Across
- 3. Web content scanner for hidden directories
- 4. Perform wireless deauthentication attacks
- 6. Discover devices in local network
- 9. Enumerate SMB shares and users
- 11. Enable monitor mode on wireless interface
Down
- 1. Crack WEP/WPA wireless keys
- 2. Directory and file brute forcing tool
- 5. Capture wireless packets and handshakes
- 6. Scan for NetBIOS information
- 7. Access SMB network shares
- 8. Web application brute force tool
- 10. High speed port scanner
