Wi-Fi Interception
DIONISYS
Overview
The Dionisys Wi-Fi interception systems consists of 3 main modules: the cracking module, interception module and localization module.
The system can work either in passive (monitoring) or active mode. In the monitoring mode, the operator sees all network users (active, connected and not connected) which are present within the system coverage. The operator may create databases of MAC addresses, signal levels and access points of users. The connected users and their amount of traffic is displayed. If the operator logs on a certain channel, the entire traffic of all users or targets may be recorded. During the reconstruction of sessions, all users connected to the target gateway may be monitored (not only users connected through WLAN, but also users connected to the router by cable). Though not only WLAN connected users are monitored but also users connected through wire to the target’s sub-network. All intercepted WLAN traffic, commands and service signals are recorded fur further analysis.
In the active mode, the system allows to manipulate the users’ activities such as sending fake emails, creating disturbances to the subscribers or access point as well as to analyze the intercepted information in advanced mode.
Application
▪ Police, Intelligence Services
▪ Prisons (interception and locating of mobile phones / tablets)
Features
- System operates with all WLAN traffic on all IEEE 802.11 a/b/g/n/ac channels
- System decrypts WEP, WPA-PSK, WPA2-PSK and all WLAN traffic
- System decrypts the traffic in on-line mode after database recording (password, VPN, Skype voice, Viber); there are special additional programs, which can decrypt voice sessions with SIP and H.323 protocols
- The approximate coverage range of the system can reach 2 km depending on the environment; average range in city conditions is around 500 m
- The system can locate all devices, with an approximate accuracy of 5 m, using standard IEEE 802.11 within the frequency ranges from 2412 to 2484 MHz and 4900 to 6200 MHz
- The system allows operation from the car or by foot (with dedicated tablet)
- WEB traffic monitoring
- FTP traffic monitoring
- Email monitoring
- Chat (communication services) monitoring
- Captured data filtration
- Storage and viewing of captured data
- Several modes of traffic capture
- Import of logs (dumps) recorded by other sniffers
- Customized versions available