Cyber intelligence made easy.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 Windows Tutorial 8 Connecting to Networks with Mobile Computing.
Advertisements

Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Netop Remote Control Trusted. Secure. Experienced.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
1 Computer Security: Protect your PC and Protect Yourself.
A+ Certification Guide Chapter 10 Mobile Devices.
Chapter 4: What is an operating system?. What is an operating system? A program or collection of programs that coordinate computer usage among users and.
Tutorial 11 Installing, Updating, and Configuring Software
By Jonathan….and Darion……….. Reliability Windows File Protection protects core system files from being overwritten by application installs. Driver certification.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.
VERSION 2.6 FAE Group Demo Guide. Remote Control System Demo In order to standardize the way how Remote Control System is presented and to maximize the.
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Introduction TO Network Administration
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Your Interactive Guide to the Digital World Discovering Computers 2012.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
Kaspersky Small Office Security INTRODUCING New for 2014!
Remote Control System 7 Cyber intelligence made easy.
Standard Demo 1 © Hacking Team All Rights Reserved.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
Guide To Develop Mobile Apps With Titanium. Agenda Overview Installation of Platform SDKs Pros of Appcelerator Titanium Cons of Appcelerator Titanium.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.
Features Compatibility. Platforms OSXLinuxWindows Yosemite (10.10)Debian 10* Mavericks (10.9)Fedora8.1 Mountain Lion (10.8) Mageia8 Lion (10.7)Mint7.
The Hacking Suite For Governmental Interception.
Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.
Office 365 Help Desk Troubleshooting Guide
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Fundamentals of Information Systems, Sixth Edition
Chapter Objectives In this chapter, you will learn:
Ilija Jovičić Sophos Consultant.
Malware and Computer Maintenance
Discovering Computers 2012: Chapter 8
2. OPERATING SYSTEM 2.1 Operating System Function
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
RCS v7 Infection Vectors
Features Compatibility
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms.
The Hacking Suite for Governmental Interception
Cyber intelligence made easy.
McAfee Total Protection 2018 Protection for PC, MAC, Smartphones and Tablets.
Chapter 4.
THIS IS A TIPS & TRICKS SLIDE FOR YOU
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms GCFLearnFree website “Computer Basics”:
Booting Up 15-Nov-18 boot.ppt.
Kind of evidence gathered by agents
Features Compatibility
The Hacking Suite for Governmental Interception
Configuring Internet-related services
HOW DO I KEEP MY COMPUTER SAFE?
Cyber intelligence made easy.
Digital Literacy 1.00 Computer Basics
Operating Systems & System Software
The Hacking Suite For Governmental Interception
Presentation transcript:

Cyber intelligence made easy. Remote Control System 7 Cyber intelligence made easy.

Can you intercept Skype calls? Can you open PGP encrypted files?

Skype adoption is growing fast Skype adoption is growing fast. People trust it for confidential communications. Criminals too.

There’s more.

Everyone uses the Web. It’s cheap, easy and global.

The new Web is the social web. Highly dynamic. Vastly networked The new Web is the social web. Highly dynamic. Vastly networked. Big data.

Actually, too much data. Mostly noise. Difficult to correlate.

Tap a cable and try to figure out what’s happening Tap a cable and try to figure out what’s happening. 99% of that is of no interest.

Interesting data often never gets to the Web. It stays on the device.

And that device may be out of reach. Linked to the Internet And that device may be out of reach. Linked to the Internet. But anywhere on Earth.

So what we want. Get access to secret data So what we want? Get access to secret data. Figure out the interesting parts. Reach them, anywhere they are.

What you already have. Traditional passive interception What you already have? Traditional passive interception. Not effective against encryption. You lose half the picture. Must pass through your network.

Traditional is good. Innovative is better.

Thinking about offensive interception? You should.

“Governments must have offensive IT capabilities.” The Financial Times

“Spy on suspected terrorists by inserting a remote forensic agent on their computers.” The Economist

A remote forensic agent. Clever idea. A sort of 007 for the digital age.

We have it.

Remote Control System 7

Evidence collection is always running. Configurable behavior Evidence collection is always running. Configurable behavior. Autonomous.

What kind of evidences can be collected?

Voice conversations Browsed URLs Accessed documents Keystrokes Printed documents Messaging Microphone Location Camera snapshots File system browsing Passwords … and more

RCS collected the evidences. They stay on remote device RCS collected the evidences. They stay on remote device. How can we gather them?

Let’s talk about Desktops first.

Internet connection. Firewalls and proxies are passed through Internet connection. Firewalls and proxies are passed through. Domain credentials are stolen.

Evidence can also be collected offline.

What about mobile platforms?

GPRS / UMTS / 3G+. You can provide a custom APN.

Open WiFi networks. Known protected networks Open WiFi networks. Known protected networks. Access Points are automatically detected.

What if no data connection is available?

Bluetooth. Short Range. Let’s introduce RCS Mediation Node.

What happens if someone tracks the connection back?

Anonymizer Chain. Prevents disclosure of RCS server addresses Anonymizer Chain. Prevents disclosure of RCS server addresses. Configurable on-the-fly.

RCS is also flexible.

Real-time alerting system. Custom commands execution on remote target Real-time alerting system. Custom commands execution on remote target. Event-driven logic.

A few examples of event-driven logic.

When entering the meeting room, start the mic When entering the meeting room, start the mic. On low battery, stop microphone capture. Special SMS is received, send back a SMS with position. Call is made or received, take a snapshot with the camera.

Combine them to suit your needs.

What if my target is very skilled?

Invisible to target user. Invisible to antivirus and anti-rootkits Invisible to target user. Invisible to antivirus and anti-rootkits. Anti-forensic measures. Resistant to DeepFreeze restoration.

How can I install it on desktop systems?

Embed RCS into common file formats (0-day exploits) Embed RCS into common file formats (0-day exploits). On-the-fly injection into downloaded applications or updates. Webpage code injection during browsing.

I’m lucky. Physical access is granted.

Bootable CDROM or USB thumb drive. Direct hard disk tampering.

What about installation on mobiles?

Memory Card. ActiveSync while synchronizing or charging Memory Card. ActiveSync while synchronizing or charging. Embed RCS into smartphone applications. Over-the-Air installation.

Supported platforms?

Microsoft Windows XP up to 7 (32 and 64 bits) Mac OS X Leopard and Snow Leopard Linux coming in Q4 2011 Windows: we’re working on Windows 8 Mac: we’re working on OS X Lion Linux: will be ready before the end of the year

Windows Mobile 6. 0 up to 6. 5 iOS 3. 0 up to 4 Windows Mobile 6.0 up to 6.5 iOS 3.0 up to 4.2 Symbian S60 3rd & 5th edition BlackBerry OS from 4.5 Android from 2.2 iOS: we’re working on iOS 5 (released on October 12)

Demo time