background preloader

WiGLE - WIFI Database

WiGLE - WIFI Database
news: Congrats to user 'fenebrae', our 150,000th user! Netstumble proud! Users make this whole thing possible -bobzilla Come find us at BSides SF security conference at DNA Lounge today and tommorow, then at Trustycon on Thursday!

https://wigle.net/

Related:  Wireless TOOLS

OSX : inSSIDer Scan the Wi-Fi networks around you and track their signal strength over time. inSSIDer scans all the Wi-Fi networks within the reach of your computer’s wireless card, tracks their signal strength over time, and determines their security settings. Track open or secure wireless networks.

Midnight Research Labs - SEAT SEAT aaron posted in on August 23rd, 2006 Project Info :: Features :: Screenshots :: Videos :: Downloads :: Documentation :: Developers :: WIKI Project info: SEAT (Search Engine Assessment Tool) is the next generation information digging application geared toward the needs of security professionals. SCADApedia A blog is great for providing current information, but this information tends to age off and lose value over time. Our answer to this problem is the SCADApedia. The SCADApedia is a set of pages covering topics of importance in ICS and control system IT.

tracetools Welcome to my resources and tools page. Just click on the buttons below to go to the page it relates to. Some tools are in more than one category so appear in more than one place. Chanalyzer Wi-Spy + Chanalyzer 5NEW! Pain Relief for Wi-Fi Headaches Now with 802.11ac support! Wi-Fi has revolutionized the way we work.

Update: Spy agencies hacked SIM card maker's encryption U.S. and U.K. intelligence agencies have reportedly hacked into the computer network of giant SIM card maker Gemalto and taken smartphone encryption keys potentially used by customers of hundreds of mobile phone carriers worldwide. The Gemalto hack, by the U.S. National Security Agency and the U.K. Search WikiLeaks 2. Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. IP whois lookup - search IP address or a domain name whois information Puwong Whois Lookup7x24-hour online service: We use nearly 300 worldwide basis Whois information server queries to ensure accurate and timely query. If you find the results of the query expired, please use the real time query. What is Whois? When we split it into two words: "who" and "is", you will know the answer, and also, you will know what puwong.com offer: domain whois information search. That is puwong.com is a domain whois information search tool, Find domain name belongs to whom (or IP address), we also offer other tools that useful for a webmaster or a domain buyer.

Eye P.A.: Visual Packet Analysis Go into detail with the Packets Tab In Eye P.A.’s Packets Tab, you’ll find a table that breaks down the packet traffic in your capture as it happened. Being able to see the RSSI, Data Rate, and other specific packet-level details provides even more insight into the cause of a WLAN’s problems. Cyber Threats against the Aviation Industry Introduction The recent incident to the Malaysia Airlines Flight MH370 is fueling the discussion of whether would be possible to hack into an airplane and gain complete control control of on-board systems, excluding the pilots. In the past, we have seen many security experts present possible attack scenarios, but never has an attacker made them reality. While the investigators still search for evidence that can provide more indications of what is really happened to the flight, some security experts also hypothesized that it could be the result of a cyber attack against the airplane. Some experts alerted to the possibility that it could be an attack against the in-flight entertainment system that allowed the hackers to infiltrate the security software. The theory was exposed by a British anti-terrorism expert who declared that similar attacks are possible due to the existence of specific exploits.

Derbycon 2015 - Blue Team Starter Kit Description: A look at some of the low-cost tools that can be utilized by Blue Team members. Tools include Redline for forensics, EMET for computer hardening, Zed Attack Proxy for web application security, and PDQ Deploy and Inventory for third party patch management. Descriptions of each tool, experiences and how I've used each of these tools, and short demos of each tool. U.S. Trace Email Address Source Trace Email Teach your friends how to locate the email sender In the following steps you'll learn how to find and copy an email header and paste it into the Trace Email Analyzer to get the sender's IP address and track the source. AirMagnet Archived Webinars Archived Webinars Surveys shouldn't just be for pre-deployment any longer. This webinar covers how to use AirMagnet's SurveyPro to make sure your Wireless LAN design meets or exceeds the initial design parameters.

Related: