Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010.

Similar presentations


Presentation on theme: "Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010."— Presentation transcript:

1 Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010

2 IP Packet Capture Way There are 3 types of IP packet capture ways based on application and industry standard : Packet captured from IP network : for IP network infrastructure in enterprises, ISP, IDC and LTE/WiMAX operators IP packet from Telco switch : 1.Tradition switch through Mediation Platform 2.For IMS and all IP networks, IP Packet can be captured through service broker of application layer or directly from IP core switch of Media and End Point layer of IMS system 3.From Cable TV ● ●

3 IP Packet Capture Way– Sniffer All data packets on Ethernet are broadcasted in the network, i.e., all physical signals will flow to the network Interface card of the appliance. NIC card can be under promiscuous mode, so it can receive all data no matter what the MAC address it is. This is what the basic of Sniffer all about. Enterprise, ISP, IDC, LTE/WiMAX E-Detective

4 Lawful Interception Can get that evidence? 4 For example : Sender address, Receive address Time and date Content Location … More

5 Sample: (POP3, SMTP and IMAP)

6 Sample: IM -Yahoo, MSN, ICQ, IRC, QQ, GTalk etc…

7 What Lawful Interception Needs Now….. Network Packet Capture and Reconstruction Ethernet VoIP Off-line Training & Support Wireless a/b/g/n HTTPS/ SSL

8 E-Detective – Mirror Mode Implementation Organization or Corporate Network Deployment

9 Wireless-Detective Standalone System - Captures WLAN packets transmitted over the air ranging up to 100 meters or more (by using enhanced system with High Gain Antenna) Wireless-Detective – Implementation Diagram (1) WLAN Lawful Interception – Standalone Architecture Wireless-Detective Deployment (Capture a single channel, a single AP or a single STA)

10 Wireless-Detective – WPA-PSK Cracking Sol. WPA-PSK Cracking Solution WPA Handshake packets need to be captured for cracking WPA key. Utilize Single Server or Distributed Servers (multiple smart password list attack simultaneously) to crack WPA key. Acceleration technology: GPU Acceleration Note: WPA handshakes packet can be captured by Standalone Wireless-Detective system or Distributed Wireless- Detective systems.

11 EDDC Offline Forensics Product Offline Raw Data (PCAP) Decoding and Reconstruction system. Comes with User and Case Management features. Investigator 1 Case 1 Investigator 2 Case 2 Case 1 Results Case 2 Results Collect, Import Raw Data For Case 1 Case 1 Case 2Collect, Import Raw Data For Case 2 Decode and Reconstruct various Internet Protocols and Services

12 HTTPS/SSL MITM Interception System Intercept and reconstruct HTTPS/SSL traffic. Obtain HTTPS page login username and password. Intercept on specific targets (suspects)

13 HTTPS/SSL MITM Interception System Intercept and reconstruct HTTPS/SSL traffic. Obtain HTTPS page login username and password. Intercept on specific targets (suspects)

14 14 Software Architecture

15 IM/Chat (Yahoo, MSN, ICQ, QQ, IRC, Google Talk Etc.) Webmail HTTP (Link, Content, Reconstruct, Upload Download) File Transfer FTP, P2 P Others Online Games Telnet etc. More Then 140 Internet Protocols Supported VOIP

16 SBC TDM RTP Stream HI-3 Content HI-2 IRI HI-1 Provisioning INI-2 IRI Control Information Control Information Router/IAD USER MEDIATION ANALYSIS USER Edge Router Target Edge Router INI-3 Call Content gateway Server INI-1 Provisioning Data Captured through Tradition Telco Switch EDDC LEA side Telco side From LI port of Soft Switch/TDM to capture signals by ETSI/CALEA standard. Passing through mediation platform and convert the data for further analysis through Handover Interface (HI) before reaching EDDC for further packet analysis Router/IAD

17 IMS IP packet/SIP Router/IAD USER ANALYSIS USER Router/IAD Target Edge Router SGIM IP Packet/SIP Data Packet Captured through Telco IP Switch EDDC LEA side Telco side Core Switch Edge Router (application layer) (media layer) E-Detective E-Detective Directly capture IP data packets from both application or media layers of IMS/all IP networks. So it is not necessary to pass through mediation platform. It’s predicted that this will be the future trend for all Telco operators CMS (session layer)

18 Data Packet Captured through Cable TV 18 User loop STB Analog fiber optic CM CMT S 50~1000MHz 5~42MHz NIU NIU Cable TV Broadcasting NIU …… Internet Computer TV Tel phone Mediation E-Detective fiber optic node

19 Technology Transfer Program To Help ETRI to Enhance Capability of LI Application Research Target –E-Detective –Wireless-Detective Scope –Source Codes –On-Site Training –On-Site Assistance for Software Development Reasonable Fee 19

20 Contact Information Casper Chang Kan/ CEO Ted Chao/ Product Manager Address : 4/F No. 31, Alley 4, Lane 36, Sec.5, Ming-Shan Phone No : Fax No : URL : East Road Taipei, Taiwan, R.O.C.


Download ppt "Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010."

Similar presentations


Ads by Google