ElcomSoft to Accelerate Wireless Network Security Audits
The new-generation GPU acceleration algorithms speed up the recovery several hundred times when compatible ATI or NVIDIA video cards are installed. By supporting both ATI and NVIDIA hardware for GPU acceleration, Elcomsoft Wireless Security Auditor becomes one of the fastest and most cost-efficient Wi-Fi password recovery and wireless security audit tools on the market.
Auditing Wireless Network Security
Do you know how secure your wireless network is? Using state-of-the art encryption methods is not enough to guarantee network security without a complex approach. Weak or inadequate password policies or lack of regular security audits can jeopardize the security of the entire company. Periodic audits of the corporate network are required to ensure corporate security.
With a minimum-required length of eight characters for a password, modern wireless networks employing WPA or WPA2 PSK encryption are secure enough to make brute force attacks unfeasible, and can provide sufficient security given the right password is chosen. However, using a weak, easy-to-guess password or passphrase that consists of dictionary words may expose the network to another sort of attacks.
Elcomsoft Wireless Security Auditor
Elcomsoft Wireless Security Auditor allows system administrators to determine exactly how secure a wireless network is by attempting to recover the original WPA/WPA2 password while performing series of advanced dictionary attacks. If a wireless network cannot withstand attacks performed by Elcomsoft Wireless Security Auditor armed with one or more inexpensive video accelerators, the entire Wi-Fi network cannot be considered secure.
Featuring the latest generation of ElcomSoft's state-of-the-art GPU acceleration technologies allows speeding up the recovery several hundred times depending on exact system configuration. In addition to compatible ATI and NVIDIA cards, Elcomsoft Wireless Security Auditor supports industrial-grade NVIDIA Quadro accelerators and Tesla desktop supercomputers.
Advanced dictionary attacks with deep mutations attempt multiple variants and combinations of each dictionary word. The mutations can be fine-tuned to employ all or some of the settings, such as different letter cases, number substitutions, changing the order of characters and using abbreviations and vowel mutations.