Advanced Interception Systems. Intelligence and surveillance
 
+353 1 902 6688 +44 20 3769 1919 +358 9 3158 7490
ˆ 1,04
Your basket
Total
0 $
Checkout
 
 

SIGINT. Signal Intelligence Solutions

MainCatalogSystems of controlled injectionWi-Fi interceptor

WebHunter. Wi-Fi interception system

Print
The newest device
Wi-Fi interceptor
Wi-Fi interceptor
Main characteristics
SKU 2248
Vendor Intercept
Category Injection - Wi-Fi interception
Standart WiFi
Active range (m) 500
Features Attacks WPS(brute force, Pixie Dust, EmptyPin), WPA2(CRACK, kr00k)
OS Windows
Decryption WEP, WPA, WPA2, WPA3
Management Management control center
Delivery set Tactical interceptors + remote decipher
Shipment According to EUC

red1.jpg Passive and active radio monitoring of IEEE 802.11 a b/g/n/ac communication networks;

red1.jpg Overcoming of standard WEP, WPA, WPA2, WPA3 cryptographic protection based on recorded information traffic on a distributed computing system;

red1.jpg Compilation of list of Wi-Fi clients with obtaining of IMSI, IMEI parameters (if service supported by subscriber terminal;

red1.jpg Monitoring and compilation of a list of Wi-Fi network clients;

red1.jpg Control of the presence in the traffic of clients of data on the use of known web resources and applications, interception of HTTP logins and passwords in traffic;

red1.jpg Creation of your own access point, imitation of an existing point, as well as passive monitoring;

red1.jpg Displaying found Wi-Fi points on the map and creating a database of collected parameters;

red1.jpg Determination of the location of the specified access points and clients by sequential approximation by the maximum signal level ("fox hunting" method);

red1.jpg Execution of a "de-authentication" attack on selected targets, disruption of Wi-Fi connection;

red1.jpg Creation of a database of targets for monitoring;

red1.jpg Interception of Handshake, PMKID;

red1.jpg An up-to-date set of attacks WPS(brute force, Pixie Dust, EmptyPin), WPA2(CRACK, kr00k), gaining remote access to Windows (BlueKeep, BlueKeep 2);

red1.jpg Analysis for vulnerabilities in the local network (both your own and the attacked points), collecting information about open ports on devices and running services;

red1.jpg The ability to create interference (Unstable network operation) both for one user or point, and at all point

File Title Release Date File Type Size (mb) Action
WebHunter. Wi-Fi interceptor 08-13-2020 Documentation (pdf) 4.28 MB download

To access this product file, get partner STE status


red1.jpg Demo or training are carried out in our premises or in the client's country, subject to an official invitation from government agencies.

red1.jpg We provide online demos only to existing clients with whom we have successful experience of cooperation.

red1.jpg We do not provide free training. If you are not familiar with the subject, links to training courses are here.

red1.jpg To apply for a demo or training you should provide a completed end user certificate

File Title Release Date File Type Size (mb) Action
WebHunter. Wi-Fi interceptor 08-13-2020 Documentation (pdf) 4.28 MB download

To access this product file, get partner STE status

File Title Release Date File Type Size (mb) Action
WebHunter. Wi-Fi interceptor 08-13-2020 Documentation (pdf) 4.28 MB download

To access this product file, get partner STE status

Additional Product Information
Can be deployed inside the infrastructure of the mobile operator
Can serve as a platform for an infection system
You may also be interested in the following products

 
Product added to the basket.
Make a purchase
Delivery
Continue
Deny
Order Product
Product name
Quantity*
Contacts
Name*
E-mail*
Phone*
Comment