Xirrus Wi-Fi Inspector

My two personal favorite Wi-Fi Inspectors are NetSurveyor and inSSIDer. Another great application is Xirrus Wi-Fi Inspector which is a powerful tool for managing and troubleshooting the Wi-Fi on a Windows XP, Vista, or 7laptop. Built in tests enable you to characterize the integrity and performance of your Wi-Fi connection. Applications include:

  • Searching for Wi-Fi networks
  • Managing and troubleshooting Wi-Fi connections
  • Verifying Wi-Fi coverage
  • Locating Wi-Fi devices
  • Detecting rogue APs

Don’t forget about Vistumbler which offers GPS information.

Updates and HotFixes you may miss in Windows

Microsoft Windows has a great update feature built in.  You may not know it but Microsoft also releases HotFixes and other items that are needed for security, networking, features and other functionality.

How do you find Hotfixes and other items that may need to be downloaded?   You can use a third party utility such as WHDownloader.  (Download here)

WHDownloader is easy to use and brings in both Microsoft Office Products and the latest Windows OS.

Download

Updated List

 

See who’s on your wireless network – SoftPerfect WiFi Guard

Want to see who is on your wireless?  SoftPerfect’s  WiFi Guard is freeware that scans your network, both wireless and wired and it also inventories connections on your network.

Before setting up WiFi Guard, inventory your computers, printers, routers, TVs and other devices that use your network.  Get each devices’ MAC address.  Load WiFi Guard and mark each device as trusted.  WiFi Guard’s settings allows you to set a scan interval and to put comments on devices that you know.  In the event a new device is connected to your network, you’ll be alerted.

taskbar

Scanned

Set a scan interval that meets your needs.Settings 

WiFi Guard keeps a history of devices that connect to your network.History

SoftPerfect WiFi Guard

Map a drive using a batch file

You can map a network drive using a script or batch file.

Open up Notepad

Type the following in substituting computer with the computer you are connecting to.  You will also substitute the folder with the folder name that is shared (only share with who you want to have access) also you can type in the password and username as necessary.

After typing this information in, Click on File and Save As.   Type map.bat and select the file type as all files.  Save the file where you want it.  You can now add it to your startup or to a schedule you set.

net use P: \\computer\folder password /user:username

pause

__________________

If you want to disconnect the drive after a period of time, follow the above steps substituting -

net use P: /delete

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for other reasons.

Want to protect your network and the computers in your network?  You can get updates for your operating systems (Linux, Mac, iOS, Android, Windows or whatever) along with updates for third party programs yet you can still be unsecure.    When updating these products, you also have to remember firmware and updates for wireless devices, access points, bridges, firewalls, routers, switches, SCADA devices, robots, mobile devices, printers and any device on your network.

Metasploit

http://www.metasploit.com/download/

Metasploit Community is free and allows for a free scan of your network or server. Although limited (Try Pro for details and Brute Force), Metasploit Community is a first step in finding open services and ports on your operating system, hardware devices such as routers and other devices.   The trick to installing Metasploit is to disable your antivirus or make exceptions to what your antivirus finds.   You should truly install the software inside of a VM (Virtual Machine) so that your computer remains protected.

You can use Metasploit to protect your network by ‘seeing’ what a hacker or malicious person would see.  Truly for network professionals and auditors, this software can help you identify services, ports and weaknesses in your network.

There are several versions of Metasploit – Community, Pro, Express and Framework (Compare Editions)

Metasploit     Metasploit Two

Metasploit Scan Complete     metasploit Hosts

Metasploit Services After Scan

The above scan was in a controlled lab.  Malicious scanning of networks may be illegal.  Read  Penetration Basics on Metasploit’s website.

Tutorials (Videos)

SVCHost Viewer – Find out what program is using it!

Anyone who has hit Ctrl-Alt-Del understands they may have several svchost.exe ‘s running.  What are they?  They relate to networking and some programs use svchost in groups.  This tiny download (14 kb) shows exactly what this file is doing.

Link to Download.

svchostviewer

150 Best Windows Software

As we move into our seventh year, we have found Rick over at What’s On My PC and the articles he finds on the web to be some of the most useful resources.   Rick once again has found an excellent article on AddictiveTips giving 150 of the Best Windows Software of the Year 2013.

For one of the best resources on the web (770 sites), visit Rick’s other site Bookmarks4Techs.

Thanks Rick!