Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Building Mobile Apps in the Cloud – Comparing Approaches.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Microsoft Dynamics. Introducing Al-Futtaim Technologies  One of the region’s leading System Integrators  Strong partnerships with leading global ICT.
Netop Remote Control Trusted. Secure. Experienced.
OPC Alarm.NET.
Computer Literacy Presentation C. Otero Katie Carson, Dianna Jenkins, John Willis-Morris.
Back to Start 1 of 10 Connect with a Mobile Device You can use your company’s Windows SBS computer network to extend your connectivity by using mobile.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
1 Computer Security: Protect your PC and Protect Yourself.
Introduction Our Topic: Mobile Security Why is mobile security important?
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.
VERSION 2.6 FAE Group Demo Guide. Remote Control System Demo In order to standardize the way how Remote Control System is presented and to maximize the.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
All your communication requirements are in the Skype for Business desktop client – IM, voice, video, presence and location, and compatibility with Lync.
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Kaspersky Small Office Security INTRODUCING New for 2014!
Remote Control System 7 Cyber intelligence made easy.
Standard Demo 1 © Hacking Team All Rights Reserved.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.
Part One: System administration Training Handouts.
The Hacking Suite For Governmental Interception.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Office 365 Help Desk Troubleshooting Guide
The BEST Citrix/Microsoft RDS alternative
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
Ilija Jovičić Sophos Consultant.
Cyber intelligence made easy.
Instructor Materials Chapter 6 Building a Home Network
RCS v7 Infection Vectors
Public Facilities and Cyber Security
EBSCO eBooks.
On the road: Test automation in practice for a BMW map update service
Information Security 101 Richard Davis, Rob Laltrello.
Getting Started with Skype for Business
How it works: Step 1 99% of CAD systems can do this without modification is sent to a unique address for your agency Example:
© EIT, Author Gay Robertson, 2017
The Hacking Suite for Governmental Interception
Cyber intelligence made easy.
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Call AVG Antivirus Support | Fix Your PC
5G Security Training
Secure Browsing Because malware usually doesn’t identify itself.
THIS IS A TIPS & TRICKS SLIDE FOR YOU
Kind of evidence gathered by agents
Features Compatibility
The Hacking Suite for Governmental Interception
Backtrack Metasploit and SET
HOW DO I KEEP MY COMPUTER SAFE?
Google for Education offering
Faculty of Science IT Department By Raz Dara MA.
Cyber intelligence made easy.
Marcial Quinones-Cardona
The Hacking Suite For Governmental Interception
Presentation transcript:

Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application Engineer

Italian company founded in 2003 by Valeriano Bedeschi and David Vincenzetti. Funded since 2007 by two Italian VC Funds.

Market leader in Italy for Ethical Hacking services. In 2004 began the development of an innovative technology to attack, infect and remotely control target devices.

Why Hacking Team Reputation No remote access to customer data No hidden features

Remote Control System Invisible Flexible Integrated Scalable Easy to use Open

How we help our customers System installation Training Support portal Consulting for custom scenarios

Scenarios

Can you intercept Skype calls? Can you open PGP encrypted files?

Skype adoption is growing fast. People trust it for confidential communications. Criminals too.

There’s more.

Everyone uses the Web. It’s cheap, easy and global.

The new Web is the social web. Highly dynamic. Vastly networked. Big data.

Actually, too much data. Mostly noise. Difficult to correlate.

Tap a cable and try to figure out what’s happening. 99% of that is of no interest.

Interesting data often never gets to the Web. It stays on the device.

And that device may be out of reach. Linked to the Internet. But anywhere on Earth.

So what we want? Get access to secret data. Figure out the interesting parts. Reach them, anywhere they are.

What you already have? Traditional passive interception. Not effective against encryption. You lose half the picture. Must pass through your network.

Traditional is good. Innovative is better.

Thinking about offensive interception? You should.

“Governments must have offensive IT capabilities.” The Financial Times

“Spy on suspected terrorists by inserting a remote forensic agent on their computers.” The Economist

A remote forensic agent. Clever idea. A sort of 007 for the digital age.

We have it.

Remote Control System 7

Evidence collection is always running. Configurable behavior. Autonomous.

What kind of evidences can be collected?

Voice conversations Browsed URLs Accessed documents Keystrokes Printed documents Messaging Microphone Location Camera snapshots File system browsing Passwords … and more

RCS collected the evidences. They stay on remote device. How can we gather them?

Let’s talk about Desktops first.

Internet connection. Firewalls and proxies are passed through. Domain credentials are stolen.

Evidence can also be collected offline.

What about mobile platforms?

GPRS / UMTS / 3G+. You can provide a custom APN.

Open WiFi networks. Known protected networks. Access Points are automatically detected.

What if no data connection is available?

Bluetooth. Short Range. Let’s introduce RCS Mediation Node.

What happens if someone tracks the connection back?

Anonymizer Chain. Prevents disclosure of RCS server addresses. Configurable on-the-fly.

RCS is also flexible.

Real-time alerting system. Custom commands execution on remote target. Event-driven logic.

A few examples of event-driven logic.

When entering the meeting room, start the mic. On low battery, stop microphone capture. Special SMS is received, send back a SMS with position. Call is made or received, take a snapshot with the camera.

Combine them to suit your needs.

What if my target is very skilled?

Invisible to target user. Invisible to antivirus and anti-rootkits. Anti-forensic measures. Resistant to DeepFreeze restoration.

How can I install it on desktop systems?

Embed RCS into common file formats (0-day exploits). On-the-fly injection into downloaded applications. Webpage code injection during browsing.

I’m lucky. Physical access is granted.

Bootable CDROM or USB thumb drive.

What about installation on mobiles?

Memory Card. ActiveSync while synchronizing or charging. Embed RCS into smartphone applications. Over-the-Air installation.

Supported platforms?

Our agents are the best. On all platforms.

Install them on Windows.

Mac.

iPhone.

iPad.

Windows Mobile.

Symbian.

BlackBerry.

Android.

Soon on Linux.

“Cool, but I have to install the agents first, and that’s the difficult part: you have to be an hacker to do that stuff.”

Wrong. Remote Control System is easy. Everything is just one click away.

We’re going to show you. Demo time