The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.

Slides:



Advertisements
Similar presentations
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Advertisements

You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
Google Chrome Operating System By Pauly Daher. Introduction Google Chrome OS is an open source PC operating system which is based on Linux. The operating.
Developed by Klaus Knopper Linux Consultant. What is Knoppix?  Unix-like operating system  Run directly from CD or DVD  Bootable from USB flash drive.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
PowerPoint Presentation to Accompany Chapter 5 System Software Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Open Web App. Purpose To explain Open Web Apps To explain Open Web Apps To demonstrate some opportunities for a small business with this technology To.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
VERSION 2.6 FAE Group Demo Guide. Remote Control System Demo In order to standardize the way how Remote Control System is presented and to maximize the.
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
PowerPoint Presentation to Accompany Chapter 5 System Software Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 14 Supporting Windows 2000 Professional. 14 You Will Learn… n About the different operating systems within the Windows 2000 suite n About the.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Microsoft Management Seminar Series SMS 2003 Change Management.
Understanding Backup and Recovery Methods Lesson 8.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Introduction TO Network Administration
11 Computers, C#, XNA, and You Session 1.1. Session Overview  Find out what computers are all about ...and what makes a great programmer  Discover.
Handheld Device Overview Concepts What is a handheld device? A self contained device that enables a portable application Why have a handheld device? Desktops.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
RCS POC – Infection Vectors Egypt June 18 th -19 st 2013 Mostapha Maanna – Marco Catino.
Remote Control System 7 Cyber intelligence made easy.
Standard Demo 1 © Hacking Team All Rights Reserved.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
How to root Android Phone and Tablet for free and safe.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.
Part One: System administration Training Handouts.
TUF: Secure Software Updates Justin Cappos NYU Poly Computer Science and Engineering.
The Hacking Suite For Governmental Interception.
Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.
Ilija Jovičić Sophos Consultant.
Cyber intelligence made easy.
Michael Etse and Maverick Fermill
Create setup scripts simply and easily.
SRA Memory Grabber Product Description.
RCS v7 Infection Vectors
Computer troubleshooting
Laplink PCmover.
Lesson 4: Web Browsing.
Modernize ConfigMgr OSD with Community Tools
5.0 : Windows Operating System
The Hacking Suite for Governmental Interception
Cyber intelligence made easy.
Microsoft Bot Framework: changing how we communicate with users
Microsoft Virtual Academy
Booting Up 15-Nov-18 boot.ppt.
PC RE-IMAGING MADE EASY
The Hacking Suite for Governmental Interception
Microsoft Virtual Academy
Google for Education offering
Implementing Client Security on Windows 2000 and Windows XP Level 150
Lesson 4: Web Browsing.
Cyber intelligence made easy.
Desktop Services Maximizing user productivity and reducing
The Hacking Suite For Governmental Interception
Microsoft Microsoft Word 2016 Core: Document Creation, Collaboration and Communication (MOS )
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
The Hacking Suite For Governmental Interception
Presentation transcript:

The Hacking Suite For Governmental Interception

Today’s topic: RCS installation vectors.

The RCS Agent is a software.

You have to deploy it.

On the target’s device. Anything that runs a modern operating system.

Locally. Remotely.

Let’s talk about local. You have access to the target device.

Boot from a USB thumb drive. Plug a USB cable.

Easy installation. 100% success.

Let’s talk about remote. No physical access this time.

Deploy RCS while the target is…

Browsing the internet.

Opening a document file.

Receiving a SMS.

Complicated scenario?

Rely on our consultancy services. i.e. BlackBerry controlled via BES. Windows PC in an enterprise domain.

RCS has a simple and unified console. Your attacks are just one-click away.

Demo Time!

Let’s add some UEFI black magic Local Installation

Agent will resist: Windows Recovery mode OS re-installation Hard disk replacement Local Installation

Pre-EULA installation is very easy! Local Installation

Supported operating systems: Windows Local Installation

Linux and OSX are coming soon… Local Installation

Integrated 0-day exploits pack. Use documents as attack vector. Use websites as attack vector. Exploitation

Easy to use exploit creation. No skills required. Exploitation

Monitors the target and modifies its traffic. Inserts code into downloads and updates. Inserts code into web pages. Network Injector

Bob’s laptop Web site Internet Network Injector

It does the magic on-the-fly. No need to be inline. Think of it as a passive probe. Network Injector

Use it at ISP level. Network Injector

Use it on wi-fi networks. Open or Protected… Network Injector

“Is it possible to bypass HTTPS?” Let’s see… Network Injector

Often used by criminal groups. Defeats disk encryption. Resident on the USB device. Infecting Live Distros

Sends a special crafted SMS to the phone. Once accepted, the phone will automatically install the Agent. Remote Mobile Installation

Desktop vectors applies to mobile as well! Remote Mobile Installation

Q&A