Your world, Secured 2016 Worldwide Release
System Overview Wi-Fi interception system is developed for police operations and searching of information leaks in the office premises, government agencies and other structures where access to Wi-Fi networks is possible. The system consists of 3 main modules: cracking module (Penetrator), interception module (Interceptor) and localization module (Aircheck). The system can work either in passive (monitoring) or active modes. In monitoring mode, the operator can see ALL network users (working, connected, not connected) which are present within system coverage. The operator can create database of MAC addresses, signals levels, all access points of users. Features Scanning for Wi-Fi stations and access points Capturing 802.11a, 802.11b, 802.11g and 802.11n WLAN traffic WEP or WPA/WPA2 keys specification to decrypt encrypted datas Display of detailed per-node and per-channel statistics Display of detailed IP connections statistics: IP addresses, ports, sessions, etc Reconstruction of TCP sessions Intercepting on Wireless Traffic over the Air RF Jamming on Wireless Traffic over the Air Intercepting on Wired Traffic in the LAN As SSL proxy for Interception on HTTPS Traffic at both LAN and WLAN
Hardware Components Main hardware components of the base model: 1. Wi-Fi AirCheck 2. Wi-Fi Penetrator 3. Wi-Fi Interceptor 2 3 Antennas 6 db Wireless adaptors with injector (for manipulation with target traffic in active mode) Wireless adaptors 2.4 and 5 GHz Directional antenna 18 db 1 Converter 12-220 V 2 kw Various cables Transportation case Software Components The software consists of 3 modules : 1. Penetration Cracking module 2. Interception module 3. AirCheck Wi-Fi module
Software modules Penetration Cracking module Crack / Recover WEP/WPA/WPA2/WPS a) FIRST METHOD: WEP / WPA / WPA2 via WPS (Wi-Fi Protected Setup) CRACKING Most Routers off the factories come with default enabled WPS Wi-Fi Protected Setup. This is a feature in routers that give a PIN Based authentication. When you get the WPS PIN you get both the full real encryption password for WEP WPA or WPA2. b) SECOND METHOD: WPA / WPA2 via Dictionary Attack In this attack you need an access point with a good signal and users connected. -80 is very bad and -40 is extreme good. So even -50 or -60 would be good. c) THIRD METHOD: WEP Cracking Only The WEP Encryption is an old type that is vulnerable in many ways and can be cracked fast. The first way is via IVS cracking where you want to choose a network with a good signal strength. Features Crack the Passkey of Encrypted 802.11a/b/g/n Networks (WEP, WPA, WPA2-PSK) Bruteforce and Rainbow table WEP/WPA/WPA2-PSK Dictionary Cracking Sophisticated Word List (dictionary) Generator Over 100,000 PPS (Passwords Per Second) of Cracking speed Over 500GB of build in Dictionaries to use with Broutforce or Rainbow table attacks One click Cracking (choose the network to crack and run the Cracking by one click) View and crack the passkey of Hidden Networks User-friendly menu Scanning the perimeter and collect the fallowed information : 1. BSSID (Basic Service Set Identification) MAC Address of the Wireless Access Points around 2. Broadcasting Channel 3. Clients or hosts Connected to each Network 4. Amount of Encrypted Packets running thru the Network of each AP and each host 5. Amount of Data Packets Running thru the Network of each AP and each host 6. Noise and Signal Level from Each AP to the System and from Each AP to its clients 7. ESSID the AP Identifiers Name 8. Host BSSID, the hosts MAC address of each AP 9. Encryption Type of each AP in the perimeter
Interception module Technical Specification Coverage Internet Content Reconstruction Management Administrative Description Simultaneous Monitoring of WiFi networks Frequency band WiFi Protocol WiFi security protocols Jamming of WiFi Network Interception of HTTPS/SSL Sessions Indoor Outdoor Email Webmail IM or Chat HTTP HTTPS/SSL Interception File Transfer VoIP Telnet Social Media Cloud Service Geo-Location service Mobile APP Export and Backup Import of Raw Data (Pcap) System Access-Management Access Browser Parameters Up to 4 2.4 GHz, 5 GHz 802.11a/b/g/n WEP, WPA-Personal, WPA2-Personal and WPA2-PSK Yes Yes (MITM) Up to 50 meters Up to 100 meters and more POP3, SMTP Yahoo Mail, Gmail, Windows Live Hotmail, etc WhatsApp (Web), Yahoo Messenger, Gtalk, Yahoo Web Chat, Skype Voice Call Duration Log etc Web Link and Content, Reconstruct, Files Upload and Download, Video Streaming (Youtube,etc.) HTTPS Decoding and Reconstruction with Username and Password available (with self-signed certificate or Sub-CA Certificate available by other party) FTP Upload/Download, P2P File Sharing (BitTorrent, etc) VoIP (SIP with G.711, G.723, G.729 and ilbg Codecs) can be customized and included; this module is optional Support with Play Back Facebook, twitter, Google+, Linkedin, Instagram CDR of Dropbox, Evernote, Google location service, GIS data from Facebook Gmail, Facebook, etc Raw Data (in PCAP format) and Reconstructed Data (ISO format) Yes, WLAN Raw Data (in PCAP format) can be imported Local Machine GUI access Built-in Browser for both operation and administration