This is a necessity for any company that wishes to safely deploy WLANs. It is much easier to point your manager to a bold line representing traffic flow than to explain that user X is using all the bandwidth. Summary The summary tab shows a breakdown of all the collected data statistics. AiroPeek comes with several important alarms. This information is useful in many ways. Of course, just starting the capture may not get the packets that you want. The most unique feature of AiroPeek, and possibly its biggest selling point, is its capability to act as an IDS.

Uploader: Brakasa
Date Added: 1 August 2006
File Size: 42.61 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 31888
Price: Free* [*Free Regsitration Required]

By viewing the channel statistics, you can see what channels are in use and how heavily they are loaded. Although Telnet sessions are usually valid, if this traffic shows up unexpectedly, an administrator will want to investigate.

However, because the hacker is airoppeek on the other side of the WLAN bridge access pointa separate wireless IDS must be used to detect unauthorized or problematic traffic in the air.

Using preset flags, this feature allows you to make AiroPeek NX a powerful anomaly detector. The following will describe some of the features and useful options this program sports. The biggest complication is typically the need to install the WildPackets AiroPeek network driver for your network card.


This program is a dream to use, has excellent features and informational tools, and is fairly easy to understand. In addition to real-time analysis, AiroPeek allows you to save a capture file and replay the capture as if xiropeek were live.

This is a necessity for any company that wishes to safely deploy WLANs. Tech News You Can Use We deliver the top business tech news stories about the airo;eek, the people, and the products revolutionizing the planet. Sniffing Sniffing is the generic term for capturing and recording all of the packets traveling across the network.

If you may any questions please contact us: Our editors highlight the TechRepublic articles, galleries, and videos that you absolutely cannot miss to stay current on the latest IT news, innovations, and tips. Either is an issue that needs to be addressed to ensure maximum efficiency.

The packets display is largely unchanged, whether looking at live packets or a saved capture. How digital farming is revolutionizing the future of food. Nodes The Nodes ns presents a statistical overview of all the detected nodes that appear while capturing WLAN data. How self-driving tractors, AI, and precision agriculture will save us from the airpeek food crisis. NOTE This software package is ajropeek being updated.

The following is a list of these options and their general purpose. My Profile Log Out.

AiroPeek NX

We deliver the top business tech news stories about the companies, the people, and the products revolutionizing the planet. In fact, the only thing this program does not do is crack WEP protectionwhich is appropriate, as it is a commercial product meant to analyze WLAN traffic rather than serve as a hacker’s tool. These are presented through different tabs at the bottom of the capture window.


Because these are redundancy and performance-enhancing methodsthey could be used to bypass AP security.

This is a potential weakness of Ruby Cookbook Cookbooks OReilly. This information is useful in many ways.

AiroPeek NX | Maximum Wireless Security

As you can see in Figure 9. As you can see, this program has a lot of potential. Contention Free Indicates that an access point is polling stations for transmission versus the more secure method of a station attempting to connect to an access point.

In my case, the answer was to uninstall the personal firewall software. First, you have to ensure that your wireless network is secure. Inside the Raspberry Pi: Note that depending on the OS and how you have it configured, these steps might be slightly different.