1Overview 6
2FinIntrusion Kit – Toolset 7
3Equipment 9
3.1Notebook 9
3.2USB Hard-Disk 9
3.3Wireless Equipment 10
4Operating System 11
4.1Introduction 11
4.2Notebook Usage 11
5Installation 12
5.1Pre requirements: 12
5.2License 14
5.3Update Software 16
6Configuration 18
6.1Network Configuration 18
1Wireless Configuration 19
1Language Options 20
20
7FinIntrusion Kit – Network Intrusion 21
7.1Target Identification 21
OS System Scan can trigger an AV Detection / Warning and is not working against all Target systems. 22
23
7.2Monitor Target 24
7.2.1PCAP Recorder 25
7.2.2Open URL in Browser 27
8FinIntrusion Kit – Wireless Intrusion 28
8.1Wireless Network Identification 29
8.2Identify hidden ESSID 31
8.3Jam Wireless Network 32
8.4Break Encryption 33
8.4.1WEP Cracking 33
8.4.2WPA/WPA2-PSK 35
8.5Wireless Client Identification 37
8.6Fake / Rogue Access Point 38
8.6.1Adapter Selection 39
8.6.2Reply-to and broadcast all seen ESSID’s: 39
8.6.3Emulate access-point only for ESSID 40
8.6.4“Monitor all” Button 40
9Password Generator Utils 41
9.1Limitations 42
10FinIntrusion Kit – Other Options 43
10.1.1Delete / Delete all 43
10.1.2Data Export 43
11Activity Log 44
12Support 45