The Hacking Suite For Governmental Interception

Slides:



Advertisements
Similar presentations
Facts about Welcome to this video from Ozeki. In this video I will present what makes Ozeki Phone System XE the Worlds best on-site software PBX for Windows.
Advertisements

Speaker Name, Title Windows 8 Pro: For Small Business.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Back to Start 1 of 10 Connect with a Mobile Device You can use your company’s Windows SBS computer network to extend your connectivity by using mobile.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Sr. Manager Global Business Solutions Carlos Capó Master Macs in Business Easily integrate Macs into a Microsoft Shop.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
PowerPoint Presentation to Accompany Chapter 5 System Software Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
WINDOWS XP PROFESSIONAL Bilal Munir Mughal Chapter-1 1.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
VERSION 2.6 FAE Group Demo Guide. Remote Control System Demo In order to standardize the way how Remote Control System is presented and to maximize the.
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
PowerPoint Presentation to Accompany Chapter 5 System Software Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Microsoft Management Seminar Series SMS 2003 Change Management.
 Computer News/Tip  Google Docs  Printer Sharing  Scanning  Faxing  Your Computer Problems.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
11 Computers, C#, XNA, and You Session 1.1. Session Overview  Find out what computers are all about ...and what makes a great programmer  Discover.
Handheld Device Overview Concepts What is a handheld device? A self contained device that enables a portable application Why have a handheld device? Desktops.
LO2 Understand the key components used in networking.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Remote Control System 7 Cyber intelligence made easy.
Standard Demo 1 © Hacking Team All Rights Reserved.
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
How to root Android Phone and Tablet for free and safe.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
BY C RAMYASVI SAGAR BARATH INSTITUTE OF ENGINEERING AND TECHNOLOGY SEMINAR TOPIC ON DOWNLOAD ACCELERATOR.
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.
Part One: System administration Training Handouts.
TUF: Secure Software Updates Justin Cappos NYU Poly Computer Science and Engineering.
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
The Hacking Suite For Governmental Interception.
Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.
How to Connect Wi-Fi HP Laptop/Desktop with Android Smart Phone? ( )
The BEST Citrix/Microsoft RDS alternative
Ilija Jovičić Sophos Consultant.
Cyber intelligence made easy.
Michael Etse and Maverick Fermill
VPN Joshua Turner.
The Internet and connections
People used to install software on their computers
RCS v7 Infection Vectors
Ways to protect yourself against hackers
Laplink PCmover.
Lesson 4: Web Browsing.
FactoryTalk® ViewPoint With FactoryTalk® View SE
The Hacking Suite for Governmental Interception
Cyber intelligence made easy.
Microsoft Bot Framework: changing how we communicate with users
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Windows® MultiPoint™ Server 2010
Microsoft Virtual Academy
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
The Hacking Suite for Governmental Interception
Google for Education offering
Lesson 4: Web Browsing.
Cyber intelligence made easy.
Netop Vision Product presentation Göteborg 1.
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Department of Engineering Science EE 465 (CES 440) - Intro
Presentation transcript:

The Hacking Suite For Governmental Interception

Today’s topic: RCS installation vectors. So what are we talking about today?

The RCS Agent is a software.

You have to deploy it. This is the key point of the whole solution. If you cannot install it, you cannot retrieve the data you need.

On the target’s device. Anything that runs a modern operating system. Desktops, Laptops, Smartphones, Tablets…

Locally. Remotely.

Let’s talk about local. You have access to the target device. Here we face different scenarios…

Boot from a USB thumb drive. Plug a USB cable. Desktop Mobile Hard drive tampering for desktop, usb connection for mobile (need to know the pin)

Easy installation. 100% success.

Let’s talk about remote. No physical access this time.

Deploy RCS while the target is… Using the INFECTION AGENT Only from desktop (win) to mobile (winmo)

Browsing the internet. Using the INJECTION PROXY Wired or wireless No matter if Desktop or smartphone. Just modify its traffic.

Opening a document file. Using the HT Zero Day Exploit Portal

Receiving a SMS. Using the REMOTE MOBILE INSTALLER

Complicated scenario?

Rely on our consultancy services. i. e. BlackBerry controlled via BES Rely on our consultancy services. i.e. BlackBerry controlled via BES. Windows PC in an enterprise domain. We provide consultancy

Curious about the real thing? Using the REMOTE MOBILE INSTALLER

RCS has a simple and unified console RCS has a simple and unified console. Your attacks are just one-click away.

Demo Time!

Exploitation Integrated 0-day exploits pack. Use documents as attack vector. Use websites as attack vector. 0) Factory to forge 1) FLAW, EXPLOIT 2) Word doc, Excel, PDF 3) Explorer or firefox L) Continue…

Easy to use exploit creation. No skills required. Exploitation Easy to use exploit creation. No skills required. *** DEMO in Vmware *** Connessione e0 Menu Forge doc Copia su vmware Run

Network Injector Monitors the target and modifies its traffic. Inserts code into downloads and updates. Inserts code into web pages. Continue…

Bob’s laptop Internet Web site Network Injector

Network Injector It does the magic on-the-fly. No need to be inline. Think of it as a passive probe. Continue…

Network Injector Use it at ISP level. ISP: hardware version (gigabit) Small: software *** DEMO ***

Use it on wi-fi networks. Open or Protected… Network Injector Use it on wi-fi networks. Open or Protected… ISP: hardware version (gigabit) Small: software *** DEMO ***

“Is it true that someone can break HTTPS?” Let’s see… Network Injector “Is it true that someone can break HTTPS?” Let’s see… ISP: hardware version (gigabit) Small: software *** DEMO ***

Insert RCS code into ANY USB device. Disguised devices Insert RCS code into ANY USB device. Send, Lend, Sell them.. Automatic OS Recognition. *** DEMO ***

Jump from an infected PC to USB-connected smartphones. Spreading Infection Jump from an infected PC to USB-connected smartphones. NO demo

Infecting Live Distros They are used by most Criminal Groups. Defeats disk encryption. Resident on the USB device. Demo

Remote Mobile Installation Sends a special crafted SMS to the phone. Once accepted, the phone will automatically install the Agent. Depending on the phone configuration the security settings are different. *** DEMO ***

Desktop vectors applies to mobile as well! Remote Mobile Installation Desktop vectors applies to mobile as well! Depending on the phone configuration the security settings are different. *** DEMO ***

Q&A