Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.
Wireshark is software that "understands" the structure of different networking protocols. Thus, it is able to display the encapsulation and the fields along with their meanings of different packets specified by different networking protocols. Wireshark uses pcap to capture packets, so it can only capture the packets on the types of networks that pcap supports.
- Data can be captured "from the wire" from a live network connection or read from a file that recorded already-captured packets.
- Live data can be read from a number of types of network, including Ethernet, IEEE 802.11, PPP, and loopback.
- Captured network data can be browsed via a GUI, or via the terminal (command line) version of the utility, tshark.
- Captured files can be programmatically edited or converted via command-line switches to the "editcap" program.
- Data display can be refined using a display filter.
- Plug-ins can be created for dissecting new protocols.
- VoIP calls in the captured traffic can be detected. If encoded in a compatible encoding, the media flow can even be played.
- Raw USB traffic can be captured with Wireshark.This feature is currently available only under Linux.
Wireshark's native network trace file format is the libpcap format supported by libpcap and WinPcap, so it can read capture files from applications such as tcpdump and CA NetMaster that use that format, and its captures can be read by applications that use libpcap or WinPcap to read capture files. It can also read captures from other network analyzers, such as snoop, Network General's Sniffer, andMicrosoft Network Monitor.

7-METASPLOIT=
The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signaturedevelopment. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive, and security research.The Metasploit Project is also well-known for anti-forensic and evasion tools, some of which are built into the Metasploit Framework.
FEATURES=
- Choosing and configuring an exploit (code that enters a target system by taking advantage of one of its bugs; about 300 different exploits for Windows, Unix/Linux and Mac OS X systems are included);
- Checking whether the intended target system is susceptible to the chosen exploit (optional);
- Choosing and configuring a payload (code that will be executed on the target system upon successful entry, for instance a remote shell or a VNC server);
- Choosing the encoding technique to encode the payload so that the intrusion-prevention system (IPS) will not catch the encoded payload;
- Executing the exploit

AirJack is a device driver (or suite of device drivers) for IEEE 802.11(a/b/g) raw frame injection and reception. It is meant as a development tool for all manner of 802.11 applications that need to access the raw protocol.
9-WIFI MONSTER=
- Connects open or private networks
- It shows current WiFi status
- It shows a list of nearby networks
- It filters and sorts found networks
- it allows you to connect selected network manually
- It can turn WiFi on and off
- It can turn WiFi off by inactivity timeout and by battery treshold
- It is finger friendly
- It supports VGA, wide screens, landscape mode, and it looks nice after all :

AirGrab WiFi Radar is a tool to display information about Apple Airport base stations and other WiFi (802.11b/g/n) wireless access points. Using AirGrab WiFi Radar you can determine most popular WiFi channels and select optimal channel for your WiFi network. Signal level and Noise level helps to diagnose common wireless network problems and optimally position your base station and or computer to achieve the best possible signal strength. Encryption status of network shows WEP, WPA, WPA2 modes of all immediately available WiFi networks.
FEATURES=
- Full info about WiFi network security (WEP, WPA, WPA2, TKIP, AES)
- Graphs WiFi connections statistics: signal, security, noise, SNR, transmit rate, and comm quality.
- Complete Graph for all WiFi Chanels
- Customizable refresh rate.
- Wifi Report to HTML and Graph
- Logging Of All Encountered Access Points.
- Mac Universal Binary and Intel Optimized binary.
- Stats AboutCurrently Connected Wireless Network.
- Easy To Use Interface.

WirelessKeyView recovers all wireless network security keys/passwords (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP and by the 'WLAN AutoConfig' service of Windows Vista. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard.
