
GOLANTECH T: + 9 7 2 -3 -6969690 |F: +972-3 -6969680
The Transparent (EX-1031)
Network Intercepting System
Transparent is a Tactical Mobile System that Intercepts Wi-Fi and Wired Data transmission over TCP/IP network.
The System enables the operator to place the Application in MITM (Man in the Middle) mode and by redirecting
all the network communication throughout the system, intercept logs and manipulate the transferred data over
the network. The Transparent is appointed to Law forces and it required basic Network Knowledge in order to be
fully operated. It was built for field agents who don’t necessarily have IT qualifications. Transparent provides the
ability to have an instant and simple access with abilities that were owned by an exclusive qualified group. This
system therefore down field this technologies to a reachable operation mode.
Main features
a. Cracking Mode - Cracking Password of secured network (WEP, WPA, WPA2, WPA-PSK etc.)
b. Sniffer Mode - Log and Record data transferred over the network
Log password – log all the password (secured and unsecured) that was sent from hosts (targets)
over the network
Log POP and SMTP mails (content , attached files, passwords etc.) this mode provide all the
relevant data concerning the mails that was sent or received
Log Instant messages (ICQ, AOL, MSN, QQ etc.)
Log all the transferred files uploaded and downloaded from any FTP or other hosting sites
(media share, Rapid share, CNET etc.)
Log all the bayside downloaded files (images, movies, audios) from direct show sites (YouTube,
Mega video etc.)
Log all cookies for SideJecking Direct Login enable the system operator to parallel log to any
secured or unsecured site along with the target (as long as he is still logged) with no need of
passwords or usernames
Log Player, enables to record and play all the traffic for post analyze
Status Manager View with instant counter of the password, mail, files, sites and data that is
being collected at any time
c. Manipulation Mode
Fake Access point – enable the operator to instantly build Fake network environment
with or without fake login page (Internet café, hotels etc.)
Fakes Update – enable to Force redirect any connected host on the Network to our
Fake Home page
d. Exploit Mode *Optional - This mode provides integrated Rapid Penetration Attack
capabilities across five attack categories
e. Training- the System is provided with courses that train the users with installing and
operating the system along with real field training. The System also contains an easy to use
manual that clearly explain all the system's functions and operating modes. This system can
be remotely supported by our support team.
THE TRANSPARENT- NETWORK INTERCEPTING SYSTEM
Comentários a estes Manuais