Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What tools do you use to WarDrive?



What tools do you use to WarDrive?..

Answer / chaitanya

Depending on the operating system in use, Kismet for Linux or Kismac for OS X provide the greatest level of functionality for detecting and identifying WLANs. NetStumbler is available for Windows but supports only active WLAN detection and identification, whereas the Linux and OS X tools both support passive WLAN detection and identification.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More WiFi Security Interview Questions

how can i see the security information of my wifi provider in my command prompt?

0 Answers   Cap Gemini,


how to heck the wifi password?

1 Answers  


How to hack the wifi password ?

1 Answers  


What is the minimum passphrase length that should be used for WPA-PSK?

1 Answers  


Captive gateways can work in Routed Mode or in Bridged Mode. What does that mean?

1 Answers  


How many types of Extensible Authentication Protocols (EAPs) are supported by WPA/WPA2 and what are they?

1 Answers  


I have a Wi-Fi network and would like to protect it from unauthorized access. It is better to use a RADIUS server that allows me to have 802.1x authentication and protection with WPA or WPA2 or use a Captive Portal that authenticates access via web login?

1 Answers  


Should an impostor capture the authenticator on the network and, without decrypting it, sends it as is to the captive gateway, could he or she obtain illegal access to the network?

1 Answers  


Briefly describe the process involved in cracking WEP.

1 Answers  


What is the difference between the HostAP drivers and the wlan-ng drivers for Linux?

1 Answers  


Our organization doesn’t have a wireless network, so is it even important for our security engineers to understand wireless security?

1 Answers  


What is the difference between active and passive WLAN detection?

1 Answers  


Categories