You are on page 1of 2

The Portable Penetrator

Portable Penetration Testing

The Portable Penetrator


Portable Penetration Testing

www.secpoint.com
Both 2.4 GHz and 5GHz Wifi Ranges Supported
Prevent Hackers from entering your Wifi network!
Portable penetration testing and wireless auditing
√ Easy step by step guide The Portable Penetrator combines the latest hacking and cracking tools
how to secure your Wifi
that offers the most comprehensive penetration testing kit.
network
Wireless Auditing System or Network Device
√ Wireless WEP, WPA and
The Portable Penetrator allows you to do real The Portable Penetrator is designed to audit any
WPA2 auditing
wireless WEP, WPA and WPA2 auditing. Just operating system or network device. It is benefi-
√ User Friendly Interface
like an attacker would do it! It highlights any cial to audit devices in the network setup to find
weaknesses in wireless networks and shows and rectify any vulnerabilities identified before
√ Latest Auditing Tools
how these can be secured most effectively. an attacker can exploit the vulnerabilities.
Included
42,000+ Database Signatures Detailed Remedies for Identified Vulner-
√ 42.000+ Database The Penetrator vulnerability database abilities
Signatures consists of more than 12 years of research. The Portable Penetrator comes with detailed
The database contains more then 42000+ remedies for identified vulnerabilities.
√ Launch Real Exploits and unique vulnerabilities ready to identify any This allows the user to quickly fix the
Denial of Service Attacks vulnerability in your network. This database is indentified vulnerabilities.
updated multiple times daily.
√ Vulnerability Scanning
Launch Real Exploits and Denial of Automatic Database and Firmware
√ Vulnerability Assessment Service Attacks Updates
You can launch real exploits to verify that an The Portable Penetrator will automatically
√ Reports Branding identified vulnerability is exploitable. It is download updates multiple times daily, at the
also possible to launch real Denial of Service user’s discretion, to ensure the vulnerability
√ Security Audit of any
attacks to test preproduction systems for database is as updated as possible.
Operating System stability.
and Network Device
Reports Branding
√ Detailed Remedies for
Branding and personalisation of the reports
Identified Vulnerabilities
and selling them as a service is allowed.
√ Automatic Database and
Firmware Updates Whether you’re a security professional or a novice, Portable Penetra-
tor PP3000 is a device which is a complete solution for auditing and
√ Interface Support Videos improving the level of security of wireless networks. Thanks to built-
in report module you will have all the documentation of the security
audits you have conducted. The product has a great value for a great
value for a complete solution like Portable Penetrator PP3000.
The Portable Penetrator
Portable Penetration Testing

Specifications Portable Penetrator Portable Penetrator Portable Penetrator


PP3000 PP6000 PP7000

Height Netbook 10.1 ” Notebook 15.4 ” Hardened Notebook 14.1 inc

180W ATX Power supply. AC / DC 250W ATX Power supply. AC / DC 460W Redundant Power supply. AC / DC
Power Supply
90~264V full range 90~264V full range 90~264VAC full range
Operating : 0°C to 40°C Operating : 0°C to 40°C Operating : 0°C to 40°C
Environment Temperatures
Storage: -20°C to 80°C Storage: -20°C to 80°C Storage: -20°C to 80°C
10/100/1000 10/100/1000 10/100/1000
Network 10/100/1000 Mbps
Ethernet interfaces Ethernet interfaces Ethernet interfaces
42.000+Database Signatures √ √ √
Launch Real Exploits & Denial of Service √ √ √
Allowed to Change IP Addresses √ √ √

Distributed Security Auditing √ √ √

Automatic database and software updates √ √ √

Features

Security Audit Features √ 2.4 GHz & 5 GHz



Vulnerability assessment √ 8 dBi Antenna

42.000+ signatures

Unlimited auditing
Finds Cross Site Scripting,

Works out of the box SQL Injection and Web Errors Automatic Update

Advanced auditing options √
Automatic web crawling engine identifies √ Automatic daily database updates

Launch real exploits known and unknown files on websites √ Automatic firmware updates with new

Audit any OS √
Finds Cross Site Scripting features and functionality

Automatic web crawl script √
Finds SQL Injection √ Centralized update point

OS independent interface √
Finds Web Errors √ Automatic alerts when database is expired

SANS top 20 audit √ Option to upload updates manually via the
Scheduled Auditing interface
Easy-to-understand reporting √
Automatic scheduled auditing

XML PDF and HTML reports √
Automatic alert about new identified Scalable and Upgradeable

Reports branding allowed security vulnerabilities √
All units can be upgraded for network

Option for syslog remote logging √
Shows new vulnerabilities discovered growth via a software license
and compares them with old records to show Investment protection

the progress in the security level
Penetration Testing Support and Maintenance
Launch real exploits for Windows®, Unix®,
√ Security Audit Configuration √
One year database subscription included
Routers, Firewalls and more. √
Virtual host auditing √
Full support included

Launch real denial of service attacks √
Audit specific ports √
Option for instant replacement hardware

Audit specific web directories √
Web-based User Interface (https)

Get an email when an audit is finished √
Quick setup wizard
Wireless Auditing √
Configuration backup/restore
√ Audit WEP networks √
Email alert and logging via syslog
√ Audit WPA and WPA2 networks √
Build-in diagnostic function
√ Test the security strength of your √
3 Years World Wide Support
wireless networks
√ Identify hidden networks

Partner Information
Internet: www.secpoint.com
E-mail: info@secpoint.com

www.secpoint.com

For more information on SecPoint, please visit www.secpoint.com/portable-penetrator.html

You might also like