The Hacking Suite For Governmental Interception Todays topic
- Slides: 33
The Hacking Suite For Governmental Interception
Today’s topic: RCS installation vectors.
The RCS Agent is a software.
You have to deploy it.
On the target’s device. Anything that runs a modern operating system.
Locally. Remotely.
Let’s talk about local. You have access to the target device.
Boot from a USB thumb drive. Plug a USB cable.
Easy installation. 100% success.
Let’s talk about remote. No physical access this time.
Deploy RCS while the target is…
Browsing the internet.
Opening a document file.
Receiving a SMS.
Complicated scenario?
Rely on our consultancy services. i. e. Black. Berry controlled via BES. Windows PC in an enterprise domain.
Curious about the real thing?
RCS has a simple and unified console. Your attacks are just one-click away.
Demo Time!
Exploitation Integrated 0 -day exploits pack. Use documents as attack vector. Use websites as attack vector.
Exploitation Easy to use exploit creation. No skills required.
Network Injector Monitors the target and modifies its traffic. Inserts code into downloads and updates. Inserts code into web pages.
Bob’s laptop Internet Network Injector Web site
Network Injector It does the magic on-the-fly. No need to be inline. Think of it as a passive probe.
Network Injector Use it at ISP level.
Network Injector Use it on wi-fi networks. Open or Protected…
Network Injector “Is it true that someone can break HTTPS? ” Let’s see…
Disguised devices Insert RCS code into ANY USB device. Send, Lend, Sell them. . Automatic OS Recognition.
Spreading Infection Jump from an infected PC to USB-connected smartphones.
Infecting Live Distros They are used by most Criminal Groups. Defeats disk encryption. Resident on the USB device.
Remote Mobile Installation Sends a special crafted SMS to the phone. Once accepted, the phone will automatically install the Agent.
Remote Mobile Installation Desktop vectors applies to mobile as well!
Q&A
- Aldy bug
- Louisiana code of governmental ethics
- Ngo mission and vision examples
- Louisiana code of governmental ethics
- 13 basic governmental accounting principles
- Ngo meaning
- Governmental systems
- Non-governmental health agencies are funded primarily by
- Dr michael sonntag
- Hujan
- Sms interception hack
- Interception hydrology
- Interruption interception modification fabrication
- Interception is an attack on
- Passive attack interception
- Lawful intercept cisco
- Threats posed to networks
- Paragraph writing strategy
- Tapic about internet
- 3 statements of cell theory
- Todays objective
- Todays final jeopardy question
- Geographic regions final jeopardy
- Whats thermal energy
- Todays software
- Todays objective
- Date frui
- Todays objective
- Todays lab
- Todays plan
- Boys football walsall
- Todays price of asda shares
- In today's class
- Olongman