SlideShare ist ein Scribd-Unternehmen logo
1 von 28
1
REMOTE CONTROL SYSTEM V5.3
www.hackingteam.it
2
Introduction
© Hacking Team
All Rights Reserved
3
System Architecture
4
Backdoor
Functionalities
(PC & Mobile)
© Hacking Team
All Rights Reserved
5
PC Version
Monitoring and Logging
Remote Control System can monitor and log any
action performed by means of a personal computer
 Web browsing
 Opened/Closed/Deleted files
 Keystrokes (any UNICODE language)
 Printed documents
 Chat, email, instant messaging
 Remote Audio Spy
 Camera snapshots
 VoIP (Skype, MSN, etc.) conversations
 …
© Hacking Team
All Rights Reserved
6© Hacking Team
All Rights Reserved
6© Hacking Team
All Rights Reserved
6
PC Version
Online Captured data transmission
 Connects through the internet to the
collection node
 Works both in home and enterprise
environments
 Network Firewalls (passed through)
 Web Proxies (passed through)
 Domain credentials (stolen)
© Hacking Team
All Rights Reserved
7© Hacking Team
All Rights Reserved
7© Hacking Team
All Rights Reserved
7
PC Version
Offline data retrieving
 No internet connection required
 Data can be exported in an encrypted
format to any external device (eg:
USB dongle)
 Data can later be imported into the
database
PC architectures
 Windows XP
 Windows 2003
 Windows Vista
 Mac OS X (Leopard 10.x)
© Hacking Team
All Rights Reserved
8
© Hacking Team
All Rights Reserved
9© Hacking Team
All Rights Reserved
9© Hacking Team
All Rights Reserved
9
Remote Control System can monitor and log any
action performed by means of a smartphone
 Call history
 Address book
 Calendar
 Email messages
 SMS/MMS interception
 Localization (cell signal info, GPS info)
 Remote Audio Spy
 Camera snapshots
 Voice calls interception
 …
Mobile Version
Monitoring and Logging
© Hacking Team
All Rights Reserved
10© Hacking Team
All Rights Reserved
10© Hacking Team
All Rights Reserved
10
Mobile Version
Online Captured data transmission
 Connection via GPRS/UMTS/3G to
the Collection Node
 Connection through any
open/preconfigured WiFi network to
the Collection Node
 Connection via BlueTooth/WiFi to the
Mobile Mediation Node (data can later
be sent to the database)
© Hacking Team
All Rights Reserved
11© Hacking Team
All Rights Reserved
11© Hacking Team
All Rights Reserved
11
Mobile Version
Mediation Node
 Useful if the target cannot access any WiFi or
3G/GPRS Network
© Hacking Team
All Rights Reserved
12
Mobile Configuration
 As for the PC version, Remote Control
System for Mobile devices can be re-
configured after each synchronization...
 ... And ‘on the fly’:
►Control SMS: messages sent from a pre-
configured phone number can be used to
control the backdoor.
►Control SMS are completely invisible to the
user and they leave no trace on the phone.
© Hacking Team
All Rights Reserved
13
Mobile architectures
 Windows Mobile 5
 Windows Mobile 6
 Windows CE 4.2 (for Thuraya)*
 iPhone OS 2.x
* Under development
14
CONFIDENTIAL
© Hacking Team
All Rights Reserved
 RCS Corporate edition with restricted infection capabilities to be
released H1 09
Clear technology & product
roadmap to market dominance
Windows 2003/XP/Vista
Windows Mobile 5/6
Mac OS X Leopard (10.5)
Today Q2 2009 Q3 2009
Launch of RCS Corporate
Q4 2009
iPhone 2.x
Symbian
Injection Proxy Appliance
15
CONFIDENTIAL
© Hacking Team
All Rights Reserved
Clear technology & product
roadmap to market dominance
Windows 7
Windows Mobile 6.5 & 7
Mac OS X Snow Leopard (10.6)
Q1 2010 Q2 2010 Q3 2010 Q4 2010
iPhone 3.x
Linux
16
System features
© Hacking Team
All Rights Reserved
17
Invisibility
 After the installation, Remote Control System cannot
be detected by any bugged user
 Existing files are not modified
 No new files appear on the computer’s hard disk
 No new processes are executed
 No new network connections are established
 Antivirus, antispyware, anti-key-loggers cannot
detect our bug
► E.g., Gartner Endpoint Security Magic Quadrant
© Hacking Team
All Rights Reserved
18
Flexibility
 Goes beyond logging and monitoring
 Allows performing actions on a bugged device
►Search and view data on the hard disk
►Execute commands remotely
►Possibly modify hard disk contents
►Inner logic for automated response (No
human interaction required)
© Hacking Team
All Rights Reserved
19
Inner Logic (1)
 It is based on an Event/Action paradigm
► Events:
• On ScreenSaver
• Time based
• On process execution
• On SMS reception
• On GPS position
• ...
► Actions:
• Synchronize
• Uninstall
• Start/Stop Agent
• Send SMS
• Execute command
© Hacking Team
All Rights Reserved
20
Inner Logic (2)
 Some examples...
 Screen saver starts -> Send data
 SIM changes -> Send SMS with SIM information
 Received Covert SMS -> Send SMS with GPS position
 On GPS position -> Start the Microphone capture and
Send SMS with GPS position
21
Infection
© Hacking Team
All Rights Reserved
22
Attack/Infection vectors
 Remote Control System is software, not a
physical device
 Which can be installed remotely
►Computer can be bugged by means of several
infection vectors
►Intelligence information about remote target
mandatory
 … but local installation remains an option
► Usually very effective
PC Remote installation
 Remote infection vectors
 Executable melting tool
 HTTP Injection Proxy
 HT Zero-day Exploits library (library is
“indirectly” accessed by customer)
 HT consultancy: anonymous attack
scenario analysis
►E.g., Moving target using Skype
© Hacking Team
All Rights Reserved
23
PC Local (physical)
installation
 Local infection vectors
 Bootable CDROM or USB pen drive
 Direct hard disk infection by means of
tampering with computer case
 Firewire Port/PCMCIA attacks
 HT consultancy: anonymous attack
scenario analysis
►E.g., Internet Café using DeepFreeze
© Hacking Team
All Rights Reserved
24
© Hacking Team
All Rights Reserved
25
Mobile Installation
 Local Infection:
 Memory Card
 ActiveSync direct connection
 Remote Infection:
 Remote CAB delivery*
 SIM Application*
* Under development
26
Demo time!
PC Demo setup
© Hacking Team
All Rights Reserved
27
Mobile Demo setup
© Hacking Team
All Rights Reserved
28

Weitere ähnliche Inhalte

Was ist angesagt?

Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Byres Security Inc.
 
ATM Compromise with and without Whitelisting
ATM Compromise with and without WhitelistingATM Compromise with and without Whitelisting
ATM Compromise with and without WhitelistingAlexandru Gherman
 
[CB19] Hardware Wallet Security
[CB19] Hardware Wallet Security[CB19] Hardware Wallet Security
[CB19] Hardware Wallet SecurityCODE BLUE
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesGENIANS, INC.
 
Whitewood entropy and random numbers - owasp - austin - jan 2017
Whitewood   entropy and random numbers - owasp - austin - jan 2017Whitewood   entropy and random numbers - owasp - austin - jan 2017
Whitewood entropy and random numbers - owasp - austin - jan 2017WhitewoodOWASP
 
The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetSean Xie
 
Security for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutSecurity for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutmentoresd
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the futureHardeep Bhurji
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor FiorimTI Safe
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and VirusesWasif Ali Syed
 
Leave ATM Forever Alone
Leave ATM Forever AloneLeave ATM Forever Alone
Leave ATM Forever AloneOlga Kochetova
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2PacSecJP
 
Symantec Freak Vulnerability Infographic
Symantec Freak Vulnerability InfographicSymantec Freak Vulnerability Infographic
Symantec Freak Vulnerability InfographicSymantec
 

Was ist angesagt? (20)

Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2
 
ATM Compromise with and without Whitelisting
ATM Compromise with and without WhitelistingATM Compromise with and without Whitelisting
ATM Compromise with and without Whitelisting
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
[CB19] Hardware Wallet Security
[CB19] Hardware Wallet Security[CB19] Hardware Wallet Security
[CB19] Hardware Wallet Security
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Whitewood entropy and random numbers - owasp - austin - jan 2017
Whitewood   entropy and random numbers - owasp - austin - jan 2017Whitewood   entropy and random numbers - owasp - austin - jan 2017
Whitewood entropy and random numbers - owasp - austin - jan 2017
 
The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - Stuxnet
 
Security for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutSecurity for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangout
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
ADVERT
ADVERTADVERT
ADVERT
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the future
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
 
Leave ATM Forever Alone
Leave ATM Forever AloneLeave ATM Forever Alone
Leave ATM Forever Alone
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2
 
Symantec Freak Vulnerability Infographic
Symantec Freak Vulnerability InfographicSymantec Freak Vulnerability Infographic
Symantec Freak Vulnerability Infographic
 

Ähnlich wie RCS Demo HackingTeam

USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & groupSourav Roy
 
Malware freak show
Malware freak showMalware freak show
Malware freak showsr1nu
 
Materi cyber sec.pdf
Materi cyber sec.pdfMateri cyber sec.pdf
Materi cyber sec.pdfindinhasan
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationJose Bittencourt
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsJan Seidl
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toasterguest66dc5f
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgL. Duke Golden
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System AdminMD SAHABUDDIN
 
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...LibreCon
 
Automated production of predetermined digital evidence
Automated production of predetermined digital evidenceAutomated production of predetermined digital evidence
Automated production of predetermined digital evidenceAnimesh Lochan
 

Ähnlich wie RCS Demo HackingTeam (20)

USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & group
 
Malware Freak Show
Malware Freak ShowMalware Freak Show
Malware Freak Show
 
Malware freak show
Malware freak showMalware freak show
Malware freak show
 
Materi cyber sec.pdf
Materi cyber sec.pdfMateri cyber sec.pdf
Materi cyber sec.pdf
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutions
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toaster
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
ACTAtek unique features
ACTAtek unique featuresACTAtek unique features
ACTAtek unique features
 
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
 
Automated production of predetermined digital evidence
Automated production of predetermined digital evidenceAutomated production of predetermined digital evidence
Automated production of predetermined digital evidence
 

Kürzlich hochgeladen

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Kürzlich hochgeladen (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

RCS Demo HackingTeam

  • 1. 1 REMOTE CONTROL SYSTEM V5.3 www.hackingteam.it
  • 3. © Hacking Team All Rights Reserved 3 System Architecture
  • 5. © Hacking Team All Rights Reserved 5 PC Version Monitoring and Logging Remote Control System can monitor and log any action performed by means of a personal computer  Web browsing  Opened/Closed/Deleted files  Keystrokes (any UNICODE language)  Printed documents  Chat, email, instant messaging  Remote Audio Spy  Camera snapshots  VoIP (Skype, MSN, etc.) conversations  …
  • 6. © Hacking Team All Rights Reserved 6© Hacking Team All Rights Reserved 6© Hacking Team All Rights Reserved 6 PC Version Online Captured data transmission  Connects through the internet to the collection node  Works both in home and enterprise environments  Network Firewalls (passed through)  Web Proxies (passed through)  Domain credentials (stolen)
  • 7. © Hacking Team All Rights Reserved 7© Hacking Team All Rights Reserved 7© Hacking Team All Rights Reserved 7 PC Version Offline data retrieving  No internet connection required  Data can be exported in an encrypted format to any external device (eg: USB dongle)  Data can later be imported into the database
  • 8. PC architectures  Windows XP  Windows 2003  Windows Vista  Mac OS X (Leopard 10.x) © Hacking Team All Rights Reserved 8
  • 9. © Hacking Team All Rights Reserved 9© Hacking Team All Rights Reserved 9© Hacking Team All Rights Reserved 9 Remote Control System can monitor and log any action performed by means of a smartphone  Call history  Address book  Calendar  Email messages  SMS/MMS interception  Localization (cell signal info, GPS info)  Remote Audio Spy  Camera snapshots  Voice calls interception  … Mobile Version Monitoring and Logging
  • 10. © Hacking Team All Rights Reserved 10© Hacking Team All Rights Reserved 10© Hacking Team All Rights Reserved 10 Mobile Version Online Captured data transmission  Connection via GPRS/UMTS/3G to the Collection Node  Connection through any open/preconfigured WiFi network to the Collection Node  Connection via BlueTooth/WiFi to the Mobile Mediation Node (data can later be sent to the database)
  • 11. © Hacking Team All Rights Reserved 11© Hacking Team All Rights Reserved 11© Hacking Team All Rights Reserved 11 Mobile Version Mediation Node  Useful if the target cannot access any WiFi or 3G/GPRS Network
  • 12. © Hacking Team All Rights Reserved 12 Mobile Configuration  As for the PC version, Remote Control System for Mobile devices can be re- configured after each synchronization...  ... And ‘on the fly’: ►Control SMS: messages sent from a pre- configured phone number can be used to control the backdoor. ►Control SMS are completely invisible to the user and they leave no trace on the phone.
  • 13. © Hacking Team All Rights Reserved 13 Mobile architectures  Windows Mobile 5  Windows Mobile 6  Windows CE 4.2 (for Thuraya)*  iPhone OS 2.x * Under development
  • 14. 14 CONFIDENTIAL © Hacking Team All Rights Reserved  RCS Corporate edition with restricted infection capabilities to be released H1 09 Clear technology & product roadmap to market dominance Windows 2003/XP/Vista Windows Mobile 5/6 Mac OS X Leopard (10.5) Today Q2 2009 Q3 2009 Launch of RCS Corporate Q4 2009 iPhone 2.x Symbian Injection Proxy Appliance
  • 15. 15 CONFIDENTIAL © Hacking Team All Rights Reserved Clear technology & product roadmap to market dominance Windows 7 Windows Mobile 6.5 & 7 Mac OS X Snow Leopard (10.6) Q1 2010 Q2 2010 Q3 2010 Q4 2010 iPhone 3.x Linux
  • 17. © Hacking Team All Rights Reserved 17 Invisibility  After the installation, Remote Control System cannot be detected by any bugged user  Existing files are not modified  No new files appear on the computer’s hard disk  No new processes are executed  No new network connections are established  Antivirus, antispyware, anti-key-loggers cannot detect our bug ► E.g., Gartner Endpoint Security Magic Quadrant
  • 18. © Hacking Team All Rights Reserved 18 Flexibility  Goes beyond logging and monitoring  Allows performing actions on a bugged device ►Search and view data on the hard disk ►Execute commands remotely ►Possibly modify hard disk contents ►Inner logic for automated response (No human interaction required)
  • 19. © Hacking Team All Rights Reserved 19 Inner Logic (1)  It is based on an Event/Action paradigm ► Events: • On ScreenSaver • Time based • On process execution • On SMS reception • On GPS position • ... ► Actions: • Synchronize • Uninstall • Start/Stop Agent • Send SMS • Execute command
  • 20. © Hacking Team All Rights Reserved 20 Inner Logic (2)  Some examples...  Screen saver starts -> Send data  SIM changes -> Send SMS with SIM information  Received Covert SMS -> Send SMS with GPS position  On GPS position -> Start the Microphone capture and Send SMS with GPS position
  • 22. © Hacking Team All Rights Reserved 22 Attack/Infection vectors  Remote Control System is software, not a physical device  Which can be installed remotely ►Computer can be bugged by means of several infection vectors ►Intelligence information about remote target mandatory  … but local installation remains an option ► Usually very effective
  • 23. PC Remote installation  Remote infection vectors  Executable melting tool  HTTP Injection Proxy  HT Zero-day Exploits library (library is “indirectly” accessed by customer)  HT consultancy: anonymous attack scenario analysis ►E.g., Moving target using Skype © Hacking Team All Rights Reserved 23
  • 24. PC Local (physical) installation  Local infection vectors  Bootable CDROM or USB pen drive  Direct hard disk infection by means of tampering with computer case  Firewire Port/PCMCIA attacks  HT consultancy: anonymous attack scenario analysis ►E.g., Internet Café using DeepFreeze © Hacking Team All Rights Reserved 24
  • 25. © Hacking Team All Rights Reserved 25 Mobile Installation  Local Infection:  Memory Card  ActiveSync direct connection  Remote Infection:  Remote CAB delivery*  SIM Application* * Under development
  • 27. PC Demo setup © Hacking Team All Rights Reserved 27
  • 28. Mobile Demo setup © Hacking Team All Rights Reserved 28