IT INTRUSION IT INTRUSION FinFisher Product Suite IT INTRUSION IT - - PowerPoint PPT Presentation

it intrusion it intrusion finfisher product suite it
SMART_READER_LITE
LIVE PREVIEW

IT INTRUSION IT INTRUSION FinFisher Product Suite IT INTRUSION IT - - PowerPoint PPT Presentation

IT INTRUSION IT INTRUSION FinFisher Product Suite IT INTRUSION IT INTRUSION FinFisher Product Suite FinFisher Product Suite FinFisher Product Suite Usage Usage Information Gathering Information Gathering PC Surveillance


slide-1
SLIDE 1

IT INTRUSION IT INTRUSION FinFisher Product Suite FinFisher Product Suite IT INTRUSION IT INTRUSION – FinFisher Product Suite FinFisher Product Suite

slide-2
SLIDE 2

Usage Usage

  • Information Gathering

Information Gathering

  • PC Surveillance
  • Hacking
  • Information Exploitation
  • Information Interception

2

slide-3
SLIDE 3

Components Components

  • FinFisher USB Suite
  • FinFisher Remote Hacking Kit
  • FinSpy
  • FinSpy
  • FinFly
  • FinTraining

Fi A dit

  • FinAudit
  • New Products - 2008

3

slide-4
SLIDE 4

FinFisher USB Suite FinFisher USB Suite

  • Suite to locally extract information from

target systems with little or no user target systems with little or no user interaction

  • Data analysis/Report generation at Head
  • Data analysis/Report generation at Head-

quarters

4

slide-5
SLIDE 5

Components Components

  • FinFisher USB Suite

– FinFisher HQ – FinFisher 1 – FinFisher 2 – FinFisher 3

  • FinFisher Remote Hacking Kit
  • FinFisher Remote Hacking Kit
  • FinSpy
  • FinFly
  • FinTraining
  • FinTraining
  • FinAudit
  • New Products - 2008

5

slide-6
SLIDE 6

FinFisher HQ FinFisher HQ

  • Graphical User Interface for FinFisher 1 and 2

U d t fig ti l ti

  • Used to configure operational options
  • Generates certificates for encryption
  • Deciphers and imports data from dongles
  • Generates reports from gathered data

p g

  • Updates FinFisher 1 and 2 systems

6

slide-7
SLIDE 7

FinFisher HQ FinFisher HQ

7

slide-8
SLIDE 8

Components Components

  • FinFisher USB Suite

FinFisher HQ – FinFisher HQ – FinFisher 1 Fi Fi h 2 – FinFisher 2 – FinFisher 3

  • FinFisher Remote Hacking Kit
  • FinSpy

py

  • FinFly

Fi T i i

  • FinTraining
  • FinAudit
  • New Products - 2008

8

slide-9
SLIDE 9

FinFisher FinFisher 1 1

  • U3 USB Dongle
  • Executes on insertion with little or no user

intervention

  • Obtains system and account information for:

Obtains system and account information for:

  • Windows Accounts
  • E-Mail Accounts (Microsoft Outlook / Express )

E Mail Accounts (Microsoft Outlook / Express, …)

  • Instant Messenger Accounts (MSN, Yahoo, ICQ, …)
  • System Details (Product Keys Hotfixes )

System Details (Product Keys, Hotfixes, …)

  • Network Information (Open Ports, Cookies, History,

…)

  • All gathered data is asymmetrically enciphered
  • Bypasses installed Anti Virus/Anti Spyware
  • Bypasses installed Anti-Virus/Anti-Spyware

software

9

slide-10
SLIDE 10

FinFisher FinFisher 1 1

10

slide-11
SLIDE 11

Components Components

  • FinFisher USB Suite

FinFisher HQ – FinFisher HQ – FinFisher 1 Fi Fi h 2 – FinFisher 2 – FinFisher 3

  • FinFisher Remote Hacking Kit
  • FinSpy

py

  • FinFly

Fi T i i

  • FinTraining
  • FinAudit
  • New Products - 2008

11

slide-12
SLIDE 12

FinFisher FinFisher 2 2

  • U3 USB Dongle
  • Executes on insertion with little or no user

intervention

  • Gets a copy of all locally stored E-Mails from

Gets a copy of all locally stored E Mails from the target system

  • Obtains specific files by file extension (e g all
  • Obtains specific files by file-extension (e.g. all

.doc and .xls files) All h d d i i ll i h d

  • All gathered data is asymmetrically enciphered
  • Bypasses installed Anti-Virus/Anti-Spyware

software

12

slide-13
SLIDE 13

FinFisher FinFisher 2 2

13

slide-14
SLIDE 14

Components Components

  • FinFisher USB Suite

FinFisher HQ – FinFisher HQ – FinFisher 1 Fi Fi h 2 – FinFisher 2 – FinFisher 3

  • FinFisher Remote Hacking Kit
  • FinSpy

py

  • FinFly

Fi T i i

  • FinTraining
  • FinAudit
  • New Products - 2008

14

slide-15
SLIDE 15

FinFisher FinFisher 3 3

  • 2 Bootable CD-Roms:
  • 1. Removes password for selected Windows

user account

  • 2. Securely wipes local hard-disks

15

slide-16
SLIDE 16

Components Components

  • FinFisher USB Suite
  • FinFisher Remote Hacking Kit
  • FinSpy
  • FinSpy
  • FinFly
  • FinTraining

Fi A dit

  • FinAudit
  • New Products - 2008

16

slide-17
SLIDE 17

FinFisher Remote Hacking Kit FinFisher Remote Hacking Kit

  • Used for remote information gathering

P id t d t h ki i t

  • Provides up-to-date hacking environment
  • Can target public servers and personal

g p p computers

17

slide-18
SLIDE 18

FinFisher Remote Hacking Kit FinFisher Remote Hacking Kit

  • Ruggedized notebook

Fi T k ti t

  • FinTrack operating system
  • Various scripts for automating attack

p g procedures

  • All major up-to-date hacking tools

18

slide-19
SLIDE 19

FinFisher Remote Hacking Kit FinFisher Remote Hacking Kit

  • High-power Wireless LAN adapter

Bl t th d t ith t l

  • Bluetooth adapter with antenna plug
  • Directional/Omni-directional antenna
  • 500 GB USB disk containing Rainbow Tables,

default password lists, etc.

  • USB-to-Ethernet adapter
  • USB to Ethernet adapter
  • PS/2 and USB Keylogger
  • Other

19

slide-20
SLIDE 20

Components Components

  • FinFisher USB Suite
  • FinFisher Remote Hacking Kit
  • FinSpy
  • FinSpy
  • FinFly
  • FinTraining

Fi A dit

  • FinAudit
  • New Products - 2008

20

slide-21
SLIDE 21

FinSpy FinSpy

  • Professional Trojan Horse
  • Monitor and remotely access one or multiple

systems

  • Presence on target system is hidden
  • All communication is hidden and enciphered
  • Components:

– FinSpy Client – FinSpy Server – FinSpy Target – FinSpy USB-U3 Dongle (Target) – FinSpy Antidote

21

slide-22
SLIDE 22

FinSpy FinSpy

  • Features:

– Custom Executables – Bypasses Anti-Virus/Anti-Spyware Software – Location Tracing – Scheduled Operations – Key Logging y gg g – Password Gathering – Webcam/Microphone Access p – Communication Sniffing:

  • Skype

yp

  • Instant Messengers (ICQ, Yahoo, …)

– Other Other

22

slide-23
SLIDE 23

Components Components

  • FinFisher USB Suite
  • FinFisher Remote Hacking Kit
  • FinSpy
  • FinSpy
  • FinFly
  • FinTraining

Fi A dit

  • FinAudit
  • New Products - 2008

23

slide-24
SLIDE 24

FinFly FinFly

  • Used to infect executables while downloading
  • Components:

– Transparent HTTP Proxy – EXE Loader

  • Proxy attaches Trojan Horse software to

downloaded executables on-the-fly

  • Loader removes attached software from

downloaded executable after installation

  • Can be used on local networks (e.g. Wireless

LANs) ISP V i i 2008

  • ISP Version to come in 2008

24

slide-25
SLIDE 25

Components Components

  • FinFisher USB Suite
  • FinFisher Remote Hacking Kit
  • FinSpy
  • FinSpy
  • FinFly
  • FinTraining

Fi A dit

  • FinAudit
  • New Products - 2008

25

slide-26
SLIDE 26

FinTraining: Basic Hacking Courses FinTraining: Basic Hacking Courses

  • 1 or 2 week basic hacking overview
  • Covers various common hacking techniques
  • Practical examples, demonstrations and

exercises

  • Topics include:

– Footprinting/Scanning/Enumeration

  • otp

t g Sca g u e at o – Networks – Exploits – Exploits – Wireless LANs Bl t th – Bluetooth – Other

26

slide-27
SLIDE 27

FinTraining Advanced: Exploiting Software FinTraining Advanced: Exploiting Software

1 k

  • 1 week course
  • Covers bugs in software and exploiting

these these

  • Practical examples, demonstrations and

exercises exercises

  • Topics include:

Software Bugs – Software Bugs – Exploit Archives/Frameworks Shellcode – Shellcode – Finding Bugs Customizing Exploits – Customizing Exploits – Other

27

slide-28
SLIDE 28

FinTraining Advanced: Rootkits FinTraining Advanced: Rootkits

  • 1 week course
  • Covers RootKit and Trojan horse

techniques

  • Practical examples, demonstrations and

exercises

  • Topics include:

– Analysis – Usage Usage – Detection Development – Development – Other

28

slide-29
SLIDE 29

FinTraining Advanced: Hacking VoIP FinTraining Advanced: Hacking VoIP

  • 1 week course
  • Covers Voice-over-IP eavesdropping and

various attack techniques

  • Practical examples, demonstrations and

exercises

  • Topics include:

– RTP Sniffing – RTP Insertion RTP Insertion – SIP Account Brute-Forcing SIP Account Cracking – SIP Account Cracking – Other

29

slide-30
SLIDE 30

FinTraining Advanced: Wireless Hacking FinTraining Advanced: Wireless Hacking

  • 1 week course
  • Covers Wireless LANs, Bluetooth and

Wireless Keyboards

  • Practical examples, demonstrations and

exercises

  • Topics include:

– Wireless LAN WEP/WPA Cracking – Bluetooth Link-Key Cracking Bluetooth Link Key Cracking – Wireless Keyboard Sniffing Other – Other

30

slide-31
SLIDE 31

FinTraining Advanced: Covert Comms FinTraining Advanced: Covert Comms

  • 1 week course
  • Covers steganography, encryption, network

and application protocols

  • Practical examples, demonstrations and

exercises

  • Topics include:

– Hiding data in objects – Hiding data in streams Hiding data in streams – Hiding VoIP communication Other – Other

31

slide-32
SLIDE 32

FinTraining Advanced: More FinTraining Advanced: More

  • More topics upon request
  • Courses are customized according to

customers needs and skill-set

32

slide-33
SLIDE 33

Components Components

  • FinFisher USB Suite
  • FinFisher Remote Hacking Kit
  • FinSpy
  • FinSpy
  • FinFly
  • FinTraining

Fi A dit

  • FinAudit
  • New Products - 2008

33

slide-34
SLIDE 34

FinAudit FinAudit

  • 1 or 2 week penetration test
  • Security check of networks, systems and

software

  • Helps analyzing various attack vectors and

fi di l bili i finding vulnerabilities

  • Prevents data disclosure and intrusion
  • Finalizing report and consulting services

34

slide-35
SLIDE 35

Components Components

  • FinFisher USB Suite
  • FinFisher Remote Hacking Kit
  • FinSpy
  • FinSpy
  • FinFly
  • FinTraining

Fi A dit

  • FinAudit
  • New Products - 2008

35

slide-36
SLIDE 36

News News 2008 2008: FinFly ISP : FinFly ISP

  • FinFly that is capable of working in ISP

networks networks

  • Can infect en-masse or targeted systems
  • Ready: Mid/End of 2008
  • Ready: Mid/End of 2008

36

slide-37
SLIDE 37

News News 2008 2008: FinCrack : FinCrack

  • Super-Cluster to crack Passwords/Hashes
  • Size and Speed customized to requirements
  • Supports:

– Microsoft Office Documents NTLM/LM – NTLM/LM – WPA Networks Unix DES – Unix DES – WinZIP – PDF PDF

  • Other modules can be provided upon request
  • Ready: Mid/End of 2008

Ready: Mid/End of 2008

37

slide-38
SLIDE 38

News News 2008 2008: FinWifiKeySpy : FinWifiKeySpy

  • Wireless Keyboard Sniffer
  • Sniffs all keystrokes of wireless keyboard within

antenna range

  • Able to inject keystrokes to remote computers
  • Supports all major vendors (Microsoft, Logitech)
  • Ready: End of 2008

38

slide-39
SLIDE 39

News News 2008 2008: FinBluez : FinBluez

  • Product for various Bluetooth attacks, e.g.:

– Utilize Bluetooth headsets as audio bugs – Record audio stream between headset and mobile phone

  • Ready: End of 2008

39