1 FINFISHER: FinIntrusion Kit 2.2 Product Training.
-
Upload
destin-humphrey -
Category
Documents
-
view
219 -
download
0
Transcript of 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.
![Page 1: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/1.jpg)
1
FINFISHER: FinIntrusion Kit 2.2
Product Training
![Page 2: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/2.jpg)
2Table of Content
1. Introduction
2. Update & License
3. Network Intrusion
4. Wireless Intrusion
5. Password Utility
6. Activity Log
![Page 3: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/3.jpg)
3Portfolio Overview
FinSpy
FinSpy Mobile
FinFly
FinUSB Suite
FinIntrusion Kit
FinFireWire
FinTraining
FinAdvisory
![Page 4: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/4.jpg)
4FinIntrusion Kit / Operational Usage
The FinIntrusion Kit is a portable IT Intrusion kit which can be used for
various strategic and tactical attacks by red-teams inside or outside the
Headquarters.
Typical Operations:
Wireless Networks: Break Encryption and record all Traffic Record Usernames and Passwords even for SSL-
encrypted sites (e.g. Facebook, MySpace, Online Banking)
Access remote Systems: Gain access to remote Infrastructures and Webservers Get access to E-Mail Accounts
![Page 5: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/5.jpg)
5FinIntrusion Kit / Core Features
• Discover Wireless LANs (802.11) devices
• Recover WEP (64 and 128 bit) Passphrase within 2-5 minutes
• Break WPA1 and WPA2 Passphrase using Dictionary Attacks
• Emulate Rogue Wireless Access-Point (802.11)
• Actively monitor Local Area Network (Wired and Wireless) and
extract Usernames and Passwords even for SSL/TLS-
encrypted Sessions like GMail, Hotmail, Facebook, etc.
• Crawl and extract Words from a webpage and generate a
Wordlist.
![Page 6: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/6.jpg)
6
• Notebook (Backtrack 5 pre-installed)
• FinIntrusion Kit Software (pre-installed)
• Wireless Intrusion Hardware
FinIntrusion Kit / Covert Tactical Unit
![Page 7: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/7.jpg)
7FinIntrusion Kit – Main Screen
Menu Bar
Main Panel
![Page 8: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/8.jpg)
8FinIntrusion Kit – Menu Bar
Change Update settings and check for Updates.
Install a new License or display License information.
Choose your Language.
Display FinIntrusion Kit version and EULA.
Visit the FinFisher Support Website.
![Page 9: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/9.jpg)
9Table of Content
1. Introduction
2. Update & License
3. Network Intrusion
4. Wireless Intrusion
5. Password Utility
6. Activity Log
![Page 10: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/10.jpg)
10FinIntrusion Kit – Menu Bar – Updates
![Page 11: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/11.jpg)
11FinIntrusion Kit – Menu Bar – Updates
Change Update settings Check for Updates now
Disabled No Update request will be done automatically.
At Startup An update request will be triggered on application start
Daily An update request will be triggered every day.
Weekly An update request will be triggered every week.
Monthly An update request will be triggered every month.
Import an Updates Package by yourself
• No online request will be done.
• Update Package could be stored locally or on an external Harddisc.
![Page 12: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/12.jpg)
12FinIntrusion Kit – Menu Bar – License
![Page 13: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/13.jpg)
13
No License is installed
FinIntrusion Kit – Menu Bar – License
Valid License is installed
![Page 14: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/14.jpg)
14FinIntrusion Kit – Menu Bar – Language
![Page 15: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/15.jpg)
15FinIntrusion Kit – Menu Bar – Language
Choose your Language. Status Messages, Menu Entries, Results are displayed in your selected
Language. (Configuration Parameter stored in “FinFisherDate.cfg” file)
Language Code in „FinFisherDate.cfg“
de-DE German (Germany)
ar-SA Arabic (Saudi Arabia)
pt_PT Portuguese (Portugal)
es-ES Spanish (Spain)
en-US English (United States / International)
ru-RU Russian
fr-FR French (Standard)
Accept changes.
Application must be restarted!
![Page 16: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/16.jpg)
16FinIntrusion Kit – Menu Bar – About
![Page 17: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/17.jpg)
17FinIntrusion Kit – Menu Bar – About
Display content of FinIntrusion Kit EULA (“End-User Licensing Agreement”)
![Page 18: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/18.jpg)
18FinIntrusion Kit – Menu Bar – About
![Page 19: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/19.jpg)
19FinIntrusion Kit – Menu Bar – Online Help
Load an after-sales website that gives the customers the following capabilities:
Download product information (latest User Manuals, Specifications, Training Slides)
Access change-log and roadmap for products
Report bugs and submit feature requests
Inspect frequently asked questions (FAQ)
![Page 20: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/20.jpg)
20Table of Content
1. Introduction
2. Update & License
3. Network Intrusion
4. Wireless Intrusion
5. Password Utility
6. Activity Log
![Page 21: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/21.jpg)
21FinIntrusion Kit – MAIN Panel
![Page 22: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/22.jpg)
22Table of Content
Network Intrusion
Adapter Configuration Refresh Renew IP Change MAC Address
Target List Network Scan Network Jammer Network Password Sniffer
Network Password Sniffer Password Sniffer Modes PCAP Recorder
![Page 23: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/23.jpg)
23FinIntrusion Kit – Network Intrusion
Network Intrusion Features:
1. Network Adapter Information & Configuration2. Search and Identify Target Systems3. Jam Target4. Sniffing Credentials
![Page 24: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/24.jpg)
24Table of Content
Network Intrusion
Adapter Configuration Refresh Renew IP Change MAC Address
Target List Network Scan Network Jammer Network Password Sniffer
Network Password Sniffer Password Sniffer Modes PCAP Recorder
![Page 25: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/25.jpg)
25FinIntrusion Kit – Network – Adapter Configuration
Network Adapter Configuration provides:
A. Network Information1) IP – Address2) Default Gateway IP Address3) IP Address(es) of all defined Nameservers4) (actual) MAC Address5) Connection Speed6) Adapter Status
B. Refresh Adapter List
C. Renew IP Address = Get an IP Address via DHCP
D. Possibility to Change / Spoof MAC Address from selected Network Adapter
A
B
C
D
![Page 26: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/26.jpg)
26Table of ContentNetwork Intrusion
Adapter Configuration Refresh Renew IP Change MAC Address
Target List Network Scan Network Jammer Network Password Sniffer
Network Password Sniffer Password Sniffer Modes PCAP Recorder
![Page 27: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/27.jpg)
27FinIntrusion Kit – Network – Target List
After „Scan Network“ Button was pressed all identified Targets inside the Network will be listed.
![Page 28: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/28.jpg)
28FinIntrusion Kit – Network – Target List
Target List – Column Overview
IP Address
MAC Address
MAC Vendor
System Name
OS Icon Operating System
Status Icon Status
IP Address of Target System
MAC Address of Target System
Translated „Organizationally Unique Identifier“ (OUI) = uniquely identifies a vendor / manufacturer
Identified System / Hostname of Target System
- unknown
- Windows
- Linux
- Apple / Mac
- Embedded (e.g. Printer)
Identified Operating System and Probability
- Password Sniffer / Recorder is running
- Network Jammer is running
Status Message if an attack runs in the background
![Page 29: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/29.jpg)
29FinIntrusion Kit – Network – Target List – Submenu
Select a column + press „right mouse button“
Pop up a „Menu“, which lists all possible options.
![Page 30: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/30.jpg)
30FinIntrusion Kit – Network – Target List – Submenu - Delete
„Delete Selected Target“
Remove selected entry from „Target List“
„Delete All...“
Remove any entries from „Target List“
![Page 31: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/31.jpg)
31FinIntrusion Kit – Network – Target List – Submenu - Delete
Before
After
![Page 32: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/32.jpg)
32FinIntrusion Kit – Network – Target List – Submenu - Export
„Export List...“
Export a tab seperated Target List into an external Textfile. This File could be loaded e.g. with Excel.
choose a Filename
press „Export“ Button to generate the file
![Page 33: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/33.jpg)
33FinIntrusion Kit – Network – Target List – Submenu - Export
Analyse exported file with Microsoft Excel
![Page 34: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/34.jpg)
34FinIntrusion Kit – Network – Target List – Submenu - Jammer
„Jam Target“
Start a Network Jammer against selected Target IP Address
Before (e.g. „ping“ / ICMP) After
![Page 35: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/35.jpg)
35FinIntrusion Kit – Network – Target List – Submenu - Jammer
Details
Network Jammer initiates a „ARP Cache Poisoning“ Attack against Target PC and overwrite MAC Address from Default Gateway with an invalid value.
Before (ARP Cache on Target PC) After (Start „ARP Cache Poisoning“
![Page 36: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/36.jpg)
36Table of ContentNetwork Intrusion
Adapter Configuration Refresh Renew IP Change MAC Address
Target List Network Scan Network Jammer Network Password Sniffer
Network Password Sniffer Password Sniffer Modes PCAP Recorder
![Page 37: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/37.jpg)
37FinIntrusion Kit – Network – Target List – Submenu - Monitor
„Monitor Target“
Initiates a sniffer to capture Hostname / IP-Address / URL, Protocol and Credentials (Username & Password)
Examples
![Page 38: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/38.jpg)
38FinIntrusion Kit – Network – Target List – Submenu - Monitor
„Monitor Modes & Protocols“
Mode Protocols (Examples)
Mode Protocols (Examples)
Mode Protocols (Examples)
„Non“ SSL Mode = Capture Credentials which were transmitted in CLEARTEXT
SMTP Pop3 Imap Telnet SNMP HTTP FTP...
„Non“ SSL Mode = Capture Credentials which were transmitted in CLEARTEXT and try to redirect HTTPS HTTP
SMTP Pop3 Imap Telnet SNMP HTTP & HTTPS (Redirect) FTP...
SSL Mode = Capture Credentials which were transmitted in CLEARTEXT and „encrypted“ with SSL
SMTP & SMTPS Pop3 & Pop3s Imap & Imaps Telnet SNMP HTTP & HTTPS FTP...
![Page 39: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/39.jpg)
39FinIntrusion Kit – Network – Target List – Submenu - Monitor
„Monitor Modes / Pro & Contra“
Pro Contra Pro Contra Pro Contra
- Capture Cleartext Passwords without the risk to trigger a Warning on Target PC.
- No Credentials which were transfered encrypted through a SSL tunnel could be connected.
- Capture Cleartext Passwords without the risk to trigger a Warning on Target PC.
- No HTTPS Certificate Warning pops up (if HTTPS HTTP redirect is working (otherwise Certificate Warning!)
HTTPS Emulation could be suspicious and is not working on every webserver (web application must support HTTP too)
- No SSL Credentials could be captured!
- „SSL“ and „non SSL“ could be captured.
Certificate Warning inside Web Browser & Email Clients will warn User or block the communication.
![Page 40: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/40.jpg)
40FinIntrusion Kit – Network – Target List – Submenu - Monitor
„PCAP Recorder Modes “
Mode Desc Mode Protocols (Examples)
Mode Protocols (Examples)
Select / Deselect „Activate SSL“
AND
Select „Activate PCAP Recorder“
Will activate a PCAP Recorder for selected Target IP (= selected row).
If „Activate SSL“ is activated, SSL Credentials will also be recorded. Otherwise only Cleartext Credentials could be recorded.
„tcpdump“ Generate a Network Capture File (= pcap file) with „tcpdump“ in the background. A capture Filter for selected IP will be used. No Traffic Analyzer will be started.
Generate a File:„/tmp/fik_pcap_recorder_IP-ADDRESS.pcap“
„Wireshark“ Start Wireshark in the foreground with a capture filter for selected Target IP (= selected row).
Capture File must be saved at the end of the session!!!
![Page 41: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/41.jpg)
41FinIntrusion Kit – Network – Passwords
„Export List“
Export a tab seperated Credential List into an external Textfile.
![Page 42: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/42.jpg)
42FinIntrusion Kit – Network – Passwords – Submenu
„Select Row press Mouse Key Submenu opens“
Open a FTP / HTTP(S) Urls into System Browser
![Page 43: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/43.jpg)
43FinIntrusion Kit – Network Intrusion Exercise
Hands-On
![Page 44: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/44.jpg)
44FinIntrusion Kit – Network Intrusion
Start FinIntrusion Kit and Tests:
1. Try to find & identify all Systems in the LAN.
2. Export a list of all Target Systems to a file.
3. Start a Network Jammer against your Target PC.
4. Monitor your Target and try to capture:a) FTP, HTTP, SMTP, POP3, IMAP Passwordsb) „HTTPS“ Passwords with „HTTPS Emulation“c) POP3s & IMAPs Passwords
5. Export captured Passwords into a file.
6. Open URL and verify captured HTTP(S) Password.
![Page 45: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/45.jpg)
45Table of Content
1. Introduction
2. Update & License
3. Network Intrusion
4. Wireless Intrusion
5. Password Utility
6. Activity Log
![Page 46: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/46.jpg)
46FinIntrusion Kit – MAIN Panel
![Page 47: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/47.jpg)
47Table of ContentWireless Intrusion
Adapter Configuration
Access Point Wireless Network Scan Identify Hidden SSID Break WEP / WPA Jam Access Point Setup „Fake AP“
Wireless Clients Wireless Client Scan Jam Wireless Client Setup „Fake AP“
Fake AP Setup / Config a „Fake
AP“
![Page 48: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/48.jpg)
48FinIntrusion Kit – Wireless Intrusion
Wireless Intrusion Features:
1. Wireless Adapter Information & Configuration2. Search and Identify Wireless Networks & Clients3. Jam Wireless Networks & Clients4. Identify Hidden ESSID5. Break WEP & WPA Encryption6. Setup Fake Accesspoint & Redirect Wireless Clients
![Page 49: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/49.jpg)
49Table of ContentWireless Intrusion
Adapter Configuration
Access Point Wireless Network Scan Identify Hidden SSID Break WEP / WPA Jam Access Point Setup „Fake AP“
Wireless Clients Wireless Client Scan Jam Wireless Client Setup „Fake AP“
Fake AP Setup / Config a „Fake
AP“
![Page 50: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/50.jpg)
50FinIntrusion Kit – Wireless – Adapter Configuration
Wireless Adapter Configuration provides:
I.
II.
I. Network Information1) Wireless Chipset2) IP – Address3) Default Gateway IP Address4) IP Address(es) of all defined Nameservers5) (actual) MAC Address6) Connection Speed7) Adapter Status
II. Refresh Adapter List
(e.g. after a new Adapter was plugged in or removed)
![Page 51: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/51.jpg)
51Table of ContentWireless Intrusion
Adapter Configuration
Access Point Wireless Network Scan Identify Hidden SSID Break WEP / WPA Jam Access Point Setup „Fake AP“
Wireless Clients Wireless Client Scan Jam Wireless Client Setup „Fake AP“
Fake AP Setup / Config a „Fake
AP“
![Page 52: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/52.jpg)
52FinIntrusion Kit – Wireless – Access Points
After „Search WLAN“ Button (= I.) was pressed all identified Accesspoints (= II.) and Connected Wireless Clients (= III.) for the selected Access Point will be listed.
I.
II.
III.
![Page 53: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/53.jpg)
53FinIntrusion Kit – Wireless – Access Point
ESSID BSSID Channel Encryption Power IV Status
ESSID = SSID = Wireless Network Name. The SSID can be up to 32 characters long and is case sensitive.
MAC Address of Wireless Access Point
Channel used by Access Point
Type of Encryption:
„OPN“ (= Open = No Encryption)WEPWPAWPA2
Transmission Power of Wireless Access Point
Initialization Vector Counter useful for WEP Cracking
Status Message if an attack runs in the background
![Page 54: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/54.jpg)
54FinIntrusion Kit – Wireless – Access Point – Connected Clients
Client MAC MAC Vendor Power
MAC Address of connected Client(s) for selected Access Point
Translated „Organizationally Unique Identifier“ (OUI) = uniquely identifies a vendor / manufacturer
Transmission Power of Wireless Client
![Page 55: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/55.jpg)
55FinIntrusion Kit – Wireless – Access Point – Submenu - Delete
„Delete Selected Access Point“
Remove selected Entry from „Access Point List“
„Delete All...“
Remove any Entries from „Access Point List“
![Page 56: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/56.jpg)
56FinIntrusion Kit – Wireless – Access Point – Submenu - Export
„Export List...“
Export a tab seperated list of Access Points into an external textfile. This file could be loaded e.g. with Excel.
choose a filename
„Export“ Button to generate the file
![Page 57: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/57.jpg)
57FinIntrusion Kit – Wireless – Access Point – Submenu - Export
Analyse exported file with Excel
![Page 58: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/58.jpg)
58FinIntrusion Kit – Wireless – Access Point – Submenu – Jam AP
„Jam Access Point“
Start a Wireless Jammer against selected Access Point. Sends out de-authentication Packages.
Operating Modes:
Mode Description
Select an Access Point and no connected Wireless Client
Send out de-authentication packages to any connected Wireless Client for selected Accesspoint.
Select an Access Point and one connected Wireless Client
Send out de-authentication packeges to a dedicated Wireless Client, who is connected to the Access Point. Other Wireless Clients still can use the Access Point.
![Page 59: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/59.jpg)
59FinIntrusion Kit – Wireless – Access Point – Submenu – Setup Fake AP
„Setup Fake Access Point“
Read out all necessary Configuration Parameter to setup a Fake Access Point. This Access Point simulates an „original“ Access Point and tries to re-route Wireless Clients through this „Fake AP“.
This Option is only available if the ESSID is known. (If ESSID is unkown, try to „Identify Hidden SSID“.)
![Page 60: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/60.jpg)
60FinIntrusion Kit – Wireless – Access Point – Submenu – Identify SSID
„Identify Hidden SSID“
Use this function if an ESSID is unknown. Typically the Access Point is configured in a mode like:
„Hidden Mode“„Hidding SSID Broadcasting“„No SSID Broadcasting“ etc...
![Page 61: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/61.jpg)
61FinIntrusion Kit – Wireless – Access Point – Submenu – Identify SSID
To identify a hidden SSID a connected Wireless Client is necessary!
After „Identify Hidden SSID“ finished successfully.
Before
![Page 62: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/62.jpg)
62FinIntrusion Kit – Wireless – Access Point – Break Encryption
„Break Encryption“
FinIntrusion Kit can be used to break WEP and WPA(2)-PSK Encryption. Select an Accesspoint with Encryption (WEP, WPA, WPA2WPA)
![Page 63: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/63.jpg)
63FinIntrusion Kit – Wireless – Access Point – WEP Cracking
A connected Wireless Client for the selected Access Point is necessary!
104/128 Bit or 40/64 Bit WEP Keys are supported.
WEP Key will be shown as HEX Value or as ASCII (if ASCII Characters were used)
![Page 64: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/64.jpg)
64FinIntrusion Kit – Wireless – Access Point – WEP Cracking
Step by Step:
1. FinIntrusion Kit sends out IEEE 802.11 de-authentication Management Frame Packages to a previous
connected Wireless Client.
2. The Wireless Client tries to reconnect a „Fragmentation Based“ Attack will be initiated...
![Page 65: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/65.jpg)
65FinIntrusion Kit – Wireless – Access Point – WEP Cracking
Step by Step:
3. If the Fragmentation Based Attack was successfull, encrypted packages will be dumped.
4. A Counter shows how many encrypted packages are captured.
![Page 66: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/66.jpg)
66FinIntrusion Kit – Wireless – Access Point – WEP Cracking
WEP Cracking Key will be shown as HEX or ASCII Values.
Key Length Encrypted Data Packages with different IVs
40 / 64 Bit ASCII ~ 30.000 Packages
40 / 64 Bit HEX ~ 40.000 Packages
104 / 128 Bit ASCII ~ 60.000 Packages
104 / 128 Bit HEX ~ 70.000 Packages
![Page 67: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/67.jpg)
67FinIntrusion Kit – WEP Cracking - Limitations
Limitations:
No Package for a Fragmentation Based Attack could be found. Try to increase Scan Time to find more connected Wireless Client and select a different one.
Only WEP 40/64 and 104/128 Bit WEP Keys are supported (no „dynamic WEP“ or WEP Keys > 128Bit)
Access Point or Wireless Clients could crash or Wireless Network will be unusable after this attack! No guarantee that every WEP Key can be broken!
![Page 68: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/68.jpg)
68FinIntrusion Kit – Wireless – Access Point – WPA Cracking
A connected Wireless Client for the selected Access Point is necessary!
Only WPA/WPA2 Pre-shared Keys are vulnerable for a Dictonary Attack.
WPA/WPA2 Enterprise mode cannot be attacked.
![Page 69: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/69.jpg)
69FinIntrusion Kit – Wireless – Access Point – WPA Cracking
For WPA/WPA2-PSK Cracking a „4-Way Handshake“ is necessary. (http://en.wikipedia.org/wiki/IEEE_802.11i-2004#The_Four-Way_Handshake)
Handshake could be captured only if a WLAN Client try to connect to an Access Point.
FinIntrusion Kit disconnect an existing Connection between Wireless Client and Access
Point and force a reconnect.
![Page 70: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/70.jpg)
70FinIntrusion Kit – Wireless – Access Point – WPA Cracking
A valid WPA handshake could be recorded.
Otherwise increase Scan Time!
![Page 71: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/71.jpg)
71FinIntrusion Kit – Wireless – Access Point – WPA Cracking
After a valid WPA – Handshake was found,
FinIntrusion Kit starts a Dictionary Attack.
The Wordlist File which was defined in WPA
Cracking Option Dialog will be used.
![Page 72: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/72.jpg)
72FinIntrusion Kit – Wireless – Access Point – WPA Cracking
WPA Password was found.
![Page 73: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/73.jpg)
73FinIntrusion Kit – WPA Cracking - Limitations
Limitations:
No Connected Wireless Client could be found. Try to increase Scan Time.
Wordlist expects one word per line!
Cracking Time depends on the CPU architecture.
WPA – PSK is case sensitive and min. 8 Characters long!
If WPA – PSK Cracking wasn‘t successful, try to re-capture a Handshake again and try a different Wordlist.
If Wordlist doesn‘t include PSK Password/Key there is no other way to crack the credential.
![Page 74: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/74.jpg)
74Table of ContentWireless Intrusion
Adapter Configuration
Access Point Wireless Network Scan Identify Hidden SSID Break WEP / WPA Jam Access Point Setup „Fake AP“
Wireless Clients Wireless Client Scan Jam Wireless Client Setup „Fake AP“
Fake AP Setup / Config a „Fake
AP“
![Page 75: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/75.jpg)
75FinIntrusion Kit – Wireless – Wireless Client(s)
After „Search Clients“ Button (= I.) was pressed all identified Wireless Clients (= II.) are listed. Select a Wireless Client which probes a previous used ESSID to setup a Fake Access Point.
I.
II.
![Page 76: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/76.jpg)
76FinIntrusion Kit – Wireless – Wireless Client – Submenu
„Delete Selected Client“
Remove selected Entry from „WLAN Client List“
„Delete All...“
Remove any Entries from „Access Point List“
„Export List“
Store all listed Wireless Clients into a tab seperated Textfile.
![Page 77: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/77.jpg)
77FinIntrusion Kit – Wireless – Client – Submenu – Jam
„Jam Client“
Start a Wireless Jammer against dedicated Wireless Client.
Send out de-authentication Packages.
Only „associated“ Clients can be jammed!
![Page 78: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/78.jpg)
78FinIntrusion Kit – Wireless – Client – Submenu – Setup Fake AP
„Setup Fake Access Point“
Read out all necessary Configuration Parameters to setup a Fake Access Point. This simulates an Access Point, which a Wireless Client try to reach. It setup a „Fake Access Point“ and provides an Uplink & an IP Address via DHCP.
This Option is only available if a probed ESSID was captured. (If no ESSID probe was captured, increase the „Scan Time“ or try to „Jam the Wireless Client“.)
![Page 79: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/79.jpg)
79FinIntrusion Kit – Wireless – Scan Time
„Scan Time“ Option
![Page 80: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/80.jpg)
80Table of ContentWireless Intrusion
Adapter Configuration
Access Point Wireless Network Scan Identify Hidden SSID Break WEP / WPA Jam Access Point Setup „Fake AP“
Wireless Clients Wireless Client Scan Jam Wireless Client Setup „Fake AP“
Fake AP Setup / Config a „Fake
AP“
![Page 81: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/81.jpg)
81FinIntrusion Kit – Wireless – Setup „Fake AP“
Setup a Fake Access Point to catch a Wireless Client and to re-route him through this Access Point.
![Page 82: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/82.jpg)
82FinIntrusion Kit – Wireless – Setup „Fake AP“
I.
II. III.
Option Description
I. Fake AP – Adapter Choose your Fake AP – Adapter. Typically this is your Wireless Adapter, which is used also for Wireless Scanning.
II. Uplink – Adapter Choose your Uplink – Adapter. Typically this is a Ethernet Adapter, which has an Internet Uplink. All Traffic from a connected Wireless Client will be re-routed through this Adapter.
III. Refresh Button If you plug in an Adapter after you started FinIntrusion Kit or your connected Adapter is not listed, press the „Refresh“ button to update your Fake AP & Uplink Adapter List.
![Page 83: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/83.jpg)
83FinIntrusion Kit – Wireless – Setup „Fake AP“
I.
II. III.
Option Description
IV. Mode Choose a „Fake AP“ Mode. Supported Modes are:
„Emulate a specific ESSID“, which must be defined in the ESSID Input Field.
„Reply to Any ESSID“
V. ESSID This Input Textfield is only available, if the Fake AP Mode is „Emulate a specific ESSID“.
V.IV.
![Page 84: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/84.jpg)
84FinIntrusion Kit – Wireless – Setup „Fake AP“
A Fake AP was started / initiated. A DHCP Server provides IP Addresses for connected Wireless Clients.
![Page 85: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/85.jpg)
85FinIntrusion Kit – Wireless – Setup „Fake AP“
„Monitor all Targets“ button will start a passive sniffer. Credentials of cleartext authentification will be captured. HTTPS Emulation is activated by default and capture HTTP passwords, if a HTTPS
HTTP breakdown is supported by the webserver. All sniffed Credentials will be listed in the Network Password Section.
![Page 86: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/86.jpg)
86FinIntrusion Kit – Wireless – Setup „Fake AP“
A Fake AP was stopped. All started Services will be stopped, Firewall Settings will be revoked and Monitoring Interface will be removed.
![Page 87: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/87.jpg)
87FinIntrusion Kit – Wireless Intrusion Exercise
Hands-On
![Page 88: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/88.jpg)
88FinIntrusion Kit – Wireless Intrusion
Start FinIntrusion Kit and Test:
1. Try to find & identify all Access Points and Wireless Clients.
2. Export a list of all Access Points and Wireless Clients into a file.
3. Start a Wireless Jammer against your Target PC and Access Point.
4. Identify a Hidden ESSID.
5. Try to break WEP & WPA/WPA2-PSK Encryption:
6. Setup a „Fake Access Point“ and re-route a Wireless Client through this AP.
7. Configure your Wireless Adapter to connect a WEP / WPA WLAN.
![Page 89: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/89.jpg)
89Table of Content
1. Introduction
2. Update & License
3. Network Intrusion
4. Wireless Intrusion
5. Password Utility
6. Activity Log
![Page 90: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/90.jpg)
90FinIntrusion Kit – MAIN Panel
![Page 91: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/91.jpg)
91FinIntrusion Kit – Password Generator Utilities
Profiler crawls a Webpage, extracts all Words and generate a Wordlist.
Supported Protocols / URLs are HTTP & HTTPS.
At the Moment max. 500 Pages will be analyzed.
![Page 92: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/92.jpg)
92FinIntrusion Kit – Password Generator Utilities
I. Post a URL / Hostname / Link into the Entry Field.
II. Press Button „Create Wordlist“
III. Export all extracted Words into a CVS formated Textfile.
I.
II.
III.
![Page 93: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/93.jpg)
93FinIntrusion Kit – Password Generator Utilities
List all extracted Words. No Duplicates will be listed. A counter in the first column indicates how many words were found in total.
![Page 94: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/94.jpg)
94FinIntrusion Kit – Password Generator Utilities
Limitations:
Only Webpages in HTML are support. Other Sourcecode (e.g. ASP, JS) could generate some unusable Words (e.g. Methode or Variable Names).
Only Webpages without Pre-authentication, Session-Cookie etc. could be analyzed.
No Proxy Authentication is supported.
Wordlist must be cleaned up by yourself. (Remove Nonsense / Unlike used Words, like Methode or Variable Name etc.)
![Page 95: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/95.jpg)
95FinIntrusion Kit – Password Generator Exercise
Hands-On
![Page 96: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/96.jpg)
96FinIntrusion Kit – Password Generator Utilities
Start FinIntrusion Kit and Test:
1. Try to generate a Password List from different Websites (HTTP & HTTPS).
2. Export Words into a Password List File.
3. Use this Password List to crack a WPA – PSK protected Wireless Network.
![Page 97: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/97.jpg)
97Table of Content
1. Introduction
2. Update & License
3. Network Intrusion
4. Wireless Intrusion
5. Password Utility
6. Activity Log
![Page 98: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/98.jpg)
98FinIntrusion Kit – MAIN Panel
![Page 99: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/99.jpg)
99FinIntrusion Kit – Activity Log
I. „Activity Log“ includes all important Status and Result Messages.
II. All Columns are sortable by clicking on the Column Header.
III. „Activity Log“ could be exported into CVS format Textfile.
I.
II.
III.
![Page 100: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/100.jpg)
100FinIntrusion Kit – Activity Log - Network
Date Category Module Event Description
Actual Date + Timestamp at the moment when Event happened
Which Category was the Event?
Status = StatusmessageResult = of an Attack / Action
Which Module triggered the Event?
e.g.• Network Scanner• Network Sniffer• Network Jammer
Includes all Debug / Result and Status Message of an Event.
![Page 101: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/101.jpg)
101FinIntrusion Kit – Activity Log - Wireless
Date Category Module Event Description
Actual Date + Timestamp at the moment when Event happened
Which Category was the Event?
Status = StatusmessageResult = of an Attack / Action
Which Module triggered the Event?
e.g.• Wireless Scanner• WEP Cracker• WPA Cracker• Wireless Jammer• Wireless Fake Accesspoint
Includes all Debug / Result and Status Message of an Event.
![Page 102: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/102.jpg)
102FinIntrusion Kit – Activity Log – Password
Date Category Module Event Description
Actual Date + Timestamp at the moment when Event happened
Which Category was the Event?
Status = StatusmessageResult = of an Attack / Action
Which Module triggered the Event?
e.g.• Password (Website)
Includes all Debug / Result and Status Message of an Event.
![Page 103: 1 FINFISHER: FinIntrusion Kit 2.2 Product Training.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649ca45503460f94965515/html5/thumbnails/103.jpg)
103Vielen Dank für die Aufmerksamkeit
Questions?
Thank you for your attention!