Wifi Password Recovery - UTM - Vulnerability Scanning

WEB SHOP
CLOUD SCAN
VIP
Sun Sun Sun

You are here: Products > Portable Penetrator

PORTABLE PENETRATOR™ WiFi Password Software - WPA - WPA2 - WPS Cracker

With Portable Penetrator you can recover Wifi Passwords for WEP, WPA, WPA2, and WPS.
 
This way you can secure your wifi network and make sure attackers can not break in.
 
Most powerfully available Wi-Fi Security Recovery Software.
 
Reveal Wi-Fi Passwords from Access Points for WEP WPA WPA2 WPS Encryption.
 
No experience necessary. Easy to do.

Runs on Windows 7 / Windows 8.1 / Mac OS X.

Powerfully USB Plug N Play Wi-Fi Adapter 1000 mW with 8 dBi antenna for best range.
 
Allows extended range options for even bigger antenna capability.
 
Find out if your Wi-Fi network has already been compromised.
 
It contains clear solutions how to fully secure your Wi-Fi network.
Personalize the PDF Reporting upload your own logo, name and watermark. 
 
 

wpa cracker

  

 wifi cracker wifi cracker

Easily Recover Wifi Keys WEP, WPA, WPA2, WPS - Real WPA Cracker

It comes as software you can run from Windows 7, Mac OS X, Linux or VMware ESXi.

Wifi Security Software - Wireless Security Assessment Tool

Prevent hackers from entering your Wifi Networks by doing wpa cracking!
Portable Penetrator Solves all your Wi-Fi security vulnerabilities. Secure your Wi-Fi networks today!

wpa crack Portable Penetrator Wifi Software Brochure  wpa crack Portable Penetrator Wifi Software Datasheet

Click for a sample Vulnerability Scan Report

wifi cracker Security Audit your Wi-Fi Network wifi password cracker Secure your Wi-Fi Network
wifi cracker Automatic  Vulnerability Scanning wifi password cracker Real WEP Cracking
wifi cracker WPA Cracker WPA2 Cracker wifi password cracker Best Wifi Cracking
wifi cracker WPS Cracking,wireless hack wifi cracker WEP WPA WPA2 Recovery
wifi cracker WPS Password Recovery             wifi password cracker WPA WPA2 Recovery
   
wifi cracker Vulnerability Scanning wifi password cracker Vulnerability Management
wifi password cracker Wifi Unlocker  wifi password cracker WPA Crack Solution

  

Is your wifi network secure? 

With Portable Penetrator ultimate Wireless Password Breaker you can find out if your Wifi networks are wide open to attackers!  

SecPoint delivers the best Wifi auditing products with vulnerability scanning capability.

Portable Penetrator - WiFi Security Testing and Vulnerability Scanning

VAPT - Vulnerability Assessment & Penetration Testing

Joomla Security Scan, Joomla Vulnerability Checker.

Do real wireless hack of your wifi network in order to secure it.

Prevent Hackers from entering your Wifi Networks and steal sensitive information! 

Do real WPA Cracking - Wifi Password Cracking.

SecPoint Portable Penetrator Presentation Videos 

SecPoint Portable Penetrator Technical Videos 

Portable Penetrator WPA Cracker Software version

You can also deploy the Portable Penetrator Wifi Auditor as a MS HyperV or VMware ESX, VMware Player edition.

Full Scanning of vulnerabilities in: Wordpress, Drupal, Joomla,Magento,Shopify,Umbraco.

Do you know if your installation is wrongly configured or have applied the latest patches?

Full scanning included in Penetrator, Cloud Penetrator and Portable Penetrator.

SecPoint Portable Penetrator

The SecPoint Portable Penetrator is more than just the portable version of the SecPoint Penetrator. More to the point, while it is "mobile" and "compact" as an appliance, the "portable" part of its name comes from the fact that it deals with scanning for vulnerabilities in portable devices, particularly their Wi-Fi connections and safety protocols.

The SecPoint Portable Penetrator is the Penetrator variant of SecPoint that's capable of improving the security of portable devices, specifically when it comes to Wi-Fi protection (because a lot of mobile phones, computers, and gadgets use Wi-Fi, such that it's the main avenue of attack for most hackers out there).

In fact, the latest version of the Portable Penetrator features a Wi-Fi password recovery system that will ensure that you can access your Wi-Fi even though a hacker has breached it and blocked you from access. While you have the Portable Penetrator around, you'll always be assured of worry-free, hacker-free secure Wi-Fi networks that safeguard your personal information from prying and curious eyes.

No matter what Wi-Fi encryption technology you're using... WPS, WPA2, WPA, and even the outdated WEP... you can rest assured that the Portable Penetrator vulnerability scanner will be there to keep you from falling victim to all the cyber criminals of the world. In essence, before you can make use of the SecPoint Protector to shield and patch up your mobile network from nefarious net ne'er-do-wells and cyberspace invaders, it's only par for the course for you to have the Portable Penetrator on hand to penetrate your system for you before some other hacker does so. It is better that you're prepared to take on the worst that the Worldwide Web can throw at you from the get go by "hacking" your system beforehand than waiting for a black hat to do it for you.

The Portable Penetrator essentially directs and defines how you'll go about establishing your security measures in light of the vulnerabilities of the system you're using, the patches you need to acquire, the system weaknesses that aren't patched yet, and a variety of other issues. Attackers will have a harder time breaking into a system that knows how they think and has every contingency covered. The Portable Penetrator is even capable of launching real exploits so that you can better develop patches to combat those programs. Recovery of WPS, WEP, WPA, and WPA2 Wi-Fi keys is a relative breeze thanks to SecPoint's portable vulnerability scanner. Your security auditing via this device acts like a vaccine of sorts; it shows your system how a hacker might breach it so that it could better defend its vulnerabilities before attackers could take action.

Find out if your Wifi network is vulnerable to Wireless Hack. 
 
wifi password finder Crack WEP, WPA, WPA2. wifi password cracker 2.4 GHz and 5.8 GHz networks.
wifi password finder Best Vulnerability Scanning. wifi password cracker 56.000 Vulnerability Checks.
wifi password finder Appliance, VMWare & Software. hacking wifi password Real WPA Cracking WPA2 Cracking.
cracking wpa wifi Recover WPA2 WPA, WEP keys. hacking wifi password WPA crack, wifi password cracking.
cracking wpa wifi Automatic Wifi Cracker hacking wifi password VM Virtual Machine Support
cracking wpa wifi Frequency ranges: 802.11 a/b/g/n hacking wifi password Scan a wireless network And see users
cracking wpa wifi Find hidden SSIds, Vendors quietly in passive mode. hacking wifi password Automated SSID discovery
cracking wpa wifi Black hat SEO Scanning wifi password cracker Google Hack Database
cracking wpa wifi Channels wifi password cracker 1~11 wifi channels ( North America )

cracking wpa wifi Wireless Hack

cracking wpa wifi 1~13 wifi channels ( Europe)

Forum and 50+ Black List checks

wifi password cracker 1~14 wifi channel (Japan)

wifi password cracker Fast Live Chat Support

Google Safe Browsing Checks

 

SEO Poison Code Scanner

Wifi Vulnerability Assessment

Wireless Vulnerability Assessment

Wordpress Vulnerability Scanning

wifi password cracker

wpa crack

wpscrack

wifi unlocker

wpa crack solution

Secure your network for WPA cracking.

 

With Portable Penetrator you can find out if your Wifi networks are wide open to attackers!

Wireless Security Assessment Tool

Portable Penetrator offers real Wifi cracking.  Drop a Wifi Bomb, Crack                     

your WEP WPA, WPA2 encrypted networks. Find out if your wifi networks are   

secure or if they have already been breached by attackers. Easy to install  

Step by step.  Easy Wifi network security guide step by step. 

How to hack wifi Recover wifi password  

crack wifi crack wep wlan crack crack wpa 

wpa crack hack wpa  wpa cracking wps crack

how to crack wps wps wpa wpa2 crack

easy was cracking wps cracker crack wpa2 with wps 

WPS Pin Brute Force wifi protected setup

wireless protected setup

 Frequently Asked Questions

What Wifi antennas are used?

It comes with 2 external antennas for Wifi Auditing(included in the price).

A superb 2.4 GHz antenna (Alfa AWUS036h) and a dual band 2.4 GHz and 5.8 GHz antenna (AWUS052NH)

So you can do full Wifi Auditing.

This is done by performing real cracking of WEP, WPA and WPA2.

The idea is to crack your own network in order to secure it.

How does the Vulnerability Scanning License work?

It also comes with vulnerability scanning with more than remote unique.53.000 Signatures.

The license works by how many concurrent scans you can run.

So if you have an 8 IP or 16 IP license that means you can maximum scan 8 or 16 IP addresses at the same time.

However it is allowed to scan 8 IPs in the morning and then change them as you want and scan 8 others later that day.

What operating system does Portable Penetrator run?

Portable Penetrator runs on a customized Slackware Linux 2.6 when you start it up you get the login screen and you login.

After that you manage the interface from Firefox or Chrome your Choice. Please see a video of the start up here

Where can I see customer references & testimonials? 

Please visit the customer references and testimonials 

How do I buy a Portable Penetrator? 

Mainly we work via the channel.

That means we want to sell via resellers all over the world.

To locate a reseller in your country please fill out the short form at the partner locator 

If there is no reseller in your country you can mail us at sales@secpoint.com or visit our 24 hour open web shop

If you have any questions please mail us at sales@secpoint.com

Risks of not having a secure wifi:

Loss of network access, including e-mail, Web and other services that can cause business downtime.

Loss of confidential information, including passwords,customer data, intellectual property, and more

Legal liabilities associated with unauthorized users

Most of the wireless vulnerabilities are in the 802.11 protocol and within wireless access points (APs) 

The central hub like devices that allow wireless clients to connect to the network.

Wireless clients have some vulnerabilities as well.

Various fixes have come along in the recent years to address these vulnerabilities, but most of these fixes have not been applied or are not enabled by default.

 You may also have employees installing rogue WLAN equipment on your network without your knowledge.

This is the most serious threat to your wireless security and a difficult one to fight off.

Even when WLANs are hardened and all the latest patches have been applied, you still may have some serious security problems, such as 

DoS Denial of Service and man in the middle attacks (Like you have on wired networks), that will likely be around for a while. 

This is done by doing a real life cracking of your wifi network. Portable Penetrator cracks, WEP, WPA & WPA2 encrypted networks. It has advanced techniques to do it however the interface is very user friendly and you control it all by clicking with the mouse. 

Wep Cracking Wpa Cracking Wpa2 Cracking Vulnerability Scanning Wifi Security Wireless Security Assessment Tool
When it cracks the network it will tell you how it did it and show you the password.

Further more it will tell you exactly how to secure your wifi networks.

Another benefit with Portable Penetrator is that it comes with vulnerability scanning capability so you can go from network to network and scan all the IP addresses for vulnerabilities.

It will then present you a PDF report with an Executive Summary for the non technical staff and a full complete technical report for the tech department so they can quickly close all the found security vulnerabilities. Wep Crack, WPA Crack and WPA2 Crack.

The IP License means that with a 8 IP model you can maximum Scan 8 IP Addresses on the same time. However if you start 8 Scans and in 1 hour all of them are finished then you are allowed to change the IP addresses and do 8 other scans. So the only limitation is how many concurrent scans you can run at the same time.

With the 256 IP Portable Penetrator you can scan 256 IP addresses at the same time.

SecPoint Portable Penetrator Wins PC World Innovation Award

SecPoint Portable Penetrator Wins PC World Innovation Award (PDF)

Vulnerability Scanning & Management Is the Key to a strong Security Strategy


The latest automated advanced hacking tools can inflict massive damage throughout a network and even across systems all over the world in a matter of hours. Understanding and knowing the potential security vulnerabilities in your network public servers and within your system is vital to any security strategy. At any rate, Portable Penetrator has all of the features a regular Penetrator has; the only difference is it's mostly used for mobile networks.

• Includes both the SecPoint vulnerability scanner and penetration tester

• Wireless Security Assessment Tool

• It's a Plug and Play Laptop

• 50.000+ Remote Unique Vulnerability tests.

• 8 dBi Powerfully Wifi Antenna included

• No software installation is required; the SecPoint Penetrator and Portable Penetrator are ready to run on any machine

• Runs in web-based remote mode

• Scans anything with an IP address that's running TCP/IP protocols

• Discovery Mode automatically detects active IP addresses on your network

• 10/100/1000 Ethernet connectivity

• Hardened Linux OS, Wireless Hack.

• The SecPoint Penetrator and SecPoint Portable Penetrator are certified CVE-compatible by MITRE

• Automatic SecPoint Updates 4 times a day

• Detailed fix information, which includes links to patches and software upgrades

• Dynamic reporting capability with Executive Summary and a Technical Details Service that shows all the particulars of a given vulnerability

• Flexible/customizable scanning options, which includes SANS/FBI Top 20

 
Portable Penetrator, like the standard Penetrator, is a penetration testing and vulnerability management appliance developed specifically for WiFi network use that comes preloaded and ready to go as soon as you get it. It is an effective and intelligent security assessment hardware solution that every WiFi network should have.

Key Features

Wep Cracking Wpa Cracking Wpa2 Cracking

Secure your Wifi Wpa2 crack wepcrack wep cracker

Vulnerability Scanning Vulnerability Assessment

Cracking Wifi Securing Wifi

Comprehensive Strong and Unlimited Vulnerability Auditing
With its wide-ranging vulnerability sccanning and assessment  database and application of sophisticated auditing techniques, the Portable Penetrator enables you to always be one step ahead of even the most skilled and advanced hackers. Both the number of IP addresses you can scan and the big amount of security scanning you can do with this device are unlimited. Ergo, the portable Penetrator is undoubtedly the strongest & most complete portable vulnerability scanner, assessment solution in the industry at this given time. 
 

Wireless Auditing with WPA2 WEP WPA and WPS Cracking

Enhance  your wifi system's defences by understanding and know which way hackers attack. You can audit your or your clients access point security of wireless wifi networks by cracking  WPS2,WEP WPA, and WPA2 networks with our professional software, industry-standard password and encryption testing services. If your wif network is secure enough to withstand our battery of tests and examinations, then script kiddies and hackers don't stand a chance against it! As an added bonus, Portable Penetrator do provide large dictionaries with country-specific language options and WPS PIN code attacks for even more effective cracking tests.
 


SecPoint Penetrator Example Report


Easy-to-Understand Reporting


A lot of the reports that the Penetrator makes can be modified, adapted, and saved as HTML, PDF, or XML files. Security holes are normally classified as either low risk, medium risk, or high risk. These system vulnerability records include the names, particulars, and fixes of each code flaw. The report also offers a comprehensive examination on the total protection level of the inspected mobile network. Furthermore, it features an executive summary that specifically compiles graphical and text details from audit results for management-level appraisal.
 

Portable Auditing Is Flexible

Obviously, the main advantage that a Portable Penetrator has over its non-portable counterpart is its portability. Compared to a normal Penetrator that needs to be fitted into a 19" rack in order to execute a wide range of auditing solutions to your network, Portable Penetrator is as equally mobile as the networks it protects; you can rest assured that your WiFi network is safe wherever you go. Simply put, SecPoint's dedicated mobile hardware inspector allows you to audit both internal and external IP ranges with ease wherever you may be!
 

This unique and completely mobile vulnerability evaluation appliance has a limitless scope of auditing ability. For instance, it can audit a never-ending number if IP addresses to even just one particular IP address with equal effectiveness. Its distributed system audits makes all this possible, because it enables administrators to modify their devices' auditor settings to their specific requirements and stipulations.
 

Because of the mobile hardware's secure linkup to the SecPoint website, updates for the security hole appraisal device come on a day-to-day basis. This guarantees users the securest, most efficient IT security defence possible by providing them with the freshest lists and records of vulnerabilities whenever they inspect their mobile network.
 

 

 

Free Newsletter
Free Webinar Signup
Free Webinar Click here
Want to be Contacted?
Click here to Get Contacted
Related pages
Portable Penetrator Around the World
Portable Penetrator Awards
Portable Penetrator Buy Now
Portable Penetrator Extended FAQ
Portable Penetrator Extended FAQ Part2
Portable Penetrator Extended FAQ Part3
Portable Penetrator Extended FAQ Part4
Portable Penetrator Learning Videos
Portable Penetrator Models
Portable Penetrator PP2000
Portable Penetrator PP4000
Portable Penetrator PP6000
Portable Penetrator PP8000 Military
Portable Penetrator Presentation Videos
Portable Penetrator Questions FAQ
Portable Penetrator Questions FAQ Part 2
Portable Penetrator Questions FAQ Part 3
Portable Penetrator Sitemap
Portable Penetrator Technical Videos
SecPoint Portable Penetrator Wifi Password Recovery Visio Stencils
What does it cost pricing?
Wifi Antenna Arsenal for Wifi Auditing
Wifi Cracking Handbook
Wifi Password Things you need to know
Wifi Security Infographics
WiFi Unlocker Software
Wifi USB Antenna Guide
Free Security Resources
Free Vulnerability Scan
Free Wi-Fi Top 15 Security Tips
SecPoint News

> New Firewall Protector VPN 28.5 Released
Downloadable firmware ready for Firewall VPN IT Security Appliance 28.5 released...
Wednesday October 08, 2014

> Weekly IT Security News 15 September 2014
Discover more about the IT Security news 2014...
Monday September 15, 2014


SecPoint Trustpilot Score

Compatible With
Awards & Reviews
  
Featured SecPoint Customers

Featured SecPoint clients



SecPoint® © Copyright 1999-2014
US Toll Free: +1-855-489-3724 - EU Toll Free: +44-808-101-2272