1 FINFISHER: FinIntrusion Kit 2.2 Release Notes
2 Copyright 2011 by Gamma Group International, UK Date 2011-09-23 Release information Version Date Author Remarks 1.0 2010-06-29 ht Initial version 2.0 2011-05-26 Pk Changes for FinIntrusion Kit Version 2.0 2.0 2011-09-23 Pk Changes for FinIntrusion Kit Version 2.2
3 Table of Content 1 Overview... 4 2 ChangeLog... 5 3 Limitations... 7
4 1 OVERVIEW The FinIntrusion Kit is a multi-purpose IT Intrusion kit that has been built specifically for nowadays operations by Law Enforcement and Intelligence Agencies. It can be utilized in a wide-range of operational scenarios like: Breaking into- and monitoring Wireless and Wired Networks Remotely breaking into E-Mail Accounts Performing security assessments of Servers and Networks The full capabilities are shown in several training courses, each focusing on different operational usecases.
5 2 CHANGELOG Version: 2.2 Component Change Description General Bugfix Using a different Language Setting blocked some functionality inside FinIntrusion Kit. GUI Improvements Fix some GUI glitches. Language Improvement Update Language Files to Version 2.2 with all new Strings and Phrases. License Check Bugfix Spoofed MAC Addresses caused the License file to be invalid. Network / Configuration Network / Configuration / Scan Network / Configuration / Scan Improvement Bugfix Bugfix Input Validation for spoofed MAC Address After a network scan the "change MAC" button was activated (without changing the MAC address) Select a new interface will now delete the network target list. Network / Monitor Bugfix Some passwords or Usernames were not displayed correctly. Network / Monitor Improvement Empty Password or Username are supported now. Network / Monitor Monitor all (Improvement) Automatically add Targets which were not selected before if SSL Man-in-the-Middle is started. After the Network Sniffer is started, all Targets will be redirect automatically through the FinIntrusion Kit, without any User Interaction. Network / Monitor Monitor more than one Credentials were not been displayed. selected Target in parallel (Bugfix) Network / Monitor New Feature Beside the Export function through the popup menu, there is an Export button now.
6 Network / Monitor New Feature FTP Credentials can be used directly through menu entry Open in Browser. Network / Monitor New Feature Added column Target IP to List. Network / Monitor Bugfix Application crashed if Monitor All tried to stop previous Attacks. Network / Monitor Bugfix Monitor Target Stop Button couldn t be used until a new selection was done. Network / Monitor Bugfix Delete all listed targets in target list monitor all button didn t disappear. Network / Monitor Bugfix Fixed crash related to Monitor All functionality without any Targets in Network list. Network / Scan New Feature Network Scan can be stopped with Stop button. Operating System Improvement Update to BT5 / RC1 + WLAN Driver Patch Start Menu Bugfix Pre-selected Network Attack could only be used after a new selection was done. Wireless / Jammer Bugfix No wireless jamming against "non-associated" targets can be initiated. Wireless / Network Scanner Wireless / WEP Cracking Wireless Fake AP Wireless Fake AP Bugfix Improvement Reply to all ESSIDs (Improvement) Specific ESSID (Bugfix) Irregular Application crash if Wireless or Network Scanner was started. Status Messages Setup Access-Points for previous used Wireless Networks. Client Connections will be logged in the GUI and Activity Log. ESSIDs with Spaces are now supported. Wireless Fake AP New Feature Passive Sniffer for Wireless Targets which are connected through the Fake-AP Access-Point.
7 3 LIMITATIONS This chapter covers current known limitations within the FinIntrusion Kit Software. Feature Backtrack FinIntrusion Kit Description Backtrack includes a wide-range of publicly available IT Intrusion tools within the Toolset. As most of them are proofof-concept tools, their functionality cannot be guaranteed in every scenario. The software is an approach to automate complex attacks with a simple user interface. Due to the wide-range of different networks and scenarios, the implemented operations cannot be guaranteed to work in all scenarios without more advanced user interaction. The automated WEP cracking technique requires the Access- Point to be vulnerable against the fragmentation attack. USB Hard-Disk Password Generator from Websites WPA Cracking The rainbow tables and default word lists provide a selection of possible passwords. It is not guaranteed that the Target s passwords are contained within these lists. Only HTTP/HTTPS pages without pre-authentication could be scanned. No Proxy support at the moment. Only pure HTTP Webpages are supported. Password List could still have some useless Entries (e.g. script code), which must be removed manually. Only WPA/WPA2-PSK mode could be attacked. WPA/WPA2 in Enterprise mode couldn t be attacked. There exists no possibility to identify from outside in which mode the Wireless Network runs (PSK / Enterprise). The success to crack a WPA-PSK depends on the password list and CPU power and could take days / weeks or couldn t be found.
8