Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.

SECRET//20350112
9.19 (U) Viewing Alerts ...................................................................................................94
9.20 (U) Viewing Target Activity.....................................................................................96
9.21 (U) Viewing Target Details.......................................................................................97
9.22 (U) Viewing Copy Data.............................................................................................98
9.23 (U) Viewing VPN Data.............................................................................................99
9.24 (U) Viewing Harvest Data.......................................................................................100
9.25 (U) Viewing Upgrade Alerts...................................................................................101
9.26 (U) Viewing Windex Alerts.....................................................................................102
9.27 (U) Using VPN Link and VPN Proxy.....................................................................103
9.28 (U) Viewing Flytrap Diagnostic Data......................................................................105
9.29 (U) One-way Transfer (OWT) of Cherry Blossom Data.........................................106
9.29.1 (U) OWT Report Use Cases.................................................................................108
9.29.1.1 (U) Mission Report Use Case....................................................................109
9.29.1.2 (U) Flytrap Report Use Case......................................................................110
9.29.1.3 (U) Flytrap Alert Report Use Case............................................................111
9.29.1.4 (U) Flytrap Copy Data Report Use Case...................................................112
9.29.2 (U) Generating a OWT Report from Cherry Web................................................113
9.29.3 (U) Generating a OWT Report from a CB Server Terminal................................113
10 (U) SYSTEM TROUBLESHOOTING............................................................115
11 (U) MISSION USE CASES............................................................................116
11.1 (S) Tradeoffs Related to Flytrap Covertness...........................................................116
11.2 (S) Known Target with Personal Computer/PDA/802.11 Device...........................118
11.3 (S) Multi-user Terminal/Computer with Target and Non-Target Users..................118
11.4 (S) Suspected Target with Unknown Email/Chat Address......................................119
11.5 (S) Wireless Network Access..................................................................................119
11.6 (S) Target Computer Exploitation (with Windex)...................................................119
11.7 (S) Network Discovery/Intrusion/Exploitation (with VPN Link)...........................119
11.8 (S) Man-In-The-Middle (MITM) Attack (with VPN Proxy)..................................120
11.9 (S) Intelligence Gathering of Internet Usage in a Specific Area.............................120
12 (U) SYSTEM LIMITATIONS..........................................................................121
12.1 (S) Maximum Number of Targets and Target Actions............................................121
12.2 (S) Overload of Copy Data......................................................................................121
12.3 (S) Certain Devices/Firmwares Lose Flytrap Persistent Data During a Hard Reset
121
12.4 (S) Ideally, at Least One PoP has a Static IP Address.............................................121
12.5 (S) Windex Action Occurs Only on First HTTP GET Request of Root URL........122
12.6 (S) Non-Deterministic Beacon Timing....................................................................122
12.7 (S) Firmware Upgrade Will Remove Implant.........................................................122
12.8 (S) VPN Link/Proxy Support...................................................................................123
13 (U) FORENSICS............................................................................................124
13.1 (S) Likelihood of Forensic Inspection.....................................................................124
5
SECRET//20350112

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh