The Portable Penetrator Portable Penetration Testing ...
The Portable Penetrator Portable Penet...
of 2

Portable penetrator datasheet penetrator datasheet
Published on: Mar 4, 2016
Published in: Business      Technology      

Transcripts - Portable penetrator datasheet

  • 1. The Portable Penetrator Portable Penetration Testing Both 2.4 GHz and 5.8 GHz Wifi Ranges Supported Prevent Hackers from entering your Wifi netWork! Portable penetration testing and wireless auditing√ easy step by step guide The Portable Penetrator combines the latest hacking and cracking tools how to secure your Wifi that offers the most comprehensive penetration testing kit. network Wireless Auditing System or Network Device√ Wireless WeP, WPa and The Portable Penetrator allows you to do real The Portable Penetrator is designed to audit any WPa2 auditing wireless WEP, WPA and WPA2 auditing. Just operating system or network device. It is benefi- like an attacker would do it! It highlights any cial to audit devices in the network setup to find√ user friendly interface weaknesses in wireless networks and shows and rectify any vulnerabilities identified before how these can be secured most effectively. an attacker can exploit the vulnerabilities.√ Latest auditing tools included 50,000+ Database Signatures Detailed Remedies for Identified Vulner- The Penetrator vulnerability database abilities√ 50.000+ Database consists of more than 12 years of research. The Portable Penetrator comes with detailed signatures The database contains more then 50000+ remedies for identified vulnerabilities. unique vulnerabilities ready to identify any This allows the user to quickly fix the√ Launch real exploits and vulnerability in your network. This database is indentified vulnerabilities. Denial of service attacks updated multiple times daily.√ vulnerability scanning Launch Real Exploits and Denial of Automatic Database and Firmware√ vulnerability assessment Service Attacks Updates You can launch real exploits to verify that an The Portable Penetrator will automatically√ reports Branding identified vulnerability is exploitable. It is download updates multiple times daily, at the also possible to launch real Denial of Service user’s discretion, to ensure the vulnerability√ security audit of any attacks to test preproduction systems for database is as updated as possible. operating system stability. and network Device Reports Branding√ Detailed remedies for Branding and personalisation of the reports identified vulnerabilities and selling them as a service is allowed.√ automatic Database and Whether you’re a security professional or a novice, Portable Penetra- firmware updates tor PP3000 is a device which is a complete solution for auditing and improving the level of security of wireless networks. Thanks to built-√ interface support videos in report module you will have all the documentation of the security audits you have conducted. The product has a great value for a great√ Wireless security value for a complete solution like Portable Penetrator PP3000. assessment tool
  • 2. The Portable Penetrator Portable Penetration TestingSpecifications Portable Penetrator Portable Penetrator Portable Penetrator PP3000 PP6000 PP7000 Height Netbook 10.1 ” Notebook 15.4 ” Hardened Notebook 14.1 inc 180W ATX Power supply. AC / DC 250W ATX Power supply. AC / DC 460W Redundant Power supply. AC / DC Power supply 90~264V full range 90~264V full range 90~264VAC full range Operating : 0°C to 40°C Operating : 0°C to 40°C Operating : 0°C to 40°C environment temperatures Storage: -20°C to 80°C Storage: -20°C to 80°C Storage: -20°C to 80°C 10/100/1000 10/100/1000 10/100/1000 network 10/100/1000 mbps Ethernet interfaces Ethernet interfaces Ethernet interfaces 50.000+Database signatures √ √ √ Launch real exploits & Denial of service √ √ √ allowed to change iP addresses √ √ √ Distributed security auditing √ √ √ automatic database and software updates √ √ √ features security audit features finds cross site scripting, automatic update √ Vulnerability assessment sQL injection and Web errors √ Automatic daily database updates √ 50.000+ signatures √ Automatic web crawling engine identifies √ Automatic firmware updates with new √ Unlimited auditing known and unknown files on websites features and functionality √ out of the box Works √ Cross Site Scripting Finds √ Centralized update point √ Advanced auditing options √ SQL Injection Finds √ Automatic alerts when database is expired √ Launch real exploits √ Web Errors Finds √ Option to upload updates manually via the √ any OS Audit interface √ Automatic web crawl script √ independent interface OS scheduled auditing √ top 20 audit SANS √ Automatic scheduled auditing scalable and upgradeable √ Automatic alert about new identified √ units can be upgraded for network All security vulnerabilities growth via a software license easy-to-understand reporting √ Shows new vulnerabilities discovered √ Investment protection √ PDF and HTML reports XML and compares them with old records to show √ Reports branding allowed the progress in the security level √ Option for syslog remote logging support and maintenance √ year database subscription included One security audit configuration √ support included Full Wireless auditing √ Virtual host auditing √ Option for instant replacement hardware √ WEP networks Audit √ specific ports Audit √ Web-based User Interface (https) √ Audit WPA and WPA2 networks √ specific web directories Audit √ setup wizard Quick √ Test the security strength of your √ an email when an audit is finished Get √ Configuration backup/restore wireless networks √ alert and logging via syslog Email √ Identify hidden networks √ Build-in diagnostic function √ 2.4 GHz & 5 GHz Penetration testing √ Years World Wide Support 2 √ 8 dBi Antenna Launch real exploits for Windows®, Unix®, √ Routers, Firewalls and more. √ Launch real denial of service attacks Partner Information Internet: E-mail: For more information on Portable Penetrator, please visit

Related Documents