Free Wireless Client

free wifi client

Wi-Fi Security can be hard. There are many options, many settings, and a lot of techno-babble in many WiFi clients that make it difficult for non-technical users to understand.

The LucidLink WiFi Client eliminates all of the clutter and only presents what you need to connect to the WiFi network. It automatically determines the WiFi security method being used on the network and requests only the information required to connect to that network.

The LucidLink WiFi Client was designed from our WiFi security background and ease of use was the foremost design consideration. It warns you if you attempt to connect to an insecure or poorly secured Wi-Fi network (you can choose not show these warnings) and it detects suspicious networks or access points that may be posing an “evil twin” attack threat.

Download the LucidLink WiFi Client & enjoy it. We hope it makes WiFi security simpler and easier to use.

download LucidLink WiFi Client

Simple, Safe WiFi Security
LucidLink wifi security

Witopia WiFi Security

A Look at the LucidLink WiFi Client

LucidLink WiFi Client

The LucidLink WiFi Client is very easy to use. Pick your network and the WiFi client asks only for the information you need to connect. Supports open, WEP, WPA, and WPA2 WiFi Security.

Download the LucidLink WiFi Client

Network Tools

Below we describe a collection of cost-free tools that can be used both as attack tools and as audit tools.

· AirJack ( is a collection of wireless card drivers and related programs. It includes a program called monkey_jack that automates the MITM attack. Wlan_jack is a DoS tool that accepts a target source and BSSID to send continuous deauthenticate frames to a single client or an entire network (broadcast address). Essid_jack sends a disassociate frame to a target client in order to force the client to reassociate with the network, thereby giving up the network SSID.

  • AirSnort ( ) can break WEP by passively monitoring transmissions and computing the encryption key when enough packets have been gathered.
  • Ethereal ( ) is a LAN analyzer, including wireless. One can interactively browse the capture data, viewing summary and detail information for all observed wireless traffic.
  • FakeAP ( can generate thousands of counterfeit 802.11b access points.
  • HostAP ( converts a station that is based on Intersil’s Prism2/2.5/3 chipset to function as an access point.
  • Kismet ( is a wireless sniffer and monitor. It passively monitors wireless traffic and dissects frames to identify SSIDs, MAC addresses, channels and connection speeds.
  • Netstumbler ( is a wireless access point identifier running on Windows. It listens for SSIDs and sends beacons as probes searching for access points.
  • Prismstumbler ( can find wireless networks. It constantly switches channels and monitors frames received.
  • The Hacker’s Choice organization ( has LEAP Cracker Tool suite that contains tools to break Cisco LEAP. It also has tools for spoofing authentication challenge-packets from an AP. The WarDrive is a tool for mapping a city for wireless networks with a GPS device.
  • StumbVerter ( is a tool that reads NetStumbler’s collected data files and presents street maps showing the logged WAPs as icons, whose color and shape indicating WEP mode and signal strength.
  • Wellenreiter ( is a WLAN discovery tool. It uses brute force to identify low traffic access points while hiding the real MAC address of the card it uses. It is integrated with GPS.
  • WEPcrack ( cracks 802.11 WEP encryption keys using weaknesses of RC4 key scheduling.