Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Hacking Suite for Governmental Interception

Similar presentations


Presentation on theme: "The Hacking Suite for Governmental Interception"— Presentation transcript:

1 The Hacking Suite for Governmental Interception
Remote Control System The Hacking Suite for Governmental Interception Milan - 23/08/2013

2 The Building Blocks

3 Remote Agent Secure Frontend Scalable Backend Infection Vectors

4 Complete solution, not a toolkit Totally developed by us

5 Remote agent Your personal 007

6 Internet Desktop installation Mobile Installation Working offline…
Then send data.

7 What can we collect?

8

9 Camera Messages Chat Microphone Contacts Calendars Calls Location
Keystrokes Documents Passwords Visited websites And much more… Social -> calendar + contacts

10 Runs on an event-driven logic
Autonomous

11 Events Actions When crossing the border Every day at midnight
On hidden SMS On voice call Actions Start microphone recording Destroy the device Send collected data Take a camera snapshot Social -> calendar + contacts

12 Many different events and actions Combine them to suit your needs

13 What if my target is security aware?

14 Invisible to target user Invisible to antivirus and anti-rootkits
Anti-forensic measures Resistant to format and restoration

15 Evidence on remote device
How can we collect it?

16 Firewalls and proxies are passed through
Internet connection Firewalls and proxies are passed through

17 Open and saved networks
WiFi Open and saved networks

18 Avoid billing the target with custom APN
GPRS / UMTS / 3G+ Avoid billing the target with custom APN

19 Where can I install the Agent?

20 Enough of features. Let’s see on what devices you can operate the RCS
Enough of features. Let’s see on what devices you can operate the RCS. On Windows for sure, so 90% of the desktop market is covered.

21 Secure Frontend An invisible barrier

22 Agent is connecting to your servers Your identity must be kept secret

23 Let’s say we have RCS in one country…
And the backdoor in another… Suppose you control a number of server around the world. You may think of forwarding the traffic…

24 Configurable on-the-fly Evidence stays encrypted

25 Scalable Backend Your data vault

26 Scalable by design

27 Agents x 300 Collector Database

28 Agents x 10000 Collector 1 Collector 2 Collector N Database Shard 1 Shard 2 Shard N

29 Adding servers is transparent Load balancing is automatic
Scale when you need Adding servers is transparent Load balancing is automatic

30 No database administration required Set & Forget backups
Fast restore in 5 minutes

31 Be informed on interesting events
Real-time alerting Be informed on interesting events

32 Polished graphical console The whole system from a single point

33 Infection Vectors Deploy your forces

34 How can I deploy my agent?

35 When the target opens a document

36 0-day exploits pack Always up to date

37 While the target browses the web

38 Inject into downloaded applications
Inject into web pages

39 Bob’s laptop Internet Web site Network Injector

40 Send your target an SMS

41 And many more…

42 Third-party Integration
Combine your weapons

43 Easily integrate with your monitoring center

44 Demo time!


Download ppt "The Hacking Suite for Governmental Interception"

Similar presentations


Ads by Google