User manual
Copyright © 2007 by Futures, Inc. All rights reserved
6
Introduction
Futures Inc. is a network security company headquartered in the Baltimore/
Washington, D.C. metropolitan area. The company has, and continues to
provide leading-edge Information Assurance/Security products and services to
commercial and government customers since 1996. In line with that vision, the
security engineers and network analysts of Futures Inc. have developed another
product for use in the security community – WhirlWind. This document serves
as the users’ manual for WhirlWind versions: Bronze, Silver, Gold and Platinum.
All versions DO NOT have all capabilities. Each version is described in detail
within the WhirlWind Features section.
Background
DDST stands for: “Deployable, Disposable, Security Technology.”
DDST packages tools to create your deployable network solution, configurable
to your unique requirements, creating bootable CD media to perform network
monitoring, and intrusion detection and information collection at a low cost in
materiel and user training. WhirlWind is built on DDST. It was created to allow
someone to perform a wireless survey without knowing how to install tools,
setup configuration files, etc. Simply place the CD-ROM in a computer system
with a WiFi card (listings provided at Table 1) and a USB GPS device (listings
provided at Table 3) and you can wardrive (survey) an area as well as collect
GPS coordinates for points at which a network can be accessed. From system
startup, WhirlWind can be ready to wardrive within 2 minutes.
Once the wardriving is completed, the resulting data set is automatically sent
to an application called DustDevil for conversion into a Google Earth™ mapping
file. Examples of mapped data sets can be found in the “Data Sets Mapping
Display” section.
Scope
The design of WhirlWind is to catalog wireless network activity in a targeted
environment to glean insight into that environment. Some of the benefits of
this survey would be to determine access point identification and level of
encryption (if any). This document describes capabilities and operation of
WhirlWind at a high level. WhirlWind runs on most computer systems, may be
(depends upon user options selected) non-invasive to operating system or data
already loaded onto the hard disk drive(s), and is easily portable and
disposable.










