FinIntrusion Kit / Release Notes FINUSB SUITE SPECIFICATIONS. FINFISHER: FinIntrusion Kit 2.2 Release Notes



Similar documents
MITM Man in the Middle

Configuring the USB Wireless Adapter with GXV3140

Powerwifi USB Router in combination with the Powerwifi USB outdoor antenna

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Question How do I access the router s web-based setup page? Answer

Setting up a WiFi Network (WLAN)

9 Simple steps to secure your Wi-Fi Network.

Training module 2 Installing VMware View

DV230 Web Based Configuration Troubleshooting Guide

How To Secure A Wireless Network With A Wireless Device (Mb8000)

Configuring Security for FTP Traffic

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

Konica Minolta s Optimised Print Services (OPS)

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

Device Log Export ENGLISH

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October Last updated: 11 October Rev: 1.

WiFi-SB-L3 300M WiFi Router WiFi Bridge WiFi Repeater. WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server

Sentral servers provide a wide range of services to school networks.

Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page

ALL Mbits Powerline WLAN N Access Point. User s Manual

Pendragon Forms Industrial

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Topics in Network Security

Massey University Wireless Network - Client

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Nokia E61i Configuring connection settings

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012

STATIC IP SET UP GUIDE

Lab Configuring Access Policies and DMZ Settings

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Network Interface Table of Contents

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Sophos Endpoint Security and Control standalone startup guide

SonicWALL PCI 1.1 Implementation Guide

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

Configuring the WT-4 for ftp (Infrastructure Mode)

Using LAN Wi-Fi (WLAN) 3-2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) 3-3 Connecting Windows 3-5 Connecting Mac 3-8

Mailstation & DM Series Communications Device, LAN Constant Connection, PC Meter Connect, and Wi Fi Connection Networking Guide

CTS2134 Introduction to Networking. Module Network Security

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Print Server and Wireless Ethernet Print Server

CYBERTRON NETWORK SOLUTIONS

Quick Installation Guide

Kali Linux Cookbook. Willie L. Pritchett David De Smet. Chapter No. 9 "Wireless Attacks"

D-Link DAP-1360 Repeater Mode Configuration

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

Opera Wireless Mobilty

Talk-101 User Guides Mailgate Administration Guide

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server

Network User s Guide

Why is a strong password important?

NBG6815. User s Guide. AC2200 MU-MIMO Dual-Band Wireless Gigabit Router. Quick Start Guide. Default Login Details. Version 1.00 Edition 1, 02/2016

Professional Mailbox Software Setup Guide

Network User s Guide. Version 0 ENG

Windows XP User guide for wired network v1.1

Shield Pro. Quick Start Guide

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Configuring connection settings

Self Help Guide. Enable wireless and wireless security on your Belkin VoIP modem/router.

Lab Configuring Access Policies and DMZ Settings

SMC7901WBRA2-B1 Installation Guide

Exchange 2013 mailbox setup guide

P-660HWP-Dx. Quick Start Guide g HomePlug AV ADSL2+ Gateway. Version /2007 Edition 1. Copyright All rights reserved.

Network User s Guide

How to Configure edgebox as a Web Server

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)

CONNECTING THE RASPBERRY PI TO A NETWORK

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server

Wireless Auditing on a Budget

WLAN Outdoor CPE For 2.4G. Quick Installation Guide

Technical Brief. Wireless Intrusion Protection

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Integrating a Hitachi IP5000 Wireless IP Phone

Using SonicWALL NetExtender to Access FTP Servers

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Attack and Penetration Testing 101

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

OpenClinica SSL VPN Access New User Setup Guide

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

ALL0237R. Wireless N 300Mbit Access Point/Repeater. User s Manual

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Certified Wireless Security Professional (CWSP) Course Overview

WAP3205 v2. User s Guide. Quick Start Guide. Wireless N300 Access Point. Default Login Details. Version 1.00 Edition 2, 10/2015

WEP WPA WPS :: INDEX : Introduction :

Multi-Homing Gateway. User s Manual

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Multi-function Print Server

Chapter 3 Safeguarding Your Network

Kaseya Server Instal ation User Guide June 6, 2008

Security Awareness. Wireless Network Security

Software installation and configuration IEC-line series

AP6511 First Time Configuration Procedure

Cyber solutions for the fight against crime

Building secure wireless access point based on certificate authentication and firewall captive portal

4. Getting started: Performing an audit

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1,

Transcription:

1 FINFISHER: FinIntrusion Kit 2.2 Release Notes

2 Copyright 2011 by Gamma Group International, UK Date 2011-09-23 Release information Version Date Author Remarks 1.0 2010-06-29 ht Initial version 2.0 2011-05-26 Pk Changes for FinIntrusion Kit Version 2.0 2.0 2011-09-23 Pk Changes for FinIntrusion Kit Version 2.2

3 Table of Content 1 Overview... 4 2 ChangeLog... 5 3 Limitations... 7

4 1 OVERVIEW The FinIntrusion Kit is a multi-purpose IT Intrusion kit that has been built specifically for nowadays operations by Law Enforcement and Intelligence Agencies. It can be utilized in a wide-range of operational scenarios like: Breaking into- and monitoring Wireless and Wired Networks Remotely breaking into E-Mail Accounts Performing security assessments of Servers and Networks The full capabilities are shown in several training courses, each focusing on different operational usecases.

5 2 CHANGELOG Version: 2.2 Component Change Description General Bugfix Using a different Language Setting blocked some functionality inside FinIntrusion Kit. GUI Improvements Fix some GUI glitches. Language Improvement Update Language Files to Version 2.2 with all new Strings and Phrases. License Check Bugfix Spoofed MAC Addresses caused the License file to be invalid. Network / Configuration Network / Configuration / Scan Network / Configuration / Scan Improvement Bugfix Bugfix Input Validation for spoofed MAC Address After a network scan the "change MAC" button was activated (without changing the MAC address) Select a new interface will now delete the network target list. Network / Monitor Bugfix Some passwords or Usernames were not displayed correctly. Network / Monitor Improvement Empty Password or Username are supported now. Network / Monitor Monitor all (Improvement) Automatically add Targets which were not selected before if SSL Man-in-the-Middle is started. After the Network Sniffer is started, all Targets will be redirect automatically through the FinIntrusion Kit, without any User Interaction. Network / Monitor Monitor more than one Credentials were not been displayed. selected Target in parallel (Bugfix) Network / Monitor New Feature Beside the Export function through the popup menu, there is an Export button now.

6 Network / Monitor New Feature FTP Credentials can be used directly through menu entry Open in Browser. Network / Monitor New Feature Added column Target IP to List. Network / Monitor Bugfix Application crashed if Monitor All tried to stop previous Attacks. Network / Monitor Bugfix Monitor Target Stop Button couldn t be used until a new selection was done. Network / Monitor Bugfix Delete all listed targets in target list monitor all button didn t disappear. Network / Monitor Bugfix Fixed crash related to Monitor All functionality without any Targets in Network list. Network / Scan New Feature Network Scan can be stopped with Stop button. Operating System Improvement Update to BT5 / RC1 + WLAN Driver Patch Start Menu Bugfix Pre-selected Network Attack could only be used after a new selection was done. Wireless / Jammer Bugfix No wireless jamming against "non-associated" targets can be initiated. Wireless / Network Scanner Wireless / WEP Cracking Wireless Fake AP Wireless Fake AP Bugfix Improvement Reply to all ESSIDs (Improvement) Specific ESSID (Bugfix) Irregular Application crash if Wireless or Network Scanner was started. Status Messages Setup Access-Points for previous used Wireless Networks. Client Connections will be logged in the GUI and Activity Log. ESSIDs with Spaces are now supported. Wireless Fake AP New Feature Passive Sniffer for Wireless Targets which are connected through the Fake-AP Access-Point.

7 3 LIMITATIONS This chapter covers current known limitations within the FinIntrusion Kit Software. Feature Backtrack FinIntrusion Kit Description Backtrack includes a wide-range of publicly available IT Intrusion tools within the Toolset. As most of them are proofof-concept tools, their functionality cannot be guaranteed in every scenario. The software is an approach to automate complex attacks with a simple user interface. Due to the wide-range of different networks and scenarios, the implemented operations cannot be guaranteed to work in all scenarios without more advanced user interaction. The automated WEP cracking technique requires the Access- Point to be vulnerable against the fragmentation attack. USB Hard-Disk Password Generator from Websites WPA Cracking The rainbow tables and default word lists provide a selection of possible passwords. It is not guaranteed that the Target s passwords are contained within these lists. Only HTTP/HTTPS pages without pre-authentication could be scanned. No Proxy support at the moment. Only pure HTTP Webpages are supported. Password List could still have some useless Entries (e.g. script code), which must be removed manually. Only WPA/WPA2-PSK mode could be attacked. WPA/WPA2 in Enterprise mode couldn t be attacked. There exists no possibility to identify from outside in which mode the Wireless Network runs (PSK / Enterprise). The success to crack a WPA-PSK depends on the password list and CPU power and could take days / weeks or couldn t be found.

8