A
program for
Linux that demonstrates the
insecurity of
WEP ("Wired Equivalent Privacy", the weak
encryption on
802.11b wireless links) by recovering encryption keys. Because AirSnort only listens passively to the
wireless traffic passing by, its use cannot be detected.
Depending on whom you ask, this tool is either a valuable warning against reliance on the weak default encryption of wireless networks (use secure tunnels such as SSH or SSL in addition), or a dangerous hacking/cracking tool.
See http://airsnort.sourceforge.net for the project's homepage.