Presentation is loading. Please wait.

Presentation is loading. Please wait.

Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.

Similar presentations


Presentation on theme: "Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account."— Presentation transcript:

1 Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account Manager

2 The Building Blocks

3 Remote Agent Secure Frontend Scalable Backend Infection Vectors

4 Complete solution, not a toolkit Totally developed by us

5 Remote agent Your personal 007

6

7 What can we collect?

8

9 Camera Messages Chat Microphone Contacts Calendars Calls Location Keystrokes Documents Passwords Visited websites And much more…

10 Runs on an event-driven logic Autonomous

11 Events When crossing the border Every day at midnight On hidden SMS On voice call Actions Start microphone recording Destroy the device Send collected data Take a camera snapshot

12 Many different events and actions Combine them to suit your needs

13 What if my target is security aware?

14 Invisible to target user Invisible to antivirus and anti-rootkits Anti-forensic measures

15 Evidence on remote device How can we collect it?

16 Internet connection Firewalls and proxies are passed through

17 WiFi Open and saved networks

18 GPRS / UMTS / 3G+ Avoid billing the target with custom APN

19 Where can I install the Agent?

20

21 Secure Frontend An invisible barrier

22 Agent is connecting to your servers Your identity must be kept secret

23

24 Configurable on-the-fly Evidence stays encrypted

25 Scalable Backend Your data vault

26 Scalable by design

27 Agents Collector Database x 300

28 Database Shard 1 Shard 2 Collector 1 Collector 2 Agents … … Collector N … … Shard N x 10000

29 Scale when you need Adding servers is transparent Load balancing is automatic

30 No database administration required Set & Forget backups Fast restore in 5 minutes

31 Real-time alerting Be informed on interesting events

32 Polished graphical console The whole system from a single point

33 Infection Vectors Deploy your forces

34 How can I deploy my agent?

35 When the target opens a document

36 0-day exploits pack Always up to date

37 While the target browses the web

38 Inject into downloaded applications Inject into web pages

39 Bob’s laptop Web site Internet Network Injector

40 Send your target an SMS

41 And many more…

42 Third-party Integration Combine your weapons

43 Easily integrate with your monitoring center

44 Demo time!


Download ppt "Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account."

Similar presentations


Ads by Google