.0 dmg install file.
Click here to download WiFi Scanner v1.0 zipped install file.
After the download completes, the application will uncompress the .dmg file and present the installer screen below. Drag the application to the Applications folder or click the WiFi Scanner.app file to launch the application directly from the folder.
Free Mac OS X Wifi Scanner for Snow Leopard




AirMagnet's Spectrum Analyzer

AirMagnet's Spectrum Analyzer proactively identifies, classifies, and finds sources of RF interferences that impact the performance of WLAN networks. These sources commonly include Bluetooth devices, cordless phones, microwaves, analog video cameras, RF jammers, and others, that are commonly present in today's environment. Unlike earlier generations of spectrum analyzers which are bulky and difficult to use, AirMagnet's Spectrum Analyzer provides an efficient and mobile solution with an IT-friendly user interface, to allow IT staff members to troubleshoot problems in their wireless network. The system also assists users in tracking those interference sources to their physical location using a built-in "device locator tool", enabling the network managers to resolve WLAN performance issues due to RF interference, quickly and easily.

Supported Adapters
RF Spectrum Analysis (mandatory wireless adapter required to run AirMedic)
Notebook based on Intel® Centrino® 2 Processor technology (WiFi Link 5100 or 5300 wireless adapters).
Additional WiFi Analysis
Note:
AirMedic for Intel offers additional WiFi analysis features for users who use a second WiFi adapter in addition to the Intel wireless adapter built in to your Centrino 2 notebook. This does NOT remove the requirement for an Intel 5100 or 5300 wireless adapter, without which the AirMedic for Intel software will not work. Below are the list of supplementary WiFi adapters that can be used to gain the additional WiFi analysis capabilities in AirMedic for Intel.
Cardbus Adapters:
 
Vendor
Wireless Adapters
AirMagnet
  • AirMagnet 802.11 a/b/g/n Wireless PC card
    Supported OS: Windows® XP™ Pro
    Media Type: 802.11 A/B/G/N
Cisco
  • Cisco Systems a/b/g Wireless Adapter
    • AIR-CB21AG-A-K9
    • AIR-CB21AG-E-K9
    • AIR-CB21AG-J-K9
    • AIR-CB21AG-P-K9
    • AIR-CB21AG-W-K9

    Supported OS: Windows® XP™ Pro
    Media Type: 802.11 A/B/G
NEC
  • NEC Warpstar Aterm WL300NC 802.11 a/b/g/n wireless adapter (TELEC regions only)
    Supported OS: Windows® XP™ Pro
    Media Type: 802.11 A/B/G/N
Proxim
  • Proxim Orinoco 802.11 a/b/g ComboCard Gold (8480-XX)
    Supported OS: Windows® XP™ Pro
    Media Type: 802.11 A/B/G
Ubiquiti
USB Adapters:
 
Vendor
Wireless Adapters
D-link
  • D-Link AirPremier DWL-AG132 Wireless 108AG USB adapter (rev B; h/w version C1)
    Supported OS: Windows® XP™ Pro
    Media Type: 802.11 A/B/G
NEC
  • NEC Aterm WL54SU2 (PA-WL54SU2) Wireless USB Adapter (TELEC Regions only)
    Supported OS: Windows® XP™ Pro
    Media Type: 802.11 A/B/G
ExpressCard Adapters:
 
Vendor
Wireless Adapters
Ubiquiti
  • Ubiquiti SRX 300mw 802.11 a/b/g MMCX Express Card
    Supported OS: Windows® XP™ Pro
    Media Type: 802.11 A/B/G
 

AirMagnet WiFi Analyzer


AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise Wi-Fi networks. AirMagnet WiFi Analyzer helps IT staff quickly solve end user issues while automatically detecting network security threats and other wireless network vulnerabilities. This wireless network analyzer includes the industry's only suite of active WLAN diagnostic tools, enabling network managers to easily test and diagnose dozens of common wireless network performance issues including throughput issues, connectivity issues, device conflicts and signal multipath problems. AirMagnet WiFi Analyzer includes a full compliance reporting engine, which automatically maps collected network information to requirements for compliance with policy and industry regulations.
 
WiFi Analyzer PRO: Called the defacto tool of WiFi Analysis, the WiFi Analyzer PRO version offers the industry's most extensive WLAN analysis solution set. WLAN administrators use AirMagnet WiFi Analyzer to solve virtually any type of network performance, security or reporting challenge in the field. AirMagnet WiFi Analyzer PRO includes all of the most powerful, industry-defining features including 11n tools, intrusion detection, professional reporting, compliance reporting, extended channel scanning and interference analysis.
WiFi Analyzer Express: The Express version of AirMagnet WiFi Analyzer provides the core building blocks of WiFi troubleshooting and auditing with the ability to see devices, automatically identify common problems and physically locate specific devices.