Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.
1 (U) INTRODUCTION...........................................................................................4
2 (U) RELATED DOCUMENTS..............................................................................4
3 (U) POINTS OF CONTACT.................................................................................4
4 (U) SYSTEM DESCRIPTION AND DEFINITIONS..............................................5
4.1 (U) Description..............................................................................................................5
4.2 (U) Definitions...............................................................................................................7
4.3 (U) Acronyms................................................................................................................8
5 (U) SYSTEM OPERATION..................................................................................9
5.1 (S) Implanting a Wireless Device..................................................................................9
5.2 (U) Logging Into CherryWeb......................................................................................10
5.3 (U) General Layout of CW Pages................................................................................11
5.4 (U) CW Overview Page...............................................................................................12
5.5 (U) Changing Your Password......................................................................................12
5.6 (U) Operation Permissions..........................................................................................12
5.7 (U) Preparing for an Initial Beacon.............................................................................13
5.8 (U) Checking Flytrap Status........................................................................................15
5.9 (U) Setting Flytrap Name, Location, Group, Child Group, Description.....................17
5.10 (U) The Default Mission............................................................................................20
5.11 (U) Planning a Mission..............................................................................................21
5.11.1 (U) Step 1: Define Targets......................................................................................21
5.11.2 (U) Step 2: Create Target Deck(s)..........................................................................22
5.11.3 (U) Step 3: Define Windex (Browser Redirect) and VPN Link/Proxy Exploits....28
5.11.4 (U) Step 4: Define Mission Files (for Application Execution)...............................31
5.11.5 (U) Step 5: Define Execute Commands (for Application Execution)....................32
5.11.6 (U) Step 6: Define PoPs..........................................................................................33
5.11.7 (U) Step 7: Create a New Mission..........................................................................34
5.11.8 (U) Step 8: Edit Operation Ownership of Mission (Mission Workflow 1)............35
5.11.9 (U) Step 9: Edit Mission Support Parameters (Mission Workflow 2)....................37
5.11.10 (U) Step 10: Add Target Decks (Mission Workflow 3)......................................40
5.11.11 (U) Step 11: Override Target Actions (Mission Workflow 4).............................41
5.11.12 (U) Step 12: Add Mission Files (Mission Workflow 5)......................................42
5.11.13 (U) Step 13: Add Execute Commands (Mission Workflow 6)............................43
5.11.14 (U) Step 14: Add FW Version Replacement String (Mission Workflow 7)........44
5.11.15 (U) Step 15: Add PoPs (Mission Workflow 8)....................................................45
(U) Step 16 (Optional): Set Suicide Properties................................................................46
5.11.16 (U) Step 17: Review the Mission.........................................................................46
5.12 (U) Assigning a Mission to Flytraps..........................................................................47
5.13 (U) Editing Missions..................................................................................................48
5.14 (U) Archiving Missions.............................................................................................49
5.15 (U) Mission States – Planning, Active, and Archived...............................................49
2