Download presentation
Presentation is loading. Please wait.
Published byBarnard Kennedy Modified over 8 years ago
1
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account Manager
2
The Building Blocks
3
Remote Agent Secure Frontend Scalable Backend Infection Vectors
4
Complete solution, not a toolkit Totally developed by us
5
Remote agent Your personal 007
7
What can we collect?
9
Camera Messages Chat Microphone Contacts Calendars Calls Location Keystrokes Documents Passwords Visited websites And much more…
10
Runs on an event-driven logic Autonomous
11
Events When crossing the border Every day at midnight On hidden SMS On voice call Actions Start microphone recording Destroy the device Send collected data Take a camera snapshot
12
Many different events and actions Combine them to suit your needs
13
What if my target is security aware?
14
Invisible to target user Invisible to antivirus and anti-rootkits Anti-forensic measures
15
Evidence on remote device How can we collect it?
16
Internet connection Firewalls and proxies are passed through
17
WiFi Open and saved networks
18
GPRS / UMTS / 3G+ Avoid billing the target with custom APN
19
Where can I install the Agent?
21
Secure Frontend An invisible barrier
22
Agent is connecting to your servers Your identity must be kept secret
24
Configurable on-the-fly Evidence stays encrypted
25
Scalable Backend Your data vault
26
Scalable by design
27
Agents Collector Database x 300
28
Database Shard 1 Shard 2 Collector 1 Collector 2 Agents … … Collector N … … Shard N x 10000
29
Scale when you need Adding servers is transparent Load balancing is automatic
30
No database administration required Set & Forget backups Fast restore in 5 minutes
31
Real-time alerting Be informed on interesting events
32
Polished graphical console The whole system from a single point
33
Infection Vectors Deploy your forces
34
How can I deploy my agent?
35
When the target opens a document
36
0-day exploits pack Always up to date
37
While the target browses the web
38
Inject into downloaded applications Inject into web pages
39
Bob’s laptop Web site Internet Network Injector
40
Send your target an SMS
41
And many more…
42
Third-party Integration Combine your weapons
43
Easily integrate with your monitoring center
44
Demo time!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.