Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber intelligence made easy.

Similar presentations


Presentation on theme: "Cyber intelligence made easy."— Presentation transcript:

1 Cyber intelligence made easy.
Remote Control System 7 Cyber intelligence made easy.

2 Can you intercept Skype calls? Can you open PGP encrypted files?

3 Skype adoption is growing fast
Skype adoption is growing fast. People trust it for confidential communications. Criminals too.

4 There’s more.

5 Everyone uses the Web. It’s cheap, easy and global.

6 The new Web is the social web. Highly dynamic. Vastly networked
The new Web is the social web. Highly dynamic. Vastly networked. Big data.

7 Actually, too much data. Mostly noise. Difficult to correlate.

8 Tap a cable and try to figure out what’s happening
Tap a cable and try to figure out what’s happening. 99% of that is of no interest.

9 Interesting data often never gets to the Web. It stays on the device.

10 And that device may be out of reach. Linked to the Internet
And that device may be out of reach. Linked to the Internet. But anywhere on Earth.

11 So what we want. Get access to secret data
So what we want? Get access to secret data. Figure out the interesting parts. Reach them, anywhere they are.

12 What you already have. Traditional passive interception
What you already have? Traditional passive interception. Not effective against encryption. You lose half the picture. Must pass through your network.

13 Traditional is good. Innovative is better.

14 Thinking about offensive interception? You should.

15 “Governments must have offensive IT capabilities.” The Financial Times

16 “Spy on suspected terrorists by inserting a remote forensic agent on their computers.” The Economist

17 A remote forensic agent. Clever idea. A sort of 007 for the digital age.

18 We have it.

19 Remote Control System 7

20

21 Evidence collection is always running. Configurable behavior
Evidence collection is always running. Configurable behavior. Autonomous.

22 What kind of evidences can be collected?

23 Voice conversations Browsed URLs Accessed documents Keystrokes Printed documents Messaging
Microphone Location Camera snapshots File system browsing Passwords … and more

24 RCS collected the evidences. They stay on remote device
RCS collected the evidences. They stay on remote device. How can we gather them?

25 Let’s talk about Desktops first.

26 Internet connection. Firewalls and proxies are passed through
Internet connection. Firewalls and proxies are passed through. Domain credentials are stolen.

27 Evidence can also be collected offline.

28 What about mobile platforms?

29 GPRS / UMTS / 3G+. You can provide a custom APN.

30 Open WiFi networks. Known protected networks
Open WiFi networks. Known protected networks. Access Points are automatically detected.

31 What if no data connection is available?

32 Bluetooth. Short Range. Let’s introduce RCS Mediation Node.

33

34 What happens if someone tracks the connection back?

35 Anonymizer Chain. Prevents disclosure of RCS server addresses
Anonymizer Chain. Prevents disclosure of RCS server addresses. Configurable on-the-fly.

36

37 RCS is also flexible.

38 Real-time alerting system. Custom commands execution on remote target
Real-time alerting system. Custom commands execution on remote target. Event-driven logic.

39 A few examples of event-driven logic.

40 When entering the meeting room, start the mic
When entering the meeting room, start the mic. On low battery, stop microphone capture. Special SMS is received, send back a SMS with position. Call is made or received, take a snapshot with the camera.

41 Combine them to suit your needs.

42 What if my target is very skilled?

43 Invisible to target user. Invisible to antivirus and anti-rootkits
Invisible to target user. Invisible to antivirus and anti-rootkits. Anti-forensic measures. Resistant to DeepFreeze restoration.

44 How can I install it on desktop systems?

45 Embed RCS into common file formats (0-day exploits)
Embed RCS into common file formats (0-day exploits). On-the-fly injection into downloaded applications or updates. Webpage code injection during browsing.

46

47 I’m lucky. Physical access is granted.

48 Bootable CDROM or USB thumb drive. Direct hard disk tampering.

49 What about installation on mobiles?

50 Memory Card. ActiveSync while synchronizing or charging
Memory Card. ActiveSync while synchronizing or charging. Embed RCS into smartphone applications. Over-the-Air installation.

51 Supported platforms?

52 Microsoft Windows XP up to 7 (32 and 64 bits) Mac OS X Leopard and Snow Leopard Linux coming in Q4 2011 Windows: we’re working on Windows 8 Mac: we’re working on OS X Lion Linux: will be ready before the end of the year

53 Windows Mobile 6. 0 up to 6. 5 iOS 3. 0 up to 4
Windows Mobile 6.0 up to 6.5 iOS 3.0 up to 4.2 Symbian S60 3rd & 5th edition BlackBerry OS from 4.5 Android from 2.2 iOS: we’re working on iOS 5 (released on October 12)

54 Demo time


Download ppt "Cyber intelligence made easy."

Similar presentations


Ads by Google