How HACKHUNTER Works

Portable

HackHunter alerts your staff when the WiFi they are using is being hacked, wherever they are. HackHunter is a portable, personal Intrusion Detection System for WiFi.

Your staff can take it with them wherever they go to protect against WiFi hacking, when they are:

  • Working in the office or from home
  • At the airport or hotel
  • At a conference or lunch meeting.

Detect

HackHunter uses an inbuilt algorithm specifically designed to detect the signatures and behaviour of hacking tools and tells your staff, in real time, when an attack occurs.

The three main types of WiFi hacks that are often precursors to broader attacks:

  • Denial of Service Attack – devices are disconnected from the network and not allowed to re-connect
  • Password Crack – handshake packets are induced, captured and cracked offline using brute force tools
  • Person-in-the-Middle – trusted networks are mimicked and users use the fake network in error.

Note: We are always researching new attack methods and tools to ensure HackHunter stays ahead.

Monitor

HackHunter passively monitors access points and WiFi traffic, searching for specific attack signatures. If an attack signature is detected, a visual and audio alert is generated.

HackHunter can also be programmed to perform actions when an attack is detected, such as turning on a VPN, turning WiFi off or switching to cell.

HackHunter passes real-time attack information to Dashboard Management Software, SIEM and syslog solutions for further analysis. It also monitors the received signal strength, allowing the hacker to be physically tracked.

With the addition of location data, a WiFi Hack Map showing WiFi danger spots globally will be available. This information can be used to inform decisions such as where to open a new office or which Hotel staff should use.

Hardware and Software

Low-level hardware and software features are used to intercept and pull apart WiFi packets to examine them for hacker signatures and behaviour.

This action requires “monitor mode” which requires special hardware and drivers that are not available in typical mobile phones and laptops.

Attack information is displayed on the device and passed to our cloud server infrastructure to support monitoring feeds and web services.