URC22B UURC22B Universal Remote Control - Manual.pdfniversal Remote Control - Manual
1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.
-
Upload
antony-greer -
Category
Documents
-
view
219 -
download
4
Transcript of 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.
![Page 1: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/1.jpg)
1
REMOTE CONTROL SYSTEM V7
www.hackingteam.it
![Page 2: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/2.jpg)
2
Introduction
![Page 3: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/3.jpg)
© Hacking TeamAll Rights Reserved
3
System Architecture
![Page 4: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/4.jpg)
4
Backdoor Functionalities(PC & Mobile)
![Page 5: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/5.jpg)
© Hacking TeamAll Rights Reserved
5
PC Version
Monitoring and Logging Remote Control System can monitor and log any
action performed by means of a personal computer Accessed URLs Accessed documents Keystrokes Printed documents Chat, e-mail, contacts, instant messaging Remote Audio Spy Localization (wifi) Camera snapshots VoIP (Skype, MSN, etc.) conversations FileSystem browsing
![Page 6: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/6.jpg)
© Hacking TeamAll Rights Reserved
6© Hacking TeamAll Rights Reserved
6© Hacking TeamAll Rights Reserved
6
PC Version
Online Captured data transmission
Connects through the internet to the collection node
Collection nodes can be hidden behind an anonymizing chain
Works both in home and enterprise environments Network Firewalls (passed through)
Web Proxies (passed through)
Domain credentials (stolen)
![Page 7: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/7.jpg)
© Hacking TeamAll Rights Reserved
7© Hacking TeamAll Rights Reserved
7© Hacking TeamAll Rights Reserved
7
PC Version
Offline data retrieving
No internet connection required
Data can be exported in an encrypted format to any external device (eg: USB dongle)
Data can later be imported into the database
![Page 8: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/8.jpg)
PC architectures
Windows XP/Vista/2003/2008/7 (32/64bit)
Mac OS X
Linux (Q2 2011)
© Hacking TeamAll Rights Reserved
8
![Page 9: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/9.jpg)
© Hacking TeamAll Rights Reserved
9© Hacking TeamAll Rights Reserved
9© Hacking TeamAll Rights Reserved
9
Remote Control System can monitor and log any action performed by means of a smartphone Call history Address book Calendar Email messages SMS/MMS interception Localization (cell signal info, GPS info, wifi) Remote Audio Spy Camera snapshots Voice calls interception …
Mobile Version
Monitoring and Logging
![Page 10: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/10.jpg)
© Hacking TeamAll Rights Reserved
10© Hacking TeamAll Rights Reserved
10© Hacking TeamAll Rights Reserved
10
Mobile Version
Online Captured data transmission
Connection via GPRS/UMTS/3G to the Collection Node Configurable custom APNs
Connection through any open/preconfigured WiFi network to the Collection Node Automatic APs detection
Connection via BlueTooth/WiFi to the Mobile Mediation Node (data can later be sent to the database)
![Page 11: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/11.jpg)
© Hacking TeamAll Rights Reserved
11© Hacking TeamAll Rights Reserved
11© Hacking TeamAll Rights Reserved
11
Mobile Version
Mediation Node
Useful if the target cannot access any WiFi or 3G/GPRS Network
![Page 12: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/12.jpg)
© Hacking TeamAll Rights Reserved
12
Mobile Configuration
As for the PC version, Remote Control System for Mobile devices can be re-configured after each synchronization...
... And ‘on the fly’:► Control SMS: messages sent from a pre-configured
phone number can be used to control the backdoor.
► Control SMS are completely invisible to the user and they leave no trace on the phone.
![Page 13: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/13.jpg)
© Hacking TeamAll Rights Reserved
13
Mobile architectures
Windows Mobile 6 6.5
iPhone OS 2 4
Symbian S60 3rd edition
BlackBerry OS >= 4.5
Android (Q1 2011)
![Page 14: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/14.jpg)
14
System features
![Page 15: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/15.jpg)
© Hacking TeamAll Rights Reserved
15
Invisibility
After the installation, Remote Control System cannot be detected by any infected user Existing files are not modified No new files appear on the computer’s hard disk No new processes are executed No new network connections are established Antivirus, antispyware, anti-key-loggers cannot
detect our bug► E.g. Gartner Endpoint Security Magic Quadrant
![Page 16: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/16.jpg)
© Hacking TeamAll Rights Reserved
16
Flexibility
Goes beyond logging and monitoring Has a real-time alerting system Allows performing actions on an infected device
►Search and view data on the hard disk►Execute commands remotely►Possibly modify hard disk contents►Inner logic for automated response (No
human interaction required)
![Page 17: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/17.jpg)
© Hacking TeamAll Rights Reserved
17
Inner Logic (1)
It is based on an Event/Action paradigm► Events:
• On ScreenSaver• Time based• On SMS reception• On GPS position• ...
► Actions:• Synchronize• Uninstall• Start/Stop Agent• Send SMS• Execute command
![Page 18: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/18.jpg)
© Hacking TeamAll Rights Reserved
18
Inner Logic (2)
Some examples...
Screen saver starts -> Send data
SIM changes -> Send SMS with SIM information
Received Covert SMS -> Send SMS with GPS position
On GPS position -> Start the Microphone capture and Send SMS with GPS position
Incoming/outgoing call -> Make a camera snapshot
![Page 19: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/19.jpg)
19
Infection
![Page 20: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/20.jpg)
© Hacking TeamAll Rights Reserved
20
Attack/Infection vectors
Remote Control System is software, not a physical device
Which can be installed remotely► Computer can be bugged by means of several infection
vectors► Intelligence information about remote target mandatory
… but local installation remains an option► Usually very effective
![Page 21: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/21.jpg)
PC Installation (1)
Remote infection vectors Executable melting tool Injection Proxy HT Zero-day Exploits portal
© Hacking TeamAll Rights Reserved
21
![Page 22: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/22.jpg)
PC Installation (2)
Local infection vectors Bootable CDROM or USB pen drive Direct hard disk infection by means of
tampering with computer case
HT consultancy Anonymous attack scenario analysis
►E.g., Internet Café using DeepFreeze
© Hacking TeamAll Rights Reserved
22
![Page 23: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/23.jpg)
© Hacking TeamAll Rights Reserved
23
Mobile Installation
Local Infection: Memory Card Through an infected PC
► when connected for synchronization/recharging
Remote Infection: CAB/SIS/COD Melting Special crafted SMS (WAP Push)
![Page 24: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/24.jpg)
24
Demo time!
![Page 25: 1 REMOTE CONTROL SYSTEM V7 . 2 Introduction.](https://reader036.fdocuments.in/reader036/viewer/2022070413/5697bff21a28abf838cbba4b/html5/thumbnails/25.jpg)
25
Q&A