exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Team Remote-exploit.org

Email addressteam at remote-exploit.org
First Active2002-05-25
Last Active2003-08-29
Wellenreiter-v1.9.tar.gz
Posted Aug 29, 2003
Authored by Team Remote-exploit.org | Site wellenreiter.net

Wellenreiter is a GTK/Perl wireless network discovery and auditing tool. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks and detects WEP capabilities and the manufacturer automatically. Dhcp and arp traffic will be decoded and displayed to give you further informations about the networks. A flexible sound event configuration lets it work in unattended. An ethereal / tcpdump-compatible dumpfile can be created. GPS is used to track the location of the discovered networks immediately. Automatic associating is possible with randomly generated MAC address. Wellenreiter runs also on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs). An unique Essod-bruteforcer is now included too. prism2, Lucent, and Cisco based cards are supported.

Changes: Added the User guide in the docs directory, Raised the packet capture length from 400 to 65535, Added a patch for better detection of prism2 based PCI and usb cards.
tags | tool, perl, wireless
systems | cisco, linux, bsd
SHA-256 | b6e11e7142d8e615e21c96edf48ca439a7d5cb0d30804df676be298377ebe0b6
Wellenreiter-v1.8.tar.gz
Posted Apr 18, 2003
Authored by Team Remote-exploit.org | Site remote-exploit.org

Wellenreiter is a GTK/Perl wireless network discovery and auditing tool. its scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks and detects WEP capabilities and the manufacturer automatically. Dhcp and arp traffic will be decoded and displayed to give you further informations about the networks. A flexible sound event configuration lets it work in unattended. An ethereal / tcpdump-compatible dumpfile can be created. GPS is used to track the location of the discovered networks immediately. Automatic associating is possible with randomly generated MAC address. Wellenreiter runs also on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs). An unique Essod-bruteforcer is now included too. prism2, Lucent, and Cisco based cards are supported.

Changes: Complete new GUI. Statistics are removed now. Scanner window is now the main window and the control point for everything. New tree/click split window makes this the easiest to use wireless scanner. Auto detection engine has been added, so no card configurations are needed anymore. Wireless-scanning for dummies :-). Speedup in the packet decoding due to a rewrite. New detail window. Partial rewrite.
tags | tool, perl, wireless
systems | cisco, linux, bsd
SHA-256 | 5951e08289e6312bb1903b8db9375afa29fd3d4a3780d451be50975d1629d648
Wellenreiter-v16.tar.gz
Posted Oct 9, 2002
Authored by Team Remote-exploit.org | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. The unique essid-brute forcer helps to get the essid of low-traffic networks. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: Added a complete new packet decoding engine. Added data frame decoding functions. Captured Arp and DHCP traffic will be automatically decoded by the engine and displayed on the detail view of the corresponding Accesspoint. Added XmitPower:1 to the startsniff command so all cisco cards are prevented from probing during sniffing. Removed the noisepackets by adding a double check function into the beacon detection. A new network or accesspoint will only be added if the same channel, sendmac and essid occurs twice. This gives me a simple way to prevent from to much noise or bad quality packets. Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | b6d7d3ff3f7fb195ee646b9aa377427ebc75bebd5b84b232e12e5bcfd2fdc453
Wellenreiter-v15.tar.gz
Posted Sep 5, 2002
Authored by Team Remote-exploit.org | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. The unique essid-brute forcer helps to get the essid of low-traffic networks. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: Added update docs, now works on newer lucent cards, faster load process, added a quick hack of a network and access point counter in status bar, added a night color feature, maps can now be exported, and bugs were fixed. Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | 318dfc344fe5fce00bbdf0cec30bf43dbabc7e898e5f404a51fe76199edfeae0
Wellenreiter-v14.tar.gz
Posted Jun 19, 2002
Authored by Team Remote-exploit.org | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. The unique essid-brute forcer helps to get the essid of low-traffic networks. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: GPS support has been added. Uncovers non-broadcasting networks by just waiting until a probe response passes the network (someone joins the network) or brute-forcing the ess! Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | a725e7f5891752efed8a64832a6a73b96ab9984333e66a484ac4e0b3987d8cc8
Wellenreiter-v13.tar.gz
Posted May 25, 2002
Authored by Team Remote-exploit.org | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: Bugfix - BSD port integration has broken ad-hoc detection. Added wifi0 device support (For newer cisco drivers), BSD Cisco cards now work well with the new ancontrols. Updated the config script better matching of the cisco bsd drivers. Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | e0a7d974fecd991d9ef2ec06c996d5cee7d1b9fa571bbd7a2697a303a34853a5
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close