Tactical Network Injector is a notebook for tactical installation on LAN or WiFi networks. Furthermore, it can be used to unlock the target computer's operating system password to permit physical infections (i.e.: via Silent Installer).
Tactical Network Injector uses Network Injector - Tactical Device as an operating system and Tactical Control Center for control software.
NOTE: Tactical Network Injector is supplied installed and ready for use, complete with disk encryption and all the foreseen applications.
Tactical Network Injector identifies devices in a WiFi or wired network and injects agents. It works based on identification (automatic or manual) or injection rules set in RCS Console. It can also connect to protected WiFi networks emulate WiFi network Access Points and unlock the operating system password.
Tactical Network Injector communicates with RCS every 30 seconds to receive identification and infection rules and send status and logs.
Its Tactical Control Center control software can be set for remote access.
Tactical Network Injector requires two network connections: one to tap the target's traffic and the other to inject agents and communicate with the RCS server.
Tip: after setup, Tactical Network Injector is independent. Internet connection is required to obtain updated rules from RCS and send logs (synchronization).
Typical WiFi layout where Tactical Network Injector is connected to the same WiFi network as target devices.
Figure 1: Tactical Network Injector: standard connection layout
Typical layout in WiFi where Tactical Network Injector emulates the open WiFi network access point to attract target devices.
Figure 2: Tactical Network Injector: access point emulation diagram
RCS9.3 | User's and Installation Guide | © COPYRIGHT 2013