Wireless is a hot topic. Unfortunately lots of wireless LANs have been put in without any consideration of security. If you haee wireless or are considering, read the whitepapers and check for yourself using a commercial or shareware analyzer. If there is a site that should be listed here or if a link goes dead, .
AiroPeek : commercial packet analyzer for IEEE 802.11b wireless LANs
Windows comprehensive packet analyzer for IEEE 802.11b wireless LANs, supporting all higher level network protocols such as TCP/IP, AppleTalk, NetBEUI and IPX.
AirSnort : collect encryption keys
Linux tool that passively monitors transmissions, computing the encryption key when enough packets have been gathered
AP Scanner : Mac 802.11 scanner
Macintosh-only application that will detect all in-range open 802.11 wireless network access points.
bsd-airtools : complete toolset for wireless 802.11b auditing
contains a bsd-based wep cracking application, dweputils; kernel patches for NetBSD, OpenBSD, and FreeBSD; a curses based ap detection application similar to netstumbler (dstumbler) to detect wireless access points and connected nodes, view signal to noise graphs, and interactively scroll through scanned ap's and view statistics for each; other tools to provide a complete toolset for making use of all 14 of the prism2 debug modes as well as do basic analysis of the hardware-based link-layer protocols provided by prism2's monitor debug mode.
Fake AP : hide in plain sight
Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. As part of a honeypot or as an instrument of your site security plan, Fake AP confuses Wardrivers, NetStumblers, Script Kiddies, and other undesirables. Fake AP is a proof of concept released under the GPL. Linux compatible.
Kismet : Linux 802.11b wireless network sniffer
capable of sniffing using almost any wireless card supported in Linux, including Prism2 based cards supported by the Wlan-NG project (Linksys, Dlink, Rangelan, etc), cards which support standard packet capture via libpcap (Cisco), and limited support for cards without RF Monitor support.
MacStumbler : Wireless scanning tool for the Apple Airport
only works with airport wireless cards
Prism2dump : part of BSD-Airtools package
puts Prism2Card into promiscuous mode
PrismStumbler : scans for beaconframes from accesspoints
operates by constantly switching channels an monitors any frames recived on the currently selected channel C & perl
ssidsniff : discover access points and save captured traffic
comes with a configure script and supports Cisco Aironet and random prism2 based cards.
StumbVerter : NetStumbler support tool
standalone application which allows you to import Network Stumbler's summary files into Microsoft's MapPoint 2002 maps.