Today, more and more public websites are moving to HTTPS, which means communications and data sent between the web server and client (i.e., an end user browsing the internet) are encrypted. This move towards encryption everywhere can obviously prove to be beneficial for protecting credit card payments, login credentials, etc. and protecting the websites from […]
Today, more and more public websites are moving to HTTPS, which means communications and data sent between the web server and client (i.e., an end user browsing the internet) are encrypted. This move towards encryption everywhere can obviously prove to be beneficial for protecting credit card payments, login credentials, etc. and protecting the websites from being hacked. Though this enhances the security of the data being passed on the network, it results in enhanced challenges to the LEAs in intercepting the same and analyzing to detect any malicious use by people.
What is SSL Interception?
SSL Interception or HTTPS Interception is the method of monitoring SSL encrypted web-based communication amongst the client and server. Interception can be carried out between the sender and the receiver and vice versa – it’s the same technique utilized in man-in-the-middle (MiTM) attacks, without the agreement of both entities.
The valuable Wi-Fi Monitoring System from Stratign
Stratign’s Tactical Wi-Fi Monitoring System has been designed to seamlessly integrate with HTTPS/SSL interception module which supports your national defense and intelligence agency with the capability to intercept the traffic from social networking sites (i.e., Facebook, Twitter), Video Steaming (YouTube, Live leak), Webmail (Gmail, Yahoo Mail etc.) and Chats (Facebook Chat, Yahoo Chat).
The system can monitor the web traffic from secure and unsecure Wi-Fi networks functioning on 2.4 and 5.8GHz frequency band. Utilizing the benefits of Wi-Fi communications, the system obtains permission to target network through proprietary technology. STN-2052 is armed with all essential hardware and software to monitor both HTTP and the HTTPS traffic. The system provides complete solution to apply and carry out the entire process of monitoring, from the access in the 1st stage to final analysis. It comprises of various modules, each of which manages a diverse aspect of the monitoring process and highlights various kinds of algorithms and methodologies.
The Wi-Fi interceptor from Stratign can monitor several targets which are linked to targeted access point and utilizes Wi-Fi network on their cellphone, tablets, desktops and computers. The system can obtain, decrypt and recreate the traffic from all potential devices together which are linked to targeted point of access.
As many of the Wi-Fi networks are protected utilizing wireless security protocol, the 1st step would be to disrupt the protocol and retrieve the password to monitor the traffic from potential devices. To break the Wireless Security Protocol and compute the password, the system is operational with a special high-performance Hardware Decryptor which can crack the WEP, WPA and WPA2 protected Wi-Fi networks.
Advantageous System Features
- Designed for monitoring and restructuring of IP traffic from both unsecured and secured Wi-Fi networks.
- Provides support for these Wi-Fi frequency bands: 2.4 GHz or 5 GHz
- Capable of breaking WEP, WPA, WPA2 protected Wi-Fi networks.
- Proficient of working without reliance of firewall, antivirus and security upgrades.
- Can monitor the traffic from target devices utilizing diverse OS like Mac OSX, Blackberry, iOS, Linux, Windows, Android etc.
- Single unit HTTPS/SSL Interception for secure and unsecured networks.
- Capable of loading the official legal certificate issued by certifying authorities and has built-in root certificate for monitoring and rebuilding HTTPS Traffic.
- Ability to inspect, decode and disclose the sign-in credentials of the target. This is based on the below and several others:
- a) Email: Yahoo Mail, GMX Mail, Yandex, Hotmail, Mail.ru, Gmail and other country-based emails. b) Social Networking: Facebook, Twitter, LinkedIn etc. c) Messenger: Skype etc.