RCS Installation
Download
Report
Transcript RCS Installation
Delivery Training
Agenda
RCS Overview
RCS Architecture and Components
RCS Installation
RCS Configuration
Hands On
Infection Vectors
Hands On
TNI and NIA
Hands On
Intelligence
Monitor
Test
Q&A
RCS Overview
Ethical Hacking Solution for governmental
agencies
A software agent installed on the device
to monitor the device
able to hide itself inside the target devices
enables both active data monitoring and process
control
designed to be polymorphic, to evade common
Anti-Viruses and Anti-Rootkits
designed to evade encryption
RCS Overview
Evidence collection on monitored devices is
stealth
Transmission of collected data from the device
to the RCS server is encrypted and untraceable
Identity and location of the Headquarter are
hidden through the use of Anonymizers.
RCS Overview
Complete solution, not a toolkit
Centrally managed through a Console
Totally developed by Hacking Team
RCS Components
Frontend
Collector
Anonymizers
Backend
Masternode
Shards
Console
RCS Frontend
RCS Collector
RCS Collectors are published on Internet
(DMZ)
The main function of Collectors is receiving
the Evidence from the Agents and forwarding it
to the Database for further processing
Collectors make possible to change the
configuration of agents, sending commands to
perform special operations, etc
RCS Collector
Agents communicate with the Collectors using
an encrypted and authenticated channel
no other component is capable of communicating
with the Agents
security is guaranteed by strong double-layered
encryption
Agents need to reach the Collector anywhere
they are
Anonymizers
Anonymizers are used to hide the real identity
of the Customer to anyone trying to figure out
where the Agent is connecting to
Anonymizers are used to send the collected
evidence to avoid exposing the real IP address
of the Collector
They can be deployed anywhere on the
Internet
Anonymizers
They can be safely placed in untrusted
networks
Each connection is fully encrypted from the
target to the frontend
Anonymizers can be linked into one or more
chains that can be fully controlled and
monitored using the Console.
RCS Backend
Master Node
The core of the whole infrastructure
It stores the Evidence collected from the
targets
Scaling capabilities
adding Shards and making them work in
parallel
auto load-balancing
Master Node
Master Node stores the evidence
It manages the configuration of the Agents
and the build of the Infection Vectors
It uses MongoDB (NoSQL DB)
Backup capabilities integrated and automated
Full (incremental or not)
Selective
Only metadata
Shards
Used to increase the number of concurrent
Agents that can be supported
Hot-plug
Automatically integrate with the infrastructure
Increase the overall capacity
The database automatically balances itself,
distributing the data according to the new
resources made available
RCS Console
Centrally manages all the RCS infrastructure
Intuitive and easy to use interface
It allows performing any operation, according
to user privileges
Wizards are available to semplify
investigations and archive
RCS Agent
Is the software that has to be installed on the
target PC or smartphone to be monitored
It extracts information already present on the
device
It keeps real-time user’s activity under
surveillance
It is invisible to Antivirus and Antirootkit
RCS Agent
Once collected, the Evidence is sent to the
Collector
if an Internet connection is not always available,
the Agent will continue to collect the Evidence,
waiting for the next opportunity to transfer it
The Agent can be configured to collect all
kinds of data from the target device
Evidence is stored encrypted and hidden on the
device itself, until the Agent can send it
RCS Agent
Once configured, Agents are autonomous on
their operation, even when they’re isolated from
the Internet
Agents configuration is made by the Console
and it can be changed everytime is needed
Q&A
RCS Installation
Backend Installation
Exec rcs-setup-[current version].exe on
Backend Server
Backend Installation
Shard[n] Installation
Frontend Installation
Console Installation
Install AdobeAir
Install rcs-console-[version].air
Starting RCS Console
Enter the credential on Username and Password tab
On server : enter the name of the machine or server address to connect to
The first time install the certificate under Trusted CA
Anonymizer Installation
Open Console System New Anonymizer
Then select download installer
Open scp client (ex. winscp) copy the
installer.zip file
Anonymizer Installation
Connect to Anonymizer via ssh (ex. Putty)
Go on the folder in which there is the
anonim.zip file
Unzip the file
Lauch the script (sh [file name])
On the Console select the anonymizer and
then click on Apply Configuration
Notes:
• Check that there are no processes listen on port 80 on
anonymizer server (netstat –antp | grep 80)
•Stop all services you don’t need on anonymizer (chkconfig - level [service name] off)
Tips&Tricks after RCS installation
Check Log
C:\RCS\DB\log
C:\RCS\Collector\log
Type also rcs-db-log and rcs-collector-log on
Backend and Collector command prompt
In order to retrive the certificate for Collector,
on Collector command prompt type:
rcs-collector-config -d [host master name] -u admin
-p [password] -t –s
Restart Collector service
Tips&Tricks after RCS installation
In order to retrive the certificate for
Anonymizer on DB server open a command
prompt and type:
rcs-db-config –a
Restart Collector service
Check that all RCS services are running
(under service search RCS)
Reset pwd admin
Backup
RCS Backup
Mount an external storage on Master Node
Create a subfolder inside c:\rcs\db\backup,
let's name it c:\rcs\db\backup\backup
Configure the backup to use that directory
from CLI of Master Node type "rcs-db-config -B
c:\rcs\db\backup\backup"
Open the console and schedule the backups:
1 backup job for metadata/day
1 backup job for full backup/week
Operation and target backup when you need
Notes: The backups can be incremental or not
Q&A
RCS Configuration
Define Users and Groups
On the Console Click Accounting User New User
Note: Only Administrators can add new users and groups
Define Users and Groups
Privileges assigned to the user:
Administrator
System Administrator
Technician
Analyst
Define Users and Groups
Administrator
User and group management
Operations management
Target management
System auditing
License modification
System Administrator
Frontend management
Backend management
System Backup & Restore
Injector management
Connectors management
Define Users and Groups
Technician
Factory creation
Installation vector creation
Agent configuration
Command execution on agents
Upload files to agent
Import evidence
Injector rules management
Analyst
Alerts creation
File system browsing on agents
Evidence editing
Evidence deletion
this authorization is never enabled by
default since it requires a user license.
Evidence export
Entity management
Define Users and Groups
Advanced Permission:
Define Users and Groups
1. On the Console Click Accounting Groups New Group
2. Enter a name to be assigned to the group Click Save
3. In the Users in this Group table, click to add users to the group.
4. In the Operations in this Group table, click to add operations to the
group
Hands On
Create users and group with different permission
Install RCS Console
Login with the user created and see the differences
Define Operation
On the Console Click Operations New Operation,
than assign the operation to the right group
Define Target
On the Console Click Operations Click on the Operation Click
On New Target
Note: Target is a physical person
under investigation.
He/she can have more than one device
(Laptop/Mobile phones/tablet)
Define a Factory
On the Console Click Operations Click on the Operation Click
On the Target name Click on New Factory.
Choose Desktop or Mobile (depends from target device)
Define Factory
The factory is a model to be used to create agents to be installed
The icon varies according to the type of device intended for the agent
The following must be set in the factory
data to be acquired (basic configuration)
modules to be dynamically activated (advanced configuration)
installation vectors (i.e.: CD, exploit, Network Injector)
There is no license for factory. It is possible to create as many
as needed
Define Factory
The factory can be:
Create
Close
Delete
Saved as template
Used to create several agents: for example, to be installed
via different installation vectors or two computers with different
operating systems, etc
Note: Close and Delete factory are irreversible!
If a factory is closed is not possible to open it again, active agents
remain accessible while all agents that have not been synchronized
at least once before the factory is closed will be uninstalled once before
the factory is closed will be uninstalled.
Basic Configuration
Add data acquisition and simple command
execution modules that do not require
complex settings
Enable and quickly set evidence
acquisition
Not include the acquisition of some types
of evidence nor detailed acquisition method
options
Basic Configuration
Advanced Configuration
Events can be linked to actions, to trigger specific agent
reactions to changing conditions in the Device
The Agent can detect specific events and react with
appropriate actions
i.e. screensaver is started
Actions can start or stop modules
Actions can enable or disable other events
All the event, action and module options can be individually set
Advanced Configuration
Hands On
Create an operation
Create a target
Play with basic and Advanced configuration
Infection Methods
A device can be infected via:
Physical infection
the device is infected by the execution of a file transmitted
using USB memories, CDs or documents.
Evidence can be collected physically or via Internet as soon
as the device connects
Remote infection
the device is infected by the execution of a file transferred via
Internet connection or made available in a Web resource.
Evidence can be collected physically or via Internet as soon as
the device connects
Remote infection can be enhanced using Network Injector.
Infection Vectors Overview
Infection Vectors Desktop
Zero-Day Exploits: zero-day exploits researched and
developed in house to provide easy delivery through common
applications are available.
Melted Application: the Agent can be melted with any
application; when run, only the original application will be
visible to the user, while the Agent will be silently installed.
Agent can be disguised with any other Application. Perfect for
social engineering attacks. Melted application can be remotely
delivered
From the network: Tactical Network Injector (TNI) and
Network Injector Appliance (NIA) will let you infect any target
on a LAN or connected to any ADSL; see the respective
sections for details
Infection Vectors Desktop
Physical Access: when physical access to the
device is available, infection can be performed
whether the computer is running or is turned off
without need of any user password :
Offiline Installation
Infection performed in as little as few seconds
Silent install
Infection Methods Desktop
Windows
Silent Installer
Melted Application
U3 Installation
Offline Installation
Exploit
Network Injection
OSX
Silent Installer
Melted Application
Offline Installation
Network Injection
Linux
Silent Installer
Melted Application
Network Injection
Infection Vectors Mobile
Physical Access: when physical access to the device is
possible, local installation can be performed
Inside Application: the Agent can be melted with any
application
when run, only the original application will be visible to the user,
while the Agent will be silently installed
Through Message: a Message containing an infecting link can
be sent to the target.
With this infection vector agent can be configured to appear as
any application (for example, as an Operating System update)
the link will be automatically loaded and prompted to the user
Any text can be included in the message
Infection Methods Mobile
Blackberry
Local Installation
Installation Package
Wap Push Message
SMS
Wap Push
QR Code / Web Link
Android
Installation Package
Wap Push Message
SMS
Wap Push
QR Code / Web Link
Melted Application
iOS
Local Installation
Installation Package
Social Exploit
Infection Methods Mobile
Windows Phone
Installation Package
Windows Mobile
Local Installation
Installation Package
Wap Push Message
SMS
Wap Push
QR Code / Web Link
Melted Application
Symbian
Installation Package
Wap Push Message
SMS
Wap Push
QR Code / Web Link
Melted Application
Hands On
Use the factories created to infect the available devices
With different infection methods
Network Injectors
Network Injector allows to tap the target's HTTP
connections and inject an agent on the device
Monitoring all the HTTP connections
Identifying the target's connections
Injecting the agent into the connections
linking it to the resources the target is downloading
from Internet
Network Injector types
Appliance: network server for installation in an intraswitch segment at an Internet service provider
Tactical: laptop for tactical installation on LAN or WiFi
networks
Network Injector Appliance
NIA is installed at Internet Service Provider’s premises
Doesn’t need to be installed inline, thanks to a patented technology
Different target identification possibilities:
IP Address or IP Range
MAC Address
DHCP Parameters
Radius Parameters
Content of packets through DPI
Different infection techniques
when the target downloads any executable file (.exe) from
the Internet
when the target visits any website
when user’s applications try to update
when the target user, prevented from viewing a video
online, will perform the operations needed to see the video
when the TNI replaces any file with a different file provided
by the operator.
Network Injector Appliance
Available for 1GB and 10GB lines
Supports Fiber and Copper channels
Easy management even when multiple NIA’s are
deployed
Full support from HackingTeam in the implementation of
any NIA Project
Tactical Network Injector
TNI supports the operator in the identification of the target on the field,
discovering all hosts on the network by displaying the following information:
MAC Address
IP Address
Hostname
Operating System
Browser in use
List of all visited website
Attacks performed on the Target
TNI supports different infection techniques:
when the target downloads any executable file (.exe) from
the Internet;
when the target visits any website;
when the target user, prevented from viewing a video online,
performs the operations needed to see the video;
when the TNI replaces any file with a different file provided
by the operator
Hands On
Play with TNI
Test fake access Point
Test different infection vectors
Scout and Elite
Only for Windows Agent there are two
stages of infection:
Scout
Elite
Scout : invisible for all AV in the list, checks
only device and screenshot (if the module is
enable on the configuration). No hidden
features
Elite : full agent with all hidden features
Scout and Elite Behavior
The Scout is installed through an infection
vector.
After 5 minutes (in order to start the agent is
waiting for user input, so the counter will start at
the first user input) the Scout will syncronize.
After the first sync it is possible to proceed to
upgrade the agent from scout to elite using RCS
Console.
Then wait 20 minutes for the next sync.
The time of the subsequent synchronizations will
match the configuration made on RCS console
Evidence
Agents can collect different type of evidence
depending on the type of Device, either
Desktop or Mobile, and the specific target
platform
Desktop:
Evidence
Chat and messages from different Social Networks
(Facebook, Twitter, and more)
Mail from different Mail Clients and Web Interfaces (Outlook,
Windows Mail, GMail, and more)
Automatic and on-the-fly interception and copy of any file
opened, even when its encrypted and does not reside on the
hard disk
Screenshots
List of visited web sites
Download of passwords stored on the device (Browsers, Mail
clients, etcetera)
Keylogger with the possibility to capture also on-screen
keyboards
Desktop:
Evidence
Copied and pasted text
Position of the device, even when no GPS is available
Recording from the microphone of the device
Detailed information on hardware and software on the device
Photos taken with the device webcam
Monitoring and recording of VOIP Calls (Skype,
LiveMessenger, and more)
Download and Upload of files to and from the device
Contacts information
New and past appointments from different calendars
More …
Evidence
Mobile:
Keylogger
Retrieve of passwords saved on the device
Position of the device (Cell signal, Wi-Fi and GPS)
Remote Audio Surveillance using the phone’s microphone
(no need to place a call)
Photos taken with the device camera
List of visited websites
Download and Upload of files from the device
More …
Hands On
Check the evidence collected from the infected devices
Try to change the configuration
See the behavior of the agent
Intelligence
The data collected through different
methods can grow indefinitely, making
it hard to extract useful information
from raw data
Intelligence
Intelligence module can:
Collect
Profiling
Correlate
It operates independently
analyzing incoming evidences on-the-fly
automatically creating relevant records
for each entity
Can be modified manually to enable
correlation of previously collected data
E.g. target’s photos, phone numbers,
accounts, etc
Intelligence Modules
Intelligence module
Automatically creates a profile for each
target, showing the digital identity of your
target
Correlation module
gives information on interactions
(communications, meetings, etc) between
different targets
Intelligence
Monitor
Test
Q&A