280 likes | 323 Views
The Remote Control System (RCS) Architecture includes ASP, HCM, Backdoor, RSS, RLD components for creating and managing backdoor configurations, infection vectors, and event-driven actions. With a comprehensive DB structure and XML-RPC interface, it enables stealth monitoring and manipulation of targets. The HCM tool facilitates user and activity management with access control, while the DB Console handles backdoor actions and workflow configurations efficiently.
E N D
]Hacking Team[ • RCS • Remote Control System
RCS Architecture ASP HCM Backdoor RSS RLD Backdoor DB Console Backdoor
It is used to create the configurations for the Backdoors. It communicates with ASP thru the DB in order to send the configurations to the Backdoors. It is used to create infection vectors such as melted executables, CD/USB, etc. ASP It is composed by two different windows services: RSS and RLD. RSS is responsible for the communication with the Backdoor. RLD decrypts the logs and sends them to the DB. Stealth monitoring program written both in C++ and ASM. Connects to ASP using an encrypted channel. It uses an event/actions paradigm and it is made up of different agents that can be activated separately. HCM Backdoor RSS RLD RCS Internals
This is the main visualization tool. It can be used to administrate users, groups, activities, targets and backdoors. It is used to browse the logs too. It is accessed by different users with different profiles (a user can only see logs from the activities assigned to him). All the information about users, activities, targets, backdoors and logs are contained into the DB. All the other components talk to the DB thru an XML-RPC interface. DB Console RCS Internals
trigger Events Agents Actions Events are raised by the event manager based on the configuration file. Agents can be activated on startup or started/stopped by an action. Each agent has its own configuration and behavior Actions are triggered by Events. Each event is configured to trigger exactly one action. Sub-actions are available. • Executed Processes • Network Connections • Screensaver start/stop • Time/Date • WinEvt • Quota • Synchronize • Start / stop agent • Uninstallation • Command execution • Voip • Microphone • Webcam • Key logger • Instant Messaging • URL • Password • Snapshot • Print • Clipboard • File Capture Backdoor Logic
Dropper Actions Agents to ASP Core Logs Actions Table Event Manager Action Manager Backdoor Workflow
Configuration Module • Single point management: • Select remote repository (DB) • Authenticate • Manage backdoor configuration • Create Infection media Remote DB HCM Remote DB Remote DB
Configuration Management • Repository selection: • Choose a repository of backdoor configuration • Authenticate with Username/Password Select DB & Authenticate Manage Backdoors Configurations • Manage configuration: • Add/Delete/Change events-actions, modifiy agent params, etc. • Save and update configuration on DB • Build Infection media: • Polymorphic Melted Executable • Offline installation tool (CDRom/USB pen) • INJ proxy: polymorphic core, plugin, etc. Build Infection Tools Logout
INJ Proxy EXE Melting Intercepts all the HTTP connections of the target and inject the backdoor into any executable file downloaded. When the target execute the file, the backdoor will execute unnoticed and the target will be infected. Boot CD/USB The target PC will be booted with the provided CD or USB key and the offline installation will start. You can choose the users of the machine on which the backdoor will be installed. You can even retrieve the log already collected. Hacking Resources The backdoor is melted within any executable. When the executable is launched the backdoor will install silently and the original executable will continue as usual. The client target can be attacked thru exploits and forced to upload and execute the backdoor. Eg: malicious website, evilly crafted file Infection Vectors HCM
http request file download file + backdoor Injection Proxy HTTP transparent proxy HTTP Server Client Melter configuration HCM
Offline Retrieving Encrypted Logs Repository Monitoring from Backdoor Log Retrieving Configuration Manager Reassembly Send Decryption Identification to DB SSL socket ASP Workflow RSS RLD
ASP Internals • Encrypted communications • Mutual authentication with the backdoors (prevents MITM and spoofing attacks) • Multi-threaded • Two independent window services for communication (RSS) and decryption (RLD) • Hidden behind a fake web server
DB Structure Apache XML-RPC XML-RPC ASP PHP Console XML-RPC HCM MySQL
DB data organization • Users and Groups • Activities, Targets and Backdoors • Logs • Audit Logs • Binaries and Certificates • Encryption Keys • Configurations
Users Privileges User ADMN TECH VIEW • Creates Backdoors • Creates infection vectors • Manages configurations • Performs queries on logs • Views the Dashboard • Generates Blotters • Manages Users and Groups • Manages Activities and Targets • Can access the Trace log • Cannot create Backdoors • Cannot view Logs • Cannot create Targets • Cannot view Logs • Cannot create Targets • Cannot configure Backdoors
Object Hierarchy (users and group) Users Group Activity Users Group Activity
Object Hierarchy (activity, target, backdoor) Activity Target Target Backdoor Backdoor Backdoor Backdoor Backdoor