1 REMOTE CONTROL SYSTEM V7 www.hackingteam.it. 2 Introduction.

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Objectives Overview Define an operating system
Advanced Techniques in Forensic Examination of Smartphones (C) Oxygen Software,
V1.00 © 2009 Research In Motion Limited Introduction to BlackBerry Smartphone Web Development—The BlackBerry Infrastructure Trainer name Date.
Trojan Horse Program Presented by : Lori Agrawal.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
CMPTR1 CHAPTER 3 COMPUTER SOFTWARE Application Software – The programs/software/apps that we run to do things like word processing, web browsing, and games.
Kerio Connect 7.1 More Than Just a Mail Server
SmartPhones Student 1 Student 2 Student 3. SmartPhone Definition “A SmartPhone is one device that can take care of all your handheld computing and communication.
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Advanced Techniques in Forensic Examination of Smartphones 2012 (C) Oxygen Software,
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
eScan Total Security Suite with Cloud Security
Technology Coordinators Training. Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights.
1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2010 Introductory Pasewark & Pasewark.
SOFTWARE.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Software 1. Software is divided into parts System software Operating system Utility software Application software 2.
What is system software and what are its parts? Programs that control operation of computer Two parts are operating systems utility programs.
Audio/Video Application Sharing Remote Assistance Instant Messaging Notifications Presence Presence File Transfer Whiteboarding Presence.
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
MIDTERM EXAM REVIEW SHEET. Review Sheet Where (what legal places) can you share digital information via computers? How are computer files shared with.
CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Protecting and Sharing Documents Lesson 13. Objectives.
1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.
VERSION 2.6 FAE Group Demo Guide. Remote Control System Demo In order to standardize the way how Remote Control System is presented and to maximize the.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Chapter Five SOFTWARE.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
Analysis And Research Of System Security Based On.
Page PearsonAccess™ Technology Training Online Test Configuration.
]Hacking Team[ RCS Remote Control System DEMO PROCEDURES.
Remote Control System 7 Cyber intelligence made easy.
Standard Demo 1 © Hacking Team All Rights Reserved.
BLACKBERRY TECHNOLOGY PRESENTED BY SHAIK TABREZ (09J01A1225 )
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.
Part One: System administration Training Handouts.
Features Compatibility. Platforms OSXLinuxWindows Yosemite (10.10)Debian 10* Mavericks (10.9)Fedora8.1 Mountain Lion (10.8) Mageia8 Lion (10.7)Mint7.
Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Office 365 is cloud-based productivity, hosted by Microsoft.
Cyber intelligence made easy.
Pilot Watcher Product Overview V5.3
RCS v7 Infection Vectors
Features Compatibility
The Hacking Suite for Governmental Interception
Cyber intelligence made easy.
Get Office 2016 with Office 365 and get down to business
Kind of evidence gathered by agents
Features Compatibility
Introduction To Computing BBA & MBA
What is keystroke logging?
The Hacking Suite For Governmental Interception
Presentation transcript:

1 REMOTE CONTROL SYSTEM V7

2 Introduction

© Hacking Team All Rights Reserved 3 System Architecture

4 Backdoor Functionalities (PC & Mobile)

© Hacking Team All Rights Reserved 5 PC Version Monitoring and Logging Remote Control System can monitor and log any action performed by means of a personal computer Accessed URLs Accessed documents Keystrokes Printed documents Chat, , contacts, instant messaging Remote Audio Spy Localization (wifi) Camera snapshots VoIP (Skype, MSN, etc.) conversations FileSystem browsing

© Hacking Team All Rights Reserved 6 © Hacking Team All Rights Reserved 6 © Hacking Team All Rights Reserved 6 PC Version Online Captured data transmission Connects through the internet to the collection node Collection nodes can be hidden behind an anonymizing chain Works both in home and enterprise environments Network Firewalls (passed through) Web Proxies (passed through) Domain credentials (stolen)

© Hacking Team All Rights Reserved 7 © Hacking Team All Rights Reserved 7 © Hacking Team All Rights Reserved 7 PC Version Offline data retrieving No internet connection required Data can be exported in an encrypted format to any external device (eg: USB dongle) Data can later be imported into the database

PC architectures Windows XP/Vista/2003/2008/7 (32/64bit) Mac OS X Linux (Q2 2011) © Hacking Team All Rights Reserved 8

© Hacking Team All Rights Reserved 9 © Hacking Team All Rights Reserved 9 © Hacking Team All Rights Reserved 9 Remote Control System can monitor and log any action performed by means of a smartphone Call history Address book Calendar messages SMS/MMS interception Localization (cell signal info, GPS info, wifi) Remote Audio Spy Camera snapshots Voice calls interception … Mobile Version Monitoring and Logging

© Hacking Team All Rights Reserved 10 © Hacking Team All Rights Reserved 10 © Hacking Team All Rights Reserved 10 Mobile Version Online Captured data transmission Connection via GPRS/UMTS/3G to the Collection Node Configurable custom APNs Connection through any open/preconfigured WiFi network to the Collection Node Automatic APs detection Connection via BlueTooth/WiFi to the Mobile Mediation Node (data can later be sent to the database)

© Hacking Team All Rights Reserved 11 © Hacking Team All Rights Reserved 11 © Hacking Team All Rights Reserved 11 Mobile Version Mediation Node Useful if the target cannot access any WiFi or 3G/GPRS Network

© Hacking Team All Rights Reserved 12 Mobile Configuration As for the PC version, Remote Control System for Mobile devices can be re-configured after each synchronization And ‘on the fly’: ► Control SMS: messages sent from a pre-configured phone number can be used to control the backdoor. ► Control SMS are completely invisible to the user and they leave no trace on the phone.

© Hacking Team All Rights Reserved 13 Mobile architectures Windows Mobile iPhone OS 2 4 Symbian S60 3 rd edition BlackBerry OS >= 4.5 Android (Q1 2011)

14 System features

© Hacking Team All Rights Reserved 15 Invisibility After the installation, Remote Control System cannot be detected by any infected user Existing files are not modified No new files appear on the computer’s hard disk No new processes are executed No new network connections are established Antivirus, antispyware, anti-key-loggers cannot detect our bug ► E.g. Gartner Endpoint Security Magic Quadrant

© Hacking Team All Rights Reserved 16 Flexibility Goes beyond logging and monitoring Has a real-time alerting system Allows performing actions on an infected device ► Search and view data on the hard disk ► Execute commands remotely ► Possibly modify hard disk contents ► Inner logic for automated response (No human interaction required)

© Hacking Team All Rights Reserved 17 Inner Logic (1) It is based on an Event/Action paradigm ► Events: On ScreenSaver Time based On SMS reception On GPS position... ► Actions: Synchronize Uninstall Start/Stop Agent Send SMS Execute command

© Hacking Team All Rights Reserved 18 Inner Logic (2) Some examples... Screen saver starts -> Send data SIM changes -> Send SMS with SIM information Received Covert SMS -> Send SMS with GPS position On GPS position -> Start the Microphone capture and Send SMS with GPS position Incoming/outgoing call -> Make a camera snapshot

19 Infection

© Hacking Team All Rights Reserved 20 Attack/Infection vectors Remote Control System is software, not a physical device Which can be installed remotely ► Computer can be bugged by means of several infection vectors ► Intelligence information about remote target mandatory … but local installation remains an option ► Usually very effective

PC Installation (1) Remote infection vectors Executable melting tool Injection Proxy HT Zero-day Exploits portal © Hacking Team All Rights Reserved 21

PC Installation (2) Local infection vectors Bootable CDROM or USB pen drive Direct hard disk infection by means of tampering with computer case HT consultancy Anonymous attack scenario analysis ► E.g., Internet Café using DeepFreeze © Hacking Team All Rights Reserved 22

© Hacking Team All Rights Reserved 23 Mobile Installation Local Infection: Memory Card Through an infected PC ► when connected for synchronization/recharging Remote Infection: CAB/SIS/COD Melting Special crafted SMS (WAP Push)

24 Demo time!

25 Q&A