Presentation is loading. Please wait.

Presentation is loading. Please wait.

Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.

Similar presentations


Presentation on theme: "Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems."— Presentation transcript:

1 Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems

2 Agenda  The Value of Lawful Hacking  Introducing Hacking Team  NICE Partner for Lawful Hacking  Leveraging Hybrid Solution ///  Integrating Target360 with Hacking Team RCS

3 Lawful Hacking : Definition Installing covert application for Intelligence gathering on targeted computers and smartphones

4 The Value of Lawful Hacking  Overcome Encryption Challenge  Monitor Skype, Gmail, BlackBerry Messenger  Collects data before it is even encrypted  Increase Coverage of Targets  Intercept targets when they are out of country  Collect historical data from device  Unique Information Type  Keyboard sniffing, camera snapshots  Retrieve contacts data

5 INTRODUCING HACKING TEAM Remote Control System version 8

6 Solution Building Blocks  RCS Agent  Hidden application on targeted devices  Infection Vectors  Methods for installing the application on devices  Evidence Transmission Agent capabilities to rely intelligence  Investigation Console  Sub-system for controlling and investigating agents

7 Solution Building Blocks  RCS Agent  Hidden application on targeted devices  Infection Vectors  Methods for installing the application on devices  Evidence Transmission Agent capabilities to rely intelligence  Investigation Console  Sub-system for controlling and investigating agents

8 RCS Logic Workflow

9 RCS Agent  Hidden and Undiscoverable  Safe from Anti-viruses and Firewalls  Encrypted on device  Supports Main Platforms  Windows, Mac, Linux  Blackberry, Android, iPhone  Collects Evidence 24/7  Fully controlled by the investigator

10 RCS Agent – Collection Capabilities  Voice conversations  Browsed URLs  Accessed documents  Keystrokes  Printed documents  Messaging  Microphone  Location (WiFi)  Camera snapshots  File system browsing  Passwords  User Defined

11 Solution Building Blocks  RCS Agent  Hidden application on targeted devices  Infection Vectors  Methods for installing the application on devices  Evidence Transmission Agent capabilities to rely intelligence  Investigation Console  Sub-system for controlling and investigating agents

12 The Challenge of Infection  Device Security  Manufacturer protection from Hacking  Dedicated software  Target Awareness  Some methods seeks target’s content  Need for intelligence know-how  Increase Infection rates with Target360°  Stay tuned for presentation last part

13 Installation Methods  Local (Physical access)  USB, CD  LAN  Flash Cards  Wireless networks  Remote  Attachments (Zero-Day, Proprietary Exploits)  Malicious website  Via ISP  Pop-up SMS

14 Solution Building Blocks  RCS Agent  Hidden application on targeted devices  Infection Vectors  Methods for installing the application on devices  Evidence Transmission Agent capabilities to rely intelligence  Investigation Console  Sub-system for controlling and investigating agents

15 Relying Evidence from Device to RCS System

16 Solution Building Blocks  RCS Agent  Hidden application on targeted devices  Infection Vectors  Methods for installing the application on devices  Evidence Transmission Agent capabilities to rely intelligence  Investigation Console  Sub-system for controlling and investigating agents

17 NICE Lawful Hacking Back-End

18 INTEGRATION WITH NICETRACK TARGET360°

19 Target 360  : Integrating Lawful Hacking Unified Investigation Platform Email Instant Messaging Social Networks & Forums Telephony Satellite & Microwave VoIP Video Other Sources 19 Lawful Hacking (Trojan Horse)

20 Integration Scheme Target360° Network Traffic Crucial Assistance Hacking Team RCS Target Target360° Infection Evidence

21 Integration Scheme Target360° Network Traffic Crucial Assistance Hacking Team RCS Target Target360° Infection Evidence

22 Target360° as Infection Enhancer  Collection of Relevant Technical Data  Installed software  Versions of Mobile devices  Anti-viruses  Analysis of Target’s Behavior  Target’s awareness  Target’s habits for opening emails  Assistance in Design of Successful Infection Operation  Significantly improves infection rates  Keep trace on installed agent’s security

23 Integration Scheme Target360 Network Traffic Crucial Assistance Hacking Team RCS Target Target360° Infection Evidence

24 Investigation Console: NiceTrack Target360°  Unified Platform  All target’s evidence in a single screen  Intuitive, easy-to-use interface  Built-In Knowledge Management  Fuse intelligence items to Target’s  Maintain comprehensive data repository  Use NICE Analytical Engines  Voice Analytics (Keyword spotting, Speaker hunting)  Text Analytics (Entity extraction, Auto translation)

25 SUMMARY

26 Summary  Lawful Hacking – Part of Target360° Solution  More intelligence on high-value targets  NEW: NICE and Hacking Team Integrated Solution  Enjoy the combination between two industry powerhouses  Tailored Solution  Answering your specific needs

27


Download ppt "Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems."

Similar presentations


Ads by Google