that demonstrates the insecurity
("Wired Equivalent Privacy", the weak encryption
wireless links) by recovering encryption keys. Because AirSnort only listens passively to the wireless
traffic passing by, its use cannot be detected.
Depending on whom you ask, this tool is either a valuable warning against reliance on the weak default encryption of wireless networks (use secure tunnels such as SSH or SSL in addition), or a dangerous hacking/cracking tool.
See http://airsnort.sourceforge.net for the project's homepage.