Secpoint cracks WPA keys with Portable Penetrator

Secpoint has introduced a new “portable penetrator” that offers browser-based wireless vulnerability scanning of large networks across hundreds of IP addresses simultaneously.

The out-of-the-box unit is based on a Dell Inspiron Mini 10v netbook with a 10.1″ screen, six-hour battery life, 1.6 Ghz Dual core Atom processor and a Linux OS.

The Portable Penetrator PP3000 also features a USB wireless adapter antenna that boasts a strength of 8dBi and is capable of cracking security keys encrypted with WEP, WPA or WPA2.

“We continue to see, week-after-week, how corporate computers connected to external networks fall foul of various security breaches after their Wi-Fi keys are cracked. Our latest Portable Penetrator identifies all of these danger zones and provides essential advice how to fix the holes,” explained Secpoint CEO Victor Christiansenn.

“[For example], a Wi-Fi router should, at a bare minimum, be protected by WEP 2.0 with a 25-character password and internal passwords at least 10 characters long, with at least one special character, four numerals, and at least one capital letter; but we never cease to be amazed by the sort of sensitive documents and databases we can access once our Portable Penetrator gets to work on the corporate client networks we’re testing.”

On start-up, the Penetrator provides the names of all identified networks in range, their types of encryption, signal strengths and number of connected users. Users can then launch any number of a wide variety of attacks, including denial of service, against any of detected networks.

The Penetrator’s attack dictionary currently includes more than 50 languages and runs 250 keys per second across a WPA encrypted network until the network password is identified.

Finally, the unit is programmed to identify more than 42,000 remote unique security vulnerabilities and display the tested networks on Google Maps in real-time.