Many Wi-Fi test tools are software-based, such as Wi-Fi stumblers and analyzer programs that use a laptop\u2019s internal Wi-Fi or maybe a USB wireless adapter. Here, we review four hardware-based products that you can throw in a laptop bag and carry around with you.\nThe four products are: AirCheck Wi-Fi Tester, Yellowjacket-BANG Wi-Fi Analyzer, Wi-Spy DBx and WiFi Pineapple Mark V. Here are the individual reviews (watch a slideshow version of this story):\n+ ALSO ON NETWORK WORLD: 7 free Wi-Fi stumbling and surveying tools for Windows and Mac +\nAirCheck Wi-Fi Tester: It\u2019s no fluke\nThe AirCheck Wi-Fi Tester ($2,000) is from Fluke Networks, which offers a myriad of other Wi-Fi and networking tools as well. This is a handheld tool dedicated for performing basic wireless troubleshooting, security auditing, interference analysis, and signal testing and locating. The unit can be used independently or optionally connected to a PC to view captured data with the AirCheck Manager software.\nAlong with the AirCheck Wi-Fi Tester unit, you receive a simple cloth-type carrying\/storage bag, USB cable for the optional PC connection, power supply for recharging, quick start guide, and a CD.\nThe unit is relatively small, measuring about 8 inches high, 3 \u00bd inches wide, and 2 inches thick and weighing less than a pound. Though it\u2019s too big for a comfortable ride in your pocket, it could at least be slipped into a laptop bag when not in use. Too expensive for us to do drop-testing, we trust its plastic outer body is durable enough to withstand collisions with the floor and other accidental abuse.\n+ ALSO ON NETWORK WORLD \u2018Free\u2019 Wi-Fi for first born? \u2026 Well, about that +\nOn the front of the unit, you find status lights, a 2.8-inch LCD screen, and buttons for controlling the unit. On the back, you\u2019ll find you can remove the rechargeable battery and above that an SMA port for optionally connecting an external antenna, such as an directional antenna for easier locating of access points or clients. On the side of the unit you\u2019ll also find the power input port for recharging and a USB Mini Type B port for performing upgrades or optionally connecting with the PC-based AirCheck Manager software.\nAfter pushing the instant-on power button, you see the main menu, allowing you to open the following screens: Networks, AutoTest, Access Points, Clients, Channels, and Tools.\nThe Networks screen displays a list of nearby networks, showing just one entry for each SSID, but selecting an SSID will show all access points with that name. You can alternatively choose Access Points from the main menu to see a list of all access points, even those with the same SSID.\nIn addition to the typical\u00a0access point details you see with wireless stumblers, you\u2019ll find noise levels and signal-to-noise ratio (SNR) for access points, useful details on 802.11n capabilities, and also any notes, such as alerts on possible interference. Signal and noise levels are given in negative dBm values and the SNR levels in dB values, all of which are also represented on a bar graph. Keep in mind that you can save sessions, which includes all information seen during a testing activity as well as any test results from connection tests in the session, which can later then be optionally uploaded via USB to a PC.\nYou can also connect to networks with the unit, in order to perform the connection tests and pings. You can also mark\u00a0access points as authorized or unauthorized, useful for detecting rogue access points. Though you can connect to 802.11ac access points, it connects utilizing the older standards. Additionally, the unit does not yet report on 802.11ac-specific stats.\nThe AutoTest feature tests the air quality, ad hoc networks, rogue access points, and network quality. It provides a pass\/fail indication of the items and identifies common problems.\nThe Clients page lists all the nearby Wi-Fi stations along with details such as the\u00a0access point they\u2019re connected to, signal levels, supported data rates, and even the SSIDs they\u2019re probing for.\nOn the Channels page you find a bar graph showing channel usage for 802.11 and non-802.11 signals on both the 2.4GHz and 5GHz bands. Selecting a particular channel brings up additional details and a graph.\nThe Tools page allows you to set and manage thresholds, files, network profiles, time\/date, and other misc preferences and settings.\nOverall, we found the AirCheck Wi-Fi Tester to be a very useful tool that\u2019s also user-friendly. It provides all the basic Wi-Fi details, including non-802.11 signals, and offers some unique testing functionality. However, it would be nice if it provided a more thorough selection of graphs and also fully support 802.11ac. The LCD screen is not touch screen either, but the way the selection and function buttons are designed makes it painless to use. Although we didn\u2019t specifically test the battery life, the specs say it typically gives you 5.5 hours of use and takes up to 3 hours to recharge.\nWiFi Pineapple Mark V: Low cost, low hanging fruit\nThe WiFi Pineapple Mark V ($99) is a Wi-Fi security auditing and penetration-testing tool, built specifically for that purpose. It\u2019s basically a wireless router sporting all kinds of interfaces, ports, and tools dreamed up by hackers themselves for advanced rogue applications, Wi-Fi monitoring, and packet injection.\nThe unit is pretty small, measuring about 3 \u00bd inches long, 3 inches wide, and 1 inch tall. The two detachable 3 \u00bd inch antennas can be positioned to your liking.\n+ ALSO: Hacker hunts and pwns WiFi Pineapples with zero-day at Def Con +\nThe top of the unit sports their yellow Wi-Fi Pineapple logo along with four LED stats lights. The front side is where you find the Ethernet port, AC power input jack, and USB 2.0 port for various uses, including connecting a 3G\/4G modem, WiFi adapter, tethered smartphone, and GPS receiver.\nOn the left side of the unit is a MicroSD slot that comes from the factory with a 4GB card, which you can use for storing and transferring saved data. On the right side are expansion headers for interfacing with the Arduino based HDK (Hardware Development Kit) over GPIO and a bank of configurable auto-attack mode switches. On the backside are leads for a TTL serial connection, useful for accessing the terminal shell on a PC, development and debugging, or even to connect a Bluetooth Serial TTL to access to the unit from a smartphone via Bluetooth.\nAlong with the unit, the box contains an AC power supply with four interchangeable sockets, allowing use in various regions with varying electrical outlet types. Also included are a small Ethernet cable and a USB power cable for an alternative way of powering the unit.\nInside the unit are dual integrated radios custom built for advanced wireless attacks. It\u2019s based on the Atheros AR9331 system on a chip (SoC), which includes a 400 MHz MIPS processor, 16MB ROM and 64MB RAM. Also, onboard is a Realtek RTL8187 radio with monitor and injection capabilities.\nUsing the WiFi Pineapple, you can perform reconnaissance of Wi-Fi access points and clients, whether associated or not. A standard toolset offers popular utilities such as nmap, sslstrip, aircrack-ng, dsniff, tcpdump and many more via downloadable packages or infusions. Standard file formats such as PCAP can be captured and stored on MicroSD cards for later analysis using tools such as Wireshark and Kismet.\nThe penetration testing attacks and demonstrations the unit can perform include but aren\u2019t limited to: setting up a honey-pot, intercepting and injecting wireless traffic, performing DNS spoofing or IP redirection, and even substitution of executables in transit. It also integrates with standard penetration testing frameworks such as Metasploit via Meterpreter.\nTo control and manage the unit, a modular web-based interface is provided. Once you login, you\u2019re met with the main page with a variety of minimizable windows displaying select stats and controls for each particular module. Clicking on the title opens the full GUI for that particular module. The unit can also be remotely accessed via SSH, SSL VPN, even via an out-of-band Internet connection as the unit supports mobile broadband modems and Android USB tethering.\n\n\nNetResults\n\n\n\nProduct\nAirCheck Wi-Fi Tester\nWiFi Pineapple Mark V\nWi-Spy DBx + Chanalyzer\nYellowjacket-BANG Wi-Fi Analyzer\n\n\n\n\nPrice\n$2,000\n$99\n$849\n$3,500\n\n\nPros\nUser-friendly, shows non-Wi-Fi signals\nInexpensive, feature-rich\nEconomical, user-friendly GUI\nThorough graphs, durable storage case\n\n\nCons\nLimited selection of graphs, lacks full 802.11ac support\nGUI could use facelift, no PoE support\nLacks automatic ID of signals\/interference, lacks reports\nRuns old Pocket PC, lacks full 802.11ac support\n\n\n\u00a0\n\u00a0\n\u00a0\n\u00a0\n\u00a0\n\n\n\u00a0\n\u00a0\n\u00a0\n\u00a0\n\u00a0\n\n\n\n\n\nMany tools come pre-loaded on the unit. However, there are many more you can add by installing packages, what they call infusions. It just takes a few clicks to install them and then a window on the main page will appear. You\u2019ll see some stats or settings on that window and then just like the preloaded ones you can click the window title to access the whole GUI.\nOverall, we found the WiFi Pineapple Mark V to be a feature-rich and inexpensive penetration-testing tool. Though we didn\u2019t test each feature or functionality, we did get a good idea of how the tool works and what it offers.\nOur only gripes are with the look and feel of the GUI and the Ethernet port lacking PoE capability. Although quite functional in design, the GUI could be improved. It currently has more of a hacker-ish type of look and feel than a professional appearance. Nevertheless, you can perform manual edits to their CSS to make color changes to the skin of the GUI.\nWi-Spy DBx and Chanalyzer: For Metageek lovers\nThe Wi-Spy DBx ($500) from Metageek is the hardware component, an RF spectrum receiver for 2.4GHz and 5GHz, and Chanalyzer ($349) is the software that lets you view and analyze the captured data. Together they allow you to scan the airwaves to verify they\u2019re clean and identify any Wi-Fi and non Wi-Fi interference that\u2019s detected. There\u2019s also other add-ons and packages available that offer additional functionality.\n+ ALSO: Wi-Spy spies on Wi-Fi +\nMetaGeek provides a few other Wi-Fi related hardware and software tools in addition to these two, including a 2.4GHz only Wi-Spy and a Wi-Spy Mini for use with just their stumbler, inSSIDer Office. Also keep in mind that several other third-parties utilize the Wi-Spy device in their software tools, such as the site surveying solutions from VisiWave, Tamograph and Ekahau.\nThe Wi-Spy DBx is relatively small, measuring about 3 inches long, 1 \u00bc inches tall, and a \u00bd inch thick. The removable single dual-band antenna measures about 4 inches long. An optional and simple but useful mount attaches to the base of the antenna, allowing you to mount or clip the device onto the laptop body or screen during field-use. There\u2019s no LED lights or buttons; just a USB Mini Type B port so you can connect the device to your laptop via USB.\nChanalyzer is a Windows-based application requiring a minimum of 4GB of RAM. It can also run on Mac OS X via virtualization with VMware Fusion or Parallels. In addition to the Wi-Spy DBx device, an internal or USB Wi-Fi adapter is also required.\nAfter you open the Chanalyzer application and plug in the Wi-Spy device, you start to see the colorful spectrum graphs. On the left portion of the main screen is where you can view and switch between sessions.\nOn the left of the main screen you see the waterfall graph, showing a historical view and where you can also adjust the timespan in which other graphs show their data. On the top right portion of the screen is a graph showing the signal amplitude across the selected band or frequencies, which can also identify where selected Wi-Fi access points are detected. Below that is another waterfall graph showing a zoomed up view for the particular timespan selected.\nOn the bottom right portion of the main screen is a tabbed interface. The Interferers tab is a showcase of what particular signals look like on the amplitude graphs to help you identify what type of devices might be interfering with your Wi-Fi. The Channels Table gives you detailed stats on each channel. The Networks Table lists nearby access points or networks, which you can select in order to have them identified on the amplitude graph, and provides their basic details similar to a basic Wi-Fi stumbler. The Utilization Graph tab provides just that. The Lab tab allows you to adjust the bands, channels, or frequencies that are being captured. The Notes tab is where you can store any notes, which are included when you save a session and can be included in any reports you generate.\nAny edition of Chanalyzer can save sessions in which you can open and play back the captured data later. However, to easily create formal reports or to use their Lab notes functionality you must purchase the next edition up for $499, which would only include one of those additional features. Or you could purchase the edition that includes reporting and support of Cisco CleanAir for $649.\nThroughout our testing we saw a useful help icon appear a couple of times, which we could click to get a simplified explanation of the feature we were trying to use. Other than that, we had to reference the full online User Guide when other questions arose.\nOverall, we found Wi-Spy DBx and Chanalyzer to be a good economical entry-level RF spectrum analyzer solution. Though interference sources aren\u2019t automatically identified, the MetaGeek tools allow you to both detect and physically locate them with some effort and analysis of your own. The Wi-Spy device is small and rugged enough to be thrown into your laptop bag or even carried slipped into your pocket.\nYellowjacket-BANG Wi-Fi Analyzer: Lots of bang for the buck\nThe Yellowjacket-BANG Wi-Fi Analyzer ($3,500) is most similar to the AirCheck Wi-Fi Tester, but is more advanced in some areas. It\u2019s a dedicated handheld tool for performing wireless troubleshooting, security auditing, interference analysis, and signal testing and locating. The tool is from Berkeley Varitronics Systems, which provides many more Wi-Fi and other wireless testing tools.\nAlong with the main unit, you receive three detachable antennas: one optimized for 2.4GHz, another for 5GHz, and the third is an external GPS antenna. You\u2019ll also receive a power supply, which recharges both their customized battery built into their proprietary case and also the internal battery of the HP iPAQ Pocket PC, which is what the YellowJacket software runs on. Additionally, they provide the original iPAQ AC charger and USB cradle for use when the iPAQ is removed from the YellowJacket case.\nThey also provide some optionally accessories, such as a direction finding antennas for both bands ($250 each) that easily mounts atop of the YellowJacket and remote control and map-based site surveying software that works along side with the unit.\nThe unit and its accessories can be stored and transported via the durable and lockable hard case that provides ample cushion inside to protect the unit and accessories. However, it\u2019s relatively large at about 1\u00bd feet long, 1-foot wide, and 7-inches tall when sat flat.\nThe YellowJack BANG unit is also relatively large at about 9 inches tall, 5 inches wide, and 3 inches thick and weighs in at over 2\u00bd pounds. Its size may prevent you from slipping the unit inside a smaller laptop bag with the laptop inside, and also prevents easy single-hand use on the 3.6-inch touchscreen. Also not ideal is the way the case fits around the iPAQ; it partially covers the power button on the top and the down arrow near the bottom of the Pocket PC. Nevertheless, the unit\u2019s outer body looks like it\u2019s durable and could withstand impacts and other accidental abuse.\nOn the bottom of the unit\u2019s case is the power input jack for recharging the batteries and on top is the SMA antenna jack and the GPS antenna jack. There are no LED status lights and the only buttons are the standard buttons on the iPAQ encased within.\nWhen you power on the YellowJacket unit, you may be greeted with the OS or the YellowJacket BANG app, depending upon if the app was open previously. The YellowJacket BANG app has an archaic-looking GUI, which is not surprising given it\u2019s running in the old Windows Mobile 5 OS.\nThe first tab of the app is MAC Information showing the basic access point list and details, including the signal-to-noise ratio, which can be sorted and filtered. Tapping on an\u00a0access point allows you to tab through more pages on details pertaining to that particular access point, including graphs on RSSI over time, multipath, and channel frequency response, 802.11n capabilities, and security info. You can also access their\u00a0access point locating feature, giving you a signal meter and audible noise to help find the location.\nThe Spectrum Analysis tab allows you to view different configurable graphs on both RF spectrums. You can specify the center, span, start, or stop frequency. It also provides many different graph modes: resolution bandwidth, reference level, screen averaging, video smoothing, traces, marker functions, trigger, band presets, persistence, and histogram.\nThe Security tab allows you to manage the authorized and unauthorized lists of access points, which allows it to provide rogue\u00a0access point detection functionality. The GPS tab allows you to check the status of the GPS receiver, the System Information tab shows the software status, and the Power tab shows you the battery stats.\nThough this YellowJacket unit provides great graphs and details, the design of the unit with the old iPAQ Pocket PC and the decade-old Windows Mobile 5 OS is less than desirable. From the way the case covers a portion of the buttons to all the issues presented from the OS, such as possibly losing the optimized OS settings if the iPAQ battery runs out, the solution overall isn\u2019t very user-friendly. The software could be improved as well with faster scanning and\/or caching so the\u00a0access point list, for instance, is saved when switching between tabs\/pages. The battery life at 3+ hours is also relatively low.\nWe hope to see an improved edition of the YellowJacket, as we are told Berkeley Varitronics Systems is planning at some point to move everything to a touch tablet running at least Windows 7.\nEric Geier is a freelance tech writer\u2014keep up with his writings on Facebook or Twitter. He\u2019s also the founder of NoWiresSecurity providing a cloud-based Wi-Fi security service, and On Spot Techs providing RF site surveying and other IT services.