Print
Discovery Telecom
Advanced Interception Systems.
Intelligence and surveillance
Tel./Fax: +353 1 902 6688
E-mail: info@intercept.ws

WebHunter. Wi-Fi interception system

Wi-Fi interceptor

Main characteristics
 
Vendor Intercept
Category Injection - Wi-Fi interception
Standart WiFi
Active range (m) 500
Features Attacks WPS(brute force, Pixie Dust, EmptyPin), WPA2(CRACK, kr00k)
OS Windows
Decryption WEP, WPA, WPA2, WPA3
Management Management control center
Delivery set Tactical interceptors + remote decipher
Shipment According to EUC

The main functions and characteristics

red1.jpg Passive and active radio monitoring of IEEE 802.11 a b/g/n/ac communication networks;

red1.jpg Overcoming of standard WEP, WPA, WPA2, WPA3 cryptographic protection based on recorded information traffic on a distributed computing system;

red1.jpg Compilation of list of Wi-Fi clients with obtaining of IMSI, IMEI parameters (if service supported by subscriber terminal;

red1.jpg Monitoring and compilation of a list of Wi-Fi network clients;

red1.jpg Control of the presence in the traffic of clients of data on the use of known web resources and applications, interception of HTTP logins and passwords in traffic;

red1.jpg Creation of your own access point, imitation of an existing point, as well as passive monitoring;

red1.jpg Displaying found Wi-Fi points on the map and creating a database of collected parameters;

red1.jpg Determination of the location of the specified access points and clients by sequential approximation by the maximum signal level ("fox hunting" method);

red1.jpg Execution of a "de-authentication" attack on selected targets, disruption of Wi-Fi connection;

red1.jpg Creation of a database of targets for monitoring;

red1.jpg Interception of Handshake, PMKID;

red1.jpg An up-to-date set of attacks WPS(brute force, Pixie Dust, EmptyPin), WPA2(CRACK, kr00k), gaining remote access to Windows (BlueKeep, BlueKeep 2);

red1.jpg Analysis for vulnerabilities in the local network (both your own and the attacked points), collecting information about open ports on devices and running services;

red1.jpg The ability to create interference (Unstable network operation) both for one user or point, and at all point