PC Surveillance. Hacking. Information Exploitation. Information Interception



Similar documents
FinFisher IT Intrusion Products

FINFISHER. it intrusion. Remote Monitoring & Infection Solutions FINSPY QUICK INFORMATION

FINFISHER : GovERNmENtal It INtRuSIoN and REmotE monitoring SolutIoNS

Detailed Description about course module wise:

Certified Ethical Hacker Exam Version Comparison. Version Comparison

FINFISHER : GOVERNMENTAL IT INTRUSION AND REMOTE MONITORING SOLUTIONS. FINFISHER. it intrusion

EAGLE EYE Wi-Fi. 1. Introduction

Cyber solutions for the fight against crime

Build Your Own Security Lab

Hacking Database for Owning your Data

Loophole+ with Ethical Hacking and Penetration Testing

PENTEST. Pentest Services. VoIP & Web.

Ethical Hacking & Cyber Security Workshop

FORBIDDEN - Ethical Hacking Workshop Duration

Ethical Hacking Course Layout

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Certified Cyber Security Analyst VS-1160

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

CEH Version8 Course Outline

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

FinIntrusion Kit / Release Notes FINUSB SUITE SPECIFICATIONS. FINFISHER: FinIntrusion Kit 2.2 Release Notes

Worms, Trojan Horses and Root Kits

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Spyware Doctor Enterprise Technical Data Sheet

Certified Ethical Hacker (CEH)

Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer:

CRYPTUS DIPLOMA IN IT SECURITY

INSTANT MESSAGING SECURITY

Web Applications The Hacker s New Target

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

The Value of Physical Memory for Incident Response

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000

The Key to Secure Online Financial Transactions

Section 12 MUST BE COMPLETED BY: 4/22

A Systems Engineering Approach to Developing Cyber Security Professionals

FinSpy / User Manual FINUSB SUITE SPECIFICATIONS. FINFISHER: FinSpy 3.00 User Manual

13 Ways Through A Firewall

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Potential Targets - Field Devices

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Smart Card APDU Analysis

Security in DSL Networks. Issues and Solutions for Small-to-Medium Sized Enterprises

TE100-P21/TEW-P21G Windows 7 Installation Instruction

ETHICAL HACKING CYBER SECURITY

How To Protect Your Network From Attack From A Hacker (For A Fee)

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Who is Watching You? Video Conferencing Security

Safe internet for business use: Getting Started Guide

Assessing Network Security

RMAR Technologies Pvt. Ltd.

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

(606) Knott County (606) Perry County (606) Letcher County.

Windows Operating Systems. Basic Security

Employee PC and Server Activity Monitoring Solution

Norton Personal Firewall for Macintosh

13 Ways Through A Firewall What you don t know will hurt you

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Wireless Auditing on a Budget

Threat Events: Software Attacks (cont.)

Introduction on Low level Network tools

The Self-Hack Audit Stephen James Payoff

Security Evaluation CLX.Sentinel

Automatic Hotspot Logon

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Network Attacks and Defenses

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

CS 356 Lecture 9 Malicious Code. Spring 2013

Penetration Testing with Kali Linux

Configuring Bria 3 Mac for Virtual Contact Center

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

EC-Council Certified Security Analyst (ECSA)

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

ICANWK406A Install, configure and test network security

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Step by step guide how to password protect your USB flash drive

Course: Information Security Management in e-governance

Kick starting science...

ManageEngine Desktop Central Training

Network Incident Report

CYBERTRON NETWORK SOLUTIONS

Configuration and Access of FTP Server

Spyware. Summary. Overview of Spyware. Who Is Spying?

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)

Course Content: Session 1. Ethics & Hacking

Transcription:

IT INTRUSION FinFisher Product Suite

Usage Information Gathering PC Surveillance Hacking Information Exploitation Information Interception 2

Components FinFisher USB Suite FinFisher Remote Hacking Kit FinSpy FinFly FinTraining FinAudit New Products - 2008 3

FinFisher USB Suite Suite to locally extract information from target systems with little or no user interaction Data analysis/report generation at Headquarters 4

FinFisher USB Suite FinFisher HQ FinFisher 1 FinFisher 2 FinFisher 3 Components FinFisher Remote Hacking Kit FinSpy FinFly FinTraining FinAudit New Products - 2008 5

FinFisher HQ Graphical User Interface for FinFisher 1 and 2 Used to configure operational options Generates certificates for encryption Deciphers and imports data from dongles Generates reports from gathered data Updates FinFisher 1 and 2 systems 6

FinFisher HQ 7

FinFisher USB Suite FinFisher HQ FinFisher 1 FinFisher 2 FinFisher 3 Components FinFisher Remote Hacking Kit FinSpy FinFly FinTraining i i FinAudit New Products - 2008 8

FinFisher 1 U3 USB Dongle Executes on insertion with little or no user intervention Obtains system and account information for: Windows Accounts E-Mail Accounts (Microsoft Outlook / Express, ) Instant Messenger Accounts (MSN, Yahoo, ICQ, ) System Details (Product Keys, Hotfixes, ) Network Information (Open Ports, Cookies, History, ) All gathered data is asymmetrically enciphered Bypasses installed Anti-Virus/Anti-Spyware software 9

FinFisher 1 10

FinFisher USB Suite FinFisher HQ FinFisher 1 FinFisher 2 FinFisher 3 Components FinFisher Remote Hacking Kit FinSpy FinFly FinTraining i i FinAudit New Products - 2008 11

FinFisher 2 U3 USB Dongle Executes on insertion with little or no user intervention Gets a copy of all locally stored E-Mails from the target system Obtains specific files by file-extension extension (e.g. all.doc and.xls files) All gathered data is asymmetrically enciphered Bypasses installed Anti-Virus/Anti-Spyware software 12

FinFisher 2 13

FinFisher USB Suite FinFisher HQ FinFisher 1 FinFisher 2 FinFisher 3 Components FinFisher Remote Hacking Kit FinSpy FinFly FinTraining i i FinAudit New Products - 2008 14

2 Bootable CD-Roms: FinFisher 3 1. Removes password for selected Windows user account 2. Securely wipes local hard-disks 15

Components FinFisher USB Suite FinFisher Remote Hacking Kit FinSpy FinFly FinTraining FinAudit New Products - 2008 16

FinFisher Remote Hacking Kit Used for remote information gathering Provides up-to-date t hacking environment Can target public servers and personal computers 17

FinFisher Remote Hacking Kit Ruggedized notebook FinTrack operating system Various scripts for automating attack procedures All major up-to-date hacking tools 18

FinFisher Remote Hacking Kit High-power Wireless LAN adapter Bluetooth th adapter with antenna plug Directional/Omni-directional antenna 500 GB USB disk containing Rainbow Tables, default password lists, etc. USB-to-Ethernet adapter PS/2 and USB Keylogger Other 19

Components FinFisher USB Suite FinFisher Remote Hacking Kit FinSpy FinFly FinTraining FinAudit New Products - 2008 20

FinSpy Professional Trojan Horse Monitor and remotely access one or multiple systems Presence on target system is hidden All communication is hidden and enciphered Components: FinSpy Client FinSpy Server FinSpy Target FinSpy USB-U3 Dongle (Target) FinSpy Antidote 21

Features: Custom Executables FinSpy Bypasses Anti-Virus/Anti-Spyware Software Location Tracing Scheduled Operations Key Logging g Password Gathering Webcam/Microphone Access Communication Sniffing: Skype Instant Messengers (ICQ, Yahoo, ) Other 22

Components FinFisher USB Suite FinFisher Remote Hacking Kit FinSpy FinFly FinTraining FinAudit New Products - 2008 23

FinFly Used to infect executables while downloading Components: Transparent HTTP Proxy EXE Loader Proxy attaches Trojan Horse software to downloaded executables on-the-fly Loader removes attached software from downloaded executable after installation Can be used on local networks (e.g. Wireless LANs) ISP Version to come in 2008 24

Components FinFisher USB Suite FinFisher Remote Hacking Kit FinSpy FinFly FinTraining FinAudit New Products - 2008 25

FinTraining: Basic Hacking Courses 1 or 2 week basic hacking overview Covers various common hacking techniques Practical examples, demonstrations and exercises Topics include: Footprinting/Scanning/Enumeration t g at o Networks Exploits Wireless LANs Bluetooth th Other 26

FinTraining Advanced: Exploiting Software 1 week course Covers bugs in software and exploiting these Practical examples, demonstrations and exercises Topics include: Software Bugs Exploit Archives/Frameworks Shellcode Finding Bugs Customizing Exploits Other 27

FinTraining Advanced: Rootkits 1 week course Covers RootKit and Trojan horse techniques Practical examples, demonstrations and exercises Topics include: Analysis Usage Detection Development Other 28

FinTraining Advanced: Hacking VoIP 1 week course Covers Voice-over-IP eavesdropping and various attack techniques Practical examples, demonstrations and exercises Topics include: RTP Sniffing RTP Insertion SIP Account Brute-Forcing SIP Account Cracking Other 29

FinTraining Advanced: Wireless Hacking 1 week course Covers Wireless LANs, Bluetooth and Wireless Keyboards Practical examples, demonstrations and exercises Topics include: Wireless LAN WEP/WPA Cracking Bluetooth Link-Key Cracking Wireless Keyboard Sniffing Other 30

FinTraining Advanced: Covert Comms 1 week course Covers steganography, encryption, network and application protocols Practical examples, demonstrations and exercises Topics include: Hiding data in objects Hiding data in streams Hiding VoIP communication Other 31

FinTraining Advanced: More More topics upon request Courses are customized according to customers needs and skill-set 32

Components FinFisher USB Suite FinFisher Remote Hacking Kit FinSpy FinFly FinTraining FinAudit New Products - 2008 33

FinAudit 1 or 2 week penetration test Security check of networks, systems and software Helps analyzing various attack vectors and finding vulnerabilities i Prevents data disclosure and intrusion Finalizing report and consulting services 34

Components FinFisher USB Suite FinFisher Remote Hacking Kit FinSpy FinFly FinTraining FinAudit New Products - 2008 35

News 2008: FinFly ISP FinFly that is capable of working in ISP networks Can infect en-masse or targeted systems Ready: Mid/End of 2008 36

News 2008: FinCrack Super-Cluster to crack Passwords/Hashes Size and Speed customized to requirements Supports: Microsoft Office Documents NTLM/LM WPA Networks Unix DES WinZIP PDF Other modules can be provided upon request Ready: Mid/End of 2008 37

News 2008: FinWifiKeySpy Wireless Keyboard Sniffer Sniffs all keystrokes of wireless keyboard within antenna range Able to inject keystrokes to remote computers Supports all major vendors (Microsoft, Logitech) Ready: End of 2008 38

News 2008: FinBluez Product for various Bluetooth attacks, e.g.: Utilize Bluetooth headsets as audio bugs Record audio stream between headset and mobile phone Ready: End of 2008 39