The PKI 1705 WiFi Clone System consists of four components.
- A software jam controller that hides the target Wi-Fi hotspot, only this and the nearest accessible repeater, and ensures that clients disconnect from this hotspot.
- A hotspot controller that creates the new cloned Wi-Fi and silently connects the clients to it.
- A password hacking server to which the hotspot controller sends the collected data to enable password hacking.
- A management computer that operates at a remote location and allows the user to remotely control the entire system.
In this application, the PKI 1705 WiFi Clone System devices are connected to a Wi-Fi hotspot. When the Wi-Fi clone system is switched on, they are disconnected and covertly reconnected to the cloned hotspot. The device now uses the internet as before, but the network traffic is controlled and modified by the PKI 1705 WiFi Clone System. Various possibilities can be used to obtain the user’s access data: fake login pages, creation of already registered free Wi-Fi hotspots, advanced AI attacks, brute force attacks etc. The PKI 1705 WiFi Clone System analyses the hotspot to clone it, gets the necessary data, sends it to the remote hacking server. This is then able to discover and use the access data to clone the original hotspot.