SecPoint Portable Penetrator Brochure Wifi Recovery


Published on
wifi password recovery wep wpa wpa2 wps cracking recovery made easy

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

SecPoint Portable Penetrator Brochure Wifi Recovery

  1. 1. The Portable Penetrator Portable Penetration Testing WiFi Recovery Crack WEP WPA & WPA2 Vulnerability Scanning Wireless Security Assessment Tool “Whether you’re a security professional or a novice, Portable Penetrator PP3000 is a device which is a complete solution for auditing and improving the level of security of wireless networks. Thanks to built-in report module you will have all the documentation of the security audits you have conducted. The product has a great value for a great value for a complete solution like Portable Penetrator PP3000.”Both 2.4 GHz and 5.8 GHz Wifi Ranges SupportedPREVENT HACKERS FROM ENTERINGYOUR WIFI NETWORK!Portable penetration testing and wireless auditingThe Portable Penetrator combines the latest hacking and cracking tools that offers themost comprehensive penetration testing kit.
  2. 2. The Portable Penetrator Portable Penetration Testing Wireless Auditing Launch Real Exploits and Denial The Portable Penetrator allows you to of Service Attacks do real wireless WEP, WPA and WPA2 You can launch real exploits to verify auditing. Just like an attacker would that an identified vulnerability is do it! It highlights any weaknesses exploitable. It is also possible to in wireless networks and shows how launch real Denial of Service attacks these can be secured most effectively. to test preproduction systems for stability. 50,000+ Database Signatures The Penetrator vulnerability database consists of more than 12 years of Wireless Security research. The database has a total of more than 50,000+ unique remote vulnerabilities to test for. This database is updated multiple times Assessment Tool daily. Detailed Remedies for Identified Vulnerabilities The Portable Penetrator comes with Penetrator Reports Branding Branding and personalisation of the detailed remedies for identified reports and selling them as a service vulnerabilities. This allows the user to is allowed. quickly fix the indentified vulnerabilities.The Portable System or Network Device The Portable Penetrator is designed Automatic Database and to audit any operating system or Firmware Updates network device. It is beneficial to The Portable Penetrator will automa- audit devices in the network setup tically download updates multiple to find and rectify any vulnerabilities times daily, at the users discretion, to identified before an attacker can exploit ensure the vulnerability database is as the vulnerabilities. updated as possible.
  3. 3. Features and Benefits• Wireless, WEP, WPA and WPA2 auditing • Reports Branding• Launch Real Exploits and • Security Audit any Operating System andDenial of Service Attacks Network Device• Automatic Database and • Detailed Remedies for IdentifiedFirmware Updates Vulnerabilities• Vulnerability Assessment • Latest Auditing Tools Included• 50.000+ Database Signatures • Wireless Security Assessment ToolPrevent Hackers from entering your Wifi Network!
  4. 4. The Portable Penetrator Portable Penetration Testing The Portable Penetrator The Portable Penetrator Models >> Are you ready for the next step? PP3000 PP6000 PP7000 Height Netbook 10.1 ” Notebook 15.4 ” Hardened Notebook 14.1 inc 460W Redundant Power supply. 180W ATX Power 250W ATX Power supply. AC / DC AC / DC Power Supply supply. AC / DC 90~264V full range 90~264V full range 90~264VAC full range Network 10/100/1000 10/100/1000 10/100/1000 10/100/1000 Mbps Ethernet interfaces Ethernet interfaces Ethernet interfaces Wireless Cracking YES YES YES The Portable Penetrator Centralised Reporting Vulnerability 50.000+ Intelligent Finds SQL Injection WEP, WPA, Distributed XML PDF Multiple Daily Auditing Signatures Auditing Cross Site Scripting, WPA2 Auditing Auditing HTML Updates Automatic Crawl Launch real exploits Scans any OS Web Server Errors Reports script u Work Stations Wireless Accsess Points Servers u u Bastion Firewall Printers Internet IP Telephones DNS WWW SMTP Work Stations BRANCH OFFICES HEAD OFFICE DMZ - “demilitarized zone”Internet: Partner InformationE-mail: www.secpoint.comFor more information on Portable Penetrator, please