secpoint portable penetrator brochure wifi recovery
Post on 14-May-2015
589 Views
Preview:
DESCRIPTION
TRANSCRIPT
Portable Penetration TestingWiFi Recovery Crack WEP WPA & WPA2 Vulnerability Scanning Wireless Security Assessment Tool
The Portable Penetrator
www.secpoint.com
Portable penetration testing and wireless auditingThe Portable Penetrator combines the latest hacking and cracking tools that offers the most comprehensive penetration testing kit.
PREVENT HACKERS FROM ENTERING YOUR WIFI NETWORK!
“Whether you’re a security professionalor a novice, Portable Penetrator PP3000 is adevice which is a complete solution for auditingand improving the level of security of wirelessnetworks. Thanks to built-in report module youwill have all the documentation of the securityaudits you have conducted. The product has a great value for a great value for a complete solution like Portable Penetrator PP3000.”
Both 2.4 GHz and 5.8 GHz Wifi Ranges Supported
The Portable PenetratorPortable Penetration Testing
Wireless AuditingThe Portable Penetrator allows you to do real wireless WEP, WPA and WPA2 auditing. Just like an attacker would do it! It highlights any weaknesses in wireless networks and shows how these can be secured most effectively.
50,000+ Database SignaturesThe Penetrator vulnerability database consists of more than 12 years of research. The database has a total of more than 50,000+ unique remote vulnerabilities to test for. Thisdatabase is updated multiple times daily.
Launch Real Exploits and Denial of Service AttacksYou can launch real exploits to verify that an identified vulnerability is exploitable. It is also possible to launch real Denial of Service attacks to test preproduction systems for stability.
Detailed Remedies for Identified VulnerabilitiesThe Portable Penetrator comes with detailed remedies for identified vulnerabilities. This allows the user to quickly fix the indentified vulnerabilities.
Automatic Database and Firmware UpdatesThe Portable Penetrator will automa-tically download updates multiple times daily, at the users discretion, to ensure the vulnerability database is as updated as possible.
Reports BrandingBranding and personalisation of the reports and selling them as a service is allowed.
System or Network DeviceThe Portable Penetrator is designed to audit any operating system or network device. It is beneficial to audit devices in the network setup to find and rectify any vulnerabilities identified before an attacker can exploit the vulnerabilities.Pe
netr
ator
The
Port
able
Wireless Security Assessment Tool
• Wireless, WEP, WPA and WPA2 auditing
• Launch Real Exploits andDenial of Service Attacks
• Automatic Database and Firmware Updates
• Vulnerability Assessment
• 50.000+ Database Signatures
Features and Benefits
• Reports Branding
• Security Audit any Operating System and Network Device
• Detailed Remedies for Identified Vulnerabilities
• Latest Auditing Tools Included • Wireless Security Assessment Tool
www.secpoint.com
Prevent Hackers from entering your Wifi Network!
Netbook 10.1 ” Notebook 15.4 ”Height
Partner Information
PP3000
Hardened Notebook 14.1 inc
PP6000 PP7000
180W ATX Powersupply. AC / DC 90~264V full range
250W ATX Power supply. AC / DC90~264V full range
460W Redundant Power supply. AC / DC
90~264VAC full rangePower Supply
10/100/1000Ethernet interfaces
10/100/1000Ethernet interfaces
10/100/1000Ethernet interfaces
Network 10/100/1000 Mbps
YES YES YESWireless Cracking
Are you ready for the next step?
The Portable PenetratorThe Portable Penetrator Models >>
Portable Penetration TestingThe Portable Penetrator
Centralised Reporting
VulnerabilityAuditing
Automatic Crawl script
50.000+Signatures
Launch real exploits
IntelligentAuditing
Scans any OS
Finds SQL Injection Cross Site Scripting, Web Server Errors
WEP, WPA,WPA2 Auditing
DistributedAuditing
XML PDFHTML
Reports
Multiple DailyUpdates
DMZ - “demilitarized zone”
Internet
BRANCH OFFICES
DNS WWW SMTP
u
Servers
Wireless Accsess Points
Work Stations
Work Stations
IP Telephones
Printers
u
u
HEAD OFFICE
Bastion Firewall
www.secpoint.com
www.secpoint.com
Internet: www.secpoint.comE-mail: info@secpoint.com
For more information on Portable Penetrator, please visit www.secpoint.com/portable-penetrator.html
The Portable Penetrator
top related