What you should know about Tactical Network Injector

Introduction

Tactical Network Injector is a notebook for tactical installation on LAN or WiFi networks. Furthermore, it can be used to unlock the target computer's operating system password to permit physical infections (i.e.: via Silent Installer).

Tactical Network Injector uses Network Injector - Tactical Device as an operating system and Tactical Control Center for control software.

NOTE: Tactical Network Injector is supplied installed and ready for use, complete with disk encryption and all the foreseen applications.

Main functions

Tactical Network Injector identifies devices in a WiFi or wired network and injects agents. It works based on identification (automatic or manual) or injection rules set in RCS Console. It can also connect to protected WiFi networks, emulate WiFi network Access Points and unlock the operating system password.

Tactical Network Injector communicates with RCS via an Anonymizer (and its chain, see "What you should know about Anonymizers"). Communications are run every 30 seconds to receive identification and infection rules and send status and logs.

Its Tactical Control Center control software can be set for remote access.

Network connections

Tactical Network Injector requires two network connections: one to tap the target's traffic and the other to inject agents and communicate with the RCS server.

Tip: after setup, Tactical Network Injector is independent. Internet connection is required to obtain updated rules from RCS and send logs (synchronization).

Standard connection layout

Typical WiFi layout where Tactical Network Injector is connected to the same WiFi network as target devices.

Tactical Network Injector: standard connection layout

Access point emulation connection diagram

Typical layout in WiFi where Tactical Network Injector emulates the open WiFi network access point to attract target devices.

Tactical Network Injector: access point emulation diagram