HackHunter alerts your staff when the WiFi they are using is being hacked, wherever they are. HackHunter is a portable, personal Intrusion Detection System for WiFi.
Your staff can take it with them wherever they go to protect against WiFi hacking, when they are:
- Working in the office or from home
- At the airport or hotel
- At a conference or lunch meeting.
HackHunter uses an inbuilt algorithm specifically designed to detect the signatures and behaviour of hacking tools and tells your staff, in real time, when an attack occurs.
The three main types of WiFi hacks that are a precursor to broader attacks:
Denial of Service Attack – devices are disconnected from the network and not allowed to re-connect
Password Crack – handshake packets are induced, captured and cracked offline using brute force tools
Man-in-the-Middle – trusted networks are mimicked and users use the fake network in error.
Note: We are always researching new attack methods and tools to ensure HackHunter stays ahead.
HackHunter passively monitors the selected WiFi channel, and optionally a specific access point, displaying the current traffic while searching for WiFi packets with specific attack signatures. If an attack signature is detected, a visual and audio alert is generated.
HackHunter can also be programmed to perform actions when an attack is detected, such as turning on a VPN, turning WiFi off or switching to cell.
HackHunter passes real-time attack information to Dashboard Management Software, SIEM and syslog solutions for further analysis. It also monitors the received signal strength, allowing the hacker to be physically tracked.
With the addition of location data, a WiFi Hack Map showing WiFi danger spots globally will be available. This information can be used to inform decisions such as where to open a new office or which Hotel staff should use.
Low-level hardware and software features are used to intercept and pull apart WiFi packets to examine them for hacker signatures and behaviour.
This action requires “promiscuous mode” which requires special hardware and drivers that are not available in typical mobile phones and laptops.
Attack information is displayed on the device and passed to our cloud server infrastructure to support monitoring feeds and web services.