Tactical Control Center data

Network Injector data tab

Data is described below:

Data Description
Injecting Interface

List of connected network interfaces. Select the injection interface connected to the network on which the device to be attacked is connected.

When simulating an Access Point, the interface used in the Fake Access Point tab also appears.

The set 3G modem and enabled for remote access in the System Management tab also appears here.

Sniffing interface

Like Injecting Interface or another network interface to only be used for sniffing.

Regular expression

Expression used to filter devices connected to the network. It is applied to all data transmitted and received by the device via network, of any kind.

See "What you should know about Tactical Control Center" .

BPF network filter

This is used to more accurately filter devices using BPF syntax (Berkeley Packet Filter). This syntax includes key words accompanied by qualifiers:

See "What you should know about Tactical Control Center" .

Found device data

Data is described below:

Data Description
Status

Connected network device status:

: unknown device. It cannot be infected due to problems tied to authentication. Forcing authentication.

: device being identified.

: device identified and can be infected.

: infected device.

HW address Device network card hardware address.
IP address Device's network IP address.
Vendor Network card brand (rather reliable).
Hostname Device name.
OS Device operating system.
Browser Web browser used by the device.
Last web Traffic

Last sites visited by the device detected and analyzed in the last five minutes.

NOTE: if the device no longer generates web traffic at the end of the five minutes, the message Idle will appear. This usually occurs when no one is using the device.

Last web attack Last attack type and results. To check additional details, see the Log System tab.
Wireless Intruder data tab

Data is described below:

Data Description
Wireless interface List of non connected network interfaces. Select the interface to connect to the protected WiFi network to be opened.
ESSID network Name of the local network to be opened.
Attack type

Types of available password identification.

WPA/WPA2 dictionary attack

WEP bruteforce attack

WPS PIN bruteforce attack

See "What you should know about Wireless Intruder attack types" .

Fake Access Point data tab

Data is described below:

Data Description
Wireless interface

List of non connected network interfaces. Select the interface to be displayed as the WiFi network.

ESSID ESSID network name to be created.
HW address Device network card hardware address.
Access point Name of the Access Point expected by the device.
System Management data tab

Data is described below:

Data Description
Network address

Anonymizer IP address used to communicate with the RCS server.

Port

Communication port with Anonymizer.

SD card

Memory card to manage the encrypted disk password.

Modem interface 3G Modem for device connection.
Notification email

E-mail address where the device IP is sent whenever it connects to the network.

IMPORTANT: mandatory field for dynamic IP addresses.

Remote management Remote access network protocol.