Text: Please have a
look at our
Now with the
vvvvw eLlman de
ELAMAN works closely with clients to develop a total system
solution t o their needs and t o ensure that they are
equipped, trained and manned to meet the formidable challenges in the field of communication.
First Information about our new
FinFisher IT Intrusion Products!
Adding n e w products solutions t o our
the target is also
portfolio is an ongoing process. Thereeasy especially comparing to normal IP-Mofore from now on ELAMAN provides
nitoring w h e r e decoding
a Newsletter whenever imporand identifying is always difficult.
tant innovations are coming
The experience shows having 100% of
traffic, the classical IP Monitoring
system will give the capability to moYour a m a n
nitor 40%, FinFisher gives another
40%. The remaining 20% is very difficult to get.
Elaman has started i t s own
41 development f o r I T - Intrusion
(Hacking) products and training as
we think this area will become more
and more important and effective and
is a very valuable add on to the classical IP-Monitoring systems provided
by e.g. Siemens, ATIS, ETI, etc.
Maybe authorities are already working internally on such methods but
even in this case FinFisher will widen
such an approach and specially the
training will improve the capabilities
of the staff and users.
The philosophy behind the FinFisher
IT Intrusion package is to provide the
government end-user with today's advanced hacking tools and techniques.
This enables Intelligence Agencies to
use such hacking components to ob-
tamn Intelligence information that cannot be obtained in any other way.
The Intrusion tools can be used by
Government Departments for internal
introduction I training to the hacking
threats being faced today.
• Information Gathering
This range o f n e w IT-Intrusion products we named FinFisher.
The FinFisher kit includes certain types of Hardware products like USB
sticks to extract from a PC all passwords, Logins, E-Mails, files, etc.,
Trojan horse to control remotely a
target PC, software and methods to
get the Trojan on a target PC, WLAN
and Bluetooth hacking as well as also different kind of Training courses.
These kind of methods and applications allow to widen the capabilities in
the field of IP-Monitoring in addition
to an existing classical IP-Monitoring
system where it is limited to plain not
encrypted IP-communications. As the
FinFisher products are directly placed
on the target PCs, encryption is not
an issue anymore and also identifying
elaman GmbH • German Security Solutions
Seitzstrage 23 • 80538 Munich • Germany
Tel: +49-89-24 20 91 80 • Fax: +49-89-24 20 91 81 • firstname.lastname@example.org • www.elaman.cle
HRB Munchen 153662 • Ust-IdNr.: DE814086265 • GeschaftsfOrer Holger Rumscheidt
GENSION " C O M " SOLUTIONS
FinFisher Products '111111111
Fisher IT Intrusion Programe
consists o f the following FinFisher
Graphical user interface HO software
for FinFisher 1 and 2.
• FinFisher 1
Extracts locally stored user accounts,
system and network information from
the target PC.
• FinFisher 2
Makes a copy of all locally stored emails and get a copy of all local files
with given file-extensions.
• FinFisher 3
2 bootable CD-ROMs to:
a) Clear the Windows Administrator account password and
b) Wipe all local hard-disks.
A trojan-horse-like software for remote
surveillance of one or multiple target
A transparent HTTP proxy that can modify executables while they are being
• FinFisher Hacking PC
Robust notebook including FinTrack
and Windows system which both are
loaded with all up-to-date hacking tools
including scripts for easier usage and
automatism. This package also includes special hardware like a high-power
Wireless LAN adapter, a modified Bluetooth dongle and 2 wireless antennas
for WLAN and Bluetooth hacking.
jan horse techniques.
Topics included: Analysis,
usage and development of professional
• Hacking VoIP
1week course covering various techniques to eavesdrop Voiceover-IP communication, g e t access t o accounts
Topics included: RTP sniffing, RIP injection, SIP account bruteforcing,
SIP password cracking, etc.
• Wireless Hacking
1week course covering different Wireless hacking techniques including Wireless LANs, Bluetooth and wireless keyboards.
Topics included: WEP / WPA cracking,
Bluetooth Sniffing and LinkKey cracking, etc.
• Covert Communication
1 week course covering covert communication techniques and programs.
Topics included: Steganography, cryptography, network protocols,
• FinFisher Services
FinAudit Professional 1 or 2 week
penetration testing of local network
to discover possible attack vectors and
ensure the security of the network. Optional Alternatively, ask to join our restricted to government only oneday intrusion seminar.
P o , 00..
0 SUS &winter".
(0, C o n e S . 1 . 0 0 1 0 0 1
(0 SIIS Client
( 0 Cisco En•We Mote/nom
0 SKS S o m e . .
( 0 Cisco G . . , F m a i m
0 VCR MAI
Basic Hacking Course
1 or 2 week basic hacking course covering up-to-date hacking
tools and techniques (using the FinFisher Hacking PC).
Topics included: Profiling, Attacking
and many more.
• Exploiting Software 1
week course covering techniques t o
discover and exploit bugs in software.
Topics included: Software bugs, Shellcode, Exploit archives / frameworks,
writing custom exploits, etc.
• Root kits
1week course covering root kit I tro
0 COO ' w o o
LOCO OCS Ness Scant,.
Coco S c a m =
CsIO C e s i t n i
(.5 SOL mooi
( 0 0E0110
ils) Krim M T
$ W o r m . . Gothienn.
4 • Innenst
S 4 1 NOIN•
5t NOWOrt Insonoss
IV e d . . *
I I d S I t
I P O O Sinelvso
, I S S . To i n s
0 Sion. Chock
• 4,:, H V I D
• , P • 11 , 5 1 - - S . c • I M O S
GERMAN ITCURITT SOLUTIONS
Recommended Finfisher Kits
FinFisher Starter Kit
This kit includes FinFisher 1, 2, 3, HQ
and the FinFisher Hacking PC kit.
FinFisher Software Kit
This kit includes only FinFisher 1, 2, 3
and H a
standing of the Systems they are attacking become more advanced.
Project o p e r a t e s
on the understanding
that there i s a need for
"authorized" Agencies to obtain information, using such methods, as
they need to be pro-active against the
strategies and tactics employed by
their Targets. They can then alert the
appropriate Law Enforcement or Military units and organizations within
their country to intercept and prevent
an incident, as opposed to reacting
after. The System has also been developed with operational simplicity in
mind, so that Intelligence operators
require the minimum of technical ability and skill when using the tactical
components within the FinFisher Project. The FinFisher Project is scalable,
thus becoming more complex in capability and operation as the objectives of the user become more complex, and their knowledge and under-
The FinFisher Project
A F u n c t i o n and Purpose
A,• 41 In essence, it is an aggressive IT
hacking component. It utilizes and
incorporates Black H a t Hacking
tactics to enable Intelligence Agencies
to be able to gather information from
target systems that would otherwise
be extremely difficult to obtain legally.
The FinFisher System has been developed to assist Intelligence Agencies
obtaining information from civilian individuals and groups.
It is not intended, or has it been tested, to see if it has the capability to
break into advanced complex government o r military security systems
with secret, or above security, classification.
Also, while every effort has been made to ensure the FinFisher Project can
get past known Anti-Virus and AntiSpyware Products and local Firewalls
and Security, no guarantees are given
in this area as these products are continuously being developed on a daily
For further Information please
don't hesitate t o contact u s
Tel: +49-89-24 20 91 80
Fax: +49-89-24 20 91 81
Fctund d e w. * 00 0E10,1E IC: 27
Found devrce 0019:87:06:E2:01
Found device 00:0E,S0030:10:22
Found dance Mk 3:111,410:ErFa
HRB Munchen 153662
a snail - Koss..
IM ' a a l 4
FinFisher Bluetooth Scanner
Document Path: ["443-elaman-newsletter-finfisher.pdf"]