How HACKHUNTER Works

Portable

HackHunter alerts your staff when the WiFi they are using is being hacked, wherever they are. HackHunter is a portable, personal Intrusion Detection System for WiFi.

Your staff can take it with them wherever they go to protect against WiFi hacking, when they are:

  • Working in the office or from home
  • At the airport or hotel
  • At a conference or lunch meeting.

Detect

HackHunter uses an inbuilt algorithm specifically designed to detect the signatures and behaviour of hacking tools and tells your staff, in real time, when an attack occurs.

The three main types of WiFi hacks that are often precursors to broader attacks:

  • Denial of Service Attack – devices are disconnected from the network and not allowed to re-connect
  • Password Crack – handshake packets are induced, captured and cracked offline using brute force tools
  • Person-in-the-Middle – trusted networks are mimicked and users use the fake network in error.

Note: We are always researching new attack methods and tools to ensure HackHunter stays ahead.

Monitor

HackHunter passively monitors access points and WiFi traffic, searching for specific attack signatures. If an attack signature is detected, a visual and audio alert is generated.

HackHunter can also be programmed to perform actions when an attack is detected, such as turning on a VPN, turning WiFi off or switching to cell.

HackHunter passes real-time attack information to Dashboard Management Software, SIEM and syslog solutions for further analysis. It also monitors the received signal strength, allowing the hacker to be physically tracked.

With the addition of location data, a WiFi Hack Map showing WiFi danger spots globally will be available. This information can be used to inform decisions such as where to open a new office or which Hotel staff should use.

Hardware and Software

Low-level hardware and software features are used to intercept and pull apart WiFi packets to examine them for hacker signatures and behaviour.

This action requires “monitor mode” which requires special hardware and drivers that are not available in typical mobile phones and laptops.

Attack information is displayed on the device and passed to our cloud server infrastructure to support monitoring feeds and web services.

Features

Audio Alerts

Audio alert for attacks (ON/OFF)

Hacker Tracker

Track down the hacker using the inbuilt signal strength indicator

Access Point Filtering

Set the BSSID filter to only monitor attacks against a specific access point

Dashboard Support

Tracking and forensics of real-time attack data with configurable alerts. Easily integrated into SIEM, Syslog and other systems with scripting capability eg. trigger shutdown of WiFi, activate VPN, notify support etc.

LED Alerts

3 level LED alert for attacks (Red, Blue, Green)

Signal Optimiser

Use the inbuilt signal strength tracker to find the best location to get good WiFi signal

Rogue Access Point

Detect Rogue Access Points before connecting

Note

  • WiFi monitoring currently restricted to 2.4GHz spectrum
  • Dashboard Support available for Enterprise solutions only

Packet Monitor

Monitor normal and attack packet volumes on the selected channel

WiFi Hack Map

View a map showing real-time hacking behaviour by location (coming soon)

SD Card Packet Capture

Capture packets to the built in SD card as ‘.cap’ files for later analysis using wireshark or other network tools