Airpwn

Airpwn is a tool near and dear to my heart because I wrote the program. It started as a competition between me and a coworker to build a wireless data-injection tool the week before Defcon. His solution used a man-in-the-middle attack, while my tool injects wireless frames into the air in an attempt to beat the legitimate access point, sort of a man-on-the-side attack. We had fun playing harmless pranks on the Defcon wireless network using my tool, and enough onlookers wanted to play with it that I released the code publicly as Airpwn (http://sf.net/projects/airpwn/).

Airpwn works by sniffing one or more wireless networks, looking for user-supplied patterns of data sent from a client (laptop, PDA, and so on) to the access point (AP). If a pattern is detected, Airpwn injects a packet back to the client with user-supplied data that appears to come from the AP. Since Airpwn is almost guaranteed to provide the packet before the AP can (the AP is usually proxying the request off to some far-away server), the client accepts Airpwn's packet and discards the APs, allowing Airpwn to control the server-side of the communication.

By allowing the user to match arbitrary patterns and reply with arbitrary content, Airpwn can perform a variety of tricks, including some pretty dangerous attacks. The possibilities are virtually limitless, but here are some examples of simple things you can do with Airpwn:

Because Airpwn allows you to inject whatever content you want, the possibilities are pretty much limited only to your imagination. The only traffic that is safe from Airpwn is on a connection protected with some form of encryption.