Passive and active radio monitoring of IEEE 802.11 a b/g/n/ac communication networks;
Overcoming of standard WEP, WPA, WPA2, WPA3 cryptographic protection based on recorded information traffic on a distributed computing system;
Compilation of list of Wi-Fi clients with obtaining of IMSI, IMEI parameters (if service supported by subscriber terminal;
Monitoring and compilation of a list of Wi-Fi network clients;
Control of the presence in the traffic of clients of data on the use of known web resources and applications, interception of HTTP logins and passwords in traffic;
Creation of your own access point, imitation of an existing point, as well as passive monitoring;
Displaying found Wi-Fi points on the map and creating a database of collected parameters;
Determination of the location of the specified access points and clients by sequential approximation by the maximum signal level ("fox hunting" method);
Execution of a "de-authentication" attack on selected targets, disruption of Wi-Fi connection;
Creation of a database of targets for monitoring;
Interception of Handshake, PMKID;
An up-to-date set of attacks WPS(brute force, Pixie Dust, EmptyPin), WPA2(CRACK, kr00k), gaining remote access to Windows (BlueKeep, BlueKeep 2);
Analysis for vulnerabilities in the local network (both your own and the attacked points), collecting information about open ports on devices and running services;
The ability to create interference (Unstable network operation) both for one user or point, and at all point
Demo or training are carried out in our premises or in the client's country, subject to an official invitation from government agencies.
We provide online demos only to existing clients with whom we have successful experience of cooperation.
We do not provide free training. If you are not familiar with the subject, links to training courses are
here.