Download presentation
Presentation is loading. Please wait.
1
Cyber intelligence made easy.
Remote Control System 7 Cyber intelligence made easy.
2
Can you intercept Skype calls? Can you open PGP encrypted files?
So what are we talking about today?
3
Skype adoption is growing fast
Skype adoption is growing fast. People trust it for confidential communications. Criminals too.
4
There’s more.
5
Everyone uses the Web. It’s cheap, easy and global.
6
The new Web is the social web. Highly dynamic. Vastly networked
The new Web is the social web. Highly dynamic. Vastly networked. Big data.
7
Actually, too much data. Mostly noise. Difficult to correlate.
It's your safety, but if used against you, it's a big, big problem.
8
Tap a cable and try to figure out what’s happening
Tap a cable and try to figure out what’s happening. 99% of that is of no interest.
9
Interesting data often never gets to the Web. It stays on the device.
10
And that device may be out of reach. Linked to the Internet
And that device may be out of reach. Linked to the Internet. But anywhere on Earth.
11
So what do we want. Get access to secret data. Anywhere they are
So what do we want? Get access to secret data. Anywhere they are. Figure out the interesting parts. ----- Meeting Notes (05/07/11 10:09) ----- Reach "them" ... subject not clear. Connections among targets should emerge.
12
What do you already have. Traditional passive interception
What do you already have? Traditional passive interception. Not effective against encryption. You lose half the picture. Must pass through your network.
13
Traditional is good. Innovative is better.
14
Thinking about offensive interception? You should.
15
“Governments must have offensive IT capabilities.” The Financial Times
----- Meeting Notes (17/11/10 12:40) ----- An authoritative source tells you MUST have it.
16
“Spy on suspected terrorists by inserting a remote forensic agent on their computers.” The Economist
17
A remote forensic agent. Clever idea. A sort of 007 for the digital age.
18
We have it. Remote Control System. Version 7.
19
Total control over your targets. Log everything. Always. Skype
Total control over your targets. Log everything. Always. Skype? No more a problem. PGP? You get the keys. What it does? It gives you control, total control, over your target. No more encrypted data to throw away because you don’t have the keys.
20
Hear your suspects voices. Watch their social life. Look at their faces. Locate them.
You’ll be able to listen to your target voice communications.
21
Even when not connected to the Internet. Anywhere they are.
22
Let’s see how it works.
23
Desktop installation Mobile Installation Working offline… Then send data. ----- Meeting Notes (05/07/11 12:07) ----- Add to keynote.
24
You want more.
25
Invisible to antiviruses. Autonomous on selective events
Invisible to antiviruses. Autonomous on selective events. Easily adaptable. Management is straightforward. Antiviruses are a must-have these days. There is lots of malware on the Net. And if you fear your target will use an antivirus to prevent any unwanted application on his system, you’re right, they probably will. But RCS is invisible to them.
26
Integrate it with your systems. Scale to your needs
Integrate it with your systems. Scale to your needs. Prevent disclosure of your presence. You already have your monitoring and alerting system, and you don’t want a new one. No problem, we will integrate RCS with your existing system.
27
Our technology works. On all the platforms.
28
Install it on Windows. Enough of features. Let’s see on what devices you can operate the RCS. On Windows for sure, so 90% of the desktop market is covered.
29
Mac. The remaining 10%. But growing.
30
Android. Android is the new entry in the mobile market, growing fast. Soon you can have it.
31
BlackBerry. Those who don’t use Nokias, use BlackBerry. You want this one.
32
iPhone. Apple iPhone. A big success. We have it.
33
iPad.
34
Symbian. Enterprises use Nokia’s. We have this one too.
35
Windows Mobile. Windows Mobile. We have that too.
36
Soon on Linux. Slowly coming to the market, but a big player nonetheless. It runs on everything. This is coming too.
37
“Cool, but I have to install the agent first, and that’s the difficult part: you have to be a hacker to do that stuff.” Your target may be out of reach. In another nation. Or on the run. Maybe he takes every possibile precaution to prevent any leakage of his data or tampering with his devices. You think you’ll need a team of hackers to get to him, lots of training and resources.
38
Wrong. Remote Control System is easy. Everything is just one click away.
39
Still you have many options. You may want the sneaky way.
Maybe you want to be sneaky. Like a sniper: clean, precise, low profile.
40
Install an agent with an SMS.
You send him an SMS and your RCS agent is ready to operate. Sounds like science fiction? It’s not.
41
While downloading an application. On the fly.
He downloads the lastest version of his favourite application and together with it, an RCS agent comes down the wire and silently install itself on the system. Not kidding.
42
Hand the bad guy a pendrive. Or make him find it. No clicks required.
You may have a person infiltrated and near your target. Hand him a pendrive with some documents on it. That’s all it’s needed by your RCS agent to start its work. Lose one on purpose near him. Sneak one in its bag … curiosity killed the cat.
43
In an Internet Café. Even with DeepFreeze.
Your target makes heavy use of Internet Cafés to make your life harder. He feels safe because Internet Cafés are using DeepFreeze to restore the system each time to a clean state. An RCS agent cannot be cleaned up by DeepFreeze. Once installed, it’s permanent. And invisible.
44
Offensive hacking IS hacking.
You use the same hacker stuff, but easy.
45
Zero day exploits. Zero technical knowledge required, it’s easy.
And you want the best ones! Those known by no one, not even the makers of the bugged application. But there’s a problem: take an exploit as it comes out of the hackers hands, and it requires another hacker to use it. And you don’t have that many hackers, don’t you? We take care of that difficult part. You just have to make a couple of clicks with your mouse, and they’re ready to be used. No tech required.
46
You want the big firepower?
Enough of the sneaky way. You want it fast and without much compliments. With little effort and maximum results.
47
Deploy at the ISP. At Gigabit speed. No need to cut the cables.
You go directly at the target ISP, with little information you identify your target … and then? You cannot cut the cables and put something in between! You don’t need to. Our solution works without being physically in the middle. As soon as the target downloads an application, your RCS agent is up and running. Too late for him. It’s easy to deploy, and light on the ISP side. You manage it, the ISP doesn’t need to do anything. And if you’ve access to a router, it works everywhere, not only at the ISP.
48
Get the suspect while having a coffee at Starbucks. Over WiFi network.
Today philosophy is “no more cables”. Everything goes over the air. WiFi anyone? We have that too.
49
A unique technology. Patent. It just works.
Our solution for ISP and WiFi operation is so unique that we patented it.
50
There’s more. We are not only technology leaders.
51
Cannot figure out how to approach a difficult scenario
Cannot figure out how to approach a difficult scenario? Our experience may be of help. Internet Café’ / DeepFreeze example.
52
Still not convinced?
53
Growing fast. Really fast. Customers in 5 continents.
I’m sure that for some of you it’s not the first time attending our presentations. You’ve seen the growth.
54
A strong development team. Fast release cycles
A strong development team. Fast release cycles. You get new features every few months. A strong team of developers are at work on the next release of RCS. We selected them among the best available in and out of the underground. To have the best, leading edge features, and a strong, industrial and proven development process.
55
Committed to the best quality.
Every software have bugs. If someone tell you different, he’s a liar. But not everyone fix them in time: we do. On average, you’ve your bug fixed in few days. Often less.
56
A strong research team. When a new device operating system or application is released, infection is possible within a few weeks.
57
On site delivery and training. Advanced training
On site delivery and training. Advanced training. Dedicated access to our support.
58
Your data is yours. And yours only
Your data is yours. And yours only. No way for us to have access to your RCS. We care about the secrecy of your operations. When we leave your site, there will be no cable between HackingTeam and you. We just don’t want to know how you’re using RCS. Your data is yours. If you need support, get in touch with us, and tell us just what’s needed.
59
You supervise the use of your RCS, to prevent abuse.
60
Backdoor concerns? We can show you the code.
You don’t trust closed solutions. Maybe there’s a backdoor hidden within them. So why not have a look at the code? Yes you can have a look. Let our developers show you the inner workings of the product.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.