New Listings | Hot Listings | Top Rated | Editor Pick | Add a Listing | Update a Listing | Get Rated | Upgrade a Listing | Contact
Welcome to Wireless Warrior
Wireless Warrior is a WiFi information resource for wlan admins and advanced wardrivers. Finding the best websites is very easy - click through any of the categories, or use the search box to find the web site you need. If you are an author of web site, you can add your web site for free by submitting to this page and following the on-screen instructions.
Community Groups (279)
Africa, Asia, Australia, Europe, Latin America.... FAQs/Guides (187)
other Wi-Fi Stuff Forums (17)
Antennas, Manufacturers Hotspots (42)
Mailing Lists (19)
Shop, Videos News (31)
Cracking Wep, Drivers/Firmware, Mapping, Monitoring/Scanning, other WiFi stuff.... Standards (29)
RFC´s Wardriving (11)
- Colligo Workgroup Edition
Colligo Workgroup Edition software enables any wireless (WiFi) capable laptop, desktop, or tablet PC to instantly and securely network to one or more computers, no matter where you are. At the coffee shop, at home, at the office, at a customer/vendor, at the park, create an instant wireless (ad-hoc) network with one click.
Category: Software > Security
Wellenreiter is a wireless network discovery and auditing tool. Prism2, Lucent, and Cisco based cards are supported. It is the easiest to use Linux scanning tool. No card configuration has to be done anymore. The whole look and feel is pretty self-explaining. It can discover networks (BSS/IBSS), and detects ESSID broadcasting or non-broadcasting networks and their WEP capabilities and the manufacturer automatically. DHCP and ARP traffic are decoded and displayed to give you further information about the networks. An ethereal/tcpdump-compatible dumpfile and an Application savefile will be automaticly created. Using a supported GPS device and the gpsd you can track the location of the discovered networks.
Category: Software > Wardriving
- Detecting Wireless LAN MAC Address Spoofing
This paper describes some of the techniques attackers utilize to disrupt wireless networks through MAC address spoofing, demonstrated with captured traffic that was generated by the AirJack, FakeAP and Wellenreiter tools. Through the analysis of these traces, the author identifies techniques that can be employed to detect applications that are using spoofed MAC addresses (*pdf)
Latest New Additions and Updates
Wireless home network – Home WLAN
Wireless home network – the best guide to the wireless technology. Get the facts about wireless internet broadband and usage in your home or office.
FAQs/Guides > other Wi-Fi Stuff
Standards > RFC´s
WlanPollution , Wifi around the world - WlanMap
Symbian NokiaS60 wardriving tool and MAP of access points
- Links: 1342
- Categories: 84
- Registered Users: 60
- Mailing List Subscribers: 12
- Unique Outgoing Hits: 380816