The Hacking Suite For Governmental Interception Todays topic
- Slides: 32
The Hacking Suite For Governmental Interception
Today’s topic: RCS installation vectors.
The RCS Agent is a software.
You have to deploy it.
On the target’s device. Anything that runs a modern operating system.
Locally. Remotely.
Let’s talk about local. You have access to the target device.
Boot from a USB thumb drive. Plug a USB cable.
Easy installation. 100% success.
Let’s talk about remote. No physical access this time.
Deploy RCS while the target is…
Browsing the internet.
Opening a document file.
Receiving a SMS.
Complicated scenario?
Rely on our consultancy services. i. e. Black. Berry controlled via BES. Windows PC in an enterprise domain.
RCS has a simple and unified console. Your attacks are just one-click away.
Demo Time!
Exploitation Integrated 0 -day exploits pack. Use documents as attack vector. Use websites as attack vector.
Exploitation Easy to use exploit creation. No skills required.
Network Injector Monitors the target and modifies its traffic. Inserts code into downloads and updates. Inserts code into web pages.
Bob’s laptop Internet Network Injector Web site
Network Injector It does the magic on-the-fly. No need to be inline. Think of it as a passive probe.
Network Injector Use it at ISP level.
Network Injector Use it on wi-fi networks. Open or Protected…
Network Injector “Is it possible to bypass HTTPS? ” Let’s see…
Disguised devices Insert RCS code into ANY USB device. Send, Lend, Sell them. . Automatic OS Recognition.
Spreading Infection Jump from an infected PC to USB-connected smartphones.
Infecting Live Distros Often used by criminal groups. Defeats disk encryption. Resident on the USB device.
Remote Mobile Installation Sends a special crafted SMS to the phone. Once accepted, the phone will automatically install the Agent.
Remote Mobile Installation Desktop vectors applies to mobile as well!
Q&A
- Aldy bug
- Louisiana code of ethics
- 13 basic governmental accounting principles
- Role of ngo in development communication
- Governmental systems
- Non-governmental health agencies are funded primarily by
- Louisiana code of governmental ethics
- Vision of ngo
- Interception hydrology
- Interruption and interception
- Interception is an attack on
- Interception attack
- Lawful interception architecture
- What is data interception and theft
- Illegal interception examples
- At what precipitation does it rain
- Sms interception hack
- Clincher sentence
- What are the steps in narrowing down research topic
- Todays jeopardy
- Handcuff nomenclature quiz
- Today's objective
- Todays globl
- Todays concept
- Todays science
- Todays objective
- Today planets position
- Cell jeopardy
- Todays sabbath lesson
- Todays health
- Todays class com
- Multiple choice comma quiz
- Todays class