Elcomsoft Wireless Security Auditor is an all-in-one tool to help administrators verify how secure a company’s wireless network is. The tool will attempt to break into a secured Wi-Fi network by sniffing wireless traffic and running an attack on the network’s WPA/WPA2-PSK password. Featuring patented cost-efficient GPU acceleration technologies, Elcomsoft Wireless Security Auditor runs an accelerated attack on the network for a pre-defined amount of time in order to test how secure your wireless environment is.
Features and Benefits
Determine how secure your wireless network is by attacking WPA/WPA2-PSK passwords
Built-in wireless network sniffer
Support for most modern Wi-Fi adapters, as well as dedicated AirPCap adapters
Patented GPU acceleration technology uses one or more NVIDIA or AMD video cards to simulate real-world attacks
Run advanced dictionary attacks with highly configurable variations
Intercept limited Wi-Fi traffic, continue working offline
How Secure Is Your Wireless Network?
A single weak link poses a valid security threat to the entire corporate network. Wireless (Wi-Fi) networks can provide sufficient security if configured properly and accompanied by an adequate password policy. Elcomsoft Wireless Security Auditor exposes security problems in your wireless network to allow network administrators taking appropriate measures and adopting a proper password policy.
Wireless Network Security Audit
Elcomsoft Wireless Security Auditor examines the security of your wireless network by attempting to break into the network from outside or inside. Elcomsoft Wireless Security Auditor can work as a wireless sniffer or operate offline by analyzing a dump of network communications. The tool attempts to retrieve the original WPA/WPA2-PSK passwords in plain text.
Elcomsoft Wireless Security Auditor allows carrying out a password audit within a limited timeframe. Representing state-of-the-art in password recovery, Elcomsoft Wireless Security Auditor is one of the fastest and most advanced tools for recovering Wi-Fi passwords. If Elcomsoft Wireless Security Auditor fails to recover a Wi-Fi password within reasonable time, a real attack would similarly fail.
Built-in Wi-Fi Sniffer
Elcomsoft Wireless Security Auditor comes with a custom NDIS driver for 32-bit and 64-bit systems (Windows 7, 8, 8.1 and 10). By automatically intercepting Wi-Fi traffic and performing an attack on selected Wi-Fi networks, Elcomsoft Wireless Security Auditor becomes a one-stop solution for auditing Wi-Fi networks. WinPCap drivers are required to enable Wi-Fi sniffing. The WinPCap driver is included with Wireless Security Auditor.
In addition, Elcomsoft Wireless Security Auditor fully supports dedicated AirPCap adapters provided that the correct drivers are installed.
ElcomSoft has pioneered many software innovations that have made it easier to recover passwords protecting various types of resources. For the first time in the industry, the company’s patented GPU acceleration makes its way into Wi-Fi password recovery, reducing the time required to recover Wi-Fi passwords up to a hundred times. Supporting up to four mixed NVIDIA and AMD video cards, Elcomsoft Wireless Security Auditor allows building servers with supercomputer performance at a fraction of the price.
Distributed Attacks with Elcomsoft Distributed Password Recovery
You can use Elcomsoft Distributed Password Recovery to perform a full-performance attack on Wi-Fi passwords. Running on multiple computers, Elcomsoft Distributed Password Recovery can utilize all available resources (CPU and GPU units) when attempting to break your wireless password. If your password cannot be recovered after a reasonably long distributed attack, you may assume your network if sufficiently secure.
Types of Attacks
Elcomsoft Wireless Security Auditor performs an advanced dictionary search attack in order to expose weak passwords consisting of words and phrases in spoken languages. Allowing highly customizable mutations of ordinary dictionary words, Elcomsoft Wireless Security Auditor performs hundreds of mutations to each word in order to ensure the widest coverage.
Simulating Insider Attacks
If one of your network workstations is compromised and a malicious person gets network access to at least one system, it may not even be necessary for an attacker to be physically close to the wireless network in order to obtain full access to data sent and received. A password hash is normally stored in the Windows Registry, and can be retrieved remotely for off-line analysis.