Kind of evidence gathered by agents

Slides:



Advertisements
Similar presentations
© 2013 Microsoft Corporation. All rights reserved. Schedule a Lync Meeting You can simply schedule an Lync Meeting by using the Outlook add-in for Lync.
Advertisements

Getting Started. Intro Must Haves and Best Practices Demo Q&A Agenda.
Talent Slate Mobile LMS Manual Club Name. Install the Talent Slate App on your Device Search for “Talent Slate” in the app store of your device and install.
MXIE overview 5/4/ Update1. MXIE Media Exchange Interface for End Users 5/4/ Update2.
1 ITGS - introduction System unit + Peripherals = PC System unit (CPU, memory, …) Peripherals (mouse, keyboard,…) PC main purpose: to communicate with.
The sequence of folders to a file or folder is called a(n) ________.
LYNC SERVER 2013 Lync Online and Office365 Omar Kudović ProCredit Bank d.d. Sarajevo BLOG: MAIL:
T.Sharon-A.Frank Multimedia Internet/Web MM Interaction Tools.
Adobe Connect User Guide. Adobe Connect Meeting is an online-based tool that lets you to connect with colleagues, classmates, or anyone else around the.
 What is it?  Skype is software which allows you to call other computer users who also have Skype installed for audio and/or video chats, for free.
Useful free software. Skype Free phone calls (to computers) Free video calls Video chat Get help from family members Cheap phone calls (to phones) Download.
How To Get Insanely Organized With Evernote Unleash the Power of the Trunk Michelle Lindsey, Technology Instructor Ozark Upper Elementary
COMMUNICATION SOFTWARE Presented by Linda Walker Illinois Office of Educational Services December 4, 2009.
Skype Skyping In The Classroom Freda Williams
Objectives Overview Identify the general categories of programs and apps Describe how an operating system interacts with applications and hardware Differentiate.
AMANDA SHERRATT. What is SKYPE ? COMPUTER PROGRAM AND VOICE OVER INTERNET PROTOCOL USE IT TO PERFORM VIDEO CONFERENCES, SEND INSTANT MESSAGES AND TEXT.
What you should know and/or be able to do..  Desktop Layout  Mouse Operations  Point  Click  Double-Click  Right-Click  Drag  Right-Drag  Create.
CARNIVORE And Other Computer Spy Programs. What is Carnivore? Carnivore helps the FBI conduct ‘wiretaps’ on Internet connections. Carnivore is a computer-based.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
Specialist communication channel. Sarah-Jane king.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
Dextrosoft SCHEDULED PHONE BACKUP Backup your mobile life Version Copyright © 2015 Dextrosoft Private Limited. All Rights Reserved.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
Android and IOS Permissions Why are they here and what do they want from me?
IT Desktop Management GoToMeeting – Online Meeting Service Organizer/Presenter Guide May 2007 Prepared by Angela Mars IT Education and Training.
Standard Demo 1 © Hacking Team All Rights Reserved.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
Accessing Your Documents from Your Personal Computer.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Applications Sharing Computer Literate.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Third Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
Features Compatibility. Platforms OSXLinuxWindows Yosemite (10.10)Debian 10* Mavericks (10.9)Fedora8.1 Mountain Lion (10.8) Mageia8 Lion (10.7)Mint7.
BY G.SRAVAN TEJA. Skype’s Popularity Skype was founded in 2003 by Niklas Zennström and Janus Friis. EBay bought Skype for 2.6 billion dollars in 2005.
Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.
Welcome to Zoom Training
Microsoft® Skype For Business™ Quick Guide
Office 2016 and Windows 10: Essential Concepts and Skills
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
Computer Literacy BASICS
Cyber intelligence made easy.
Quick Start for Apple iPhone/Ipad February 2017
Using Apps to Get and Share Information
Using Jabber in Global Offices
Microsoft® Lync™ 2010 Web App Training
MICROSOFT OUTLOOK and Outlook service Provider
Features Compatibility
A Digital Tool for the Classroom
What this activity will show you
Lync Meetings Join a Lync Meeting Lync 2013 Quick Reference
Lync Meetings Join a Lync meeting Schedule a Lync meeting
Lync Meetings Join a Lync Meeting Lync 2013 Quick Reference
Panasonic UC Pro - Ver Rev1.0 7 Jun.,
Objectives Overview Identify the general categories of programs and apps Describe how an operating system interacts with applications and hardware Differentiate.
Print the screen on Macbook Easily
Getting Started with Skype for Business
The Hacking Suite for Governmental Interception
Cyber intelligence made easy.
Useful free software.
Features Compatibility
RCS on a low bandwith.
Skype for Business Webinar Meeting
ConnectPro User Guide for Students
Zoom Conferencing Tips, Tricks and Tools.
software & cloud computing
Lync Meetings Join a Lync Meeting Lync 2013 Quick Reference
Introduction To Computing BBA & MBA
Skype.
Microsoft Teams User Interface
Presentation transcript:

Kind of evidence gathered by agents RCS Modules Kind of evidence gathered by agents Is the “tool” of the agent used to gather certain type of evidence Pictures, files, keystrokes, messages, etc. What is a module? One shot modules need to be triggered everytime agent must gather a specific kind of evidence Always-on modules are activated by actions and are working until disabled by an anoter action Types of modules Not all modules are available in every platform and some of them are depending on Desktop or Mobile application Agents manage modules in a best efford form, so will gather the information requested only if its possible Platforms and availability

RCS Modules Desktop When an action starts one of this modules, only one unit of this kind of evidences will be gathered. Agent should activate them as many times as evidence units needs If an action starts one of these modules, it will work until another action stops it Thses are security modules that must be used after conulting with HT support service

RCS One-shot Modules Example: Taking a screenshot every 10 seconds When agent starts working after 10 sec 1st screenshot 2nd screenshot 3rd screenshot …

Example: Taking pictures when Skype starts and stops RCS One-shot Modules Example: Taking pictures when Skype starts and stops When skype.exe stops When skype.exe starts

RCS On-Off Modules Example: Mouse module based on active process When that window is not active When a window with *HSNC* in title is activ

RCS Modules Desktop: Takes a picutere with webcam if available. LED of webcam will blink Mobile: Takes a picture with front and rear camera of the device Camera Quality: Indicates level of JPEG compression of the evidence Camera Settings

RCS Modules Desktop: Processor, Memory, Disks, OS, Application list, … Mobile: Model, Manufaturer, IMEI, IMSI, App list, ... Device Desktop: In Windows and Linux platforms, gather information of Bitcoins, Litecoins, ... accounts in the computer Money Desktop: Gathers wifi hotspots around. Mobile: Gathers Wifi hotspots around GSM cell info and/or GPS Position

RCS Modules Desktop: Takes a copy of whole screeen or on-focus window Mobile: Takes a copy of device whole screen Screenshot Desktop & Mobile: gathers contacts from different applications like mail, chats, Facebooks, phone agenda, etc. Agenda Desktop & Mobile: shows when every application starts or stops Applications

RCS Modules Desktop & Mobile: Presents dates and schedules Calendar Desktop: Records calls on supported applications Mobile: Captures audio* and call information from GSM and apps. Call Desktop & Mobile: Captures every piece of conversation on supported apps as single evidence Chat

RCS Modules Desktop & mobile: gathers text copied to clipboard Clipboard Desktop: Captures path (and content) of files opened by target matching filters of module settings. Files

RCS Modules Desktop & Mobile: Gathers what is typed in keyboard Keylogger Desktop: Captures email messages Mobile: Captures email, SMS and MMS messages. Messages

RCS Modules Microphone Desktop & Mobile: Records surrounding voices Desktop: Takes a picture around every mouse click Mouse Desktop & Mobile: Captures every possible password stored by user Password

RCS Modules Desktop & Mobile: Copy every URL accessed by device browser URL Mobile: Makes a third party call to specified number Conference Mobile: Calls specified number for realtime listening Livemic

RCS Modules Desktop & Mobile: Disable agent functionalities in order to prevent being detected URL