ND-IM005 Standard Wi-Fi Interception System
ND-IM005 Standard Wi-Fi Interception System is specifically designed and developed for law enforcement agency to monitor and identify information leaks in classified premises where access to Wi-Fi networks is available.
The system consists of 2 main modules:
- Cracking Module (Penetrator)
- Interception Module (Interceptor)
The system can work either in passive or active monitoring modes. In monitoring mode, the operator can see ALL network users (working, connected, or disconnected) within system coverage. The operator can create database of MAC addresses, signal levels, and all access points of users.
The system is able to scan for Wi-Fi stations and access points, capture 802.11a, 802.11b, 802.11g and 802.11n WLAN traffic, crack WEP or WPA/WPA2 passwords, display detailed per-node and per-channel statistics and IP connections statistics, and reconstruct HTTPs contents.
This product is available in our Sample Promotion Program with extremely favorable price now.
|Functions||Simultaneous monitoring of wi-fi networks||Up to 4|
|Frequency band||2.4GHz, 5GHz|
|Wi-Fi security protocols||WEP, WPA-Personal, WPA2-Personal, WPA2-PSK|
|Jamming of wi-fi network||Yes|
|Interception of HTTPS/SSL Sessions||Yes (MITM)|
|Coverage||Indoor||Up to 50 meters|
|Outdoor||Up to 100 meters and more|
|Internet content reconstruction||IMAP, POP3, SMTP|
|Webmail||Yahoo Mail, Gmail, Windows Live Hotmail, etc.|
|IM or Chat||Facebook Messager(Web), Yahoo Messenger, Gtalk, Yahoo Web Chat, Skype Voice Call Duration Log, etc.|
|HTTP||Web Link and Content, Reconstruct, Files Upload and Download, Video Streaming (Youtube, etc.)|
|HTTPS/SSL Interception||HTTPS decoding and reconstruction with username and password available (with self-signed certificate or Sub-CA certificate available by other party)|
|File Transfer||FTP Upload/Download, P2P File Sharing (BitTorrent, etc)|
|VoIP||VoIP (SIP with G.711, G.723, G.729 and iLBG Codecs) can be customized and included (this module is optional)|
|Telnet||Support with Play Back|
|Social Media||Facebook, twitter, Google+, Linkedin, etc.|
|Cloud Service||CDR of Dropbox, Evernote|
|Geo-location Service||Google Location Service, GIS Data from Facebook|
Wi-Fi & Lawful Interception System/WiFi Monitoring System
• Scanning for Wi-Fi stations and access points
• Capturing 802.11a, 802.11b, 802.11g and 802.11n WLAN traffic
• WEP or WPA/WPA2 keys specification to decrypt encrypted datas
• Display of detailed per-node and per-channel statistics
• Display of detailed IP connections statistics: IP addresses, ports, sessions, etc.
• Reconstruction of TCP sessions
|• Wi-Fi Interceptor||x 1|
|• Wi-Fi Cracking||x 1 (or several)|
|• Wireless Adaptors||x 2|
|• Power Adaptor||x 1|
|• Set of Cables||x 1|
|• Transportation Case||x 1|
|• User Manual||x 1|