Finusb suite specifications finfisher: F



Download 3.48 Mb.
Page2/28
Date01.06.2018
Size3.48 Mb.
#52427
1   2   3   4   5   6   7   8   9   ...   28



1Overview 6

2FinIntrusion Kit – Toolset 7

3Equipment 9

3.1Notebook 9

3.2USB Hard-Disk 9

3.3Wireless Equipment 10

4Operating System 11

4.1Introduction 11

4.2Notebook Usage 11

5Installation 12

5.1Pre requirements: 12

5.2License 14

5.3Update Software 16

6Configuration 18

6.1Network Configuration 18

1Wireless Configuration 19

1Language Options 20

20


7FinIntrusion Kit – Network Intrusion 21

7.1Target Identification 21

OS System Scan can trigger an AV Detection / Warning and is not working against all Target systems. 22

23


7.2Monitor Target 24

7.2.1PCAP Recorder 25

7.2.2Open URL in Browser 27

8FinIntrusion Kit – Wireless Intrusion 28

8.1Wireless Network Identification 29

8.2Identify hidden ESSID 31

8.3Jam Wireless Network 32

8.4Break Encryption 33

8.4.1WEP Cracking 33

8.4.2WPA/WPA2-PSK 35

8.5Wireless Client Identification 37

8.6Fake / Rogue Access Point 38

8.6.1Adapter Selection 39

8.6.2Reply-to and broadcast all seen ESSID’s: 39

8.6.3Emulate access-point only for ESSID 40

8.6.4“Monitor all” Button 40

9Password Generator Utils 41

9.1Limitations 42

10FinIntrusion Kit – Other Options 43

10.1.1Delete / Delete all 43

10.1.2Data Export 43

11Activity Log 44

12Support 45

  1. Overview

The FinIntrusion Kit is a multi-purpose IT Intrusion kit that has been built specifically for nowadays operations by Law Enforcement and Intelligence Agencies. It can be utilized in a wide-range of operational scenarios like:



  • Breaking into- and monitoring Wireless and Wired Networks

  • Remotely breaking into E-Mail Accounts

  • Performing security assessments of Servers and Networks

The full capabilities are shown in several training courses, each focusing on different operational use-cases.

The following topics are covered within this document:



  • Equipment

  • Installation

  • Configuration

  • Usage

  • Support
  1. FinIntrusion Kit – Toolset


All the tools within the Backtrack system require advanced knowledge on basic techniques related to their purpose. Most tools have to be used on the command-line as they do not provide any graphical user interface.

The FinIntrusion Kit toolset is categorized into the following sub-categories:



  • Network: Tools for Local Area Network (LAN) Intrusion




  • Network Scanner discovers all Systems which are part of the same Local Area Network.

  • Network Scanner tries to identify Operating System and Hostname from Target PC.

  • Network Jammer prevents Internet Access for dedicated Systems.

  • Network Sniffer redirects Traffic in Local Area Network and logs Credentials from a Target PC.

  • MAC Change functions to spoof Hardware Address of a local Network Adapter.



  • Wireless: Tools for Wireless Network- and Client Intrusion




  • Wireless Scanner discovers Access Points and connected Wireless Clients from all Wireless Networks which could be reached with the Adapter (and Antenna).

  • Wireless Scanner discovers Wireless Clients which search for a known Wireless Network and emulate a “Fake” Access Point for these systems.

  • Hidden ESSID Identifier which starts attacks against specific Wireless Network to extract “Hidden ESSID”.

  • Wireless Jammer could be started against dedicated Wireless Clients or Access Point to re-route Target Systems over a “Fake” Access Point.

  • WEP Cracking against 40/64bit or 104/128bit protected Wireless Networks.

  • WPA Cracking against WPA-PSK or WPA2-PSK protected Wireless Networks.



  • Password: Password Generation Utilities




  • Password Generator from specific Website. This Generator extracts Words from a specified Website and generates a unique Password List.



  • Reporting:




  • Export Function to save all results to “*.csv” files.

  • Generate Activity Log with all Status and Result Messages.


  1. Download 3.48 Mb.

    Share with your friends:
1   2   3   4   5   6   7   8   9   ...   28




The database is protected by copyright ©ininet.org 2024
send message

    Main page