WiFinspect [Root]

WiFinspect [Root]











ROOT needed for most functions - FREE app without ads.
Description:

WiFinspect is a multi-device planned for Computer Security experts and other propelled clients that desire to screen the systems they claim or have consent, for example the application is a security review instrument and not a hacking apparatus. The capacities include:

* Network Information

* UPnP Device Scanner

* Host Discovery

* Network Sniffer

* Pcap Analyzer (three choices)

* PCI DSS (Version 2) Menu

- Access Point Default Password Test (prerequisite 2.1.1.c)

- Access Point Security Test (prerequisite 4.1.1)

- Access Point Scanner (prerequisite 11.1)

- Internal Network Vulnerability Scanner (prerequisite 11.2.1)

- External Network Vulnerability Scanner (readiness for necessity 11.2.2)

* Host Information

* Port Scan

* Host Vulnerability Scan

* Traceroute

* Ping

DISCLAIMER:

This application is an understudy thesis by Andreas Hadjittofis as a major aspect of his MSc in Computer Security at the University of Birmingham, UK. The undertaking is directed by Dr Tom Chothia and was discharged in August 2012. The designers of this application can't be considered in charge of how this application is being utilized. The application accompanies no assurances.

Capacities:

* Network Information (ROOT): Information about the associated system like MAC and IP addresses, entryway and so on

* UPnP Device Scanner: Lists all UPnP gadgets on the system that are inside the perspective on your gadget

* Host revelation (ROOT): Uses nmap to find all gadgets on the system that are inside the perspective on your gadget

* Network Sniffer (ROOT): Uses tcpdump to sniff on all bundles that are inside the perspective on your gadget. The subsequent pcap records can be broke down with Wireshark or the implicit Pcap Analyzer

* Pcap Analyzer: Uses jNetPcap to parse a pcap record. Three alternatives: Packet Distribution, Bandwidth Distribution or Communicating Hosts investigation

* Access Point Default Password Test: Checks a pre-set rundown of default switch passwords against your switch's control board and tells you if your switch is utilizing a default secret word

* Access Point Security Test: Displays the passageways that are inside the perspective on your gadget with a note whether they are secure (WPA/WPA2) or not (WEP or opened)

* Access Point Scanner: Displays the passageways that are inside the perspective on your gadget

* Internal Vulnerability Scanner (ROOT): Uses nmap to discover all gadgets on the system that are inside the perspective on your gadget. A note is given whether adventures exists for a given gadget dependent on its working framework and open ports

* External Vulnerability Scanner (ROOT): Runs Host Information, Port Scan, Host Vulnerability Scan, Traceroute, Ping or Sniffer works on a given IP address or hostname

* Host Information (ROOT): Uses nmap to recover the gadget's hostname, MAC address, merchant, working framework, gadget name and workgroup

* Port Scan (ROOT): Uses nmap to recover the gadget's open ports. Snap on a port to see the Metasploit results for the gadget's working framework and port

* Host Vulnerability Scanner (ROOT): Uses nmap to recover data about the host alongside a note expressing whether adventures exists for the gadget dependent on its working framework and open ports

* Traceroute (ROOT): Uses nmap to traceroute to a host

* Ping (ROOT): Uses nping to ping a host

Authorizations:

* ACCESS_WIFI_STATE, CHANGE_WIFI_STATE, ACCESS_NETWORK_STATE: Used to decide whether the gadget is associated with a Wi-Fi organize and to recover the information showed in Network Information work

* CHANGE_WIFI_MULTICAST_STATE: Used by the UPnP Device Scanner work

* INTERNET: Used to recover the gadget's outside IP address in Network Information work, for Metasploit search, and for the discretionary blunder announcing.

* WRITE_EXTERNAL_STORAGE: Used to store the nmap and pcap documents.



No comments:

Post a Comment