Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.

Similar presentations


Presentation on theme: "The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors."— Presentation transcript:

1 The Hacking Suite For Governmental Interception

2 Today’s topic: RCS installation vectors.

3 The RCS Agent is a software.

4 You have to deploy it.

5 On the target’s device. Anything that runs a modern operating system.

6 Locally. Remotely.

7 Let’s talk about local. You have access to the target device.

8 Boot from a USB thumb drive. Plug a USB cable.

9 Easy installation. 100% success.

10 Let’s talk about remote. No physical access this time.

11 Deploy RCS while the target is…

12 Browsing the internet.

13 Opening a document file.

14 Receiving a SMS.

15 Complicated scenario?

16 Rely on our consultancy services. i.e. BlackBerry controlled via BES. Windows PC in an enterprise domain.

17 RCS has a simple and unified console. Your attacks are just one-click away.

18 Demo Time!

19 Let’s add some UEFI black magic Local Installation

20 Agent will resist: Windows Recovery mode OS re-installation Hard disk replacement Local Installation

21 Pre-EULA installation is very easy! Local Installation

22 Supported operating systems: Windows Local Installation

23 Linux and OSX are coming soon… Local Installation

24 Integrated 0-day exploits pack. Use documents as attack vector. Use websites as attack vector. Exploitation

25 Easy to use exploit creation. No skills required. Exploitation

26 Monitors the target and modifies its traffic. Inserts code into downloads and updates. Inserts code into web pages. Network Injector

27 Bob’s laptop Web site Internet Network Injector

28 It does the magic on-the-fly. No need to be inline. Think of it as a passive probe. Network Injector

29 Use it at ISP level. Network Injector

30 Use it on wi-fi networks. Open or Protected… Network Injector

31 “Is it possible to bypass HTTPS?” Let’s see… Network Injector

32 Often used by criminal groups. Defeats disk encryption. Resident on the USB device. Infecting Live Distros

33 Sends a special crafted SMS to the phone. Once accepted, the phone will automatically install the Agent. Remote Mobile Installation

34 Desktop vectors applies to mobile as well! Remote Mobile Installation

35 Q&A


Download ppt "The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors."

Similar presentations


Ads by Google