{"id":4542281515121,"title":"HAK5 WiFi Pineapple NANO TACTICAL inkl. Field Guide","handle":"hak5-wifi-pineapple-nano-tactical-inkl-field-guide","description":"\u003cdiv class=\"product-summary-wrap\"\u003e\n\u003cdiv class=\"row\"\u003e\n\u003cdiv class=\"summary entry-summary col-md-7\"\u003e\n\u003cdiv class=\"description woocommerce-product-details__short-description\"\u003e\n\u003cp\u003eDie patentierte PineAP-Suite nutzt die speziell für \u003cstrong\u003eHAK5 WiFi Pineapple NANO TACTICAL \u003c\/strong\u003e entwickelte Hardware, um die fortschrittlichsten WiFi-Angriffe mit präziser Zielerfassung zu ermöglichen. Ganz gleich, ob Sie eine einfache WiFi-Bewertung durchführen oder campusweite, persistente Sensoren einsetzen möchten – es gibt eine WiFi Pineapple für Sie.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"woocommerce-tabs woocommerce-tabs-wiovqp7tywo3taj0u8lx3y0g33ea97w resp-htabs\" id=\"product-tab\"\u003e\n\u003cdiv class=\"resp-tabs-container\"\u003e\n\u003cdiv class=\"tab-content resp-tab-content resp-tab-content-active\" id=\"tab-description\" aria-labelledby=\"tab_item-0\"\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch2\u003eDie beste Rogue Access Point und WiFi-Pentest-Plattform der Welt\u003c\/h2\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cp\u003eMit dem WiFi Pineapple können Pentester gezielte Man-in-the-Middle-Angriffe, erweiterte Aufklärung, das Ernten von Berechtigungsnachweisen, das Sammeln von Open-Source-Informationen und mehr durchführen – alles über eine saubere, intuitive Weboberfläche.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_single_image wpb_content_element vc_align_left\"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cdiv class=\"vc_single_image-wrapper vc_box_border_grey\"\u003e\u003cimg class=\"vc_single_image-img \" src=\"https:\/\/firewire-revolution.de\/wp-content\/uploads\/2019\/10\/mockup1_600x-e1578826537778.png\" width=\"582\" height=\"437\" alt=\"mockup1_600x\" title=\"mockup1_600x\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1.\u003c\/strong\u003e\u003cspan\u003e \u003c\/span\u003eDurchführung fortschrittlicher Man-in-the-Middle-Angriffe durch gründliche Nachahmung der bevorzugten Netzwerke\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e2.\u003c\/strong\u003e\u003cspan\u003e \u003c\/span\u003eSammeln Sie Informationen, auch darüber, welche anderen Netzwerke die Ziele verbunden haben\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e3.\u003c\/strong\u003e\u003cspan\u003e \u003c\/span\u003eVollständige Visualisierung der WiFi-Landschaft mit kontinuierlicher, passiver Live-Überwachung\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e4.\u003c\/strong\u003e\u003cspan\u003e \u003c\/span\u003eErfassung von WPA- und WPA Enterprise-Zugangsdaten in den Formaten pcap, hashcat, JTR oder Klartext\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e5.\u003c\/strong\u003e\u003cspan\u003e \u003c\/span\u003eUnd das alles ohne Beeinträchtigung der Nachbarn außerhalb der Reichweite durch ein einfaches, plattformübergreifendes Web-Interface.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wpb_single_image wpb_content_element vc_align_center\"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cdiv class=\"vc_single_image-wrapper vc_box_border_grey\"\u003e\u003cimg class=\"vc_single_image-img \" src=\"https:\/\/firewire-revolution.de\/wp-content\/uploads\/2019\/10\/banner_1400_2.png\" width=\"1400\" height=\"467\" alt=\"banner_1400_2\" title=\"banner_1400_2\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003eDie patentierte PineAP-Suite nutzt die speziell entwickelte WiFi-Pineapple-Hardware, um die fortschrittlichsten WiFi-Angriffe mit präziser Zielführung zu ermöglichen. Egal, ob Sie eine einfache WiFi-Bewertung durchführen oder campusweite, persistente Sensoren einsetzen – es gibt einen WiFi-Pineapple für Sie.\u003c\/h3\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wpb_single_image wpb_content_element vc_align_center\"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cdiv class=\"vc_single_image-wrapper vc_box_border_grey\"\u003e\u003cimg width=\"240\" height=\"240\" src=\"https:\/\/firewire-revolution.de\/wp-content\/uploads\/2019\/10\/nano_medium.jpg\" class=\"vc_single_image-img attachment-large\" alt=\"HAK5 WiFi Pineapple NANO Basic\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch2 class=\"pricing-table__header\"\u003e\n\u003cb\u003eWIFI PINEAPPLE NANO\u003c\/b\u003e –\u003c\/h2\u003e\n\u003ch3\u003eEinfacher WiFi-Pentest-Begleiter im Taschenformat\u003c\/h3\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003eSingle Band 2.4 GHz\u003cbr\u003e400 MHz Network SoC\u003c\/h3\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003e\u003cbr\u003e\u003c\/h3\u003e\n\u003ch3\u003eZwei Standard-Antennen\u003cbr\u003ebis zu 400mW pro Funk\u003c\/h3\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003e\u003cbr\u003e\u003c\/h3\u003e\n\u003ch3\u003eUSB-Ethernet-Stecker,\u003cbr\u003eUSB-Host-Anschluss\u003c\/h3\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003e\u003cbr\u003e\u003c\/h3\u003e\n\u003ch3\u003eMicroSD-Erweiterung\u003c\/h3\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003e\u003cbr\u003e\u003c\/h3\u003e\n\u003ch3\u003eStromversorgung über USB\u003c\/h3\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch2 align=\"center\"\u003e\u003cbr\u003e\u003c\/h2\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003ch2 align=\"center\"\u003e\u003cstrong\u003eWiFi Pineapple Eigenschaften\u003c\/strong\u003e\u003c\/h2\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cdiv class=\"eight columns alpha\"\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/pineap.png?v=1538079218\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Leading Rogue Access Point\u003c\/b\u003e\u003cbr\u003eDie patentierte PineAP Suite ahmt die bevorzugten Netzwerke gründlich nach und ermöglicht so Man-in-the-Middle-Angriffe\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/wpa.png?v=1540685519\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e WPA and WPA Enterprise Attacks\u003c\/b\u003e\u003cbr\u003eErfassung von WPA-Handshakes und Nachahmung von Unternehmens-Access-Points, Erfassung von Unternehmens-Credentials\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/filtering.png?v=1540685553\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Precision Targeting Filters\u003c\/b\u003e\u003cbr\u003eBleiben Sie im Rahmen des Engagements und begrenzen Sie Kollateralschäden mit MAC- und SSID-Filterung\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/dashboard_b8c1dcaf-2ec9-4f20-9fcb-572688d25627.png?v=1538079459\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Simple Web Interface\u003c\/b\u003e\u003cbr\u003eSchnell und intuitiv, mit Schwerpunkt auf Workflow und verwertbarer Intelligenz – einfach per Mausklick angreifen\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/web.png?v=1540685592\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Cross-Platform\u003c\/b\u003e\u003cbr\u003eKeine Software zu installieren. Funktioniert in jedem modernen Webbrowser unter Windows, Mac, Linux, Android, iOS\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cdiv class=\"eight columns omega\"\u003e\n\u003cdiv class=\"eight columns omega\"\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/recon_95dac5be-b944-4893-9688-6f97a79e5d6a.png?v=1540685611\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Advanced Reconnaissance\u003c\/b\u003e\u003cbr\u003eVisualisierung der WiFi-Landschaft und der Beziehungen zwischen Access Points und Geräten\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/privacy.png?v=1538080055\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Actionable Intelligence\u003c\/b\u003e\u003cbr\u003eIdentifizierung gefährdeter Geräte, Sammlung von Informationen über das Ziel und direkte Angriffe\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/identify.png?v=1540685645\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Passive Surveillance\u003c\/b\u003e\u003cbr\u003eÜberwachen und sammeln Sie Daten von allen Geräten in der Umgebung. Berichte speichern und jederzeit abrufen\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/target_eefa9930-f84b-4d82-bc03-4031585dae11.png?v=1540685542\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Active Frame Injection Attacks\u003c\/b\u003e\u003cbr\u003eGezielte, aktive WiFi-Angriffe mit manipulierten Management-Frames inklusive Deauth durchführen\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/c2.png?v=1540685731\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Cloud C² Enabled\u003c\/b\u003e\u003cbr\u003eEinsatz mit Zuversicht. Mit Hak5 den Äther fernsteuern und\u003cbr\u003ekontrollieren\u003cspan\u003e \u003c\/span\u003e\u003ca href=\"https:\/\/shop.hak5.org\/products\/c2\"\u003eCloud C²\u003c\/a\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_single_image wpb_content_element vc_align_left\"\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_single_image wpb_content_element vc_align_left\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2020-07-23T15:25:02+02:00","created_at":"2020-07-23T15:19:26+02:00","vendor":"Hak5","type":"IT Forensik \u0026 forensische Computeranalyse","tags":["Attack","Bash Bunny","DEDIZIERTER SHELL-ZUGANG","EMP","Hak5","Hak5 Bash Bunny","INTELLIGENTE EXFILTRATION","KEYSTROKE INJECTION","NANO TACTICAL","PC Penetration","Pentesting","USB","USB Bundle","USB Rubber Ducky","Wi-Fi","WiFi","WiFi Pineapple"],"price":21900,"price_min":21900,"price_max":21900,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":31923527057521,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"2956","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"HAK5 WiFi Pineapple NANO TACTICAL inkl. Field Guide","public_title":null,"options":["Default Title"],"price":21900,"weight":500,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOTACTICAL.jpg?v=1595510632","\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOBasic4.jpg?v=1595510635","\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOBasic3.jpg?v=1595510637","\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOBasic2.jpg?v=1595510640","\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WIFIFieldGuide.jpg?v=1595510644"],"featured_image":"\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOTACTICAL.jpg?v=1595510632","options":["Title"],"media":[{"alt":null,"id":7276726911089,"position":1,"preview_image":{"aspect_ratio":1.0,"height":788,"width":788,"src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOTACTICAL.jpg?v=1595510632"},"aspect_ratio":1.0,"height":788,"media_type":"image","src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOTACTICAL.jpg?v=1595510632","width":788},{"alt":null,"id":7276727074929,"position":2,"preview_image":{"aspect_ratio":1.599,"height":374,"width":598,"src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOBasic4.jpg?v=1595510635"},"aspect_ratio":1.599,"height":374,"media_type":"image","src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOBasic4.jpg?v=1595510635","width":598},{"alt":null,"id":7276727566449,"position":3,"preview_image":{"aspect_ratio":0.997,"height":598,"width":596,"src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOBasic3.jpg?v=1595510637"},"aspect_ratio":0.997,"height":598,"media_type":"image","src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOBasic3.jpg?v=1595510637","width":596},{"alt":null,"id":7276728123505,"position":4,"preview_image":{"aspect_ratio":0.998,"height":593,"width":592,"src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOBasic2.jpg?v=1595510640"},"aspect_ratio":0.998,"height":593,"media_type":"image","src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WiFiPineappleNANOBasic2.jpg?v=1595510640","width":592},{"alt":null,"id":7276728221809,"position":5,"preview_image":{"aspect_ratio":1.0,"height":594,"width":594,"src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WIFIFieldGuide.jpg?v=1595510644"},"aspect_ratio":1.0,"height":594,"media_type":"image","src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0055\/4349\/3745\/products\/HAK5WIFIFieldGuide.jpg?v=1595510644","width":594}],"content":"\u003cdiv class=\"product-summary-wrap\"\u003e\n\u003cdiv class=\"row\"\u003e\n\u003cdiv class=\"summary entry-summary col-md-7\"\u003e\n\u003cdiv class=\"description woocommerce-product-details__short-description\"\u003e\n\u003cp\u003eDie patentierte PineAP-Suite nutzt die speziell für \u003cstrong\u003eHAK5 WiFi Pineapple NANO TACTICAL \u003c\/strong\u003e entwickelte Hardware, um die fortschrittlichsten WiFi-Angriffe mit präziser Zielerfassung zu ermöglichen. Ganz gleich, ob Sie eine einfache WiFi-Bewertung durchführen oder campusweite, persistente Sensoren einsetzen möchten – es gibt eine WiFi Pineapple für Sie.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"woocommerce-tabs woocommerce-tabs-wiovqp7tywo3taj0u8lx3y0g33ea97w resp-htabs\" id=\"product-tab\"\u003e\n\u003cdiv class=\"resp-tabs-container\"\u003e\n\u003cdiv class=\"tab-content resp-tab-content resp-tab-content-active\" id=\"tab-description\" aria-labelledby=\"tab_item-0\"\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch2\u003eDie beste Rogue Access Point und WiFi-Pentest-Plattform der Welt\u003c\/h2\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cp\u003eMit dem WiFi Pineapple können Pentester gezielte Man-in-the-Middle-Angriffe, erweiterte Aufklärung, das Ernten von Berechtigungsnachweisen, das Sammeln von Open-Source-Informationen und mehr durchführen – alles über eine saubere, intuitive Weboberfläche.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_single_image wpb_content_element vc_align_left\"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cdiv class=\"vc_single_image-wrapper vc_box_border_grey\"\u003e\u003cimg class=\"vc_single_image-img \" src=\"https:\/\/firewire-revolution.de\/wp-content\/uploads\/2019\/10\/mockup1_600x-e1578826537778.png\" width=\"582\" height=\"437\" alt=\"mockup1_600x\" title=\"mockup1_600x\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1.\u003c\/strong\u003e\u003cspan\u003e \u003c\/span\u003eDurchführung fortschrittlicher Man-in-the-Middle-Angriffe durch gründliche Nachahmung der bevorzugten Netzwerke\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e2.\u003c\/strong\u003e\u003cspan\u003e \u003c\/span\u003eSammeln Sie Informationen, auch darüber, welche anderen Netzwerke die Ziele verbunden haben\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e3.\u003c\/strong\u003e\u003cspan\u003e \u003c\/span\u003eVollständige Visualisierung der WiFi-Landschaft mit kontinuierlicher, passiver Live-Überwachung\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e4.\u003c\/strong\u003e\u003cspan\u003e \u003c\/span\u003eErfassung von WPA- und WPA Enterprise-Zugangsdaten in den Formaten pcap, hashcat, JTR oder Klartext\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e5.\u003c\/strong\u003e\u003cspan\u003e \u003c\/span\u003eUnd das alles ohne Beeinträchtigung der Nachbarn außerhalb der Reichweite durch ein einfaches, plattformübergreifendes Web-Interface.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wpb_single_image wpb_content_element vc_align_center\"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cdiv class=\"vc_single_image-wrapper vc_box_border_grey\"\u003e\u003cimg class=\"vc_single_image-img \" src=\"https:\/\/firewire-revolution.de\/wp-content\/uploads\/2019\/10\/banner_1400_2.png\" width=\"1400\" height=\"467\" alt=\"banner_1400_2\" title=\"banner_1400_2\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003eDie patentierte PineAP-Suite nutzt die speziell entwickelte WiFi-Pineapple-Hardware, um die fortschrittlichsten WiFi-Angriffe mit präziser Zielführung zu ermöglichen. Egal, ob Sie eine einfache WiFi-Bewertung durchführen oder campusweite, persistente Sensoren einsetzen – es gibt einen WiFi-Pineapple für Sie.\u003c\/h3\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wpb_single_image wpb_content_element vc_align_center\"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cdiv class=\"vc_single_image-wrapper vc_box_border_grey\"\u003e\u003cimg width=\"240\" height=\"240\" src=\"https:\/\/firewire-revolution.de\/wp-content\/uploads\/2019\/10\/nano_medium.jpg\" class=\"vc_single_image-img attachment-large\" alt=\"HAK5 WiFi Pineapple NANO Basic\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"vc_empty_space\"\u003e\n\u003cspan class=\"vc_empty_space_inner\"\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch2 class=\"pricing-table__header\"\u003e\n\u003cb\u003eWIFI PINEAPPLE NANO\u003c\/b\u003e –\u003c\/h2\u003e\n\u003ch3\u003eEinfacher WiFi-Pentest-Begleiter im Taschenformat\u003c\/h3\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003eSingle Band 2.4 GHz\u003cbr\u003e400 MHz Network SoC\u003c\/h3\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003e\u003cbr\u003e\u003c\/h3\u003e\n\u003ch3\u003eZwei Standard-Antennen\u003cbr\u003ebis zu 400mW pro Funk\u003c\/h3\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003e\u003cbr\u003e\u003c\/h3\u003e\n\u003ch3\u003eUSB-Ethernet-Stecker,\u003cbr\u003eUSB-Host-Anschluss\u003c\/h3\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003e\u003cbr\u003e\u003c\/h3\u003e\n\u003ch3\u003eMicroSD-Erweiterung\u003c\/h3\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch3\u003e\u003cbr\u003e\u003c\/h3\u003e\n\u003ch3\u003eStromversorgung über USB\u003c\/h3\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-12\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003ch2 align=\"center\"\u003e\u003cbr\u003e\u003c\/h2\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003ch2 align=\"center\"\u003e\u003cstrong\u003eWiFi Pineapple Eigenschaften\u003c\/strong\u003e\u003c\/h2\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"porto-separator \"\u003e\u003chr class=\"separator-line align_center\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cdiv class=\"eight columns alpha\"\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/pineap.png?v=1538079218\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Leading Rogue Access Point\u003c\/b\u003e\u003cbr\u003eDie patentierte PineAP Suite ahmt die bevorzugten Netzwerke gründlich nach und ermöglicht so Man-in-the-Middle-Angriffe\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/wpa.png?v=1540685519\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e WPA and WPA Enterprise Attacks\u003c\/b\u003e\u003cbr\u003eErfassung von WPA-Handshakes und Nachahmung von Unternehmens-Access-Points, Erfassung von Unternehmens-Credentials\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/filtering.png?v=1540685553\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Precision Targeting Filters\u003c\/b\u003e\u003cbr\u003eBleiben Sie im Rahmen des Engagements und begrenzen Sie Kollateralschäden mit MAC- und SSID-Filterung\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/dashboard_b8c1dcaf-2ec9-4f20-9fcb-572688d25627.png?v=1538079459\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Simple Web Interface\u003c\/b\u003e\u003cbr\u003eSchnell und intuitiv, mit Schwerpunkt auf Workflow und verwertbarer Intelligenz – einfach per Mausklick angreifen\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/web.png?v=1540685592\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Cross-Platform\u003c\/b\u003e\u003cbr\u003eKeine Software zu installieren. Funktioniert in jedem modernen Webbrowser unter Windows, Mac, Linux, Android, iOS\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\n\u003cdiv class=\"eight columns omega\"\u003e\n\u003cdiv class=\"eight columns omega\"\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/recon_95dac5be-b944-4893-9688-6f97a79e5d6a.png?v=1540685611\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Advanced Reconnaissance\u003c\/b\u003e\u003cbr\u003eVisualisierung der WiFi-Landschaft und der Beziehungen zwischen Access Points und Geräten\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/privacy.png?v=1538080055\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Actionable Intelligence\u003c\/b\u003e\u003cbr\u003eIdentifizierung gefährdeter Geräte, Sammlung von Informationen über das Ziel und direkte Angriffe\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/identify.png?v=1540685645\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Passive Surveillance\u003c\/b\u003e\u003cbr\u003eÜberwachen und sammeln Sie Daten von allen Geräten in der Umgebung. Berichte speichern und jederzeit abrufen\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/target_eefa9930-f84b-4d82-bc03-4031585dae11.png?v=1540685542\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Active Frame Injection Attacks\u003c\/b\u003e\u003cbr\u003eGezielte, aktive WiFi-Angriffe mit manipulierten Management-Frames inklusive Deauth durchführen\u003c\/p\u003e\n\u003cp\u003e\u003cimg src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0068\/2142\/files\/c2.png?v=1540685731\" alt=\"\"\u003e\u003cb\u003e\u003cspan\u003e \u003c\/span\u003e Cloud C² Enabled\u003c\/b\u003e\u003cbr\u003eEinsatz mit Zuversicht. Mit Hak5 den Äther fernsteuern und\u003cbr\u003ekontrollieren\u003cspan\u003e \u003c\/span\u003e\u003ca href=\"https:\/\/shop.hak5.org\/products\/c2\"\u003eCloud C²\u003c\/a\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_text_column wpb_content_element \"\u003e\n\u003cdiv class=\"wpb_wrapper\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_single_image wpb_content_element vc_align_left\"\u003e\n\u003cdiv class=\"vc_row wpb_row row\"\u003e\n\u003cdiv class=\"vc_column_container col-md-6\"\u003e\n\u003cdiv class=\"wpb_wrapper vc_column-inner\"\u003e\n\u003cdiv class=\"wpb_single_image wpb_content_element vc_align_left\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"}