Documents

Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail

Mar. 12, 2014

1/1
Download
Page 1 from Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail
l'vlHS Leverages XKS for QUANTUM Against Yahoo and Hotmail TOP TD USA, FVEY - MH 5 Leverages Paclret Analysis to Identify Feasibility of QUANTUM Against "I"aho-or and Hotmail Automated deep pacl-cet analysis of "r"ahoo and Hotmail providers gives keen insight into the potential success of QUAHTUMTHEDRY exploitation against these services- is a set of CHD man--on--the--side capabilities that involves real--time packet inject in response to passive collection of target communications- inspects each packet, one at a time. for a set of keywords that determine if the packet originated from a CHE target and if a modified response to that packet might result in exploitation ofthe client computer- Because each is inspected individually. if occur across packet boundaries the technicgue will not tipthe EIGIHT systemto attempt exploitation of a client. As headers and the size ofcool-ties grows. the likelihood of all lteywords occurring within a single packet reduces- in collaboration with and the FECHI. productized an IHIHETECGRE l'u'lapIFi.educe analytic that leverages the packets collected and made accessible to analytics by HKEYEEDRE systems- identifies the QUAHTUMTHEDFW keywords in a packet capture and generates statistics for each service [currently Hotmail and "r"ahoo} to determine how often all of the lteywords occur within a single packet- This would not have been possible without providing a platform for analysis to mass-deploy packet-level processing- Approximately of Hotmail and of"r"ahoo sessions contain the lteywords necessary within a single packet to be targeted Ec-llaberatic-n: name radar-ted Access Operations Division. HEIFTWE Fl'.'l Po-c: rum=ouo} Iuoax Division. Iv1Hs reclaaz-'teel TOP SECRETHSIHREL T0 USA, FVEY
l'vlHS Leverages XKS for QUANTUM Against Yahoo and Hotmail TOP TD USA, FVEY - MH 5 Leverages Paclret Analysis to Identify Feasibility of QUANTUM Against "I"aho-or and Hotmail Automated deep pacl-cet analysis of "r"ahoo and Hotmail providers gives keen insight into the potential success of QUAHTUMTHEDRY exploitation against these services- is a set of CHD man--on--the--side capabilities that involves real--time packet inject in response to passive collection of target communications- inspects each packet, one at a time. for a set of keywords that determine if the packet originated from a CHE target and if a modified response to that packet might result in exploitation ofthe client computer- Because each is inspected individually. if occur across packet boundaries the technicgue will not tipthe EIGIHT systemto attempt exploitation of a client. As headers and the size ofcool-ties grows. the likelihood of all lteywords occurring within a single packet reduces- in collaboration with and the FECHI. productized an IHIHETECGRE l'u'lapIFi.educe analytic that leverages the packets collected and made accessible to analytics by HKEYEEDRE systems- identifies the QUAHTUMTHEDFW keywords in a packet capture and generates statistics for each service [currently Hotmail and "r"ahoo} to determine how often all of the lteywords occur within a single packet- This would not have been possible without providing a platform for analysis to mass-deploy packet-level processing- Approximately of Hotmail and of"r"ahoo sessions contain the lteywords necessary within a single packet to be targeted Ec-llaberatic-n: name radar-ted Access Operations Division. HEIFTWE Fl'.'l Po-c: rum=ouo} Iuoax Division. Iv1Hs reclaaz-'teel TOP SECRETHSIHREL T0 USA, FVEY