UTM VPN Firewall - Vulnerability Scanner - Wifi Password Pen Test
SHOP
CLOUD
VIP
Sun Sun Sun

You are here: SecPoint & IT Security News

 

Hakin9 IT Security Magazine German Review

HAKIN9 – Hard Core IT Security Magazine – Number 2/2010 (44) March/April 2010

New Portable Penetrator PP3000 Hakin9 Magazine Review.

To read the full review please click.

 

To read the review please click Hakin9 Portable Penetrator PP3000 English Review

 

 

 

 

SecPoint Portable Penetrator PP3000

Alongside the prominence of remote systems and cell phones fit for joining with them, the requirement for supplying a fitting security level emerges. To fulfill this need, SecPoint has offered another gadget - Portable Penetrator PP3000. Its employment is to dissect and check the level of any remote system you choose.The arrangement has instruments for examining remote systems in your surroundings and serves to perform complete reviews of filtered systems. It has the capacity split security keys scrambled with WEP, WPA or WPA2. It oversees to discover crevices in security, as well as gives all important information expected to fill these holes. All the data with respect to the level of security, its powerless focuses and proposed arrangements of specific issues is displayed in a report, which supplies significant data for those with specialized information as well as those without it.

The Portable Penetrator PP3000 is in light of a Dell Inspiron Mini 10v netbook and remote connector outfitted with a fairly expansive recieving wire and USB port. A little netbook accompanies 10.1" screen and a battery equipped for 5-6 hour work and an Intel Atom stage which gives acceptable solace of work and a completely unconstrained portability. The tried example had a Linux framework introduced. The beforehand said remote connector's recieving wire has a quality of 8dBi and the connector itself can be mounted to the back of the screen utilizing a basic additionally successful sucker. The connector is associated with the PC by a supplied USB link.

The preinstalled programming for the Portable Penetrator is program based. The client interface was intended to present all significant data in a clear way. In the wake of finishing a short setup transform in which you set your system parameters and register your product, you can begin the checking procedure. The gadget is equipped for finding all systems in extent - particularly those covered up and also those with an exceptionally powerless sign. It shows nitty gritty data about these systems, for example, the name, kind of encryption, sign quality and the quantity of joined clients.

When you have picked the system to work with, the time it now, time to confirm its security level. Contingent upon the kind of encryption and the quantity of joined clients you can pick an alternate technique for assault. In the event that you pick a lexicon based system you can discover even such outlandish dialects like Iranian or Vietnamese. The supplied lexicons are an exceptionally solid purpose of the arrangement. The advancement of breaking the security key of a picked system can be effectively checked. The information comprises of such parameters like the rate of key era, right now tried key or number of keys officially tried. The pace of key era intensely relies on upon the utilized stage.

With our tried specimen with Dual center Atom with 1.6 GHz it was 250 keys every second for a WPA encoded system. In the event that the secret word is found it is displayed to the client. The created keys use alphanumeric characters so keys with diverse mix of letters and numbers can likewise be found. The techniques utilized for remote system breaking are in view of those utilized by normal programmers, using such procedures as a foreswearing of administration for instance. Security experts will unquestionably admire the capacity of picking distinctive sorts of assaults and also a tremendous database of adventures and production line sent word references. For the individuals who have less experience the maker supplied nitty gritty aides on the best way to utilize the item. At the point when associated with the Internet the Portable Penetrator can simply stay avant-garde by upgrading its firmware and mark databases.

Whether you're a security expert or a beginner, Portable Penetrator PP3000 is a gadget which is a complete answer for evaluating and enhancing the level of security of any remote system. Because of implicit report module you will have all the documentation of the security reviews you have directed. The item costs 999 EUR, which for a complete arrangement like Portable Penetrator PP3000 is an incredible quality for cash.

 

 

UTM Firewall - Vulnerability Scanner Free Security Resources
Free Vulnerability Scan

Free Security Webinar

IT Security Compliance with
hipaa compliance, cve compliance
WiFi Password Finder Awards & Reviews
Best IT Security Company
Best IT Security Products

Encyclopedia | Link Policy | Privacy Statement | Resources | Sitemap | User Policy

SecPoint® © Copyright 1999-2015
US Toll Free: +1-855-489-3724 - EU Toll Free: +44-808-101-2272