drivebadger.com Open in urlscan Pro
78.47.98.51  Public Scan

Submitted URL: https://egyqaz.com/
Effective URL: https://drivebadger.com/can-drive-badger-replace-pegasus.html?domain=egyqaz.com&redirect=/
Submission Tags: falconsandbox
Submission: On October 24 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Menu
 * About us
   
   * Drive Badger in media
   * Frequently Asked Questions
   * Legal questions
   * News
   * Roadmap
   * Sponsoring
   * Our history
 * Drive Badger
   
   * Configuration repositories
   * Drive Badger design and basic information
   * Emergency procedure
   * Encryption support
   * Exfiltrating virtual servers
   * Exclusion rules
   * Filesystem injection support
   * Hook repositories
   * How to start?
   * Installing
   * Install script
   * Kali Linux
   * Recommended hardware
   * Tested systems
 * Mobile Badger
   
   * Data storage
   * Events display
   * Installing
   * Install script
   * Recommended hardware
   * Tested systems
 * Troubleshooting
   
   * Common user mistakes
   * Frequently Asked Questions (technical)
   * Hardware compatibility list
   * Hardware problems (Apple)
   * Hardware problems (Asus)
   * Hardware problems (Dell)
   * Hardware problems (HP)
   * Hardware problems (HP Compaq)
   * Hardware problems (HP ProLiant)
   * Hardware problems (Lenovo)
   * Hardware problems (MSI)
   * Hardware problems (damaged USB ports)
   * Hardware problems (universal)
   * Hardware test log
   * Incompatible hardware
   * Understanding the boot process
 * Field manuals
   
   * Cayman National – Hyper–V exfiltration case study
   * Can Drive Badger replace Pegasus?
   * Configuring encryption keys
   * Planning the big attack
   * 🇺🇦 Warfare tool against Russia

 * About us
   
   * Drive Badger in media
   * Frequently Asked Questions
   * Legal questions
   * News
   * Roadmap
   * Sponsoring
   * Our history
 * Drive Badger
   
   * Configuration repositories
   * Drive Badger design and basic information
   * Emergency procedure
   * Encryption support
   * Exfiltrating virtual servers
   * Exclusion rules
   * Filesystem injection support
   * Hook repositories
   * How to start?
   * Installing
   * Install script
   * Kali Linux
   * Recommended hardware
   * Tested systems
 * Mobile Badger
   
   * Data storage
   * Events display
   * Installing
   * Install script
   * Recommended hardware
   * Tested systems
 * Troubleshooting
   
   * Common user mistakes
   * Frequently Asked Questions (technical)
   * Hardware compatibility list
   * Hardware problems (Apple)
   * Hardware problems (Asus)
   * Hardware problems (Dell)
   * Hardware problems (HP)
   * Hardware problems (HP Compaq)
   * Hardware problems (HP ProLiant)
   * Hardware problems (Lenovo)
   * Hardware problems (MSI)
   * Hardware problems (damaged USB ports)
   * Hardware problems (universal)
   * Hardware test log
   * Incompatible hardware
   * Understanding the boot process
 * Field manuals
   
   * Cayman National – Hyper–V exfiltration case study
   * Can Drive Badger replace Pegasus?
   * Configuring encryption keys
   * Planning the big attack
   * 🇺🇦 Warfare tool against Russia



Drive Badger: open source platform for covert data exfiltration operations,
ranging from small computers to big servers.

contact@drivebadger.com




CAN DRIVE BADGER REPLACE PEGASUS?

Drive Badger is sometimes being compared to, recently popular in media, Pegasus
spyware platform, developed by Israeli company NSO Group. In this article, we'll
try, without going too far into technical details, to compare the
functionalities of both platforms from purely functional side.

From technical point of view, Pegasus can be divided into several dozen separate
functional modules (mostly related to remote infection and subsequent analysis
of the victim's actions). But functionally, looking from the perspective of
surveillance officer, it can be divided into 5 functional blocks:


1. REMOTE INFECTION

Fully remote phone infection ability is in fact the main competitive advantage
of Pegasus and the reason, why it is chosen by uniformed services across the
world above any other platform - including platforms with much better digital
evidence analytics. Especially that Pegasus supports phones and tablets only,
and it's not possible to combine evidence obtained from victim's phone and
computer in any single tool.


2. LOCAL INFECTION

Drive Badger can "infect" only locally - but full range of targets: computers,
servers, mobile phones, tablets, pen drives, and even photo cameras. This
functionality was developed for countries, where evidence or backdoor planting
is legal, eg. Brasil, Vietnam, China and so on.

As Drive Badger is developed by a civillian company, without any cyberweapon
trading licenses etc., as open source project, it is not directly weaponized
(apart from this simple demo for Linux hosts). It fully allows injecting content
into exfiltraded filesystems, but it is operator's responsibility to provide any
exploits, evidence files or any other content to be injected.


3. DATA EXFILTRATION

While Pegasus' main competitive advantage is remote infection, Drive Badger
excels in efficient data exfiltration, with support for all important disk
encryption methods and automated key matching.

The whole data exfiltration process is fully automated, based on over 400 unique
exclusion rules (for various operating systems, for both phones and computers),
which reduce the amount of files to be copied by eliminating low-value files and
directories from the list, thus save most of the time, that would be spent by
"naive" script.


4. DATA ANALYSIS AND CORRELATION, DIGITAL EVIDENCE MANAGEMENT

Pegasus comes with web panel for surveillance officers, allowing them to browse
phone contents in a way similar to how most people uses Google services
(especially Drive and Calendar): browse SMS contents, call lists, photos,
calendar entries etc.

Drive Badger mainly focuses on quick taking control over victim's data, while
all analytics is left to be done using 3rd party computer forensic software
(either commercial or also open source).


COMPATIBLE ANALYSIS TOOLS

Below we intentionally skipped tools that:

 * don't have an open source, free, free for personal use, trial or demo version
   - or even a commercial version with reasonable price, that could be paid for
   just 1 month
 * can work only:
   * in original LAN (eg. Wireshark or other network traffic analyzers)
   * on the original computer (eg. Volatility Framework, or otherwise awesome
     Nirsoft tools)
   * on a block image of the original drive (eg. most file recovery tools)

MAGNET AXIOM

It's a definite leader among forensic analytics tools. AXIOM package consists of
2 separate tools: Process and Examine (in one you operate on raw source
materials, while the other is for conducting evidence analysis - of course this
makes sense during formal investigations, where all knowledge is collected for
use in the trial - while Drive Badger is designed for collecting operational
knowledge).

AXIOM is a paid (and expensive) toolkit. Official trial version is available,
however it requires not just filling the registration form, but also being
verified by Magnet Forensics. In Internet, it's also easy to find cracked
versions 4.10.0.23663 and 3.11.0.19007, without malware.

PARABEN E3

Another commercial tool, in our opinion even better than AXIOM (especially when
analyzing non-Windows platforms, eg. Apple devices) is Paraben E3, which has a
free version - functionally restricted, but fully functional regarding phones.

Registration is just a formality and the download link comes in email right
after completing the form.

FTK FORENSIC TOOLKIT

If you know the very popular, free FTK Imager software - FTK Forensic Toolkit is
a full forensic analysis suite, developed by the same company.

The trial version can be simply downloaded, without any previous verification,
or even registration form.

AUTOPSY

The above 3 packages are commercial, very expensive tools, with proprietary
solutions for working with digital evidence - so user can operate not only at
raw data level (eg. photos, SMS history etc.), but there are higher, abstract
levels: evidence and investigation.

Different types and parts of raw data can be grouped together, forming an
evidence. And evidence can be attached to investigation. Finally, these data can
be exported in imported, which, especially for AXIOM, allows cooperation of many
experts on the same investigations directly in AXIOM, not just at the paper
level.

Autopsy (often bundled with The Sleuth Kit, for analyzing drive images) is
probably the only open source tool (comparing eg. to the below ones), that is
not just a compilation of open source components, but provides its own panel,
that at least tries to follow this commercial approach.

OTHER OPEN SOURCE TOOLS

THe below recommended open source tools, are actually just specialized Linux
distributions, based on either Debian or Ubuntu, with added bunch of generally
known, open source, security-related programs: live forensic scanners, drive
image scanners, filesystem scanners, network scanners, Windows registry scanners
(eg. RegRipper), cloud content scanners, OSINT tools and so on, glued together
in a better or worse way.

But still, different programs for each purpose, and working on raw data
(computer or drive) level only, instead of uniform panel for investigators
without IT experience.

 * SANS SIFT - you need to register to download ready-to-run VirtualBox
   appliance, or alternatively you can download Ubuntu and WSL (Windows 10)
   installers without registration
 * CAINE
 * CSI Linux
 * Parrot OS
 * Kali Linux - exactly the same, which is the base system for Drive Badger


5. SUPERVISION, FRAUD/ABUSE DETECTION

PEGASUS

In case both for Pegasus, and any other system to be officially approved as tool
for armed forces:

 * all activities related to maintenance and current usage of the system, are
   divided into roles and permissions - so the surveillance officer don't have
   access to global configuration, or even particular wiretap configuration,
   while people from technical support can't listen victims' activities
 * there is a "four eyes principle", and it is required for all reconfiguration
   and wiretapping activities, possibly combined with review/versioning
   mechanisms (so one person is unable to do anything significant alone)
 * surveillance officer is only a pawn, fully accountable for his actions

All these rules are intended to prevent abuse - both individual (eg.
surveillance operator suspects his wife of infidelity and would like to spy her)
and institutional (eg. spying politicians or journalists). In practice, since
these restrictions don't really work in the first case, is it fair to still
enforce them in the second one?

DRIVE BADGER

Drive Badger is based on completely different assumptions:

 * to start using it, you don't need any consent from your superiors
 * surveillance officer has absolute power (root privileges) over his own Drive
   Badger/Mobile Badger devices, and over exfiltrated data
 * all devices are privately owned by the surveillance officer (or organizer in
   case of bigger attacks)
 * devices log only technical events (required for troubleshooting, and only
   internally), but nothing more
 * target partitions (holding exfiltrated data) are encrypted, with up to 8
   independent access passwords
 * in case of physicall loss of the device, it can't be distinguished from
   regular Kali Linux Live without knowing the proper password

Of course, surveillance officer can still be held accountable for everything
that happens outside the devices themselves - especially if their actions are
recorded by cameras. Therefore, in each attack, there should be as little
improvisation as possible, and as many strictly planned and rehearsed actions as
possible.

Drive Badger: open source platform for covert data exfiltration operations,
supporting computers, servers, phones, tablets, photo cameras and most equipment
with USB port.
 * 
 * 
 * 
   

EXPLORE

 * Overview
 * Legal questions
 * Project history
 * News
 * How to start?

 * Security
 * Supported systems
 * Hardware
 * Encryption support
 * Troubleshooting

CONTACT US

 * Tomasz Klim Payload.pl
   ul. Święty Marcin 29/8
   61-806 Poznań, Poland
   NIP: 599-264-49-08
 * contact@drivebadger.com

© Copyright 2017-2022 by Tomasz Klim Payload.pl

This website uses cookies to create anonymous usage statistics. See our cookie
policy. Accept