Throwing Star LAN Tap Pro
Description
Throwing Star LAN Tap Pro - LAN Monitoring Device
Pentest Tool for IT Security. Connect the Throwing Star LAN Tap (J1+J2) in line with a target network to be monitored. IT security hardware. Throwing Star LAN Tap Pro - LAN Monitoring Device Throwing Star LAN Tap Pro (pentest device) available at HackmoD Berlin. The Pro model features 10BASET and 100BASETX surveillance performance that you can carry in your pocket with no soldering or assembly required.
The LAN Tap Pro is so small and unobtrusive that it is hardly noticeable in a target network. If you don't need power for the passive tap, you can use RX and TX monitoring functions for your favorite packet sniffing programs (e.g. tcpdump, tshark, wireshark). While a gigabit network may not be tapped passively, the Throwing Star LAN Tap Pro features two specially placed capacitors that force 1000BASET networks to operate at lower speeds.
Typically 100BASETX, transparent to the end user. LAN Pentest Device Throwing Star LAN Pro. More on the Hackmac Blog.
1. Use Ethernet cables to connect the Throwing Star LAN Tap (J1 and J2) to a target network to be monitored. 2. Use Ethernet cables to connect one or both monitoring ports (J3 and J4) to ports on one or two monitoring stations. Each port monitors traffic in only one direction. 3. Use the software of your choice (such as tcpdump or Wireshark) on the monitoring stations to capture network traffic. This practical pentest device is quick and easy to install. Throwing Star LAN Tap Pro by Great Scott Gadgets.
Pentest Tool for IT-Security. Connect the Throwing Star LAN Tap (J1+J2) in line with a target network to be monitored. IT-Security Hardware.
Product safety information
Safety Notice: Penetrationtest Tools The use of Pentest Tools is subject to strict legal regulations. This device is a powerful tool for security analysis and penetration testing and must only be used in compliance with applicable laws. Unauthorized access to networks, privacy violations, or any other unlawful activities are strictly prohibited. Ensure that you have obtained explicit permission from the owner of the target network before use. Improper use may result in legal consequences, including criminal prosecution. Use the Pentest Tools solely for ethical and legal purposes, such as enhancing IT security within your organization or conducting authorized tests. The Manufacturer and the retailer assume no liability for damages resulting from misuse of this device. It is the user’s responsibility to comply with all local laws and regulations.
Manufacturer information
info(at)greatscottgadgets.com