Name: FinFisher

Text: Please have a
look at our

Newsletter 3/07
December 2007

new Website!
Now with the
newest
Information
to downloadl
vvvvw eLlman de

ELAMAN works closely with clients to develop a total system
solution t o their needs and t o ensure that they are
equipped, trained and manned to meet the formidable challenges in the field of communication.

News
First Information about our new
FinFisher IT Intrusion Products!

Adding n e w products solutions t o our
the target is also
Agra
portfolio is an ongoing process. Thereeasy especially comparing to normal IP-Mofore from now on ELAMAN provides
nitoring w h e r e decoding
a Newsletter whenever imporand identifying is always difficult.
tant innovations are coming
up.
The experience shows having 100% of
IP
traffic, the classical IP Monitoring
Kincrre ards
system will give the capability to moYour a m a n
nitor 40%, FinFisher gives another
40%. The remaining 20% is very difficult to get.

IT Intrusion:
Elaman's new
Finfisher Products
Elaman has started i t s own
41 development f o r I T - Intrusion
(Hacking) products and training as
we think this area will become more
and more important and effective and
is a very valuable add on to the classical IP-Monitoring systems provided
by e.g. Siemens, ATIS, ETI, etc.

Maybe authorities are already working internally on such methods but
even in this case FinFisher will widen
such an approach and specially the
training will improve the capabilities
of the staff and users.
The philosophy behind the FinFisher
IT Intrusion package is to provide the
government end-user with today's advanced hacking tools and techniques.
This enables Intelligence Agencies to
use such hacking components to ob-

tamn Intelligence information that cannot be obtained in any other way.
The Intrusion tools can be used by
Government Departments for internal
introduction I training to the hacking
threats being faced today.
Features
• Information Gathering
• Sniffing
• Exploitation

This range o f n e w IT-Intrusion products we named FinFisher.
The FinFisher kit includes certain types of Hardware products like USB
sticks to extract from a PC all passwords, Logins, E-Mails, files, etc.,
Trojan horse to control remotely a
target PC, software and methods to
get the Trojan on a target PC, WLAN
and Bluetooth hacking as well as also different kind of Training courses.
These kind of methods and applications allow to widen the capabilities in
the field of IP-Monitoring in addition
to an existing classical IP-Monitoring
system where it is limited to plain not
encrypted IP-communications. As the
FinFisher products are directly placed
on the target PCs, encryption is not
an issue anymore and also identifying

elaman GmbH • German Security Solutions
Seitzstrage 23 • 80538 Munich • Germany
Tel: +49-89-24 20 91 80 • Fax: +49-89-24 20 91 81 • info@elaman.cle • www.elaman.cle
HRB Munchen 153662 • Ust-IdNr.: DE814086265 • GeschaftsfOrer Holger Rumscheidt

1

elarnan
GENSION " C O M " SOLUTIONS

FinFisher Products '111111111
FinFisher
Fisher IT Intrusion Programe
consists o f the following FinFisher
Products:
• FinFisher
Fisher HQ
Graphical user interface HO software
for FinFisher 1 and 2.
• FinFisher 1
Extracts locally stored user accounts,
system and network information from
the target PC.
• FinFisher 2
Makes a copy of all locally stored emails and get a copy of all local files
with given file-extensions.
• FinFisher 3
2 bootable CD-ROMs to:
a) Clear the Windows Administrator account password and
b) Wipe all local hard-disks.
• FinSpy
A trojan-horse-like software for remote
surveillance of one or multiple target
systems.
• FinFly
A transparent HTTP proxy that can modify executables while they are being
downloaded.
• FinFisher Hacking PC
Robust notebook including FinTrack
and Windows system which both are
loaded with all up-to-date hacking tools
including scripts for easier usage and
automatism. This package also includes special hardware like a high-power
Wireless LAN adapter, a modified Bluetooth dongle and 2 wireless antennas
for WLAN and Bluetooth hacking.

FinFisber
jan horse techniques.
Topics included: Analysis,
usage and development of professional
root kits.
• Hacking VoIP
1week course covering various techniques to eavesdrop Voiceover-IP communication, g e t access t o accounts
and more.
Topics included: RTP sniffing, RIP injection, SIP account bruteforcing,
SIP password cracking, etc.
• Wireless Hacking
1week course covering different Wireless hacking techniques including Wireless LANs, Bluetooth and wireless keyboards.
Topics included: WEP / WPA cracking,
Bluetooth Sniffing and LinkKey cracking, etc.
• Covert Communication
1 week course covering covert communication techniques and programs.

WLAN Scanner

Topics included: Steganography, cryptography, network protocols,
etc.
• FinFisher Services
FinAudit Professional 1 or 2 week
penetration testing of local network
to discover possible attack vectors and
ensure the security of the network. Optional Alternatively, ask to join our restricted to government only oneday intrusion seminar.
! etionitte
0

0

Finfisher Training

P o , 00..

PPCOurnr..
1,,zsts

COL=
Checikood

0 SUS &winter".

(0, C o n e S . 1 . 0 0 1 0 0 1

(0 SIIS Client

( 0 Cisco En•We Mote/nom

0 SKS S o m e . .

( 0 Cisco G . . , F m a i m

0 VCR MAI

0

Basic Hacking Course
1 or 2 week basic hacking course covering up-to-date hacking
tools and techniques (using the FinFisher Hacking PC).
Topics included: Profiling, Attacking
and many more.
• Exploiting Software 1
week course covering techniques t o
discover and exploit bugs in software.
Topics included: Software bugs, Shellcode, Exploit archives / frameworks,
writing custom exploits, etc.
• Root kits
1week course covering root kit I tro

0

Sol

0 COO ' w o o

SNIFithinneosos

LOCO OCS Ness Scant,.
Coco S c a m =

0

0

CsIO C e s i t n i

(.5 SOL mooi

ion

0

hams I

6; SOUS

( 0 0E0110

tia sou.

ils) Krim M T

$ W o r m . . Gothienn.
4 • Innenst

S 4 1 NOIN•

Cs) SOLlintic

re
seiestioselooi

5104P Walk

CNC* Toon

Halbeol

5t NOWOrt Insonoss

re) Siestiess
Soloini

IV e d . . *
Canino"




! Dectinserils

Putemrs
• „

Anstros

„.fa

0 spot/
SsooliVir

I I d S I t

500.05,5.

I P O O Sinelvso

INScind

Roo,. Coins
,

Innil
tL!SOINNIIIMPt

SiniooEnt.

, I S S . To i n s

o,

4

0 Sion. Chock

• 4,:, H V I D

*Mem

W,

10 Toot

,

VIIC

al ntinvit

sqa,.,

•toniesei

0

S c

Yen,.

0 %giant,
soient
sOniurnsingins
isninnowt

.••401VOrli•
• , P • 11 , 5 1 - - S . c • I M O S

0

011001000

FinFisher Menu

Newsletter 3/07
December 2007

2

elaman
GERMAN ITCURITT SOLUTIONS

Recommended Finfisher Kits
FinFisher Starter Kit
This kit includes FinFisher 1, 2, 3, HQ
and the FinFisher Hacking PC kit.
FinFisher Software Kit
This kit includes only FinFisher 1, 2, 3
and H a

standing of the Systems they are attacking become more advanced.
The FinFisher
Project o p e r a t e s
on the understanding
that there i s a need for
"authorized" Agencies to obtain information, using such methods, as
they need to be pro-active against the
strategies and tactics employed by
their Targets. They can then alert the
appropriate Law Enforcement or Military units and organizations within
their country to intercept and prevent
an incident, as opposed to reacting
after. The System has also been developed with operational simplicity in
mind, so that Intelligence operators
require the minimum of technical ability and skill when using the tactical
components within the FinFisher Project. The FinFisher Project is scalable,
thus becoming more complex in capability and operation as the objectives of the user become more complex, and their knowledge and under-

The FinFisher Project
A F u n c t i o n and Purpose
A,• 41 In essence, it is an aggressive IT
hacking component. It utilizes and
incorporates Black H a t Hacking
tactics to enable Intelligence Agencies
to be able to gather information from
target systems that would otherwise
be extremely difficult to obtain legally.

TIM.

A

d

d

2001,12,..1

O

r

e
r

.

,
,

Appropriate Note
The FinFisher System has been developed to assist Intelligence Agencies
obtaining information from civilian individuals and groups.
It is not intended, or has it been tested, to see if it has the capability to
break into advanced complex government o r military security systems
with secret, or above security, classification.
Also, while every effort has been made to ensure the FinFisher Project can
get past known Anti-Virus and AntiSpyware Products and local Firewalls
and Security, no guarantees are given
in this area as these products are continuously being developed on a daily
basis.

For further Information please
don't hesitate t o contact u s
under:
elaman GmbH
German Security
Solutions

ES

Seitzstralle 23
80538 Munich
Germany
Tel: +49-89-24 20 91 80
Fax: +49-89-24 20 91 81
info@elaman.de
www.elaman.de

Fctund d e w. * 00 0E10,1E IC: 27
Found devrce 0019:87:06:E2:01
Found device 00:0E,S0030:10:22
Found dance Mk 3:111,410:ErFa

HRB Munchen 153662
Ust-IdNr.• DE814086265

I

• 3

a snail - Koss..

IM ' a a l 4

:

:

2

:

Managing Director:
Holger Rumscheidt

FinFisher Bluetooth Scanner

Newsl
December 2007

3

Document Path: ["443-elaman-newsletter-finfisher.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh