WI-FI INTERCEPTION SYSTEM

WI-FI INTERCEPTION SYSTEM

The WiFi Monitoring System can intercept multiple targets which are connected to targeted Access Points and using same WiFi network on their mobile, tablets, desktop and laptops.

The widespread availability of Wi-Fi networks and it’s increased use by subversive elements across the world had necessitated the need for monitoring certain Wi-Fi networks by the Law Enforcement Agencies. Stratign offers Tactical WiFi Monitoring System which has been designed for the purpose of providing your national defence and intelligence agencies with the capability to intercept the traffic from social media application (i.e. Facebook, Twitter), Chat Application (Facebook Chat, YahooChat), Webmail (Gmail, YahooMail etc), Video Streaming (Youtube, dailymotion).
The WiFi Monitoring System can intercept multiple targets which are connected to targeted Access Points and using same WiFi network on their mobile, tablets, desktop and laptops. System has capability to acquire process, decode and reconstruct the traffic from all targeted devices simultaneously which are connected to the Access Point.
The operation of the system does not require deep knowledge of the WiFi network and provides an excellent platform to intelligence agencies for obtaining valuable data intelligence from both secure and unsecure WiFi networks which are used by criminals and terrorists.
f-WiFi Interception

System Features

Targets Secured & Unsecured Networks
Designed for Interception and reconstruction of IP traffic from both unsecured and secured WiFi networks.
WiFi Frequency Bands
Support 2.4 GHz or 5 GHz WiFi frequency bands.
Breaks Secured Networks
Can break WEP, WPA, WPA2 secured WiFi networks.
Independent of Firewall
Capable of working independent of firewall, antivirus and security updates.
OS Agnostic
Can intercept the traffic from target devices using different OS like Mac OSX, Windows, iOS, Android, Blackberry, Linux etc.
HTTPS Traffic
Can load the legal certificate issued by certificate certifying authorities and also has inbuilt root certificate for Intercepting and Reconstructing HTTPS Traffic.
Target’s Login Credentials
Can intercept, decode and display the Targets login credentials from the following and many more. Email: Gmail, YahooMail, Hotmail, GMX Mail, Yandex, Mail.ru, Country Specific Emails etc., Social Networking: Facebook, Twitter, LinkedIn etc., Messenger: Skype etc.
Reconstruct browsed Web Pages
Can intercept and automatically reconstruct the browsed webpages in the same language, on which it is browsed on the target system.
Intercept Chat Sessions
Can intercept chat sessions like Yahoo chat, Facebook Chat along with session related information.
Intercept Emails
Can intercept Emails sent from email client such as Outlook, Thunderbird Mail etc.
Static and Portable Deployment
Can be used for both static and portable deployment depending upon the mission requirement.
Selective Jamming
Can also be used for jamming of specific WiFi network.

Know More

Download Brochure