VERSION 2.6 FAE Group Demo Guide. Remote Control System Demo In order to standardize the way how Remote Control System is presented and to maximize the.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Chapter 20 Oracle Secure Backup.
Digital Certificate Installation & User Guide For Class-2 Certificates.
FILEMAKER SERVER SOFTWARE & REMOTE ADMINISTRATION
Digital Certificate Installation & User Guide For Class-2 Certificates.
DSL-2730B, DSL-2740B, DSL-2750B.
For Removal Info: visit
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Choose a category: Install Episys Install Accessories Synergent Confidential Episys Version Synergent 2008Download latest guides from:
NetOp School Your Interactive Classroom Help instructors optimize, manage and control their teaching environment. Consists of two modules: o the teacher.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Maintaining and Updating Windows Server 2008
6 February LAN-50/500 Ethernet Communication.
A Quick Review of Unit 1 – Recognizing Computers Computing Fundamentals © CCI Learning Solutions.
GeneXpert Installation and Xpert MTB/RIF Set-up
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Installing software on personal computer
Getting to Know the Digital Hub Can you sketch/draw the digital hub system – subsystems? Can you Identify Point of failures?
Objectives  Understand the purpose of the superuser account  Outline the key features of the Linux desktops  Navigate through the menus  Getting help.
Blue Ray DVD/DVR Players
FileSecure Implementation Training Patch Management Version 1.1.
A+ Certification Guide Chapter 10 Mobile Devices.
April WebEx Intel ® Active Management Technology (AMT) LANDesk Provisioning LANDesk Server Manager.
Installing and Troubleshooting Hardware Device and Drivers Chapter 6 powered by dj.
eScan Total Security Suite with Cloud Security
Configuring the MagicInfo Pro Display
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
ETP Reloaded e-Commission Technological Platform Upgrade to Microsoft Office 2003 DIGIT Adapted to DG SCIC.
Tutorial 11 Installing, Updating, and Configuring Software
Phones and fieldTask. Session Objective Be familiar with: – selecting smart phones for a survey, – configuring them – and using them – fieldTask (c) Smap.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Specialist communication channel. Sarah-Jane king.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Week #3 Objectives Partition Disks in Windows® 7 Manage Disk Volumes Maintain Disks in Windows 7 Install and Configure Device Drivers.
MUzima INSTALLATION BY RUTH KEITANY 10/29/20151 mUzima Installation.
Evaluating & Maintaining a Site Domain 6. Conduct Technical Tests Dreamweaver provides many tools to assist in finalizing and testing your website for.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
W elcome to our Presentation. Presentation Topic Virus.
VERSION 1.0 FAE Group Delivery Guide. Remote Control System Delivery The FAE Group Delivery Guide aims to provide a simple and comprehensive list of steps.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
Technology Requirements for Online Testing Training Module Copyright © 2014 American Institutes for Research. All rights reserved.
Run the on your PC to start the firmware configuration process Run IP Config Tool.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
Maintaining and Updating Windows Server 2008 Lesson 8.
Standard Demo 1 © Hacking Team All Rights Reserved.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
CACI Proprietary Information | Date 1 Sybase Open Client 15.5 ESD#6 Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.
ICAICT201A USE COMPUTER OPERATING SYSTEM. USING THE CONTROL PANEL The Control Panel contains many options for configuring your computer, including: adding.
Cyber intelligence made easy.
Features Compatibility
MOA Delta Mobile OA Installation Guide 2015/12/16.
The Hacking Suite for Governmental Interception
Cyber intelligence made easy.
Intuit has launched QuickBooks File Doctor tool (QBFD) in QuickBooks File Doctor is a tool that has been designed to recover the damaged company.
Presentation transcript:

VERSION 2.6 FAE Group Demo Guide

Remote Control System Demo In order to standardize the way how Remote Control System is presented and to maximize the effectiveness of pre-sales meetings, a standard demonstration has been prepared. This presentation contains steps to follow and features to highlight, to show the most important characteristics in a short time frame, performing thus a successful demonstration. --- To prepare your demo chain in the proper way (hardware, software, licenses, etc.), please check all the contents within the following position on FAE DiskStation: [ 1. PRE-SALES \ 1.1. Demo Chains ] To find your updated RCS license file, please check the following position on FAE DiskStation: [ 4. INTERNAL \ 4.1. Product Licenses ]

Below are listed mandatory pre-checks to be verified on Server and Target (Desktop) systems. If just one of these checks fail, you may encounter problems in system usage.  Server and Target “hosts” files contain correct mappings  Server and Target are correctly connected on demo wireless network  Server Windows Firewall is enabled  Server time zone, time and date are correctly configured  Target can connects to Server via HTTP, displaying “No data received” message Make sure that you demo chain strictly follows Demo Chain Naming Conventions: [ 1. PRE-SALES \ 1.1. Demo Chains \ Demo Guide \ Demo_Chains_Naming_Conventions.txt ] Demo Chain Pre-Checks

The steps listed below must be executed only if a new product version has been released. Steps from 1 to 4 can be skipped if you are not installing a new demo chain, but only upgrading. 1.Install the exact RCS version according to X.X.X version of the Master Server file [ 1. PRE-SALES \ 1.1. Demo Chains \ Demo Guide \ RCS_Master_Server_X.X.X.rar ] 2.Stop all RCS Windows services 3.Replace C:\RCS folder, using the Master Server file ( password: 0nlyf0rFAE ) 4.Replace RCS license file (C:\RCS\DB\config\rcs.lic) with your assigned one 5.Re-start all RCS Windows services 6.Plug your HASP token 7.Open a DOS shell and run the following commands: rcs-db-demo –r Master rcs-db-config –R admin when prompted, type: Password123 8.Upgrade RCS using the latest version available, providing your license file In case of error, change the RCS version file (C:\RCS\DB\config\VERSION) with a different (lower) number 9.Open a DOS shell and run the following commands: rcs-db-demo –d Master rcs-db-demo –b Master Prepare Server Environment

Restore the RCS database to the previous trusted state, running the following command: rcs-db-demo –r Master Connect to RCS Console using the following parameters: User: demo Password: Password123 Server: rcs-server Restore Server Environment After the execution, ensure that all RCS services are up and running. If needed, restart them manually.

Before each demonstration, you have to copy a Silent Installer agent called “a.exe” on the target drive C:\ root. This file is password protected and can be found of FAE DiskStation: [ 1. PRE-SALES \ 1.1. Demo Chains \ Demo Guide \ Fake 0-day Exploit (target Windows) \ backdoor.rar ] In order to make the fake 0-day exploit works, a second executable file called “Office_Word.exe” need to be placed on target system as well. This file, available on FAE DiskStation, must be used as default application to open all Word files on the target system. As soon as a Word file will be opened on the target, the “Office_Word.exe” application will search and run the “a.exe” file first (causing the infection) and then will open the Word document. Prepare Target Infection (Desktop) Word file Silent Installer

Using your personal criminal identity, open a browser and connect to Gmail and Facebook fake accounts, showing stored users/friends, messages and chats. From Gmail window, open a previously prepared with a.DOCX attachment and download it. Before opening the Word file, show Kaspersky Anti-Virus installed on the target system. Target Infection (Desktop)

Immediately after infection, make a logout/logon on the target system, in order to show how RCS agent is persistent and always reloaded when the O.S. starts. The logout/logon action is crucial, to ensure the full functioning of the agent. Show an encrypted document, opening the TrueCrypt container. Perform a VoIP encrypted call, running Skype. Navigate few URLs through bouncing communications, using Tor Browser. Generate Local Evidence (Desktop)

Show Evidence Received (Desktop) From RCS Console, access the Dashboard and show collected data: Show Facebook chats: all chats are collected, even if generated before the infection! Show Gmail messages: they look exactly like in the target’s inbox! Show contacts, collected from Facebook, Gmail and Skype. Play the Skype encrypted VoIP call recorded. Show the captured encrypted PDF document: it is an exact copy, not a screenshot! Show stored URLs: they are perfectly visible even if surfed through Tor Browser!

If your demo chain doesn’t contain all mobile devices, you can skip infections for those missing. Before each demonstration, you have to prepare a QR Code / Web Link agent for Android, a Local Installation agent for BlackBerry and an Installation Package for iOS. These agents must be generated from Console and placed on RCS Server desktop. For Android infection, QR Droid Code Scanner needs to be installed on Android target device. For BlackBerry infection, BlackBerry Desktop Software needs to be installed on RCS server. For iOS infection, Jailbreak needs to be installed on iOS target device. For more information about how to jailbreak an iOS device, please refer to FAE DiskStation, at the following position: [ 3. POST-SALES \ 3.5. Guides (documents) \ RCS9_iOS_Jailbreak_Guide_v1.1.docx ] Prepare Target Infection (Mobile)

Android Infection Start QR Droid Code Scanner on your Android target device and show client how the infection can be executed graphically, scanning the QR Code agent. BlackBerry Infection Connect your BlackBerry target device to RCS server via USB cable and show the client how the infection can be executed physically, running the Local Installation agent. Then disconnect it. iOS Infection Run the file “ios.bat” - modified accordingly - in order to show the client how the infection can be executed over the air through a wireless network. More info: [ 1. PRE-SALES \ 1.1. Demo Chains \ Demo Guide \ iOS Infection \ iOS_Infection.txt ] Target Infection (Mobile)

After the infection of all mobile devices, you can proceed executing few activities in order to generate local evidence on target devices. Take some camera snapshots from your Android target device. This will allow the backdoor to automatically retrieve pictures using the Photo module. Place your BlackBerry target device in proximity to the nearest window. This will help you to get a better Wi-Fi, GSM or GPS position. Connect AC power to your iOS target device, for few seconds. This will force the backdoor to activate the internal microphone and record surrounding audio. Generate Local Evidence (Mobile)

Show Evidence Received (Mobile) From RCS Console, access the Dashboard and show collected data: Show device information: all the smartphone technical data are collected. Show geographic position, retrieved via Wi-Fi, GSM or GPS. Show camera pictures, captured directly from smartphone camera. Show Gmail messages: they look exactly like in the target’s inbox! Play the microphone audio recording, retrieved during AC power. Introduce the File System feature, scheduling “Retrieve default” option.

Intelligence After the analysis of collected evidence, move to Intelligence section and open Target card. Show the target’s digital identities (Gmail, Facebook and Skype), the most contacted people, the most visited websites and the last known position, introducing the most visited places’ algorithm. --- To provide more information about how the Intelligence section works, make a logout from the Console and access again using the DEMO mode with pre-loaded data (entities, links and groups).

Conclusions This guide provides a list of features considered important and therefore to be shown. Each demonstration is obviously different and unique and may not have the time or the attention required, by the audience. The goal is to try to show the features presented in this guide, but always giving priority to the requests and questions asked by the end-user. If you feel confident and if time permits, you can show in detail other modules (according to the evidence recorded by devices infected during the demo) and introduce other functionalities, like Alerting, Audit and Monitor. --- To make sure that your demo chain is always properly configured and that the right software is running, please check frequently FAE DiskStation for changes.