Inception: APT Campaign Spanning PCs, Mobile, the Cloud, and Home Routers
|
|
|
- Laurel Ryan
- 10 years ago
- Views:
Transcription
1 SESSION ID: BR-T10 Inception: APT Campaign Spanning PCs, Mobile, the Cloud, and Home Routers Snorre Fagerland Sr. Principal Security Researcher Blue Coat Waylon Grange Sr. Threat Researcher Blue Coat plum
2 What is Inception? 2
3 Who was targeted? Government Embassies Politics Finance Military Engineering United Nations Members World Petroleum Council 3
4 Phishing s 4
5 Attack vector Installer vbs Polymorphed dll Decrypter dll Phishing Exploit doc Encrypted blob Implant dll Additional capabilities Decoy doc 5
6 Base implant { 'UserName': u'q', 'ServicePack': 'Service Pack 3', 'ComputerName': u' ab411a4, 'ModuleName': u'c:\\windows\\system32\\regsvr32.exe', 'SystemLCID': '0x419', 'SystemDrive': u C:\\', 'isadmin': True, 'UserLCID': '0x419', 'Time': ' :47:0', 'OSVersion': ' ', 'VolumeSerial': 0xb48f8edc } Pulls basic survey information from target and uploads this information every ±15 minutes Can retrieve additional functionality from command and control servers. We ve observed the following additional capabilities downloaded Dir/File walk Survey domain information System hardware survey Enumerate all installed software Upload files of interest to c&c doc/x, xls/x, ppt/x, pdf 6
7 Command and control via the cloud Utilized cloud hosting provider Cloudme.com All data over WEBDAV Via WNetAddConnection call 7
8 Communication channel Interchangeable cloud service All comms with C&C server are encrypted with 256bit AES Unique encryption key for each sample Attacks against same target share same account Data is exchange via files dropped in configured folders Data from victim is given a selected extension to blend in on cloud server 8
9 Chinese APT tie In some instances we noticed this executable being dropped Known to be associated with a Chinese APT group Is a simple C&C backdoor whose functionality overlaps with already in place backdoor C&C domain for this sample expired shortly after being observed Coding skill behind this sample far inferior Victims Researchers 'ModuleName': u'c:\\windows\\system32\\regsvr32.exe 'ModuleName': u'c:\\windows\\syswow64\\regsvr32.exe 'ModuleName': u'c:\\analysis\\ollyclean\\loaddll.exe' 'ModuleName': u'c:\\windows\\system32\\rundll32.exe 9
10 A dream within a dream 10
11 Cloudme logs Cloudme provided access logs for an account Attackers accessed account from over 100 different IPs Attackers IP seemed to change on regular intervals Large majority of IPs came from South Korea IPs didn t match TOR exit nodes or any other known proxies browner parker young samantha2064 hurris sanmorinostar adams2350 adison8845 franko7046 james9611 billder1405 carter0648 bimm4276 chloe7400 depp3353 lisa.walker frogs6352 farrel0829 chak2488 droll5587 garristone corn6814 allan1252 daw0996 tem5842 visteproi
12 Proxy network built from embedded devices 12
13 How do I copy? Router runs stream-line Linux Uses busybox for basic command line utilities tail- looks fishy Now, how to download it USB SCP FTP TFTP netcat echo e wget busybox w/ netcat 13
14 Router proxy malware 14
15 Attacker s infrastructure Hacked IoT Rented Servers Victims Unknown Attackers CloudMe 15
16 Turning the tables Hacked IoT Rented Servers Victims Unknown Attackers CloudMe Analyst 16
17 More infrastructure revealed Servers Hacked IoT Rented Servers Victims Unknown Attackers CloudMe Analyst 17
18 servers Observed attacks uses SOCKS proxy to servers they controlled Used routers to hide their identify from service providers Domains and servers appear to be paid for with bitcoin Domains look legit to victims haarmannsi.cz vs haarmannsi.com sanygroup.co.uk vs sanygroup.com ecolines.es vs ecolines.net 18
19 Mobile as a target 19
20 Phishing link 743: Serve malware disguised as WhatsApp updates 1024: Serve malware disguised as Viber updates other: Serve MMS phishing content. 20
21 MMS phishing We don t have a sample of the actual MMS message Presumed message contained a link and a password Link from message takes victim to a simple password page The Logo is one of many mobile phone carriers We were only able to collect some of the carrier logos from the server before it was shutdown 21
22 Bitly statistics 22
23 Bitly statistics 23
24 Android malware Masked as WhatsApp Update Upon execution installs as service and removed app icon Is capable of gathering the following information Account data Location Contacts External and Internal Storage (files written) Audio (microphone) Outgoing calls Incoming calls Call log Calendar Browser bookmarks Incoming SMS 24
25 Android Comms Malware Connects to specific user account on common blog site Looks for encrypted message between special HTML tags Decodes message which points to second-tier blog site Second-tier blog sites all appear to be compromised sites This way attackers can easily switch out what compromised sites are used for C&C 25
26 ios malware Masked as Skype Update Requires iphone to be rooted with Cydia installed Once executed deletes app and sets executable to run at reboot Communicates with C&C via public hosting service s FTP Is capable of gathering the following information Device platform, name, model, system name, system version itunes Account Information Contacts Hardware information SMS messages Call log Calendar 26
27 ios deb installer 27
28 Blackberry malware Masked as settings app Is capable of gathering the following information Complete device hardware information (including temperature) Account information Hardware information Address book Mobile carrier information and area code Installed applications 28
29 Mobile red herrings 29
30 C&C clues Tracked when new command files were uploaded to Cloudme Command files took the form of [x].bin where x is incremented each time From this we gained a good idea how successful their campaign was Over 24 hours this number increased by about 100, thus 100 active targets the attackers were using Based on the times the files were uploaded attackers were most active from 8:00AM to 5:00PM in the Eastern European Timezone 30
31 RedOctober Many similarities to RedOctober attack from 2012/2013 Some phishing documents look almost identical Similar exploit markers Kaspersky notes large target overlap between campaigns 31
32 Summary 32
33 Summary One of the most sophisticated malware attacks Blue Coat Labs has ever discovered Whole setup shows signs of automation and seasoned programming The amount of layers used in this scheme to protect the payload of their attack seems excessively paranoid The attackers utilize compromised embedded devices as well as multiple dedicated hosting providers and VPN services to mask their identity The framework is generic, and could work as an attack platform for a multitude of purposes with very little modification Includes malware targeting mobile devices: Android, Blackberry and ios Difficult to assign attribution due to false clues
34 Apply/Prevention Block outbound WEBDAV Don t unlock phones Don t install apps from unofficial sources Keep software up-to-date User education (phishing attacks) 34
35 Questions
36 References 36
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Dictamus Manual. Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10.
Dictamus Manual Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10. Table of Contents Settings! 3 General! 3 Dictation!
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
The Epic Turla Operation: Information on Command and Control Server infrastructure
The Epic Turla Operation: Information on Command and Control Server infrastructure v1.00 (August 7, 2014) Short Report by Laboratory of Cryptography and System Security (CrySyS Lab) http://www.crysys.hu/
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Sophos Mobile Encryption Help. Product version: 1.0 Document date: April 2012
Sophos Mobile Encryption Help Product version: 1.0 Document date: April 2012 Contents 1 About Sophos Mobile Encryption...3 2 Home view...5 3 itunes...6 4 Dropbox...7 5 Favorites...9 6 Document view...11
USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------
USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support
Utilizing Dropbox to Share Files
Utilizing Dropbox to Share Files At times it is necessary to share large files with instructors or other students. Dropbox.com provides a very user friendly solution to fill this need. Dropbox is designed
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service
Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Quick Start Guide Using OneDisk with the Tappin Service
Quick Start Guide Using OneDisk with the Tappin Service Copyright 2013, Tappin, Inc. All rights reserved. Tappin and the Tappin logo are trademarks of Tappin, Inc. All other trademarks are the property
Parla, Secure Cloud Email
Parla, Secure Cloud Email Secure Email, Instant Messaging, Calendar, Contacts, Tasks, File sharing and Notes across all devices The 1 st Secure Email and Instant Messaging from and European Security Vendor
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Quick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Exchange ActiveSync (EAS)
Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,
Lutron Home Control Remote Access FAQ
Lutron Home Control Remote Access FAQ What software versions of RadioRA 2 / HomeWorks QS / Lutron Home Control App does remote access work with? RadioRA 2 version 6.1.0 and up HomeWorks QS version 5.0.3
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
EMR Link Server Interface Installation
EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at [email protected], or call
Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080
Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.
Enterprise Mobile Threat Report
Enterprise Mobile Threat Report The State of ios and Android Security Threats to Enterprise Mobility I. Introduction This report examines enterprise security threats for ios and Android. While Android
SmartWatch Eco/Eco Compact
SmartWatch Eco/Eco Compact Digital Video Recorders SmartWatch Eco SmartWatch Eco Compact Mobile Application Installation & Operation Manual Table of Contents Introduction...3 Installation and Operation
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Client applications are available for PC and Mac computers and ios and Android mobile devices. Internet
Introduction to OpenVPN 1 - Introduction to OpenVPN The AN-300-RT-4L2W router features a built-in OpenVPN server for secure, easily configured access to the network from the Internet using devices with
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
z/os Security - FTP Logon Failures
Page 1 of 5 CLEVER Solutions Empowering Global Enterprise z/os Security: FTP Logon Failures Dear Cathy, Does your business have a laissez faire attitude toward z/os security? Most companies do because
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
SA-Announce Cloud Services Mobile Notifier User Manual: ios and Android Version 1.0.0
SA-Announce Cloud Services Mobile Notifier User Manual: ios and Android Version 1.0.0 About Syn-Apps Syn-Apps L.L.C. was founded in 2001 as a consulting firm focused on developing software for IP telephony
SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
HACKER INTELLIGENCE INITIATIVE. The Secret Behind CryptoWall s Success
HACKER INTELLIGENCE INITIATIVE The Secret Behind 1 1. Introduction The Imperva Application Defense Center (ADC) is a premier research organization for security analysis, vulnerability discovery, and compliance
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
You will need your District Google Mail username (e.g. [email protected]) and password to complete the activation process.
As a courtesy to the Palm Beach County School District employees, the Division of IT is now providing District Google Mail access for personal mobile devices. Although we do not have the staffing to accept
Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5. Getting Started 1.2... 7 Download ncrypted Cloud...
Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted
Phone.com. Communicate Better
1 Communicate Better - 1 / 16 - 2 Faxes Setting a Number to Receive Faxes Fax Notification Email Notification Text Message (SMS) notification Managing Faxes Viewing a Fax Downloading a Fax Viewing a Fax
LogMeIn Rescue+Mobile for Android
LogMeIn Rescue+Mobile for Android Contents How to Connect to an Android Device...3 How to Start a Code Session on an Android Device...4 How to Chat with the Customer...5 How to Manage Files on a Customer's
Samsung KNOX User Guide KNOX for Consumers Edition
Samsung KNOX User Guide KNOX for Consumers Edition Version 1.3 Jan 07, 2015 Copyright Notice Copyright 2013 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung
APT Advanced Persistent Threat Time to rethink?
APT Advanced Persistent Threat Time to rethink? 23 November 2012 Gergely Tóth Senior Manager, Security & Privacy Agenda APT examples How to get inside? Remote control Once we are inside Conclusion 2 APT
Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC
Setting Up Email on Your Sprint Power Vision SM Mogul by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
USER GUIDE CLOUDME FOR WD SENTINEL
USER GUIDE CLOUDME FOR WD SENTINEL Document 2013-11-17 Page 2 of 13 TABLE OF CONTENTS INTRODUCTION 2 Safe European Storage 2 How does this really work? 2 GETTING STARTED 3 Setting up an account 3 Setting
CHAPTER 1 Exploring Mobile Devices with IMail 1
Contents CHAPTER 1 Exploring Mobile Devices with IMail 1 CHAPTER 2 Windows Mobile... 2 Configuring Microsoft Exchange ActiveSync... 2 Setting up Mail Account... 8 CHAPTER 3 BlackBerry... 13 Configuring
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Mobile Print/Scan Guide for Brother iprint&scan
Mobile Print/Scan Guide for Brother iprint&scan Version K ENG Definitions of notes We use the following note style throughout this user s guide: specifies the operating environment, conditions for installation,
Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014
1. Executive Summary Penetration Testing Report Client: xxxxxx Date: 19 th April 2014 On the 19th of April, a security assessment was carried out on the internal networks of xxxxxx, with the permission
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
USER GUIDE CLOUDME FOR WD SENTINEL
USER GUIDE CLOUDME FOR WD SENTINEL Page 2 of 18 TABLE OF CONTENTS INTRODUCTION 3 Safe European Storage How does this really work? 3 3 GETTING STARTED 4 Setting up an account Setting up a company account
Protecting against Mobile Attacks
2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537 2 Agenda Attacks moving to mobile
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile
Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
Spontania User Setup Guide
Spontania User Setup Guide ClearOne 5225 Wiley Post Way Suite 500 Salt Lake City, UT 84116 Telephone 1.800.945.7730 1.801.975.7200 Spontania Support 1.801.974.3612 TechSales 1.800.705.2103 FAX 1.801.977.0087
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
How to configure your mobile devices post migrating to Microsoft Office 365
How to configure your mobile devices post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document support boundaries... 3 Examples used in this document... 3 ipad and iphone (ios 4.x and 5.x)...
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1
How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1 How Do I Set Up My Office 365 Account On An iphone, ipad or ipod Touch?... 3 How Do I Remove My Office 365 Account From A
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Enhancing Your Network Security
Enhancing Your Network Security Rainer Singer SE Manager Central Europe October 2013 Infoblox Overview & Business Update Founded in 1999 Headquartered in Santa Clara, CA with global operations in 25 countries
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Dell OpenManage Mobile Version 1.4 User s Guide (Android)
Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION
Old National offers both Mobile Web and a Mobile App, so you can choose the best fit for your device type. Either solution enables you to:
Your bank. For your mobile life. Getting started You live life on the move, and Old National Mobile Banking goes right along with you. Whether you re at work, play, running errands or on vacation, you
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
DVS-100 Installation Guide
DVS-100 Installation Guide DVS-100 can be installed on any system running the Ubuntu 14.04 64 bit Linux operating system, the guide below covers some common installation scenarios. Contents System resource
The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices
The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices Kyle Wilhoit Sr. Threat Researcher Trend Micro 1 Glossary HMI: Human Machine Interface IED: Intelligent Electronic Device SCADA:
FIREEYE THREAT INTELLIGENCE HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group JULY 2015 SECURITY REIMAGINED
S P E C I A L R E P O R T FIREEYE THREAT INTELLIGENCE HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group JULY 205 SECURITY REIMAGINED CONTENTS HAMMERTOSS 3 APT29 5 Introducing HAMMERTOSS
Android App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012
Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data Dave Shackleford February, 2012 Agenda Attacks We ve Seen Advanced Threats what s that mean? A Simple Example What can we
For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.
DropBox vs SugarSync - File storage in the cloud 1 Dropbox There are a number of solutions emerging into the market, which provide users the ability to store files in the cloud, which provide a number
Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault
Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large
Getting Started. Confirm that the Wi-Fi settings on your mobile terminal are enabled. Download Canon Mobile Printing and install it.
Getting Started Check the network connection environment. The mobile terminal must be connected to a wireless LAN access point. The access point and the Canon device you are using must be connected by
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
F-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
