RCS v7 Infection Vectors

Slides:



Advertisements
Similar presentations
Chapter 1:Introduction to the world of computers
Advertisements

Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Google Apps for Education. What Is Google Apps For Education? Sites (Webpages) Docs (Office Suite) Gmail ( ) Calendar Google Talk (Communications.
Trojan Horse Program Presented by : Lori Agrawal.
Office 2003 Introductory Concepts and Techniques M i c r o s o f t CPTG104 Intro to Information Systems Dr. Hwang Essential Introduction to Computers.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
For more notes and topics visit:
Operating Systems Operating System
WINDOWS XP PROFESSIONAL Bilal Munir Mughal Chapter-1 1.
Cyber Crimes.
Viruses.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
Tutorial 11 Installing, Updating, and Configuring Software
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Introduction to Windows 7. Desktop Maximize, Minimizing, and Restoring.
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
By Jonathan….and Darion……….. Reliability Windows File Protection protects core system files from being overwritten by application installs. Driver certification.
IT Introduction to Information Technology CHAPTER 01.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
VERSION 2.6 FAE Group Demo Guide. Remote Control System Demo In order to standardize the way how Remote Control System is presented and to maximize the.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Teleworking Effectively Or, how to work from home without SNA or a token. Don’t be this guy:
1 Title: Introduction to Computer Instructor: I LTAF M EHDI.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Introduction TO Network Administration
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
Client – Server Architecture A Basic Introduction 1.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
LO2 Understand the key components used in networking.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
]Hacking Team[ RCS Remote Control System DEMO PROCEDURES.
RCS POC – Infection Vectors Egypt June 18 th -19 st 2013 Mostapha Maanna – Marco Catino.
Remote Control System 7 Cyber intelligence made easy.
Standard Demo 1 © Hacking Team All Rights Reserved.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Types of computers Module 1.10 AS identifies and distinguishes between computer types and associated software. AS identifies the main hardware.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.
Part One: System administration Training Handouts.
Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.
HedEx Lite Obtaining and Using Huawei Documentation Easily
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
Android Mobile Application Development
Microsoft Office 2010 Basics and the Internet
Microsoft Office 2010 Basics and the Internet
Cyber intelligence made easy.
CONNECT.
People used to install software on their computers
The Hacking Suite for Governmental Interception
Cyber intelligence made easy.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Google Apps for Education
The Hacking Suite for Governmental Interception
Press ESC for Startup Options © Microsoft Corporation.
Slides prepared by Sarah Benis Scheier-Dolberg
Computing Essentials Module 1.
Computing Essentials Module 1.
The Hacking Suite For Governmental Interception
Presentation transcript:

RCS v7 Infection Vectors www.hackingteam.it

Introduction Remote Control System is software, not a physical device Installation on target device is required It can be installed Remotely: Intelligence information about remote target mandatory. Some vectors require minimal user’s interaction Locally: It requires physical access to target devices Usually very effective © Hacking Team All Rights Reserved

PC Installation (1) Remote infection vectors Executable melting tool Injection Proxy HT Zero-day Exploits portal © Hacking Team All Rights Reserved

PC Installation (2) Local infection vectors HT consultancy Bootable CDROM or USB pen drive Direct hard disk infection by means of tampering with computer case Firewire Port/PCMCIA attacks HT consultancy Anonymous attack scenario analysis E.g., Internet Café using DeepFreeze © Hacking Team All Rights Reserved

Mobile Installation Local Infection: Remote Infection: Memory Card Through an infected PC when connected for synchronization/recharging Remote Infection: CAB/SIS/COD Melting Special crafted SMS (WAP Push) © Hacking Team All Rights Reserved

Vectors & Scenarios

Melting tool Remote vectors / Desktop You can melt RCS core with any executable file and: Send it through a spoofed e-mail Put it on a fake promotional CD Put it on a U3 USB key ... © Hacking Team All Rights Reserved

Injection Proxy(1) Remote vectors / Desktop “If you can monitor user’s traffic maybe you can be interested in infecting him” ;-) Embeds on-the-fly RCS core into any executable file downloaded by the user any automatic upgrade by common programs any visited web page Embeds on-the-fly exploit code into web pages downloaded documents (.pdf, .ppt, etc.) © Hacking Team All Rights Reserved

Injection Proxy(2) Remote vectors / Desktop Can be used like a passive probe It doesn’t require to be in-line Can be placed into target’s ISP target’s enterprise network target’s WiFi network Fully integrated with RCS Console Comes in two versions Software: smaller networks Hardware: up to Gbs traffic © Hacking Team All Rights Reserved

Exploit Portal (1) Remote vectors / Desktop Contains public, private and 0-day exploits Allows embedding RCS core into common file formats (.pdf, .ppt, etc.) Send through a spoofed e-mail Use the Injection Proxy © Hacking Team All Rights Reserved

Exploit Portal (2) Remote vectors / Desktop Allows creation of “infected” web pages Send the URL via e-mail, IM, etc. Use in conjunction with Injection Proxy Pages could be hosted by RCS nodes Fully integrated with RCS Console Database always up to date © Hacking Team All Rights Reserved

Bootable CD/USB key Local vectors / Desktop Automatically installs RCS on a turned-off PC It requires only few seconds The same media can be used for all the supported architectures © Hacking Team All Rights Reserved

Memory card Infection Local vectors / Mobile Automatically installs RCS on a smart phone, no matter if turned on or not It requires only few seconds It doesn’t require PIN/PUK codes © Hacking Team All Rights Reserved

SMS Infection Remote vectors / Mobile You send a special crafted SMS to the target It pretends to be some kind of upgrade from the operator Once accepted, the smartphone is infected Depending on smartphone settings, it requires no-to-minimal interaction by the target © Hacking Team All Rights Reserved

Two-stage infection Other vectors / Mobile You need to infect a Desktop PC first When attached to the PC (for synchronization or charging), the smartphone gets automatically infected. © Hacking Team All Rights Reserved

Final words Those were only few examples among all the possible ways for target infection You can rely on our consultancy service to identify which is the most suitable way for any scenario © Hacking Team All Rights Reserved

Q&A