Name: 5-Series

Text: -

-h

-.L

a

INT.ROD

5

X N G THE

a*,!-&I--

s

.Ilc

-

-"-

Yq

1

+
c

C

L*r

networks. Designed for defense and (c~,lnW]
y are fully-embedded without mating parts and
ks m8 p m r foaQrintSsi aU ewstc1rnize$"
inutes, they can be configwad and installed'
-,-f existing nefwnrk topotag~.Capabilities include: Keyword, 'RMiUS,
ion identif~ation;Mtering. moditicatian,and injection of packets;
ng collection systems. With this modu!asplakfbrm, Packet forensics
IL-creaksmission packages based on
customet requiwmb.
Bf all, thejre
so cost eR&ve, t
h
e
n
2 dis~mbl.e--tbt

I

4:

'---3

Introduction
The Ei-Series is a turnkey Enterrnpt solution
in an appliance platform. Uffering the most
flexibte approach to network surveillance
and novel approaches to rapid deployment
and stealthy reporting of captured data.
the 5-Series devices are unmatched in the
industry.

An attractive feature of the fi-Seriesis
its ability to passive& discover network
topiogy--this allowz an individual to
depIoy it wlth no prior knwvledge of the
target network. The device can be placed
in-tine and immediately act as a passive
bridge while performing its mission.
As intelligenceis being gathered and
the device has an understandingof the
network. it uses its stealth reparting
techniques to return captured information
or accomplirh a variety of other missions.

tapologicatly behindit. The 5-Series

can be used to intercept and recad
matching d o n s to intentat fktshmemory, or report ttrern upstfegmusing
a variety of fmt(pt&. In the most hostile
environments, this upstream reparting can
be aaccornptishedusing a technique W
makes the 5-Series'presinse undektable
using standard network security mcethods,
The 5-Series is an ideal solution to the
"Internet Caie Pro$lem.' Quick d
e
p
m
e
n
t
and remote control minimize personnet
risk and m
m
ze
axii
~ ~ t b d mpabitities.
on
Small footprint and minimal power
requirements make installation easy,

Solvina the lnternet Cafe Problem

_ _ -.

_.

Key Advantages

The 5-Series has no MAC adbnws or P

ad-;
it dynamically m q u w a d e s
as the most appropriate host that sits

ThelntwnetCafe

-- -. -. -. -. -. -. _ _

Intercepted content is relayed covertly via a "Digital Dead Drop."
somewhere on the Internet, sent out-of-band via 36 network or
sent using the existing lnternet connection directly to the LEA.

WireLessAP

-

I

Customized mission packages
Small form-factor, solid-state [as
small as 4 square inches]
No moving parts, highly reliable
Battery, PoE o r wired power
Hardware bypass, fail-safe
Tamper detection, fail-secure
Up to Gblsec throughput
Deployable with no knowledge of
target network topology
Supports stealth upstream reporting
[practically undetectablel
"Digital Dead Drop" delivery
Triggers intercepts based on
keywords, RADIUS, DHCP, behavior
or other subject criteria
Probe and Mediation capabilities
Performs dialed digit extraction
Packet modification, injection and
replay capabilities
Packet Forensics software stack and
PeerTalkTMtechnology
Advanced firmware-update keeps
software up-to-date

4

z

fikring, remote pcket injection, traffic
teptay and literal&T k o h n d s m m .

Advanced Policy Regime
The Packet Forensics policy regime
allows multiple policies to operate
simultaneously on the entire data

For technical experts, an advanced

stream. This means while you search

policy editor is provided. You can

for thousands of different strings

craft your own applications and take

deep inside each packet, you can also

granular control over a l l packet
processing functions.

intercept VolP calls, extract dialed

a

digits and correlate RADIUS and
DHCP Log-ins with IP addresses. Each

Simple Scalability

policy can have different resulting

With the Packet Forensics multi-

actions, such as forwarding packets

platform graphical user interface,

to another analysis system or writing

scaling an installation is as simple

pen register-type Logs. Packet

as stacking additional equipment,

Forensics provides many powerful

plugging it in, and clicking on a few

applications such as transparent web

buttons authorizing i t to execute your

-m

t0.E fU X 4.5 W
I f X l -75 [M

Custom S i W l a b t e
S i n Flash. Memory

SeridfkmdewithCiJ
S5H Remcrte Managment
Multi-&Ell~
u
,

g&
PACKET FORENSICS

s

~

PACKET FORENSICS

4 2 0 S S M I T H RD

TEMPE, AZ 85281 U S

+lI7571 3 2 0 - 2 0 0 2

WWW.PACKETFORENSICS.COM

-

/"

i

Document Path: ["brochure407.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh