Sophie

Sophie

distrib > Mandriva > 9.1 > ppc > by-pkgid > b82be8858f2957e07989a529efa4f4a6 > files > 12

Wellenreiter-1.6-2mdk.noarch.rpm

**************************************************************
* Wellenreiter - advanced 802.11b audit tool - Wellenreiter  *
**************************************************************
*        Homepage: http://www.remote-exploit.org             *
*        IRC: #wellenreiter @  openprojects.net              *
*                                                            *
**************************************************************
*                       -[ MAIN README ]-                    *
**************************************************************

Documentation:
	See docs/*

About Wellenreiter:
	Wellenreiter is a gtkperl program that makes the discovery and auditing
	of 802.11b wireless networks much easier.  It has an embedded statistics
	engine for common parameters provided by wireless drivers which enables 
	you to gather details about the consistency, signal strength, etc. of
	the network.  For discovery of accesspoints / networks / ad-hoc cards,
	Wellenreiter has an amazingly easy scanner window, which searches for
	any accesspoint within range of the scanning device.  It detects and
	differentiates essid broadcasting and non-broadcasting wireless networks
	in every channel, doing frequency switching automatically.  The 
	manufacturer is detected by the device's MAC address.  WEP detection is
	also implemented, and Wellenreiter detects and handles whenever the
	beacon broadcasting machine is a true accesspoint or an AD-Hoc mode
	station.  Detecting essid's of non-broadcasting networks is possible and
	gps support is also built in. Also a uniq essid bruteforcer is included now.
	
	The Networks with a red symbol are "non-essid-broadcasting" ones.  This
	means the accesspoint does not send out the essid network name for
	security reasons.  Non-broadcasting networks can be only detected by
	using the raw-sniffing mode.  Green symbols are shown for a broadcasting
	network.  You can join these nets automatically without specifying the
	essid.  These nets are also available in the statistics engine.

	The distinction between WEP/cleartext sending accesspoints is indicated
	by coloring the accesspoints red for WEP enabled and green for
	cleartext.
	
	AD-Hoc stations have different icons than real accesspoints.  And in the
	information screen at the right side you see all the info as text.

	Since version 1.6 it also discovers information about dhcp and arp    
	communication on the detected networks automaticly

Where to get:
	Get the official version and status at: http://www.remote-exploit.org
	Get the actual cvs version from sourceforge.org                      

Authors:
	Max Moser :		mmo@remote-exploit.org
	Steffen Kewitz :	steffen@remote-exploit.org
	Dario Luethi :		dlu@remote-exploit.org
	Martin J. Muench :	mjm@remote-exploit.org	 
	Karl Schoepf :		kye@remote-exploit.org

Features:
	Supported Platforms:
		-Linux
		-BSD (experimental)
		-Ipaq / Linux

	Supported Cards:
		-Cisco based cards
		-Lucent based cards
		-Prism2 based cards 

	See the specific README'S for further information. 

Greetings to:
	Dunja, Kerberos, Nicole, Dario, Marc Ruef, Jesse, #wellenreiter on
	openprojects.net, Ryke, DukeCS, Ingo Scholz, IBM T21, Gürkan, Markus,
	Agent Schmied, Jürg Äbi, anyone else that supports the project in any
	way. 


**************************************************************
* If you have further questions, please contact the team at  *
*        Homepage: http://www.remote-exploit.org             *
*        IRC: #wellenreiter @  openprojects.net              *
**************************************************************