The included Wireless (802.11) and Bluetooth equipment can be used for short- and long-distance attacks against wireless networks/clients and Bluetooth-enabled devices.
Wireless examples:
Scanning for Wireless Networks and Clients
Breaking WEP/WPA/WPA2 Encryption
Emulating an Access-Point for Client-Side attacks
Monitoring Wireless LAN Traffic
Bluetooth examples:
Introduction
The FinIntrusion Kit is shipped with a copy of BackTrack 5, an operating system that is based on Linux and includes a complete set of up-to-date IT intrusion and analysis tools.
BackTrack operating system is used by numerous professional IT security companies world-wide.
Notebook Usage
Turn on the notebook and boot with the default settings. After the Backtrack graphical user interface (GDM) is loaded, it is ready to use.
The system can be customized using the programs included in the menu.
Installation Pre requirements:
Mono-runtime
Gtk-sharp2
Dhcp3-server
Whois
To install the software on the FinIntrusion Kit follow these steps:
Insert CD-Rom and open the folder FinIntrusion Kit
|
|
Click on the file “finintrusionkit_installer_v_XXX.ggi”
|
|
A shortcut for launching FinIntrusion Kit now appears on the desktop (/root/Desktop/FinIntrusionKit.desktop)
|
|
Share with your friends: |