In the computer field, hijacking refers to a technique which, by illicit means, makes it possible to hack a network or a user in order to seize something. This applies to information theft, entering network connections, modems, etc.
Test your networks against penetration
This application called Hijacker is a tool for performing such hacks, although, as it is developed from an ethical point of view, we will rather talk about penetration tests or pentest . This is why through an intuitive and intelligible user interface, it presents various functions to perform.
Its main features are:
- Compilation of information on access points and nearby customers, activity on a specific network, statistics on access points and stations, data from the device manufacturer, signal strength devices, etc. ;
- Attacks by authentication cancellation of all clients of a network or of a client in particular, MDK3 Beacon Flooding, DoS, etc. ;
- Copy of commands and MAC addresses;
- Commands to enable or disable automatic tracking;
- Sort and filter access points and stations with many parameters;
- Export the information collected to a file.