Transcript E-DETECTIVE
E-Detective
HTTPS/SSL Interception – MITM & Proxy
Decision Group
www.edecision4u.com
Introduction to HTTPS/SSL Interception
HTTPS/SSL Interception Appliance (Software + Hardware)
User can opt to purchase only software from us and use
their own hardware/server.
Intercept HTTPS/SSL traffic (connection sessions) by MITM attack or by
Proxy setup.
HTTPS/SSL Interception by MITM mode is carried out utilizing both DNS
and ARP attacks.
HTTPS web pages on targeted user can be decrypted, decoded and
reconstructed. Username and password can also be obtained for Web
Login.
Apply to standard HTTPS/SSL traffic without additional security.
HTTPS/SSL Interception by Proxy mode required the target users’ Web
Browser to be pre-configured to use the Proxy service.
Solution for:
Lawful Enforcement Agencies (Police Intelligence, Military Intelligence, National
Security, Counter Terrorism, etc) and corporate organizations.
HTTPS/SSL Interception – By MITM Attack
Intercept and reconstruct HTTPS/SSL
traffic. Obtain HTTPS page login
username and password. Intercept on
specific targets (suspects)
HTTPS/SSL Interception – By MITM Attack
HTTPS/SSL Interception by MITM mode is carried out utilizing both DNS
and ARP attacks.
HTTPS web pages on targeted user can be decrypted, decoded and
reconstructed. Username and password can also be obtained for Web
Login.
Target User (Suspect) IP Address must be known or pre-configured in
the setup of HTTPS/SSL Interception system.
Target Website Links (URLs) must also be pre-configured.
Concurrently attack up to 5 users (Optional for more users).
Apply to standard HTTPS/SSL traffic without additional security.
To view encrypted content,
a key is a needed
HTTPS/SSL Interception – By Proxy Method
HTTPS/SSL Interception – By Proxy Method
HTTPS/SSL Interception by Proxy implementation.
Proxy pre-configured on the targeted user(s) ‘ Web Browser is required.
HTTPS/SSL Interception by Proxy implementation can supports other
protocols capturing and reconstruction besides HTTPS/SSL traffic.
Some supported protocols are: Webmail (Yahoo Mail, Gmail, Hotmail etc.),
IM (Yahoo, MSN, ICQ, IRC, QQ, Web MSN, Web Yahoo etc.), HTTP Web
Browsing, P2P and Online Games).
Can be implemented to a group of users (more than 100 concurrent
interception)
HTTPS/SSL decryption only apply to standard HTTPS/SSL traffic without
additional security.
To view encrypted content,
a key is a needed
HTTPS/SSL Interception – Proxy Implementation
Protocols Supported
Webmail
HTTP
(Hotmail, Yahoo,
(Link, Content,
Gmail etc.)
IM/Chat
(Yahoo,
MSN, ICQ,
Gtalk, IRC,
QQ, Web MSN,
Web Yahoo)
Others
Online Games
Reconstruct)
File Transfer
P2P
Sample: Webmail (Read and Sent)
Sample: IM (Yahoo, MSN, ICQ etc.)
Sample: HTTP Link and HTTP Content
References – Implementation Sites and Customers
Criminal Investigation Bureau
The Bureau of Investigation Ministry of Justice
National Security Agency (Bureau) in various countries
Intelligence Agency in various countries
Ministry of Defense in various countries
Counter/Anti Terrorism Department
National Police, Royal Police in various countries
Government Ministries in various countries
Federal Investigation Bureau in various countries
Telco/Internet Service Provider in various countries
Banking and Finance organizations in various countries
Others
Notes: Due to confidentiality of this information, the exact name and countries of
the various organizations cannot be revealed.
Decision Group
For more information about HTTPS/SSL Interception system,
please contact [email protected].
Product demonstrations can be arranged.