A program for Linux that demonstrates the insecurity of WEP ("Wired Equivalent Privacy", the weak encryption on 802.11b wireless links) by recovering encryption keys. Because AirSnort only listens passively to the wireless traffic passing by, its use cannot be detected.

Depending on whom you ask, this tool is either a valuable warning against reliance on the weak default encryption of wireless networks (use secure tunnels such as SSH or SSL in addition), or a dangerous hacking/cracking tool.

See http://airsnort.sourceforge.net for the project's homepage.

Log in or register to write something here or to contact authors.