Wireless Network Monitor & Analyzer

for WiFi is a powerful wireless network monitor and analyzer for 802.11 a/b/g/n/ac networks. Loaded
with many user-friendly features, CommView for WiFi combines performance and
flexibility with an ease of use unmatched in the industry.

for WiFi captures every packet on the air to display important information such
as the list of access points and stations, per-node and per-channel statistics, signal strength, a list of packets and
network connections, protocol distribution charts, etc. By providing this information, CommView for WiFi can
help you view and examine packets, pinpoint network problems, and troubleshoot
software and hardware.

for WiFi includes a VoIP module for in-depth analysis, recording, and playback
of SIP and H.323 voice communications.

can be decrypted utilizing user-definedWEP or WPA-PSK keys and are decoded down
to the lowest layer. With over 70 supported protocols, this network analyzer
allows you to see every detail of a captured packet using a convenient
tree-like structure to display protocol layers and packet headers.
Additionally, the product provides an open interface for plugging in custom
decoding modules.

What you can do with CommView for WiFi

  • ·        
    Scan the air for WiFi stations and access points.
  • ·        
    Capture 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac WLAN
  • ·        
    Specify WEP or WPA keys to decrypt encrypted packets.
  • ·        
    View detailed per-node and per-channel statistics.
  • ·        
    View detailed IP connections statistics: IP addresses, ports,
    sessions, etc.
  • ·        
    Reconstruct TCP sessions.
  • ·        
    Configure alarms that can notify you about important events, such
    as suspicious packets, high bandwidth utilization, unknown addresses, rogue
    access points, etc.
  • ·        
    View protocol “pie” charts.
  • ·        
    Monitor bandwidth utilization.
  • ·        
    Browse captured and decoded packets in real time.
  • ·        
    Search for strings or hex data in captured packet contents.
  • ·        
    Log individual or all packets to files.
  • ·        
    Load and view capture files offline.
  • ·   Import and export packets in Sniffer®, EtherPeek™, AiroPeek™,
    Observer®, NetMon, Tcpdump, hex, and text formats.

You can
download evaluation versions
of our products and try them for 30 days

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...