• Solutions
  • Services
  • Resources
  • About
  • Contact Us
  • Solutions
      • By Need
        • Application Penetration Testing
        • PCI DSS Compliance
        • Deploy Rugged Code Rapidly with DevSecOps
        • Migrate an App Securely to Cloud Computing
        • Cyber Essentials
      • By Role
        • CSO/CTO
        • Information Security Manager
        • Software Developer
        • Managed Service Provider
  • Services
      • Assess
        • Application Penetration Testing
        • SaaS Penetration Testing
        • Kubernetes Penetration Testing
        • Vulnerability Scanning
        • Mobile Application Security Review
        • Cyber Essentials Certification
      • Advise
        • Kubernetes Security Consultancy
        • PCI DSS Consultancy
        • Software Security Consultancy
      • Educate
        • Penetration Testing Training
        • OWASP Top Ten Secure Development Training
        • PCI DSS Secure Coding Workshop
        • Bespoke Application Security Training
      • Transform
        • DevOps / DevSecOps
        • Cloud Migration
  • Resources
      • Reading
        • Blog
        • Case Studies
        • How-To Guides
      • Watching
        • Videos
      • Tools
        • Security Testing Scoping Form
        • PCI DSS SAQ Selector
        • Github Repository
      • Connect with us
        • Twitter
        • LinkedIn
        • Facebook
  • About
      • About 4ARMED
        • Company Overview
        • Accreditations
        • Ethos
        • Careers
        • Our Security
  • Contact Us

galileo

The Endgame - Attributing Hacking Team implants globally

Author image Aug 26 2015
This is the final post in our series on analysing Hacking Team's 'Galileo RCS (Remote Control System)'. In our previous post we showed how to detec...
READ POST

Network Defense - Catching the Galileo RCS using Snort

Author image Aug 12 2015
This post carries on from our previous post on detecting Hacking Team's 'Galileo Remote Control System' using a memory image of a compromised host....
READ POST

Memory Forensics - Detecting Galileo RCS on Windows

Author image Aug 6 2015
This is the next post in our series on Hacking Team's 'Galileo Remote Control System'. In our previous posts we've been looking at the capability o...
READ POST

Hacking Team Galileo RCS - Video Demonstration

Author image Jul 29 2015
Due to interest inĀ our previous posts analysing Hacking Team's 'Galileo' Remote Control System (RCS) we've recorded a video demonstration of the pl...
READ POST

Hacking Team's KillSwitch - Disabling the Galileo RCS remotely and silently

Author image Jul 22 2015
This is the next post in our series on examining Hacking Team's Galileo Remote Control System (RCS). This time we're looking at an embedded 'kill s...
READ POST

Galileo RCS - Running an espionage operation

Author image Jul 20 2015
This is the next installment in our series on Hacking Team's 'Galileo' Remote Control System (RCS). After defeating the license restrictions, we're...
READ POST

Hacking Team's Galileo RCS - Repurposing espionage software

Author image Jul 15 2015
Following on from the previous analysis of the Galileo RCS, in this post we'll look at trying to build a working command and control system for the...
READ POST

Hacking Team RCS Analysis - (or is that 'Hacked Team'?)

Author image Jul 9 2015
The Internet is a very dangerous place to be. This is true for everyone, from your humble user right up to a boutique security firm specialising in...
READ POST

Categories

 
 
 
 
Contact

Contact Information for 4ARMED Limited4ARMED Limited
Oundle Wharf, Station Road
Oundle
PETERBOROUGH PE8 4DE

+44 (0)203 475 2443

Registered in England and Wales, Company Number 05526276.
VAT GB 834 587 007

© 2019 4ARMED Limited

  • Twitter logo
  • Linkedin logo
  • Facebook logo
Solutions
By Need
  • PCI DSS Compliance
  • Penetration Testing
  • Deploy Rugged Code Rapidly with DevSecOps
  • Migrate Securely to Cloud Computing
  • Cyber Essentials
By Role
  • Chief Information Security Officer
  • Executive
  • Information Security Manager
  • Software Developer
  • Managed Service Provider
Services
Assess
  • Penetration Testing
  • SaaS Penetration Testing
  • Kubernetes Penetration Testing
  • Vulnerability Scanning
  • Mobile Application Security Review
  • Cyber Essentials Certification
Advise
  • Kubernetes Security Consultancy
  • PCI DSS Consultancy
  • Software Security Consultancy
Educate
  • Penetration Testing Training
  • OWASP Top Ten Secure Development Training
  • PCI DSS Secure Coding Workshop
  • Bespoke Application Security Training
Transform
  • DevOps / DevSecOps
  • Cloud Migration
About 4ARMED
  • Company Overview
  • Accreditations
  • Ethos
  • Careers
  • Our Security
  • Privacy Policy