How easy is it to Hack WiFi?

Most WiFi routers and network connected devices are still susceptible to the three main types of WiFi attacks and VPNs cannot always protect against an attack.

HackHunter detects the key signatures of these attacks and alerts you in real-time – it’s even capable of determining the attacking tool being used and its location.

The three main WiFi attack types:

Denial of Service (DOS)

Hardware and software tools that are easily concealed are available for a few dollars that can disconnect one or more devices from the network.

The WiFi network will be rendered inoperable for as long as the DOS attack continues.

Password Cracking

Using common hacking tools such as those bundled with Kali Linux, handshake packets can be intercepted and saved offline to crack using brute force tools.

Strong passwords will help, but more sophisticated cracking tools and more powerful processors are making the task easier for hackers.


Hacking tools such as the WiFi Pineapple can listen to connection requests from your mobile phone or other WiFi connected device and pretend to be your home WiFi network or other trusted networks.

With the right hacking configuration and typical default device settings, your device will automatically connect to the Rogue or Fake Access Point, allowing the attacker to control your connection.



HackHunter alerts your staff when the WiFi they are using is being hacked, wherever they are. HackHunter is a portable, personal Intrusion Detection System for WiFi.

Your staff can take it with them wherever they go to protect against WiFi hacking, when they are:

  • Working in the office or from home
  • At the airport or hotel
  • At a conference or lunch meeting.


HackHunter uses an inbuilt algorithm specifically designed to detect the signatures and behaviour of hacking tools and tells your staff, in real time, when an attack occurs.

The three main types of WiFi hacks that are often precursors to broader attacks:

  • Denial of Service Attack – devices are disconnected from the network and not allowed to re-connect
  • Password Crack – handshake packets are induced, captured and cracked offline using brute force tools
  • Person-in-the-Middle – trusted networks are mimicked and users use the fake network in error.

Note: We are always researching new attack methods and tools to ensure HackHunter stays ahead.


HackHunter passively monitors access points and WiFi traffic, searching for specific attack signatures. If an attack signature is detected, a visual and audio alert is generated.

HackHunter can also be programmed to perform actions when an attack is detected, such as turning on a VPN, turning WiFi off or switching to cell.

HackHunter passes real-time attack information to Dashboard Management Software, SIEM and syslog solutions for further analysis. It also monitors the received signal strength, allowing the hacker to be physically tracked.

With the addition of location data, a WiFi Hack Map showing WiFi danger spots globally will be available. This information can be used to inform decisions such as where to open a new office or which Hotel staff should use.

Hardware and Software

Low-level hardware and software features are used to intercept and pull apart WiFi packets to examine them for hacker signatures and behaviour.

This action requires “monitor mode” which requires special hardware and drivers that are not available in typical mobile phones and laptops.

Attack information is displayed on the device and passed to our cloud server infrastructure to support monitoring feeds and web services.


Meeting Rooms and the Executive Floor

Highly confidential information is shared in Meeting Rooms and on the Executive Floor.

HackHunter’s power-over-ethernet (POE) device can be permanently installed to monitor constantly.

Any rogue access points or hacking behavior will be identified and reported immediately.

Mobile Staff

When high-value staff are outside your environment, how do you know the access points they use are safe? Unfortunately VPNs cannot cover all the gaps.

HackHunter’s portable device can be taken anywhere – working from home, travelling, at a conference or lunch meeting.

When an attack is detected HackHunter can alert staff with a visual alarm (red light), audible alarm (buzzer), SMS or email (in any combination).

HackHunter can also turn WiFi off, turn a VPN on, switch to cell network etc. when an attack is detected.

WiFi Hack Map

Knowing where WiFi attacks are occurring decreases risk as these areas can be avoided.

The WiFi Hack Map identifies danger spots to avoid globally when planning the location of a new office, booking a Hotel etc.

Cyber Security Awareness

Educate your staff about cyber risks for corporate data, both inside and outside the organization.

HackHunter is a tangible take-away which reminds staff to be mindful when using WiFi networks outside the office and gives them a tool to protect themselves from WiFi hacking.

About Us

Serinus Security specialises in personal wireless hacking detection products.

HackHunter is a portable device that detects WiFi hacking behaviour and alerts you, in real time, when the WiFi you are using is being hacked.

If you’d like to keep up to date with the latest news, please register below.