Download presentation
Presentation is loading. Please wait.
Published byTobias Martin Modified over 8 years ago
1
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems
2
Agenda The Value of Lawful Hacking Introducing Hacking Team NICE Partner for Lawful Hacking Leveraging Hybrid Solution /// Integrating Target360 with Hacking Team RCS
3
Lawful Hacking : Definition Installing covert application for Intelligence gathering on targeted computers and smartphones
4
The Value of Lawful Hacking Overcome Encryption Challenge Monitor Skype, Gmail, BlackBerry Messenger Collects data before it is even encrypted Increase Coverage of Targets Intercept targets when they are out of country Collect historical data from device Unique Information Type Keyboard sniffing, camera snapshots Retrieve contacts data
5
INTRODUCING HACKING TEAM Remote Control System version 8
6
Solution Building Blocks RCS Agent Hidden application on targeted devices Infection Vectors Methods for installing the application on devices Evidence Transmission Agent capabilities to rely intelligence Investigation Console Sub-system for controlling and investigating agents
7
Solution Building Blocks RCS Agent Hidden application on targeted devices Infection Vectors Methods for installing the application on devices Evidence Transmission Agent capabilities to rely intelligence Investigation Console Sub-system for controlling and investigating agents
8
RCS Logic Workflow
9
RCS Agent Hidden and Undiscoverable Safe from Anti-viruses and Firewalls Encrypted on device Supports Main Platforms Windows, Mac, Linux Blackberry, Android, iPhone Collects Evidence 24/7 Fully controlled by the investigator
10
RCS Agent – Collection Capabilities Voice conversations Browsed URLs Accessed documents Keystrokes Printed documents Messaging Microphone Location (WiFi) Camera snapshots File system browsing Passwords User Defined
11
Solution Building Blocks RCS Agent Hidden application on targeted devices Infection Vectors Methods for installing the application on devices Evidence Transmission Agent capabilities to rely intelligence Investigation Console Sub-system for controlling and investigating agents
12
The Challenge of Infection Device Security Manufacturer protection from Hacking Dedicated software Target Awareness Some methods seeks target’s content Need for intelligence know-how Increase Infection rates with Target360° Stay tuned for presentation last part
13
Installation Methods Local (Physical access) USB, CD LAN Flash Cards Wireless networks Remote Attachments (Zero-Day, Proprietary Exploits) Malicious website Via ISP Pop-up SMS
14
Solution Building Blocks RCS Agent Hidden application on targeted devices Infection Vectors Methods for installing the application on devices Evidence Transmission Agent capabilities to rely intelligence Investigation Console Sub-system for controlling and investigating agents
15
Relying Evidence from Device to RCS System
16
Solution Building Blocks RCS Agent Hidden application on targeted devices Infection Vectors Methods for installing the application on devices Evidence Transmission Agent capabilities to rely intelligence Investigation Console Sub-system for controlling and investigating agents
17
NICE Lawful Hacking Back-End
18
INTEGRATION WITH NICETRACK TARGET360°
19
Target 360 : Integrating Lawful Hacking Unified Investigation Platform Email Instant Messaging Social Networks & Forums Telephony Satellite & Microwave VoIP Video Other Sources 19 Lawful Hacking (Trojan Horse)
20
Integration Scheme Target360° Network Traffic Crucial Assistance Hacking Team RCS Target Target360° Infection Evidence
21
Integration Scheme Target360° Network Traffic Crucial Assistance Hacking Team RCS Target Target360° Infection Evidence
22
Target360° as Infection Enhancer Collection of Relevant Technical Data Installed software Versions of Mobile devices Anti-viruses Analysis of Target’s Behavior Target’s awareness Target’s habits for opening emails Assistance in Design of Successful Infection Operation Significantly improves infection rates Keep trace on installed agent’s security
23
Integration Scheme Target360 Network Traffic Crucial Assistance Hacking Team RCS Target Target360° Infection Evidence
24
Investigation Console: NiceTrack Target360° Unified Platform All target’s evidence in a single screen Intuitive, easy-to-use interface Built-In Knowledge Management Fuse intelligence items to Target’s Maintain comprehensive data repository Use NICE Analytical Engines Voice Analytics (Keyword spotting, Speaker hunting) Text Analytics (Entity extraction, Auto translation)
25
SUMMARY
26
Summary Lawful Hacking – Part of Target360° Solution More intelligence on high-value targets NEW: NICE and Hacking Team Integrated Solution Enjoy the combination between two industry powerhouses Tailored Solution Answering your specific needs
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.