E-Detective Series of Products Decision Computer Group of Company Website: www.edecision4u.com Email: frankie@decision.com.tw; DECISION-COMPUTER INTERNATIONAL CO., LTD Agenda Introduction to E-Detective Series of Products E-Detective Wireless-Detective E-Detective Decoding Center (EDDC/XDDC) HTTPS/SSL Network Forensics Device WatchGuard.WLAN VOIP Interception Uniqueness of Decision Computer Group References Others Offering DECISION-COMPUTER INTERNATIONAL CO., LTD 2 E-Detective (LAN Internet Monitoring/Interception System) DECISION-COMPUTER INTERNATIONAL CO., LTD 3 E-Detective Solution for: • Organization Internet Monitoring/Network Behavior Recording • Auditing and Record Keeping, Compliance Solution for: • Forensics Analysis and Investigation, Sarbanes Oxley Act (SOX) • Legal and Lawful Interception (LI) HIPAA, GLBA, SEC, NASD, • Others E-Discovery etc. E-Detective Architecture/Work Flow 010101010 10010101010 E-Detective Standard System Models and Series FX-06 FX-30 DECISION-COMPUTER INTERNATIONAL CO., LTD FX-100 FX-120 4 E-Detective Implementation Diagram (1) Organization Internet Monitoring and Interception System DECISION-COMPUTER INTERNATIONAL CO., LTD 5 E-Detective Implementation Diagram (2) Telco and ISP Internet Lawful Interception (LI) Solution Real-Time/Online Decoding and Reconstruction Offline Decoding and Reconstruction Nationwide Internet Monitoring for Protecting National Security DECISION-COMPUTER INTERNATIONAL CO., LTD 6 Decoding and Reconstruction – Protocols Supported 1. 2. 3. 3. 4. 5. 6. 7. 8. 9. Email POP3, SMTP, IMAP Webmail (Read and Sent) Yahoo Mail (Standard and Beta/2.0), Windows Live Hotmail, Gmail, Giga Mail etc. IM/Chat Windows Live Messenger-MSN, Yahoo, ICQ, AOL, QQ, Google Talk, IRC, UT Chat Room, Skype call session/duration File Transfer – FTP File Transfer – P2P Bittorent, eMule/eDonkey, Gnutella, Fasttrack HTTP Link, Content, Reconstruct, Upload/Download, Video Stream Online Game Maplestory, RO, Kartrider, FairyLand, Hero, WonderLand etc. Telnet/BBS VOIP Yahoo Messenger – reconstructed back to GIPS format Webcam Yahoo and MSN Messenger DECISION-COMPUTER INTERNATIONAL CO., LTD 7 E-Detective – Homepage – Dashboard with Reports DECISION-COMPUTER INTERNATIONAL CO., LTD 8 E-Detective – Sample Email – POP3/SMTP/IMAP DECISION-COMPUTER INTERNATIONAL CO., LTD 9 E-Detective – Sample Web Mail (Read) Webmail: Yahoo Mail, Gmail, Windows Live Hotmail, Giga Mail, Hinet etc. DECISION-COMPUTER INTERNATIONAL CO., LTD 10 E-Detective – Sample Web Mail (Sent) Webmail: Yahoo Mail, Gmail, Windows Live Hotmail, Giga Mail, Hinet etc. DECISION-COMPUTER INTERNATIONAL CO., LTD 11 E-Detective – Sample IM/Chat – MSN, Yahoo etc. DECISION-COMPUTER INTERNATIONAL CO., LTD 12 E-Detective – Sample File Transfer - FTP DECISION-COMPUTER INTERNATIONAL CO., LTD 13 E-Detective – Sample File Transfer – P2P P2P Protocols: Bittorent, eDonkey/eMule, Fasttrack etc. DECISION-COMPUTER INTERNATIONAL CO., LTD 14 E-Detective – Sample HTTP – Link/Content/Reconstruct Whois function provides you the actual URL Link IP Address HTTP Web Page content can be reconstructed DECISION-COMPUTER INTERNATIONAL CO., LTD 15 E-Detective – Sample HTTP Video Stream Playback of Video File Video Stream (FLV format): Youtube, Google Video, Metacafe. DECISION-COMPUTER INTERNATIONAL CO., LTD 16 E-Detective – Sample TELNET Playback of Telnet Session DECISION-COMPUTER INTERNATIONAL CO., LTD 17 E-Detective – Authority Assignment Authority – Visibility and Operation in Group (with User defined) Authority - Visibility Authority - Operation Authority Groups with Users DECISION-COMPUTER INTERNATIONAL CO., LTD 18 E-Detective – Backup – Auto-FTP/Manual Auto-FTP Backup Manual Backup Download ISO or Burn in to CD/DVD Reserved Raw Data Files and Backup Reconstructed Data Comes with Hashed Export Function DECISION-COMPUTER INTERNATIONAL CO., LTD 19 E-Detective – Online IP List with IP/Account Report DECISION-COMPUTER INTERNATIONAL CO., LTD 20 E-Detective – Alert – Alert with Content Alert configured from different service categories and different parameters such as key word, account, IP etc. Alert can be sent to Administrator by Email or SMS if SMS Gateway is available. DECISION-COMPUTER INTERNATIONAL CO., LTD 21 E-Detective – Search Search – Free Text Search, Conditional Search, Similar Search and Association Search Conditional Search Free Text Search Association Search DECISION-COMPUTER INTERNATIONAL CO., LTD 22 Wireless-Detective (WLAN/802.11a/b/g Interception System) DECISION-COMPUTER INTERNATIONAL CO., LTD 23 Wireless-Detective - Introduction Wireless-Detective System WLAN Analytics/Forensics/Legal Interception System Smallest and most complete WLAN Interception System in the World! • Scan all WLAN 802.11a/b/g 2.4 and 5.0 GHz channels for AP and STA • Captures/sniffs WLAN 802.11a/b/g packets. • Decrypt WEP key (WPA Optional Module) • Decodes and reconstructs WLAN packets • Stores data in raw and reconstructed content • Displays reconstructed content in Web GUI • Hashed export and archive All in One System! Important Tool for Intelligent Agencies such as Police, Military, Forensics, Legal and Lawful Interception Agencies. DECISION-COMPUTER INTERNATIONAL CO., LTD 24 Wireless-Detective – Implementation Diagram (1) Wireless-Detective Standalone System - Captures WLAN packets transmitted over the air ranging up to 100 meters or more (by using Enhanced System with High Gain Antenna) WLAN Interception Standalone Architecture Deployment (Capture a single channel, a single AP or a single STA) DECISION-COMPUTER INTERNATIONAL CO., LTD 25 Wireless-Detective – Implementation Diagram (2) Wireless-Detective Extreme System - Utilizing multiple/distributed Wireless-Detective systems (Master – Slave) to conduct simultaneous capture, forbidding and location estimation functions. WLAN Interception Distributed Architecture Deployment (Utilizing min. of 2 systems for simultaneously (Master & Slaves capturing/forbidding functions. Capture a single channel, a single AP or a single STA) Note: For capturing multiple channels, each Wireless-Detective (WD) can reconfigure/act as standalone system. For example deploy 4 WD systems with each capturing on one single channel. DECISION-COMPUTER INTERNATIONAL CO., LTD 26 Wireless-Detective – Implementation Diagram (3) Wireless-Detective Standalone Systems Multiple Channels Capturing Utilizing more than 1 Wireless-Detective to capture different channels. WLAN Interception Standalone – Multiple Channels Capturing Single WD for single channel capturing. Multiple WD for multiple channel capturing Note: The advantage to have multiple WD systems is you have the flexibility to deploy distributed architecture (for capturing single channel/target) or you can split it for standalone system deployment for multiple channels capturing. DECISION-COMPUTER INTERNATIONAL CO., LTD 27 Wireless-Detective – AP/STA Information – Capture Mode Displaying information of Wireless devices (AP/STA) in surrounding area. DECISION-COMPUTER INTERNATIONAL CO., LTD 28 Wireless-Detective – AP/STA Information – Forbidder Mode Displaying information of Wireless devices (AP/STA) in surrounding area. DECISION-COMPUTER INTERNATIONAL CO., LTD 29 Wireless-Detective – Forbidder Mode Implementation WLAN Jammer/Forbidder Implementation 1.Forbid connectivity of STA 2.Forbid connectivity of AP DECISION-COMPUTER INTERNATIONAL CO., LTD 30 Cracking/Decryption of WEP/WPA Key (1) WEP Key Cracking/Decryption can be done by Wireless-Detective System! Auto Cracking (system default) or Manual Cracking 1) WEP Key Cracking/Decryption:-- (64, 128, 256 bit key) Proactive Crack and Passive Crack Proactive/Active Crack – By utilizing ARP Injection Passive Crack – Silently collecting Wireless LAN packets 64-bit key – 10 HEX (100-300MB raw data /100K-300K IVs collected) 128-bit key – 26 HEX (150-500MB raw data /150K-500K IVs collected) 2) WPA Key Cracking/Decryption:-- (Optional Module Available) WPA-PSK cracking is an optional module. By using external server with Smart Password List and GPU acceleration technology, WPA-PSK key can be recovered/cracked. Notes: The time taken to decrypt the WEP key by passive mode depends on amount network activity. The time to crack WPA-PSK key depends on the length and complexity of the key. Besides, it is compulsory to have the WPA-PSK handshakes packets captured. DECISION-COMPUTER INTERNATIONAL CO., LTD 31 Cracking/Decryption of WEP Key (2) Automatic: System auto crack/decrypt WEP key (default) Manual: Capture raw data and crack/decrypt WEP key manually Cracking Manually DECISION-COMPUTER INTERNATIONAL CO., LTD 32 Cracking/Decryption of WEP Key (3) WEP Key Cracked! DECISION-COMPUTER INTERNATIONAL CO., LTD 33 Wireless-Detective – WPA Cracking Solution WPA-PSK Cracking Solution WPA Handshake packets need to be captured for cracking WPA key. Utilize Single Server or Distributed Servers (multiple smart password list attack simultaneously) to crack WPA key. Acceleration technology: GPU Acceleration Note: WPA handshakes packet can be captured by Standalone Wireless-Detective system or Distributed Wireless-Detective systems. DECISION-COMPUTER INTERNATIONAL CO., LTD 34 Cracking/Decryption of WPA-PSK Key WPA/WPA2-PSK cracking module is optional (dedicated server). Application: Utilizing Smart Password List attack and GPU technology (Graphic Cards) to recover or crack the WPA/WPA2-PSK Key. Supported WPA: WPA-PSK (TKIP) and WPA2-PSK (AES). Speed: up to 30 times faster than normal CPU. GPU supported: NVIDIA and ATI DECISION-COMPUTER INTERNATIONAL CO., LTD 35 Decoding and Reconstruction – Protocols supported 1. 2. 3. 3. 4. 5. 6. 7. 8. 9. Email POP3, SMTP, IMAP Webmail (Read and Sent) Yahoo Mail (Standard and Beta/2.0), Windows Live Hotmail, Gmail, Giga Mail etc. IM/Chat Windows Live Messenger-MSN, Yahoo, ICQ, AOL, QQ, Google Talk, IRC, UT Chat Room, Skype call session/duration File Transfer – FTP File Transfer – P2P Bittorent, eMule/eDonkey, Gnutella, Fasttrack HTTP Link, Content, Reconstruct, Upload/Download, Video Stream Online Game Maplestory, RO, Kartrider, FairyLand, Hero, WonderLand etc. Telnet/BBS VOIP Yahoo Messenger – reconstructed back to GIPS format Webcam Yahoo and MSN Messenger DECISION-COMPUTER INTERNATIONAL CO., LTD 36 Wireless-Detective GUI – Sample Email – POP3 Date/Time, From, To, CC, Subject, Account, Password DECISION-COMPUTER INTERNATIONAL CO., LTD 37 Wireless-Detective GUI – Sample Web Mail (Read) Date/Time, Content, Web Mail Type DECISION-COMPUTER INTERNATIONAL CO., LTD 38 Wireless-Detective – Sample Web Mail (Sent) Date/Time, Form, To, CC, BCC, Subject, Webmail Type DECISION-COMPUTER INTERNATIONAL CO., LTD 39 Wireless-Detective – Sample IM/Chat – MSN Date/Time, User Handle, Participant, Conversation, Count DECISION-COMPUTER INTERNATIONAL CO., LTD 40 Wireless-Detective – Sample IM/Chat – Yahoo Date/Time, Screen Name, Participant, Conversation, Count Including VOIP and Webcam sessions reconstruction and playback DECISION-COMPUTER INTERNATIONAL CO., LTD 41 Wireless-Detective – Sample File Transfer - FTP Date/Time, Account, Password, Action, FTP Server IP, File Name DECISION-COMPUTER INTERNATIONAL CO., LTD 42 Wireless-Detective – Sample Peer to Peer – P2P Date/Time, Port, Peer Port, Tool, File Name, Action, Hash DECISION-COMPUTER INTERNATIONAL CO., LTD 43 Wireless-Detective – Sample Telnet Date/Time, Account, Password, Server IP, File Name Playback of TELNET Session DECISION-COMPUTER INTERNATIONAL CO., LTD 44 Wireless-Detective – Sample HTTP – Link/Content/Reconstruct Date/Time, URL Reconstructed Web Pages DECISION-COMPUTER INTERNATIONAL CO., LTD 45 Wireless-Detective – Sample HTTP – Upload/Download Date/Time, Action, File Name, HTTP Download/Upload URL, Size DECISION-COMPUTER INTERNATIONAL CO., LTD 46 Wireless-Detective – Sample Online Games Date/Time, MAC Address, Port, Peer Port, Game Name DECISION-COMPUTER INTERNATIONAL CO., LTD 47 Wireless-Detective – Search – Conditional/Free Text Search by Parameters/Conditions Free Text Search DECISION-COMPUTER INTERNATIONAL CO., LTD 48 Wireless-Detective – Alert and Notification by Condition Alert Administrator by Parameters/Conditions DECISION-COMPUTER INTERNATIONAL CO., LTD 49 Wireless-Detective – Wireless Equipment Locator Utilizes Wireless Sensors and Triangulation Training Methods to estimate the location of the targeted Wireless Devices. 1 WD Master system + min. 3 WD Slave systems (sensors) Note: WatchGuard.WLAN can be used in place of WD slave systems for this Wireless Equipment Locator function) DECISION-COMPUTER INTERNATIONAL CO., LTD 50 Wireless-Detective - Advantages/Benefits Smallest, portable, mobile and light weight WLAN legal interception system. This allows easy tracking and capturing of suspect’s Internet activities especially suspect moves from one place to another. Suspect won’t notice WD existence as it looks like normal laptop. Detects unauthorized WLAN access/intruders (IDS). Provides detailed information of AP, Wireless Routers and Wireless Stations (such as channel, Mbps, security (encryption), IP, signal strength, manufacturer, MAC) Provides capturing of WLAN packets from single channel, AP, STA or multiple channels by deploying distributed/multiple systems. That also means flexibility and scalability of deployment solution. Provides decryption of Wireless key, WEP key (WPA cracking is optional module) Provides decoding and reconstruction of different Internet services/protocols on the fly, reconstructed data is displayed in original content format on local system Web GUI. Supports reserving of raw data captured (for further analysis if required) and archiving of reconstructed at with hashed export functions. Supports condition/parameter search and free text search. Supports alert by condition/parameter. Provides Wireless forbidding/jamming function Provides Wireless Equipment Locator function. The All-in-One Portable WLAN Interception System DECISION-COMPUTER INTERNATIONAL CO., LTD 51 E-Detective Decoding Centre (EDDC/XDDC) DECISION-COMPUTER INTERNATIONAL CO., LTD 52 EDDC/XDDC • EDDC/XDDC is a Unix/Linux based system specially designed for Offline raw data files reconstruction. • It allows Administrator to create different project/case for different user/investigator (with different level of authority) to conduct Internet raw data parser and forensics analysis task on the system. • The system is able to reconstruct Internet application/services like Email (POP3, SMTP, IMAP), Webmail (Yahoo Mail, Gmail, Hotmail etc.) IM (Yahoo, MSN, ICQ, QQ, UT, IRC, Google Talk, Skype Voice Call Log), File Transfer (FTP, P2P), HTTP (Link, Content, Reconstruct, Upload/Download, Video Stream), Telnet, Online Games, VoIP (Yahoo), Webcam (Yahoo, MSN). User/Case Management – Offline Internet Raw Data Parser/Reconstruction – Search Function – Export/Backup EDDC- Standard Offline Reconstruction System XDDC – Offline Reconstruction with Layer 7 Analytics – NEW! DECISION-COMPUTER INTERNATIONAL CO., LTD 53 EDDC/XDDC Implementation (1) Offline Raw Data Decoding and Reconstruction system. Comes with User and Case Management functions. DECISION-COMPUTER INTERNATIONAL CO., LTD 54 EDDC/XDDC Implementation (2) Offline Raw Data Decoding and Reconstruction system. Comes with User and Case Management functions. Case 1 Case 1 Investigator 1 Case 1 Case 1 Results Case 2 Case 2 Investigator 2 Case 2 Case 2 Results DECISION-COMPUTER INTERNATIONAL CO., LTD 55 E-Detective VOIP Forensics Intelligence System DECISION-COMPUTER INTERNATIONAL CO., LTD 56 VOIP Forensic Intelligence System VOIP Protocols supported: * SIP (The most common VOIP protocol used worldwide) * H.323 Audio CODECS supported: Voice call (VOIP) sessions can be captured, recorded (in “wav” file format) and played back with popular voice media player. Current available and supported Audio CODECS developed by Decision include: - G.729 - G.711-a law and G.711-u law - G.723 - G.726 - ILBG Point to Point Communication SIP Server Architecture Relay Sample Information retrievable: Date/Tim e Caller No. Called No. Duratio n Caller Gateway (IP) Called Gateway (IP) Caller Port Called Port Conversati on Protocol Audio Codec Session 1 DECISION-COMPUTER INTERNATIONAL CO., LTD 57 HTTPS/SSL Network Forensics Device DECISION-COMPUTER INTERNATIONAL CO., LTD 58 HTTPS/SSL Interceptor • • • Capable of decrypting HTTPS traffic. Two modes of operation: 1. Man in the Middle Attack (MITM); and 2. Offline Method (Decrypting HTTPS raw data with Private Key Available) Username and passwords (login) can be captured by the HTTPS/SSL Device. For instance, Google/Gmail login, Hotmail login, Yahoo Mail login, Amazon login etc. To view encrypted content, a key is a needed DECISION-COMPUTER INTERNATIONAL CO., LTD 59 WatchGuard.WLAN DECISION-COMPUTER INTERNATIONAL CO., LTD 60 WatchGuard.WLAN • WLAN – IEEE 802.11a/b/g Instruction Detection System (IDS), WLAN Defender and Jammer System. • WatchGuard.WLAN provides WLAN communication diagnosis function. It can detect unauthorized WLAN communication from access point (AP) or wireless station (STA) within the coverage area. It can then forbid the unauthorized connection. Warning/notification Email/message can be sent to the network administrator. • To prevent/forbid the unauthorized WLAN connections, the system can pretend as the station to inform the AP to stop the communication. Besides, noise signal emission to the station and/or AP is another method to prevent/deter wireless communication. To protect from outside attack and prevent from inside leakage! DECISION-COMPUTER INTERNATIONAL CO., LTD 61 Application Diagram - WatchGuard.WLAN DECISION-COMPUTER INTERNATIONAL CO., LTD 62 Uniqueness of Decision Computer Group Designer, Architect and Manufacturer for variety of Network Security, Content Forensics and Internet Interception Solutions. We provides OEM and ODM services where we accept customization requirements from customers. Series of Products Offering: E-Detective (Ethernet LAN and Telco/ISP Lawful Interception System) Wireless-Detective (WLAN Lawful Interception System) EDDC/XDDC (Offline Internet Decoding and Reconstruction System) HTTPS/SSL Interceptor (HTTPS/SSL Decryption System – using MITM attack) VOIP Forensics Intelligence (VOIP Interception System) WatchGuard.WLAN (WLAN Forbidding, Jamming and Defense tool) NuBlock (Write Protection Toolkit) Industrial I/O Card Series DECISION-COMPUTER INTERNATIONAL CO., LTD 63 Decision Computer Group - References Customers • • • • • • • • • • Criminal Investigation Bureau TW The Bureau of Investigation Ministry of Justice TW National Security Agency (Bureau) in various countries Intelligence Agency in various countries Ministry of Defense in various countries National Police, Royal Police in various countries Government Ministries in various countries Federal Investigation Bureau in various countries Telco/Internet Service Provider in various countries Banking and Finance organizations in various countries Note: Due to confidentiality of this information, the exact name and countries of the various organizations cannot be revealed. DECISION-COMPUTER INTERNATIONAL CO., LTD 64