Bypassing HSTS SSL with the Mana Toolkit

Anyone who’s attempted to use Moxie Marlinspike’s SSLstrip against recent browsers has no doubt run into HTTP Strict Transport Security (HSTS), a mechanism by which a website is able to inform the browser if it’s supposed to be secured with SSL. This fixes the key problem with previous SSL implementations (and what made SSLstrip possible); the fact that the user had to know ahead of time if the site they were visiting was using encryption.

When a user running a recent version of Chrome or Firefox visits an SSL secured site which has been forced down to plain HTTP with SSLstrip, it not only fails, but goes as far as informing the user their current Internet connection is potentially being tampered with by a third party.

But thanks to the recently released “Mana Toolkit”, the SSLstrip technique is once again viable on modern operating systems and browsers. Combining an updated version of SSLstrip, some DNS trickery, and a turn-key rogue AP, Mana is an extremely effective solution for covertly capturing WiFi traffic.


Running Mana

Mana has just recently been added to the Kali Linux repositories, which means it’s automatically available to Pwnie devices running Pwnix by simply running:


apt-get install mana-toolkit


This will pull in quite a few dependencies required to get Mana running, and will drop you back to the command line once finished.

From there, navigate to the Mana directory located at /usr/share/mana-toolkit, and then enter the directory named run-mana. Here you’ll find a number of scripts used to control how Mana operates.



Of the available scripts, the following will be the most useful under normal circumstances:

Starts the rogue AP, routes client requests to the Ethernet network, and enables all of the tools included in Mana will. This is the script you want to get Mana working as quickly as possible.

Starts the rogue AP, but none of the tools. Use this script if you want to deploy your own tools against targets.

Starts roque AP without Internet connection, complete with fake captive portal login for attempting to capture victim credentials even if you’re offline.

The most common usage will be to run the full Mana suite, so we’ll look at that. While you can manually edit the configuration files under /etc/mana-toolkit, it isn’t necessary to get Mana up and running. Running the “” script will launch Mana and start flooding the terminal with status info:



Mana will now be advertising a wireless network named “Internet”, as well as attempting to spoof other networks as it sees SSID broadcasts from clients searching for previously connected access points.


Compatible Sites

Mana includes the necessary configuration files to capture credentials on a number of popular sites, but of course not all are currently supported. Browsing the source via their official GitHub page shows Mana is already setup to capture login credentials from Facebook, Google, and Apple:

As Mana is still in development, additional sites and services are still being added. In the meantime, the developers suggest using the already available code as a template to customize your Mana installation for your specific needs and targets.


Reviewing Captured Data

The main Mana script dumps out a rather overwhelming amount of continually updating information, and it can be very difficult to interpret it as everything goes by. It’s therefore easier to manually check the SSLstrip logs to look for captured credentials than trying to read them from the script’s output.

The main SSLstrip log file is located at /var/lib/mana-toolkit/sslstrip.log, which holds all the previously SSL protected data that Mana managed to capture. Searching this file for usernames and passwords (try using grep to search for terms such as “pass”) can uncover some extremely interesting information.

New Call-to-action

PCI-DSS 3.0 and Education

PCI-DSS (Payment Card Industry Data Security Standard) is considered one of the “standards” for security within the business world. The requirements outlined by the standard encourage security staff to evaluate their own systems properly, and the implications of not passing help to encourage potentially unwilling executives to invest in security. Because of this, the regulatory framework provided by PCI-DSS is used as a basis for many organizations’ security policies.

But an often overlooked portion of a secure organization – one that is difficult to “build” into a regulatory framework – is education. Education is a broad topic, and one that we at Pwnie feel is particularly important. Though education about security is important unto itself, there is an unfortunate lack of real, public information about how regulatory frameworks are actually implemented on the ground. The Payment Card Industry itself understands the need for documentation helping organizations to move in the direction of compliance; they released a summary of changes from PCI 2.0 to PCI 3.0, a helpful document for overworked security professionals and smaller organizations that do not necessarily have the luxury of having a dedicated compliance officer.

Pwnie Express is excited to announce that we want to contribute to compliance education, starting with our November 13 webinar on PCI-DSS and Remote Sites. Click here to register.

WPS Cracking with Reaver

We’ve previously covered how ineffectual WEP encryption is for securing a wireless network, showing that the Pwn Plug R3 can easily break into a WEP network in less than one minute. But considering how old WEP is, that shouldn’t really come as much of a surprise. Most networks will now be running the much more robust WiFi Protected Access (WPA), with WEP running mainly on the older systems that haven’t been updated or maintained.

But while it’s not as trivial as breaking into a WEP network, WPA is not completely infallible. Here we will take a look at one of the methods used to crack into a WPA network, and some of the pitfalls you may encounter.


WPS Pin Attack

An often overlooked feature on many WiFi routers and access points is WiFi Protected Setup (WPS). This is a convenient feature that allows the user to configure a client device against a wireless network by simultaneously pressing a button on both the access point and the client device (the client side “button” is often in software) at the same time. The devices trade information, and then set up a secure WPA link.

On the surface, this is a very clever feature. It allows less savvy users to establish a secure connection between their devices quickly and easily, and as it requires physical access to the hardware, it would seem relatively secure.

But a tool called Reaver has been designed to brute-force the WPA handshaking process remotely, even if the physical button hasn’t been pressed on the access point.

While some newer devices are building in protection against this specific attack, the Reaver WPS exploit remains useful on many networks in the field.

Note: To be clear, WPS is the vulnerable system in this case, not WPA. If a network has WPS disabled (which they should, given the existence of tools such as this), it will be immune to the following attack.


Finding a Network

If you’ve read the previous tutorial on cracking into a WEP network, you’ll recognize the command used to get the hardware into monitor mode:


airmon-ng start wlan0


From here you could use airodump-ng to look for networks, but Reaver actually includes its own tool for finding vulnerable WPS implementations which is much more straightforward. To start it, run the following command:


wash -i mon0


The output will look something like this:

WPS Cracking

This shows two networks which are, at least in theory, vulnerable to the WPS brute force attack Reaver uses. Note the “WPS Locked” column; this is far from a definitive indicator, but in general, you’ll find that APs which are listed as unlocked are much more likely to be susceptible to brute forcing. You can still attempt to launch an attack against a network which is WPS locked, but the chances of success aren’t very good.


Launching Reaver

Once you’ve found a network you wish to run the attack against, operating Reaver is very straightforward. The basic command needs only the local interface, channel, and ESSID to be specified. The command to launch Reaver against the “linksys” network above would look like this:


reaver -i mon0 -c 6 -b 00:23:69:48:33:95 -vv


The only part of the above command that might not be immediately obvious is “-vv”; this enables verbose output which greatly helps when trying to gauge how well Reaper is (or is not) progressing.

Once you’ve started Reaver, you’ll start seeing output like this:


This output shows that WPS pins are successfully being tried against the target (here we see 12345670 and 00005678 are being tested), and Reaver is operating normally.


Advanced Options

Ideally, the basic command works and the attack progresses as expected. But in reality, different manufacturers have been trying to implement protections against Reaver-style attacks, and additional options may be required to get the attack moving.

As an example, the following command adds a few optional switches that can help to get Reaver working on more picky devices:


reaver -i mon0 -c 6 -b 00:23:69:48:33:95  -vv -L -N -d 15 -T .5 -r 3:15


The core command hasn’t changed, the additional switches just change how Reaver behaves:


Ignore locked WPS state.


Don’t send NACK packets when errors are detected.

-d 15

Delay 15 seconds between PIN attempts.


Set timeout period to half a second.

-r 3:15

After 3 attempts, sleep for 15 seconds


This is by no means an exhaustive list of Reaver options, but it gives an idea on what kind of things you might want to try.


Attack Duration

Even under ideal conditions, Reaver can take a very long time to complete its run. There is an element of chance involved, the brute forcing could theoretically discover the PIN very quickly, but in general it is going to take many hours to even make a dent in the possible pool of PINs.

Luckily, Reaver keeps a progress log file automatically, so you can stop the attack at any time and resume whenever it’s convenient. Spending a few hours a day running Reaver against the same network should uncover its PIN and through that the WPA passphrase…eventually.

Learn More About Rogue Devices

Six Great DIY Projects for Hacking Computers and Networks

– By Alan Henry –

If you’re testing your hacking skills or trying to learn more about security, your toolkit shouldn’t end with your computer. If you’re willing to pick up a screwdriver, a soldering iron, or a few other tools, there are several great DIY hacking projects that’ll test your mettle and teach you a few things about networking at the same time. Let’s take a look at some of them.

This post is part of our Evil Week series at Lifehacker, where we look at the dark side of getting things done. Knowing evil means knowing how to beat it, so you can use your sinister powers for good. Want more? Check out our evil week tag page.

As with all hacking and network sniffing and monitoring projects, keep in mind that these are the kinds of things you should use ethically, on your own network or networks you have permission to probe. Your company’s IT department wouldn’t like it much if you started sniffing around their network, and neither would everyone else at the coffee shop trying to get work done. With that out of the way, let’s take a look.

Gov. Shumlin, Mayor Weinberger, Tech Businesses Announce Upcoming Tech Jam

News Release — Gov. Peter Shumlin
Oct. 22, 2014

Susan Allen

Event highlights growth in Vermont high-tech industry, Great Jobs in Vermont effort

BURLINGTON – Joined by Burlington Mayor Miro Weinberger, tech business owners, economic development officials and others at the new business Ello in Burlington, Gov. Peter Shumlin today touted the upcoming 2014 Vermont Tech Jam being held on Friday and Saturday, and highlighted Vermont’s growing high-tech industry and national recognition.

“We’re at Ello today because this company – the hottest new social media site since Facebook — is a great example of this booming part of our economy,” Gov. Shumlin said. “Ello is not alone. There are new companies across Vermont looking for employees to take these cutting-edge jobs. The growing popularity of Vermont Tech Jam is a testament to this thriving sector of our economy.”

Ello, which was co-founded by CEO Paul Budnitz, is an ad-free social network site with the motto “Beautiful, Simple and Ad-Free.” The site has seen exponential growth since its launch, particularly from people seeking an alternative to Facebook.

“Like Vermont, Ello is beautiful. Also like Vermont, Ello does not allow billboard advertising of any kind,” said Budnitz. “Ello is a very Vermont business — this is a state with a long history of successful businesses that take a stand for what they believe in, and make money doing it.”

The 8th Vermont Tech Jam (there were two Tech Jams in 2008), presented by and MyWebGrocer, takes place on Friday and Saturday, October 24 and 25, at Memorial Auditorium in Burlington. The Tech Jam is organized by independent newsweekly Seven Days and the Vermont Technology Alliance, the trade organization for the tech sector. The two were part of a coalition of public and private sector partners who started the Tech Jam in 2008.

“Tech Jam is one of the most exciting, optimistic events of the year,” said Mayor Weinberger. “The annual growth of the event reminds us how far the region’s tech sector has come and demonstrates Burlington’s potential to be a great tech city. Thanks to innovators like Paul Budnitz and his remarkable creation, Ello, Burlington is becoming recognized as an outstanding place to launch a start-up and grow tech businesses.”

The Vermont Tech Jam is a job fair and tech expo, with 60-plus exhibitors including some of Vermont’s largest employers (Fletcher Allen, IBM, Keurig Green Mountain, the State of Vermont, to some of its newest startups (Notabli, Xemory Software, GameTheory, Designbook). Colleges, universities and job training programs will also exhibit, including Champlain College, Vermont Tech, UVM Continuing and Distance Ed, CCV, Vermont Law School and Vermont Works for Women’s Step Up to IT program.

Cathy Resmer, Associate Editor of Seven Days and one of Tech Jam’s organizers, said exhibitor space sold out this year for the fourth year in a row. There are half a dozen companies on the waiting list. She said at least 48 exhibitors are actively looking to fill technical positions, including longtime Tech Jam supporters like, MyWebGrocer, Keurig Green Mountain, LORD MicroStrain, Logic Supply, Vermont Information Processing, Greensea Systems, Global-Z International, Middlebury Interactive Languages and SoundToys, as well as first-time exhibitors asicNorth, Linear Technology, IrisVR, Notabli, Level 3, Xemory Software and A.N. Deringer of St. Albans. Seven Days publishes its annual Tech Issue on the Wednesday before the Jam; 36,000 copies hit the streets on Wed. October 22. The Tech Jam program guide is inserted into every issue (see schedule below).

The State of Vermont has been a strong supporter of the Tech Jam, through the Agency of Education, the Agency of Commerce and Community Develop and the Vermont Department of Labor, all of which are sponsoring the Jam in various ways. The State of Vermont departments of Human Resources and Labor are also exhibitors.

“Not only do we help connect employers to job seekers, we also help tell the tech story of Vermont,” Resmer said. She noted that in January 2014, the website named Burlington one of the country’s Top 10 Most Promising Tech Hubs to Watch, citing the Tech Jam as one of the reasons.

In addition, the Governor said the state’s newly launched Great Jobs in Vermont campaign has seen early success. Great Jobs is a marketing and job posting site, launched in collaboration with the Department of Labor’s “Vermont Job Link,” connects job seekers in and out of state with exciting available job openings in Vermont businesses. Vermont’s autumn microsite that hosts has seen strong traffic through the autumn season, receiving over 44,000 users since September 10. Of the users, about 15,980 were from New York, 10,369 were from Massachusetts, 7,720 were from New Jersey, and 2,560 were from Vermont.

Kurt Nielsen of Keurig Green Mountain, founder of the Vermont Recruiters Association, said the group is using the Great Jobs in VT LinkedIn site to help get the word out about jobs openings. The LinkedIn group has already grown to 567 members with 138 current job postings. The Association was formed to attract and keep good employees from both inside and outside Vermont.

“With the growth of companies such as Ello,, Pwnie Express and other worldwide leaders in the tech sector, Vermont is becoming known nationally and internationally as a hotbed of technical ingenuity,” said Pat Moulton, Secretary of Commerce and Community Development. “And Burlington is fast joining the ranks of Boulder, Palo Alto, Cambridge and other start-up centers as an incubator for innovation.”

In addition to Ello, other recent startups include:
· Faraday of Middlebury, which uses computer learning to predict customer behavior and identify ways customers can save on energy.

· Yonder, the Woodstock-based app that Backpacker calls “What happens when Instagram and Foursquare meet at REI.”

· Pwnie Express of Barre, the maker of what WIRED Magazine has called “the little white box that can hack your network.”

· Inntopia, the Stowe-based developer of software for resort bookings and online reservations that was recently sold to Northstar Travel Media.

· Localvore of Burlington, an alternative to Groupon that just received another round of private funding.

· Logic Supply of South Burlington, which makes industrial-strength mini-computers that don’t break and are used by the Coast Guard and more.

· And Middlebury Interactive, which has doubled in size in the past 5 years and more than 170,000 students at 1,200 schools around the country use its digital language courses.

“These are the kinds of jobs that will keep Vermonters home, and attract people from across the country who want to work, play and raise their families here,” Gov. Shumlin said.

Tech Jam highlights, provided by Cathy Resmer:

Friday highlights:

— More than 400 middle and high school students from all across Vermont will visit the Tech Jam on Friday, October 24. Field trips will arrive from Middlebury, Williamstown, South Hero, Cabot, St. Albans, Moretown and Burlington, among others. Peter Drescher, the Agency’s Technology Coordinator, has organized a showcase of student projects on the Student STEM Stage.

— Education Secretary Rebecca Holcombe will be speaking at a press conference on Friday, October 24, to announce a new statewide initiative with Google and the State’s Division of Historic Preservation.

— Seven Days and The Agency of Commerce and Community Development present the Tech Tank, a 90-minute series of short talks that highlight innovative Vermont companies, including Greensea Systems, Mack Molding, Logic Supply, and MyWebGrocer.

— David Bradbury offers a guided tour of VCET@BTV, Burlington’s new tech hub in the FairPoint building across the street from the Jam.

— The Vermont Technology Alliance will announce the winners Tech Jam Awards, sponsored by Merchants Bank, in Generator, Burlington’s maker space. Commerce Secretary Patricia Moulton presents the awards Friday night. Finalists for the Innovation Award: IBM, Greensea Systems and Stone Environmental; finalists for the Ambassador Award: Girl Develop It Burlington, UVM Department of Computer Science, Bradley Holt and Jason Pelletier of Found Line.

Saturday highlights:

— Seven Days and Kids VT are hosting a Girls in STEM luncheon. We’re providing lunch for invited tech savvy teens interested in tech careers and local women role models in STEM fields, including Maureen McElaney of, founder of Girl Develop It Burlington, Rebecca Grenier, a developer at EatingWell Media Group, IBM engineer Jennifer Robbins and Professor Mercedes Rincon, a patent-holding researcher of UVM’s College of Medicine.

— Vermont EPSCoR presents a panel aimed at helping startups find funding. Presenters include entrepreneurs who have successfully gotten funding through federal SBIR grants (Steve Arms, founder of Microstrain; Jack Glaser, CEO of MBF Bioscience), as well as Cairn Cross from FreshTracks Capital.

— Burlington Mayor Miro Weinberger moderates a panel about BTV Ignite, the city’s partnership to leverage the opportunities created by its gigabit, fiber-to-the-home network.

Both days: HR reps offer tips on job-seeking strategies in “How to Get Hired” sessions; Logic Supply teaches people to build basic computers in workshops; GameTheory explains the process behind conceptualizing a successful video game in “paper prototyping” workshops; Vermont makers show their stuff and demonstrate equipment at Generator, Burlington’s new maker space.

WTF: The Internet of Things?

– By Mark Davis –

Many of us are still getting used to the idea of being connected to the internet through our smartphones. But just as we’re coming to accept that it may be impossible to ever truly get away from the web, a bizarre new term seems to suggest even more ways to be plugged in.

The “internet of things.”

WTF is that?

It boils down to a future in which internet connections will be built into tiny devices in all manner of products — refrigerators, light bulbs, industrial equipment — allowing them to speak to each other without human control. Apps would monitor them.

Two key advancements — the spread of wireless technology and the advent of the cloud, where massive quantities of data can be stored and accessed with ease — have ushered in the era of IoT.

In fact, it’s already upon us: Today, you can buy a so-called smart refrigerator that, with the help of tiny sensors, will tell you when you’re low on milk or eggs. The local sporting goods store sells plenty of wearable fitness devices that measure heart rate, pace, the running-route topography and just about anything else you can think of, and uploads the info to the cloud. Smart meters, which control energy use in your home and communicate back to the utility for billing and monitoring purposes, are growing in popularity.

Wait, there’s more.

Waterbury-based Keurig Green Mountain has hinted at a future in which its ubiquitous coffee machines may be connected to the internet. The bottom of the recently released Keurig 2.0 has a dataport for unspecified future uses.

The next generation of smart refrigerators won’t just tell you what to put on your shopping list. They’ll share that information with the grocery store, and as you pull into the store’s sensor-filled parking lot, clerks will have gathered the goods for you.

At least, that’s the future envisioned by South Burlington-based Logic Supply, which has been in the IoT game since before the term was coined.

While IoT consumer goods get most of the media attention, Logic Supply is focused on industrial applications.

For example, to help a mining company improve efficiency and keep better track of its inventory, Logic Supply installed computers in the mining carts, sensors on their tracks and a computer to upload all the information gleaned from those gizmos into the cloud, where it can be accessed in real time.

While most of its business is national and international, Logic Supply has worked with some Vermont companies, including Pwnie Express, which provides security products to governments and private companies.

“I think you’re going to continue to see more and more commercial applications for systems and devices that are speaking to each other, reacting to what others are doing,” Logic Supply content manager Darek Fanton predicted. “I don’t see the downside. It’s nothing but helpful. It creates efficiencies.”

Last year, Cisco Systems issued a report that claimed 8.7 billion devices were connected to the internet in 2012 — and the networking equipment manufacturer predicted the number would explode to 50 billion by 2020. The financial firm Morgan Stanley countered with its own prediction: 75 billion.

The McKinsey Global Institute lists the IoT as a “disruptive technology” with an worldwide “economic impact” that could reach $6.2 trillion by 2025.

The founders of MicroGen Systems hope to secure a piece of that pie. UVM alum Robert Andosca and professor Junru Wu created the company in 2007, basing it on research they did at UVM. MicroGen Systems makes miniscule wireless devices that “scavenge” energy from vibrations, and use it to power tiny sensors, according to the university. The company is now based in Rochester, N.Y.

“The internet of things is pretty much a lot of sensors on all things, and all they’re doing is detecting something, whether it’s vibration, heat, humidity, some parameter or multiple parameters,” Andosca said. “And all that data is transmitted to a hub, a computer, and gets uploaded on the internet, so now the whole world is connected and becomes smarter. It’s really an amazing time we live in.”

Of course, you might wonder, Haven’t I seen all this before? Isn’t this the point in the sci-fi movie where the machines realize they no longer need humans, so they take all the power we have given to them and use it to exterminate us?

Rest easy, IoT advocates say. The interconnected machines still need human input, and can only act within parameters we set.

“There’s a fine line between something being a very popular buzzword, and something being terrifying,” Fanton of Logic Supply said. “An intelligent machine is different than a machine that is thinking for itself. An intelligent machine, you give it parameters. It can react to what’s happening, but it’s not sentient. It’s not making those decisions without some input from you at some point.”

Well, that certainly sounds reassuring. If one day you wind up battling some homicidal machine-robot, at least there’s someone local to blame.

Shadow IT in Stores and Branches: How to Stay Compliant

– By Bob Tarzey –

Branches are where the rubber still hits the road for many organisations; where retailers still do most of their selling, where much banking is still carried out and where health care is often dispensed. However, for IT managers, branches are outliers, where rogue activity is hard to curb; this means branches can become security and compliance black spots.

Branch employees may see fit to make their lives easier by informally adding to the local IT infrastructure, for example installing wireless access points purchased from the computer store next door. Whilst such activity could also happen at HQ, controls are likely to be more rigorous. What is needed is an ability to extend such controls to branches, monitoring network activity, scanning for security issues and detecting non-compliant activity before it has an impact.

(Original Article)

The Pwnie Reviewer: Cybersecurity in the Public Eye

Now that Staples was hit, it seems that it’s official: breaches are becoming common, they’re being reported on, and there’s public interest. For once, though, the regular news media is lagging behind the rest of the entertainment industry: cybersecurity and data privacy have been cool in Hollywood for a long time.

Spy movies and cop procedurals have, for a long time, tackled the privacy and surveillance issues that were brought into the spotlight by Edward Snowden and his ilk. Questions of cops using potentially inadmissible evidence helped to educate the public on the subject, and wiretapping and other subjects have gotten more attention by their presence on TV than by their presence in the Supreme Court. Even Hollywood’s tech hardware has helped to influence public opinion about what things should look like: Star Trek very famously “predicted” the cellphone and other tools that now reflect, visually, their fictional predecessors.

For a short review on hacking in Hollywood, Computer World has a good – though extraordinarily subjective – list of the Top 10 Hacking Movies. This is only movies centered around hacking: as we see popular TV shows like “Scandal,” “The Blacklist,” and even “Agents of S.H.I.E.L.D,” references are popping up everywhere more and more frequently. Unfortunately, they rarely portray the “real deal.”

As technology becomes more and more a part of everyday life, it would seem to make sense that we will see more of it in our media. The question is whether or not it will be accurate, and how much, realistically, the public will learn from it. Cybersecurity is incredibly important, and it is vital for it to be incorporated fully into our national consciousness.


*Interesting note: for some reason, many hacking references seem to be of Nmap (as the organization itself has pointed out)

*Let’s be honest: Pwnie Express products sound and look like something right out of a movie. [See: the Pwnie Studios short film]

Quocirca – security vendor to watch – Pwnie Express

– By Bob Tarzey –

Branches are where the rubber still hits the road for many organisations; where retailers still do most of their selling, where much banking is still carried out and where health care is often dispensed. However, for IT managers, branches are outliers, where rogue activity is hard to curb; this means branches can become security and compliance black spots.


Branch employees may see fit to make their lives easier by informally adding to the local IT infrastructure, for example installing wireless access points purchased from the computer store next door. Whilst such activity could also happen at HQ, controls are likely to be more rigorous. What is needed is an ability to extend such controls to branches, monitoring network activity, scanning for security issues and detecting non-compliant activity before it has an impact.

(Original Article)

Enterprises Embrace Pwnie Express’s “Pwn Pulse” SaaS Security Assessment Solution First of Its Kind Enterprise-class Offering Provides Remote Location Intelligence

Boston, MA, October 21, 2014 – Enterprises across verticals have lauded Pwnie Express’s new Pwn Pulse software as a service (SaaS) solution, calling it “groundbreaking”  for its ability to easily provide visibility across their remote locations. The enterprises were taking part in the Beta program for Pwn Pulse, which became publicly available today.

“Pwn Pulse allows us to have true policies in regards to our networks and computers and a true way to test them,” said Eric Gilbert, Manager of IT Operations for Black, Mann & Gramm, L.L.P, who took part in the Beta program. “It gives us the ability to not only have the policies on hardening our hardware but also a way to verify that it’s where it’s supposed to be.”

Gilbert touted the system’s ease of use and management console, stating that you don’t have a to be “security guru” to fully leverage the Pwn Pulse.

“For Amarillo National Bank security of our customers’ information is paramount. We already know the power of Pwnie’s sensors that currently provide us with unprecedented wired and wireless asset discovery at our remote sites,” said Bill Davis, Data Security Officer at Amarillo National Bank. “We are excited to be taking part in the Pwn Pulse Beta program because it solves the pressing problem of continuous and comprehensive assessment of remote locations.”

Pwnie Express is the only company to assess wired and wireless network security in remote locations on demand.  Pwn Pulse enterprise-class offering uses Pwnie Express’s easy-to-deploy sensors combined with central management  to provide highly scalable continuous intelligence across remote locations.

An end-to-end security assessment solution designed specifically for hard-to-reach distributed remote sites, Pwn Pulse delivers real-time wired and wireless asset discovery, continuous vulnerability scanning, pentesting, risk trending and alerting.

The Pwn Pulse solution also scored top marks in a comprehensive security audit performed by leading security-consulting firm TrustedSec, LLC.

“We were very impressed with how Pwn Pulse compared to the security of most other SaaS platforms,” said Dave Kennedy, President and CEO of TrustedSec. “Pwnie Express is clearly paving the way to a new baseline security profile for SaaS.”

Known for its drop-box penetration testing solutions, the new SaaS solution completes the entire enterprise security assessment lifecycle. The solution delivers a robust centralized management console that:

o   Allows for out-of-the-box deployment of sensors

o   Aggregates and correlates sensor data

o   Provides trending and analysis of data with the ability to drill down to sensor asset level

Pwn Pulse also easily and seamlessly integrates with existing security information and event management (SIEM) products.

Product benefits:

o   Provides a cost-effective lightweight, non-intrusive and easy-to-deploy solution for remote locations

o   Delivers the most comprehensive asset discovery to remote sites

o   Extends vulnerability management to remote sites

o   Enables subsequent on-demand penetration testing to remote sites

o   Allows for easy anywhere multi-site deployment

o   Increases frequency and scope of remote site assessment

o   Expands awareness of wired, wireless, BYOD and rogue devices across all sites

o   Addresses PCI DSS and HIPAA compliance requirements at remote sites

o   Reduces travel and operational overhead required to do security testing

“Securing wired and wireless connections at remote locations has never been more critical with the proliferation of access points exponentially expanding the enterprise attack surface,” said Dave Porcello, CTO and founder of Pwnie Express. “Attackers seek the easiest point of entry, and today, with the widespread use of wireless devices, from printers to BYOD, and the lack of visibility into these locations, it has never been easier.”

Pwn Pulse provides consolidated asset discovery, vulnerability scanning, and pentesting in a single unified solution to deliver actionable risk information showing organizations where they are most vulnerable. This allows organizations to focus on high probability threats and threat vectors.

It also helps organizations meet regulatory standards including the Payment Card Industry Data Security Standard (PCI DSS) that requires penetration testing to be in compliance.

Pwn Pulse’s integrated intelligence delivers continuous in-depth analysis to accurately identify attack paths, allowing organizations to extend their security from the headquarters across their entire organization.


Pwn Pulse is  generally available. For more information please contact: (855) 793-1337.

[Press Release]