How easy is it to Hack WiFi?

Most WiFi routers and network connected devices are still susceptible to the three main types of WiFi attacks and VPNs cannot always protect against an attack.

HackHunter detects the key signatures of these attacks and alerts you in real-time – it’s even capable of determining the attacking tool being used and its location.

The three main WiFi attack types:

Denial of Service (DOS)

Hardware and software tools that are easily concealed are available for a few dollars that can disconnect one or more devices from the network.

The WiFi network will be rendered inoperable for as long as the DOS attack continues.

Password Cracking

Using common hacking tools such as those bundled with Kali Linux, handshake packets can be intercepted and saved offline to crack using brute force tools.

Strong passwords will help, but more sophisticated cracking tools and more powerful processors are making the task easier for hackers.

Man-in-the-Middle

Hacking tools such as the WiFi Pineapple can listen to connection requests from your mobile phone or other WiFi connected device and pretend to be your home WiFi network or other trusted networks.

With the right hacking configuration and typical default device settings, your device will automatically connect to the Rogue or Fake Access Point, allowing the attacker to control your connection.

How HACKHUNTER Works

Portable

HackHunter alerts your staff when the WiFi they are using is being hacked, wherever they are. HackHunter is a portable, personal Intrusion Detection System for WiFi.

Your staff can take it with them wherever they go to protect against WiFi hacking, when they are:
- Working in the office or from home
- At the airport or hotel
- At a conference or lunch meeting.

Detect

HackHunter uses an inbuilt algorithm specifically designed to detect the signatures and behaviour of hacking tools and tells your staff, in real time, when an attack occurs.

The three main types of WiFi hacks that are a precursor to broader attacks:
Denial of Service Attack – devices are disconnected from the network and not allowed to re-connect
Password Crack – handshake packets are induced, captured and cracked offline using brute force tools
Man-in-the-Middle – trusted networks are mimicked and users use the fake network in error.

Note: We are always researching new attack methods and tools to ensure HackHunter stays ahead.

Monitor

HackHunter passively monitors the selected WiFi channel, and optionally a specific access point, displaying the current traffic while searching for WiFi packets with specific attack signatures. If an attack signature is detected, a visual and audio alert is generated.

HackHunter can also be programmed to perform actions when an attack is detected, such as turning on a VPN, turning WiFi off or switching to cell.

HackHunter passes real-time attack information to Dashboard Management Software, SIEM and syslog solutions for further analysis. It also monitors the received signal strength, allowing the hacker to be physically tracked.

With the addition of location data, a WiFi Hack Map showing WiFi danger spots globally will be available. This information can be used to inform decisions such as where to open a new office or which Hotel staff should use.

Hardware and Software

Low-level hardware and software features are used to intercept and pull apart WiFi packets to examine them for hacker signatures and behaviour.

This action requires “promiscuous mode” which requires special hardware and drivers that are not available in typical mobile phones and laptops.

Attack information is displayed on the device and passed to our cloud server infrastructure to support monitoring feeds and web services.

HACKHUNTER IN ACTION

Meeting Rooms and the Executive Floor

Highly confidential information is shared in Meeting Rooms and on the Executive Floor.

HackHunter’s power-over-ethernet (POE) device can be permanently installed to monitor constantly.

Any rogue access points or hacking behavior will be identified and reported immediately.

Mobile Staff

When high-value staff are outside your environment, how do you know the access points they use are safe? Unfortunately VPNs cannot cover all the gaps.

HackHunter’s portable device can be taken anywhere – working from home, travelling, at a conference or lunch meeting.

When an attack is detected HackHunter can alert staff with a visual alarm (red light), audible alarm (buzzer), SMS or email (in any combination).

HackHunter can also turn WiFi off, turn a VPN on, switch to cell network etc. when an attack is detected.

WiFi Hack Map

Knowing where WiFi attacks are occurring decreases risk as these areas can be avoided.

The WiFi Hack Map identifies danger spots to avoid globally when planning the location of a new office, booking a Hotel etc.

Cyber Security Awareness

Educate your staff about cyber risks for corporate data, both inside and outside the organization.

HackHunter is a tangible take-away which reminds staff to be mindful when using WiFi networks outside the office and gives them a tool to protect themselves from WiFi hacking.

About Us

Serinus Security specialises in personal wireless hacking detection products.

HackHunter is a portable device that detects WiFi hacking behaviour and alerts you, in real time, when the WiFi you are using is being hacked.

If you’d like to keep up to date with the latest news, please register below.