Presentation is loading. Please wait.

Presentation is loading. Please wait.

Remote Control System 7 Cyber intelligence made easy.

Similar presentations


Presentation on theme: "Remote Control System 7 Cyber intelligence made easy."— Presentation transcript:

1 Remote Control System 7 Cyber intelligence made easy.

2 Dish of the day: RCS installation vectors.

3 The RCS backdoor is a software.

4 You have to install it.

5 Where ?

6 On the target’s device. Anything that runs a modern operating system.

7 How ?

8 Locally. Remotely.

9 Let’s talk about local. You have access to the target device.

10 You’re a lucky man. Easy installation. 100% success.

11 Is the device turned off or hibernated?

12 Boot a CD-ROM or USB thumb drive. Insert a memory card. Use a direct cable connection.

13 Is the device on ?

14 Grab it and install.

15 Let’s talk about remote. No physical access this time.

16 We provide many options.

17 Melt the backdoor with any installer.

18 Jump from a controlled device to another.

19 Modify target’s network traffic.

20 Exploit the target’s device.

21 Send an auto-install to the target’s device.

22 Complicated scenario?

23 No problem. Ask us.

24 We develop custom solutions. i.e. Internet café using DeepFreeze.

25 Too much pieces to put together?

26 RCS has a simple and unified console. Your attacks are just one-click away.

27 Demo Time.

28 Send via email. Put on a promotional CD. Drop a USB thumb drive. … Melting Tool

29 Monitors the target and modifies its traffic. Melts the backdoor with executables. Inserts exploits into documents. Inserts applets into web pages. Injection Proxy

30 It does the magic on-the-fly. No need to be inline. Think of it as a passive probe. Injection Proxy

31 Use it at ISP level. On small networks. On wi-fi networks. Injection Proxy

32 Public, private and 0-day exploits. Use documents as attack vector. Use websites as attack vector. Exploit Portal

33 Use it in conjunction with IPA. Database always up-to-date. Exploit Portal

34 Easy to use exploit creation. No skills required. Exploit Portal

35 Requires only few minutes. Same media for all architecture. Boot Installation

36 Requires only few seconds. Does not require PIN. Memory Card Installation

37 Sends a binary crafted SMS to the phone. Once accepted the phone will automatically install the backdoor Remote Mobile Installation

38 Q&A


Download ppt "Remote Control System 7 Cyber intelligence made easy."

Similar presentations


Ads by Google