The Hacking Suite for Governmental Interception

Slides:



Advertisements
Similar presentations
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Advertisements

Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
School Management Software
Netop Remote Control Trusted. Secure. Experienced.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Module 7: Fundamentals of Administering Windows Server 2008.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
VERSION 2.6 FAE Group Demo Guide. Remote Control System Demo In order to standardize the way how Remote Control System is presented and to maximize the.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Enterprise Messaging & Collaboration. e-Interact Modules.
Maintaining and Updating Windows Server 2008 Lesson 8.
Remote Control System 7 Cyber intelligence made easy.
Standard Demo 1 © Hacking Team All Rights Reserved.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.
Part One: System administration Training Handouts.
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
The Hacking Suite For Governmental Interception.
Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.
BUILD SECURE PRODUCTS AND SERVICES
Managing Windows Security
Cyber intelligence made easy.
Munix Healthcare Customer Profiling, Frequency Analysis, Location Mapping, Movement Analysis, Web Classification, Time Analysis, and much more …. Internet.
Barracuda Web Security Flex
TrueSight Operations Management 11.0 Architecture
Module Overview Installing and Configuring a Network Policy Server
RCS v7 Infection Vectors
Backdoor Attacks.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
MICROSOFT OUTLOOK and Outlook service Provider
Computer Virus and Antivirus
Veeam Backup Repository
Cyber intelligence made easy.
Running on the Powerful Microsoft Azure Platform,
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
ForceManager Integrates with Office 365 Outlook Mail, Calendar, Contacts, Word, and Excel for a Smart, Fast, Intuitive Mobile CRM Sales Solution OFFICE.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Data Security for Microsoft Azure
CloneManager® Helps Users Harness the Power of Microsoft Azure to Clone and Migrate Systems into the Cloud Cost-Effectively and Securely MICROSOFT AZURE.
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Windows 7 – Beyond the boundaries of your office
The Jamespot for Office 365 Application Attaches Business Processes to Docs and Syncs Them to OneDrive to Simplify Collaboration and Sharing OFFICE 365.
The Hacking Suite for Governmental Interception
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Backtrack Metasploit and SET
Information Security Awareness
HOW DO I KEEP MY COMPUTER SAFE?
Google for Education offering
Cyber intelligence made easy.
Employee Monitoring Solution
6. Application Software Security
Microsoft Virtual Academy
The Hacking Suite For Governmental Interception
Presentation transcript:

The Hacking Suite for Governmental Interception Remote Control System The Hacking Suite for Governmental Interception Milan - 23/08/2013

The Building Blocks

Remote Agent Secure Frontend Scalable Backend Infection Vectors

Complete solution, not a toolkit Totally developed by us

Remote agent Your personal 007

Internet Desktop installation Mobile Installation Working offline… Then send data.

What can we collect?

Camera Messages Chat Microphone Contacts Calendars Calls Location Keystrokes Documents Passwords Visited websites And much more… Social -> calendar + contacts

Runs on an event-driven logic Autonomous

Events Actions When crossing the border Every day at midnight On hidden SMS On voice call Actions Start microphone recording Destroy the device Send collected data Take a camera snapshot Social -> calendar + contacts

Many different events and actions Combine them to suit your needs

What if my target is security aware?

Invisible to target user Invisible to antivirus and anti-rootkits Anti-forensic measures Resistant to format and restoration

Evidence on remote device How can we collect it?

Firewalls and proxies are passed through Internet connection Firewalls and proxies are passed through

Open and saved networks WiFi Open and saved networks

Avoid billing the target with custom APN GPRS / UMTS / 3G+ Avoid billing the target with custom APN

Where can I install the Agent?

Enough of features. Let’s see on what devices you can operate the RCS Enough of features. Let’s see on what devices you can operate the RCS. On Windows for sure, so 90% of the desktop market is covered.

Secure Frontend An invisible barrier

Agent is connecting to your servers Your identity must be kept secret

Let’s say we have RCS in one country… And the backdoor in another… Suppose you control a number of server around the world. You may think of forwarding the traffic…

Configurable on-the-fly Evidence stays encrypted

Scalable Backend Your data vault

Scalable by design

Agents x 300 Collector Database

Agents x 10000 Collector 1 Collector 2 … Collector N Database Shard 1 Shard 2 … Shard N

Adding servers is transparent Load balancing is automatic Scale when you need Adding servers is transparent Load balancing is automatic

No database administration required Set & Forget backups Fast restore in 5 minutes

Be informed on interesting events Real-time alerting Be informed on interesting events

Polished graphical console The whole system from a single point

Infection Vectors Deploy your forces

How can I deploy my agent?

When the target opens a document

0-day exploits pack Always up to date

While the target browses the web

Inject into downloaded applications Inject into web pages

Bob’s laptop Internet Web site Network Injector

Send your target an SMS

And many more…

Third-party Integration Combine your weapons

Easily integrate with your monitoring center

Demo time!