Finusb suite specifications finfisher: F



Download 3.48 Mb.
Page24/28
Date01.06.2018
Size3.48 Mb.
#52427
1   ...   20   21   22   23   24   25   26   27   28


MAC Address Wireless Adapter of Target Client



  • Vendor

  • Translated „Organizationally Unique Identifier“ (OUI) = uniquely identifies a vendor / manufacturer




  • BSSID

MAC Address of Access Point (if associated!)


  • Probed ESSID

Names of previous used Wireless Networks, which Wireless Client is searching for.
    1. Fake / Rogue Access Point


For this attack, the software emulates a fake Access Point which Wireless clients can find and connect to. This is a very useful attack to get access to targets network traffic and gain the position to attack their system.



Example of “Fake AP” was started

Two different types of Modes exist:


      1. Adapter Selection


If a client gets connected and cannot access the internet, no valuable traffic will be created from his side and therefore no essential data can be gathered from monitoring it.

To redirect all traffic from the target wireless stations FinIntrusion Kit system needs an internet connection/uplink.



Using this technique, clients will assign normally to the Access Point and use the internet as they normally do when using public hotspots.

Fake AP - Adapter could only be Wireless Adapter. On this adapter a “Fake Access Point” will be started.

Uplink - Adapter is any other adapter, than “Fake AP – Adapter”, which has the Status “UP”!!! This Interface will be used to provide Internet Access for all connected Wireless Clients. Typically a “cable network interface” should be used in this case.
      1. Reply-to and broadcast all seen ESSID’s:


In this mode, the software see’s all requests for Wireless LAN’s by systems and replies to all of them so the scanning systems connect to the emulated access point. This is very useful as especially Windows systems always scan for recently used Wireless networks (e.g. hotel/hotspot networks).



ESSID text field is deactivated. Gamma doesn’t recommend this Mode. If a Target Subject was previously connected e.g. “My Home Network” / “Hotel XYZ” / “Airport XYZ” and will be connect to an Access Point with the same “Network Name” it could be conspicuous (only if the Person is NOT in this environment anymore!).
      1. Emulate access-point only for ESSID


This feature will emulate a normal access-point which the target systems see when scanning for wireless networks. The chosen ESSID can trick people into selecting and associating to this network.


      1. “Monitor all” Button


A passive Network sniffer will be started in the background. Features are:

  • Capture all credentials from Wireless Clients which are connected to your Fake Access Point.

  • Traffic from all Wireless Clients will be captured, no single Target selection is necessary.

  • All Cleartext Passwords like FTP, IRC, SNMP, etc. will be captured (same like Non-SSL Mode in the network section)

  • A HTTPS  HTTP Emulation will be started automatically in the background, as long as it is supported by the Target Webpage.

Press the button to stop the Fake-AP and Monitor function.


  1. Download 3.48 Mb.

    Share with your friends:
1   ...   20   21   22   23   24   25   26   27   28




The database is protected by copyright ©ininet.org 2024
send message

    Main page