Belkin4xx. WPA & WPA2 Belkin routers Keygen Audit.
Dictionary Generator WPA & WPA2 networks default keys for Belkin routers.
Vulnerable Belkin routers with the ESSID's (Belkin.XXXX, Belkin_XXXXXX, belkin.xxxx y belkin.xxx) and the models (F7D1301, F7D3302, F7D3402, F7D4301, F7D7301, F5D7234-4, F7D2301, F7D4402, F7D5301, F7D8301, F9J1102, F9J1105, F9K1001, F9K1002, F9K1003, F9K1004 y F9K1105).
The main features are the Wireless Network scanner, dictionary generator WPA and WPA2 keys for Belkin routers, connection to open wireless networks and the Belkin vulnerable routers even with the ESSID modified.
Grant version includes more features, including these new features are included the dictionary generator for WPA and WPA2 key networks ESSID modified by calculating the WPA and WPA2 key from BSSID, besides the on / off button, turbo mode to speed up the wireless network scanner.
On the basic functions of scanner, autoscan contains fast and slow, normal scan on demand, turbo scan, types of networks to search, types of encryption to seek, sound to warn Belkin vulnerable routers and open networks, a network connection status and a description of networks.
Generates a dictionary with name 'Dic_ESSID.txt' in the root scard to select a vulnerable network, appearing the generate button network dictionary for Belkin vulnerable router.
Once selected and generated a network dictionary for vulnerable network, opens a drop-down with the keys generated for your choice. If the key selected in the drop coincides with the network key, and we made the 'audit' to the Belkin router. It is also possible that none of the generated keys is that good or can not associate with the network wireless.
Please note that this app is not meant to be a hacking utility.
The use of this product wireless analysis software should be a basic tool for professionals and individuals who are eager to know the security level of wireless facilities is strictly forbidden to use it to commit criminal acts of intrusion on wireless networks of which we do not own or do not have permissions to analyze their security.