The Hacking Suite For Governmental Interception Todays topic

  • Slides: 33
Download presentation
The Hacking Suite For Governmental Interception

The Hacking Suite For Governmental Interception

Today’s topic: RCS installation vectors.

Today’s topic: RCS installation vectors.

The RCS Agent is a software.

The RCS Agent is a software.

You have to deploy it.

You have to deploy it.

On the target’s device. Anything that runs a modern operating system.

On the target’s device. Anything that runs a modern operating system.

Locally. Remotely.

Locally. Remotely.

Let’s talk about local. You have access to the target device.

Let’s talk about local. You have access to the target device.

Boot from a USB thumb drive. Plug a USB cable.

Boot from a USB thumb drive. Plug a USB cable.

Easy installation. 100% success.

Easy installation. 100% success.

Let’s talk about remote. No physical access this time.

Let’s talk about remote. No physical access this time.

Deploy RCS while the target is…

Deploy RCS while the target is…

Browsing the internet.

Browsing the internet.

Opening a document file.

Opening a document file.

Receiving a SMS.

Receiving a SMS.

Complicated scenario?

Complicated scenario?

Rely on our consultancy services. i. e. Black. Berry controlled via BES. Windows PC

Rely on our consultancy services. i. e. Black. Berry controlled via BES. Windows PC in an enterprise domain.

Curious about the real thing?

Curious about the real thing?

RCS has a simple and unified console. Your attacks are just one-click away.

RCS has a simple and unified console. Your attacks are just one-click away.

Demo Time!

Demo Time!

Exploitation Integrated 0 -day exploits pack. Use documents as attack vector. Use websites as

Exploitation Integrated 0 -day exploits pack. Use documents as attack vector. Use websites as attack vector.

Exploitation Easy to use exploit creation. No skills required.

Exploitation Easy to use exploit creation. No skills required.

Network Injector Monitors the target and modifies its traffic. Inserts code into downloads and

Network Injector Monitors the target and modifies its traffic. Inserts code into downloads and updates. Inserts code into web pages.

Bob’s laptop Internet Network Injector Web site

Bob’s laptop Internet Network Injector Web site

Network Injector It does the magic on-the-fly. No need to be inline. Think of

Network Injector It does the magic on-the-fly. No need to be inline. Think of it as a passive probe.

Network Injector Use it at ISP level.

Network Injector Use it at ISP level.

Network Injector Use it on wi-fi networks. Open or Protected…

Network Injector Use it on wi-fi networks. Open or Protected…

Network Injector “Is it true that someone can break HTTPS? ” Let’s see…

Network Injector “Is it true that someone can break HTTPS? ” Let’s see…

Disguised devices Insert RCS code into ANY USB device. Send, Lend, Sell them. .

Disguised devices Insert RCS code into ANY USB device. Send, Lend, Sell them. . Automatic OS Recognition.

Spreading Infection Jump from an infected PC to USB-connected smartphones.

Spreading Infection Jump from an infected PC to USB-connected smartphones.

Infecting Live Distros They are used by most Criminal Groups. Defeats disk encryption. Resident

Infecting Live Distros They are used by most Criminal Groups. Defeats disk encryption. Resident on the USB device.

Remote Mobile Installation Sends a special crafted SMS to the phone. Once accepted, the

Remote Mobile Installation Sends a special crafted SMS to the phone. Once accepted, the phone will automatically install the Agent.

Remote Mobile Installation Desktop vectors applies to mobile as well!

Remote Mobile Installation Desktop vectors applies to mobile as well!

Q&A

Q&A