Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 FINFISHER: FinIntrusion Kit 2.2 Product Training.

Similar presentations


Presentation on theme: "1 FINFISHER: FinIntrusion Kit 2.2 Product Training."— Presentation transcript:

1 1 FINFISHER: FinIntrusion Kit 2.2 Product Training

2 2 Table of Content 1.Introduction 2.Update & License 3.Network Intrusion 4.Wireless Intrusion 5.Password Utility 6.Activity Log

3 3 Portfolio Overview FinSpy FinSpy Mobile FinFly FinUSB Suite FinIntrusion Kit FinFireWire FinTraining FinAdvisory

4 4 FinIntrusion Kit / Operational Usage The FinIntrusion Kit is a portable IT Intrusion kit which can be used for various strategic and tactical attacks by red-teams inside or outside the Headquarters. Typical Operations: Wireless Networks:  Break Encryption and record all Traffic  Record Usernames and Passwords even for SSL-encrypted sites (e.g. Facebook, MySpace, Online Banking) Access remote Systems:  Gain access to remote Infrastructures and Webservers  Get access to Accounts

5 5 FinIntrusion Kit / Core Features Discover Wireless LANs (802.11) devices Recover WEP (64 and 128 bit) Passphrase within 2-5 minutes Break WPA1 and WPA2 Passphrase using Dictionary Attacks Emulate Rogue Wireless Access-Point (802.11) Actively monitor Local Area Network (Wired and Wireless) and extract Usernames and Passwords even for SSL/TLS-encrypted Sessions like GMail, Hotmail, Facebook, etc. Crawl and extract Words from a webpage and generate a Wordlist.

6 6 Notebook (Backtrack 5 pre-installed) FinIntrusion Kit Software (pre-installed) Wireless Intrusion Hardware FinIntrusion Kit / Covert Tactical Unit

7 7 FinIntrusion Kit – Main Screen Menu Bar Main Panel

8 8 FinIntrusion Kit – Menu Bar  Change Update settings and check for Updates.  Install a new License or display License information.  Choose your Language.  Display FinIntrusion Kit version and EULA.  Visit the FinFisher Support Website.

9 9 Table of Content 1.Introduction 2.Update & License 3.Network Intrusion 4.Wireless Intrusion 5.Password Utility 6.Activity Log

10 10 FinIntrusion Kit – Menu Bar – Updates

11 11 FinIntrusion Kit – Menu Bar – Updates  Change Update settings  Check for Updates now DisabledNo Update request will be done automatically. At StartupAn update request will be triggered on application start DailyAn update request will be triggered every day. WeeklyAn update request will be triggered every week. MonthlyAn update request will be triggered every month.  Import an Updates Package by yourself No online request will be done. Update Package could be stored locally or on an external Harddisc.

12 12 FinIntrusion Kit – Menu Bar – License

13 13  No License is installed FinIntrusion Kit – Menu Bar – License  Valid License is installed

14 14 FinIntrusion Kit – Menu Bar – Language

15 15 FinIntrusion Kit – Menu Bar – Language  Choose your Language. Status Messages, Menu Entries, Results are displayed in your selected Language. (Configuration Parameter stored in “FinFisherDate.cfg” file) Language Code in „FinFisherDate.cfg“ de-DEGerman (Germany) ar-SAArabic (Saudi Arabia) pt_PTPortuguese (Portugal) es-ESSpanish (Spain) en-USEnglish (United States / International) ru-RURussian fr-FRFrench (Standard)  Accept changes. Application must be restarted!

16 16 FinIntrusion Kit – Menu Bar – About

17 17 FinIntrusion Kit – Menu Bar – About  Display content of FinIntrusion Kit EULA (“End-User Licensing Agreement”)

18 18 FinIntrusion Kit – Menu Bar – About

19 19 FinIntrusion Kit – Menu Bar – Online Help Load an after-sales website that gives the customers the following capabilities:  Download product information (latest User Manuals, Specifications, Training Slides)  Access change-log and roadmap for products  Report bugs and submit feature requests  Inspect frequently asked questions (FAQ)

20 20 Table of Content 1.Introduction 2.Update & License 3.Network Intrusion 4.Wireless Intrusion 5.Password Utility 6.Activity Log

21 21 FinIntrusion Kit – MAIN Panel

22 22 Table of Content Network Intrusion Adapter Configuration  Refresh  Renew IP  Change MAC Address Target List  Network Scan  Network Jammer  Network Password Sniffer Network Password Sniffer  Password Sniffer Modes  PCAP Recorder

23 23 FinIntrusion Kit – Network Intrusion Network Intrusion Features: 1.Network Adapter Information & Configuration 2.Search and Identify Target Systems 3.Jam Target 4.Sniffing Credentials

24 24 Table of Content Network Intrusion Adapter Configuration  Refresh  Renew IP  Change MAC Address Target List  Network Scan  Network Jammer  Network Password Sniffer Network Password Sniffer  Password Sniffer Modes  PCAP Recorder

25 25 FinIntrusion Kit – Network – Adapter Configuration Network Adapter Configuration provides: A.Network Information 1)IP – Address 2)Default Gateway IP Address 3)IP Address(es) of all defined Nameservers 4)(actual) MAC Address 5)Connection Speed 6)Adapter Status B.Refresh Adapter List C.Renew IP Address = Get an IP Address via DHCP D.Possibility to Change / Spoof MAC Address from selected Network Adapter A B C D

26 26 Table of Content Network Intrusion Adapter Configuration  Refresh  Renew IP  Change MAC Address Target List  Network Scan  Network Jammer  Network Password Sniffer Network Password Sniffer  Password Sniffer Modes  PCAP Recorder

27 27 FinIntrusion Kit – Network – Target List After „Scan Network“ Button was pressed all identified Targets inside the Network will be listed.

28 28 FinIntrusion Kit – Network – Target List Target List – Column Overview IP Address MAC Address MAC Vendor System Name OS IconOperating System Status IconStatus IP Address of Target System MAC Address of Target System Translated „Organizationall y Unique Identifier“ (OUI) = uniquely identifies a vendor / manufacturer Identified System / Hostname of Target System - unknown - Windows - Linux - Apple / Mac - Embedded (e.g. Printer) Identified Operating System and Probability - Password Sniffer / Recorder is running - Network Jammer is running Status Message if an attack runs in the background

29 29 FinIntrusion Kit – Network – Target List – Submenu Select a column + press „right mouse button“  Pop up a „Menu“, which lists all possible options.

30 30 FinIntrusion Kit – Network – Target List – Submenu - Delete „Delete Selected Target“  Remove selected entry from „Target List“ „Delete All...“  Remove any entries from „Target List“

31 31 FinIntrusion Kit – Network – Target List – Submenu - Delete Before After

32 32 FinIntrusion Kit – Network – Target List – Submenu - Export „Export List...“  Export a tab seperated Target List into an external Textfile. This File could be loaded e.g. with Excel. choose a Filename press „Export“ Button to generate the file

33 33 FinIntrusion Kit – Network – Target List – Submenu - Export  Analyse exported file with Microsoft Excel

34 34 FinIntrusion Kit – Network – Target List – Submenu - Jammer „Jam Target“  Start a Network Jammer against selected Target IP Address Before (e.g. „ping“ / ICMP) After

35 35 FinIntrusion Kit – Network – Target List – Submenu - Jammer Details  Network Jammer initiates a „ARP Cache Poisoning“ Attack against Target PC and overwrite MAC Address from Default Gateway with an invalid value. Before (ARP Cache on Target PC)After (Start „ARP Cache Poisoning“

36 36 Table of Content Network Intrusion Adapter Configuration  Refresh  Renew IP  Change MAC Address Target List  Network Scan  Network Jammer  Network Password Sniffer Network Password Sniffer  Password Sniffer Modes  PCAP Recorder

37 37 FinIntrusion Kit – Network – Target List – Submenu - Monitor „Monitor Target“  Initiates a sniffer to capture Hostname / IP-Address / URL, Protocol and Credentials (Username & Password) Examples

38 38 FinIntrusion Kit – Network – Target List – Submenu - Monitor „Monitor Modes & Protocols“ ModeProtocols (Examples) ModeProtocols (Examples) ModeProtocols (Examples) „Non“ SSL Mode = Capture Credentials which were transmitted in CLEARTEXT  SMTP  Pop3  Imap  Telnet  SNMP  HTTP  FTP ... „Non“ SSL Mode = Capture Credentials which were transmitted in CLEARTEXT and try to redirect HTTPS  HTTP  SMTP  Pop3  Imap  Telnet  SNMP  HTTP & HTTPS (Redirect)  FTP ... SSL Mode = Capture Credentials which were transmitted in CLEARTEXT and „encrypted“ with SSL  SMTP & SMTPS  Pop3 & Pop3s  Imap & Imaps  Telnet  SNMP  HTTP & HTTPS  FTP ...

39 39 FinIntrusion Kit – Network – Target List – Submenu - Monitor „Monitor Modes / Pro & Contra“ ProContra ProContra ProContra - Capture Cleartext Passwords without the risk to trigger a Warning on Target PC. - No Credentials which were transfered encrypted through a SSL tunnel could be connected. - Capture Cleartext Passwords without the risk to trigger a Warning on Target PC. - No HTTPS Certificate Warning pops up (if HTTPS  HTTP redirect is working (otherwise Certificate Warning!) HTTPS Emulation could be suspicious and is not working on every webserver (web application must support HTTP too) - No SSL Credentials could be captured! - „SSL“ and „non SSL“ could be captured. Certificate Warning inside Web Browser & Clients will warn User or block the communication.

40 40 FinIntrusion Kit – Network – Target List – Submenu - Monitor „PCAP Recorder Modes “ ModeDesc ModeProtocols (Examples) ModeProtocols (Examples) Select / Deselect „Activate SSL“ AND Select „Activate PCAP Recorder“ Will activate a PCAP Recorder for selected Target IP (= selected row). If „Activate SSL“ is activated, SSL Credentials will also be recorded. Otherwise only Cleartext Credentials could be recorded. „tcpdump“Generate a Network Capture File (= pcap file) with „tcpdump“ in the background. A capture Filter for selected IP will be used. No Traffic Analyzer will be started. Generate a File: „/tmp/fik_pcap_recorder _IP-ADDRESS.pcap“ „Wireshark“Start Wireshark in the foreground with a capture filter for selected Target IP (= selected row). Capture File must be saved at the end of the session!!!

41 41 FinIntrusion Kit – Network – Passwords „Export List“  Export a tab seperated Credential List into an external Textfile.

42 42 FinIntrusion Kit – Network – Passwords – Submenu „Select Row  press Mouse Key  Submenu opens“ Open a FTP / HTTP(S) Urls into System Browser

43 43 FinIntrusion Kit – Network Intrusion Exercise Hands-On

44 44 FinIntrusion Kit – Network Intrusion Start FinIntrusion Kit and Tests: 1.Try to find & identify all Systems in the LAN. 2.Export a list of all Target Systems to a file. 3.Start a Network Jammer against your Target PC. 4.Monitor your Target and try to capture: a)FTP, HTTP, SMTP, POP3, IMAP Passwords b)„HTTPS“ Passwords with „HTTPS Emulation“ c)POP3s & IMAPs Passwords 5.Export captured Passwords into a file. 6.Open URL and verify captured HTTP(S) Password.

45 45 Table of Content 1.Introduction 2.Update & License 3.Network Intrusion 4.Wireless Intrusion 5.Password Utility 6.Activity Log

46 46 FinIntrusion Kit – MAIN Panel

47 47 Table of Content Wireless Intrusion Adapter Configuration Access Point  Wireless Network Scan  Identify Hidden SSID  Break WEP / WPA  Jam Access Point  Setup „Fake AP“ Wireless Clients  Wireless Client Scan  Jam Wireless Client  Setup „Fake AP“ Fake AP  Setup / Config a „Fake AP“

48 48 FinIntrusion Kit – Wireless Intrusion Wireless Intrusion Features: 1.Wireless Adapter Information & Configuration 2.Search and Identify Wireless Networks & Clients 3.Jam Wireless Networks & Clients 4.Identify Hidden ESSID 5.Break WEP & WPA Encryption 6.Setup Fake Accesspoint & Redirect Wireless Clients

49 49 Table of Content Wireless Intrusion Adapter Configuration Access Point  Wireless Network Scan  Identify Hidden SSID  Break WEP / WPA  Jam Access Point  Setup „Fake AP“ Wireless Clients  Wireless Client Scan  Jam Wireless Client  Setup „Fake AP“ Fake AP  Setup / Config a „Fake AP“

50 50 FinIntrusion Kit – Wireless – Adapter Configuration Wireless Adapter Configuration provides: I. II. I. Network Information 1)Wireless Chipset 2)IP – Address 3)Default Gateway IP Address 4)IP Address(es) of all defined Nameservers 5)(actual) MAC Address 6)Connection Speed 7)Adapter Status II. Refresh Adapter List (e.g. after a new Adapter was plugged in or removed)

51 51 Table of Content Wireless Intrusion Adapter Configuration Access Point  Wireless Network Scan  Identify Hidden SSID  Break WEP / WPA  Jam Access Point  Setup „Fake AP“ Wireless Clients  Wireless Client Scan  Jam Wireless Client  Setup „Fake AP“ Fake AP  Setup / Config a „Fake AP“

52 52 FinIntrusion Kit – Wireless – Access Points After „Search WLAN“ Button (= I.) was pressed all identified Accesspoints (= II.) and Connected Wireless Clients (= III.) for the selected Access Point will be listed. I. II. III.

53 53 FinIntrusion Kit – Wireless – Access Point ESSIDBSSIDChannelEncryptionPowerIVStatus ESSID = SSID = Wireless Network Name. The SSID can be up to 32 characters long and is case sensitive. MAC Address of Wireless Access Point Channel used by Access Point Type of Encryption:  „OPN“ (= Open = No Encryption)  WEP  WPA  WPA2 Transmission Power of Wireless Access Point Initialization Vector Counter  useful for WEP Cracking Status Message if an attack runs in the background

54 54 FinIntrusion Kit – Wireless – Access Point – Connected Clients Client MACMAC VendorPower MAC Address of connected Client(s) for selected Access Point Translated „Organizationally Unique Identifier“ (OUI) = uniquely identifies a vendor / manufacturer Transmission Power of Wireless Client

55 55 FinIntrusion Kit – Wireless – Access Point – Submenu - Delete „Delete Selected Access Point“  Remove selected Entry from „Access Point List“ „Delete All...“  Remove any Entries from „Access Point List“

56 56 FinIntrusion Kit – Wireless – Access Point – Submenu - Export „Export List...“  Export a tab seperated list of Access Points into an external textfile. This file could be loaded e.g. with Excel. choose a filename „Export“ Button to generate the file

57 57 FinIntrusion Kit – Wireless – Access Point – Submenu - Export  Analyse exported file with Excel

58 58 FinIntrusion Kit – Wireless – Access Point – Submenu – Jam AP „Jam Access Point“  Start a Wireless Jammer against selected Access Point. Sends out de-authentication Packages. Operating Modes: ModeDescription Select an Access Point and no connected Wireless Client Send out de-authentication packages to any connected Wireless Client for selected Accesspoint. Select an Access Point and one connected Wireless Client Send out de-authentication packeges to a dedicated Wireless Client, who is connected to the Access Point. Other Wireless Clients still can use the Access Point.

59 59 FinIntrusion Kit – Wireless – Access Point – Submenu – Setup Fake AP „Setup Fake Access Point“  Read out all necessary Configuration Parameter to setup a Fake Access Point. This Access Point simulates an „original“ Access Point and tries to re-route Wireless Clients through this „Fake AP“.  This Option is only available if the ESSID is known. (If ESSID is unkown, try to „Identify Hidden SSID“.)

60 60 FinIntrusion Kit – Wireless – Access Point – Submenu – Identify SSID „Identify Hidden SSID“  Use this function if an ESSID is unknown. Typically the Access Point is configured in a mode like:  „Hidden Mode“  „Hidding SSID Broadcasting“  „No SSID Broadcasting“  etc...

61 61 FinIntrusion Kit – Wireless – Access Point – Submenu – Identify SSID  To identify a hidden SSID a connected Wireless Client is necessary! After „Identify Hidden SSID“ finished successfully. Before

62 62 FinIntrusion Kit – Wireless – Access Point – Break Encryption „Break Encryption“  FinIntrusion Kit can be used to break WEP and WPA(2)-PSK Encryption. Select an Accesspoint with Encryption (WEP, WPA, WPA2WPA)

63 63 FinIntrusion Kit – Wireless – Access Point – WEP Cracking  A connected Wireless Client for the selected Access Point is necessary!  104/128 Bit or 40/64 Bit WEP Keys are supported.  WEP Key will be shown as HEX Value or as ASCII (if ASCII Characters were used)

64 64 FinIntrusion Kit – Wireless – Access Point – WEP Cracking Step by Step: 1.FinIntrusion Kit sends out IEEE de-authentication Management Frame Packages to a previous connected Wireless Client. 2.The Wireless Client tries to reconnect  a „Fragmentation Based“ Attack will be initiated...

65 65 FinIntrusion Kit – Wireless – Access Point – WEP Cracking Step by Step: 3. If the Fragmentation Based Attack was successfull, encrypted packages will be dumped. 4. A Counter shows how many encrypted packages are captured.

66 66 FinIntrusion Kit – Wireless – Access Point – WEP Cracking  WEP Cracking Key will be shown as HEX or ASCII Values. Key LengthEncrypted Data Packages with different IVs 40 / 64 Bit ASCII~ Packages 40 / 64 Bit HEX~ Packages 104 / 128 Bit ASCII~ Packages 104 / 128 Bit HEX~ Packages

67 67 FinIntrusion Kit – WEP Cracking - Limitations Limitations:  No Package for a Fragmentation Based Attack could be found. Try to increase Scan Time to find more connected Wireless Client and select a different one.  Only WEP 40/64 and 104/128 Bit WEP Keys are supported (no „dynamic WEP“ or WEP Keys > 128Bit)  Access Point or Wireless Clients could crash or Wireless Network will be unusable after this attack! No guarantee that every WEP Key can be broken!

68 68 FinIntrusion Kit – Wireless – Access Point – WPA Cracking  A connected Wireless Client for the selected Access Point is necessary!  Only WPA/WPA2 Pre-shared Keys are vulnerable for a Dictonary Attack.  WPA/WPA2 Enterprise mode cannot be attacked.

69 69 FinIntrusion Kit – Wireless – Access Point – WPA Cracking  For WPA/WPA2-PSK Cracking a „4-Way Handshake“ is necessary. (http://en.wikipedia.org/wiki/IEEE_802.11i-2004#The_Four-Way_Handshake)http://en.wikipedia.org/wiki/IEEE_802.11i-2004#The_Four-Way_Handshake  Handshake could be captured only if a WLAN Client try to connect to an Access Point.  FinIntrusion Kit disconnect an existing Connection between Wireless Client and Access Point and force a reconnect.

70 70 FinIntrusion Kit – Wireless – Access Point – WPA Cracking  A valid WPA handshake could be recorded. Otherwise increase Scan Time!

71 71 FinIntrusion Kit – Wireless – Access Point – WPA Cracking  After a valid WPA – Handshake was found, FinIntrusion Kit starts a Dictionary Attack.  The Wordlist File which was defined in WPA Cracking Option Dialog will be used.

72 72 FinIntrusion Kit – Wireless – Access Point – WPA Cracking  WPA Password was found.

73 73 FinIntrusion Kit – WPA Cracking - Limitations Limitations:  No Connected Wireless Client could be found. Try to increase Scan Time.  Wordlist expects one word per line!  Cracking Time depends on the CPU architecture.  WPA – PSK is case sensitive and min. 8 Characters long!  If WPA – PSK Cracking wasn‘t successful, try to re-capture a Handshake again and try a different Wordlist.  If Wordlist doesn‘t include PSK Password/Key there is no other way to crack the credential.

74 74 Table of Content Wireless Intrusion Adapter Configuration Access Point  Wireless Network Scan  Identify Hidden SSID  Break WEP / WPA  Jam Access Point  Setup „Fake AP“ Wireless Clients  Wireless Client Scan  Jam Wireless Client  Setup „Fake AP“ Fake AP  Setup / Config a „Fake AP“

75 75 FinIntrusion Kit – Wireless – Wireless Client(s) After „Search Clients“ Button (= I.) was pressed all identified Wireless Clients (= II.) are listed. Select a Wireless Client which probes a previous used ESSID to setup a Fake Access Point. I. II.

76 76 FinIntrusion Kit – Wireless – Wireless Client – Submenu „Delete Selected Client“  Remove selected Entry from „WLAN Client List“ „Delete All...“  Remove any Entries from „Access Point List“ „Export List“  Store all listed Wireless Clients into a tab seperated Textfile.

77 77 FinIntrusion Kit – Wireless – Client – Submenu – Jam „Jam Client“  Start a Wireless Jammer against dedicated Wireless Client.  Send out de-authentication Packages.  Only „associated“ Clients can be jammed!

78 78 FinIntrusion Kit – Wireless – Client – Submenu – Setup Fake AP „Setup Fake Access Point“  Read out all necessary Configuration Parameters to setup a Fake Access Point. This simulates an Access Point, which a Wireless Client try to reach. It setup a „Fake Access Point“ and provides an Uplink & an IP Address via DHCP.  This Option is only available if a probed ESSID was captured. (If no ESSID probe was captured, increase the „Scan Time“ or try to „Jam the Wireless Client“.)

79 79 FinIntrusion Kit – Wireless – Scan Time „Scan Time“ Option

80 80 Table of Content Wireless Intrusion Adapter Configuration Access Point  Wireless Network Scan  Identify Hidden SSID  Break WEP / WPA  Jam Access Point  Setup „Fake AP“ Wireless Clients  Wireless Client Scan  Jam Wireless Client  Setup „Fake AP“ Fake AP  Setup / Config a „Fake AP“

81 81 FinIntrusion Kit – Wireless – Setup „Fake AP“ Setup a Fake Access Point to catch a Wireless Client and to re- route him through this Access Point.

82 82 FinIntrusion Kit – Wireless – Setup „Fake AP“ I. II. III. OptionDescription I. Fake AP – AdapterChoose your Fake AP – Adapter. Typically this is your Wireless Adapter, which is used also for Wireless Scanning. II. Uplink – AdapterChoose your Uplink – Adapter. Typically this is a Ethernet Adapter, which has an Internet Uplink. All Traffic from a connected Wireless Client will be re-routed through this Adapter. III. Refresh ButtonIf you plug in an Adapter after you started FinIntrusion Kit or your connected Adapter is not listed, press the „Refresh“ button to update your Fake AP & Uplink Adapter List.

83 83 FinIntrusion Kit – Wireless – Setup „Fake AP“ I. II. III. OptionDescription IV. ModeChoose a „Fake AP“ Mode. Supported Modes are:  „Emulate a specific ESSID“, which must be defined in the ESSID Input Field.  „Reply to Any ESSID“ V. ESSIDThis Input Textfield is only available, if the Fake AP Mode is „Emulate a specific ESSID“. V.IV.

84 84 FinIntrusion Kit – Wireless – Setup „Fake AP“ A Fake AP was started / initiated. A DHCP Server provides IP Addresses for connected Wireless Clients.

85 85 FinIntrusion Kit – Wireless – Setup „Fake AP“  „Monitor all Targets“ button will start a passive sniffer.  Credentials of cleartext authentification will be captured.  HTTPS Emulation is activated by default and capture HTTP passwords, if a HTTPS  HTTP breakdown is supported by the webserver.  All sniffed Credentials will be listed in the Network  Password Section.

86 86 FinIntrusion Kit – Wireless – Setup „Fake AP“ A Fake AP was stopped. All started Services will be stopped, Firewall Settings will be revoked and Monitoring Interface will be removed.

87 87 FinIntrusion Kit – Wireless Intrusion Exercise Hands-On

88 88 FinIntrusion Kit – Wireless Intrusion Start FinIntrusion Kit and Test: 1.Try to find & identify all Access Points and Wireless Clients. 2.Export a list of all Access Points and Wireless Clients into a file. 3.Start a Wireless Jammer against your Target PC and Access Point. 4.Identify a Hidden ESSID. 5.Try to break WEP & WPA/WPA2-PSK Encryption: 6.Setup a „Fake Access Point“ and re-route a Wireless Client through this AP. 7.Configure your Wireless Adapter to connect a WEP / WPA WLAN.

89 89 Table of Content 1.Introduction 2.Update & License 3.Network Intrusion 4.Wireless Intrusion 5.Password Utility 6.Activity Log

90 90 FinIntrusion Kit – MAIN Panel

91 91 FinIntrusion Kit – Password Generator Utilities  Profiler crawls a Webpage, extracts all Words and generate a Wordlist.  Supported Protocols / URLs are HTTP & HTTPS.  At the Moment max. 500 Pages will be analyzed.

92 92 FinIntrusion Kit – Password Generator Utilities I.Post a URL / Hostname / Link into the Entry Field. II.Press Button „Create Wordlist“ III.Export all extracted Words into a CVS formated Textfile. I. II. III.

93 93 FinIntrusion Kit – Password Generator Utilities  List all extracted Words.  No Duplicates will be listed.  A counter in the first column indicates how many words were found in total.

94 94 FinIntrusion Kit – Password Generator Utilities Limitations:  Only Webpages in HTML are support. Other Sourcecode (e.g. ASP, JS) could generate some unusable Words (e.g. Methode or Variable Names).  Only Webpages without Pre-authentication, Session-Cookie etc. could be analyzed.  No Proxy Authentication is supported.  Wordlist must be cleaned up by yourself. (Remove Nonsense / Unlike used Words, like Methode or Variable Name etc.)

95 95 FinIntrusion Kit – Password Generator Exercise Hands-On

96 96 FinIntrusion Kit – Password Generator Utilities Start FinIntrusion Kit and Test: 1.Try to generate a Password List from different Websites (HTTP & HTTPS). 2.Export Words into a Password List File. 3.Use this Password List to crack a WPA – PSK protected Wireless Network.

97 97 Table of Content 1.Introduction 2.Update & License 3.Network Intrusion 4.Wireless Intrusion 5.Password Utility 6.Activity Log

98 98 FinIntrusion Kit – MAIN Panel

99 99 FinIntrusion Kit – Activity Log I.„Activity Log“ includes all important Status and Result Messages. II.All Columns are sortable by clicking on the Column Header. III.„Activity Log“ could be exported into CVS format Textfile. I. II. III.

100 100 FinIntrusion Kit – Activity Log - Network DateCategoryModuleEvent Description Actual Date + Timestamp at the moment when Event happened Which Category was the Event? Status = Statusmessage Result = of an Attack / Action Which Module triggered the Event? e.g. Network Scanner Network Sniffer Network Jammer Includes all Debug / Result and Status Message of an Event.

101 101 FinIntrusion Kit – Activity Log - Wireless DateCategoryModuleEvent Description Actual Date + Timestamp at the moment when Event happened Which Category was the Event? Status = Statusmessage Result = of an Attack / Action Which Module triggered the Event? e.g. Wireless Scanner WEP Cracker WPA Cracker Wireless Jammer Wireless Fake Accesspoint Includes all Debug / Result and Status Message of an Event.

102 102 FinIntrusion Kit – Activity Log – Password DateCategoryModuleEvent Description Actual Date + Timestamp at the moment when Event happened Which Category was the Event? Status = Statusmessage Result = of an Attack / Action Which Module triggered the Event? e.g. Password (Website) Includes all Debug / Result and Status Message of an Event.

103 103 Vielen Dank für die Aufmerksamkeit Questions? Thank you for your attention!


Download ppt "1 FINFISHER: FinIntrusion Kit 2.2 Product Training."

Similar presentations


Ads by Google