Ecuador Senain

SENAIN (Secretaría Nacional de Inteligencia) bought 0 days exploits to HackingTeam through a Colombian partner Robotec (http://robotec.com).

Is well know that president Rafael Correa's government persecute any citizen, journalist or politician that is not in favour of his government and he is using HackingTeam technology to spy on the journalist and politicians critics of his government.

Big Brother is watching you.

George Orwell

In a time of deceit, telling the truth is a revolutionary act.

George Orwell

Be safe online

http://www.hubbardtwppd.org/Homeland/online.htm

Robotec Colombia

Teléfono: +571 516 9651

ventas@robotec.com

People related to SENAIN and HackingTeam

Hugo Ardila <hardila@robotec.com> skype hardila

elmarcopoloh@yahoo.com

Luis Solis <luis.solis@sin.gob.ec> skype beto.solis

Cristian Vardaro <websense@senain.gob.ec>

Natalia Herrera Monteros <natalia.herrera.monteros@gmail.com> CI 1717743452

RC server data

181.39.56.226

nic-hdl: SEL

person: Tomislav Topic

e-mail: hostmaster@TELCONET.NET

address: Kennedy Norte MZ, 109, Solar 21

address: 59342 - Guayaquil -

country: EC

phone: +593 4 2680555 [101]

created: 20021004

changed: 20100921

Starting Nmap 6.40 ( http://nmap.org ) at 2015-07-11 21:32 ART

Nmap scan report for 181.39.56.226

Host is up (0.45s latency).

Not shown: 97 filtered ports

PORT STATE SERVICE VERSION

80/tcp open http Lotus Domino httpd

1723/tcp open pptp Clavister (Firmware: 1)

3389/tcp open ms-wbt-server Microsoft Terminal Service

Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port

Aggressive OS guesses: Microsoft Xbox game console (modified, running XboxMediaCenter) (95%), Vodavi XTS-IP PBX (94%), Samsung SCX-4x24-series printer (92%), 3Com SuperStack 3 Switch 3870 (90%), Crestron XPanel control system (90%), Netgear DG834G WAP or Western Digital WD TV media player (90%), Aastra A510 VoIP phone (90%), Nintendo Wii game console (88%), HP ProCurve 2524 switch or 9100c Digital Sender printer (88%), Motorola SURFboard SB5120 cable modem (VxWorks 5.4) (88%)

No exact OS matches for host (test conditions non-ideal).

Service Info: OS: Windows

--

2012-11-15 13:58:00

asordo@ibl.mx

info@hackingteam.com

Info RCS To whom it may concern

I represent a company based on Querétaro, México that sells all kind of technology to local and foreign government entities. We are very interested in the Da Vinci system; we know you offer it in México thru a local company, however our business is abroad (Ecuador)

--

2012-11-19 09:22:30

ardila.hugo@gmail.com

demo

Hello Max:

After speaking with the customer - SENAIN- they are looking for the demo

monday 26 of November in Quito. So, I am scheduled to go there from sunday.

25 of November.

The customer is asking to read on smartphones the most popular instant

messaging applications (What's Up and Viber) please confirm if those

capabilities are available.

Regards

Hugo

Enviado desde mi BlackBerry de Movistar

--

2012-11-22 09:35:38

Hardware for the System in Ecuador

Ciao Daniele, as you can see from the mail below our partner Robotec (colombia) has a potential opportunity in Ecuador.Main issue is that if the deal is successful the client wants the delivery by the end of the year.The partner is asking if they can manage it with our support from remote.Fyi: they already sold in panama and they constantly give support to the client. Please let me know your opinion on this. Thx,Max

--

2012-12-08 20:23:35

hardila@robotec.com

Dear all:

Thank you for your suppport during the test. Now I will explain more freely the outcome of the test:

1) The demo was performed at the residence of Pablo Romero - the Director of the Intelligence Agency of Ecuador - Senain. He was with two engineers that work as advisors (Jose Miguel Delgado - Technical Director of Senain + Other engineer whose name was not provided that flew from Quito for this specific meeting).

2) Seems that they were convinced that the platform is real and does that needs to do, but now they want a more specific information about the following:

2.1) Program of training: More formal: Objectives, time frame, pre-requisites, hours taken, etc.

2.2) How can they be assured that this solution is not being sold to private organizations?

2.3) They want a remote infection approach, but also they liked the tactical approach of the competitor, where they can use one U3

--

2013-06-20 21:53:20

Re: Questions from Customer in Ecuador

Hi Marco, Giamcarlo, Alex and Daniele, I hope you are doing well.

The customer asked us to travel tonight to Quito to meet them at its HQs to negociate the final terms of the contract and therefore getting the advance payment. (Meeting Friday 21th of June)

We kindly request to stay on stand by basis tomorrow during our morning to ask you questions and perform consultations that allow us to sign the deal.

JAIME CAICEDO our general manager is personally travelling to see the director of the agency, Pablo Romero, customer's technical Director Jose Miguel Delgado and Senain Legal Counsel.

Thanks for your cooperation.

Regards

Hugo Ardila

Director Defensa y Seguridad Nacional

Robotec Corporation

--

2013-08-08 11:41:31

Request of Webinar

Hello Hugo,

just to better clarify one important aspect, the person in Colombia is one

of our Field Application Engineer from Milan.

We don't have a FAE in the Americas.

Regards,

Massimiliano

--

2013-08-08 11:45:26

Request of Webinar

Dear Max:

I just spoke with the customer. They accepted to have the webinar Thursday

22nd of August. Please confirm that date.

Regards,

--

2013-08-30 08:50:39

Alert per Nuovo Ordine Inserito - Senain Ecuador

Portale HackingTeam Senain Ecuador has been added

Prezzo: € 610.000,00

Last Modified 30/08/2013 10.48 by Marco Bettini

--

2013-08-30 18:16:40

Saludos

juan.guerrero@senain.gob.ec

--

2014-03-20 19:20:19

[!BFM-656-56034]: Exploit Word

SENAIN updated #BFM-656-56034

Status: Closed (was: In Progress)

Exploit Word

Ticket ID: BFM-656-56034

URL: https://support.hackingteam.com/staff/index.php?/Tickets/Ticket/View/2439

Name: Natalia Herrera Montero

Email address: natalia.herrera.monteros@gmail.com

Creator: User

Department: Exploit requests

Staff (Owner): Bruno Muschitiello

Type: Issue

Status: Closed

Priority: Urgent

Template group: Default

Created: 18 March 2014 09:40 AM

Updated: 18 March 2014 10:35 AM

Staff CP: https://support.hackingteam.com/staff

--

2014-03-20 18:49:36

[!CRV-878-90152]: Exploit 02

SENAIN updated #CRV-878-90152

Exploit 02

Ticket ID: CRV-878-90152

URL: https://support.hackingteam.com/staff/index.php?/Tickets/Ticket/View/2440

Name: Natalia Herrera Montero

Email address: natalia.herrera.monteros@gmail.com

Creator: User

Department: Exploit requests

Staff (Owner): Bruno Muschitiello

Type: Bug

Status: In Progress

Priority: Urgent

Template group: Default

Created: 18 March 2014 09:48 AM

Updated: 20 March 2014 01:49 PM

Thanks,

The exploit works fine,

finally we need 5 .docx zeroday with the same document word.

Kind regards

Staff CP: https://support.hackingteam.com/staff

--

2014-03-26 15:28:18

[!AHO-671-73267]: Assignment - Exploit docx

Bruno Muschitiello updated #AHO-671-73267

Staff (Owner): Bruno Muschitiello (was: -- Unassigned --) Status: In Progress (was: Open)

Exploit docx

Ticket ID: AHO-671-73267 URL: https://support.hackingteam.com/staff/index.php?/Tickets/Ticket/View/2479 Name: SENAIN Email address: luis.solis@sin.gob.ec Creator: User Department: Exploit requests Staff (Owner): Bruno Muschitiello Type: Task Status: In Progress Priority: Urgent Template group: Default Created: 26 March 2014 04:22 PM Updated: 26 March 2014 04:28 PM

Here is the rar file containing the infecting document.

Please check if everything works properly, and if you receive logs from the real target.

Since the infection is one-shot, remember to not open the document inside the .rar in your lab!

Additional information:

Here some details on how the exploit works. Protected mode for Microsoft Office is a security feature that opens documents coming from potentially risky location, such as internet, in read-only mode and with active content disabled and it works by taking advantage of a functionality built in the Windows operating system called Alternate Data Streams that allows to mark a file to indicate where it comes from.

When you download a file using a modern browser the file is tagged as coming from internet and that's why MS Office opens it using Protected Mode.

A simple way to get around this problem is to send the document in a rar container. This way the .rar file will be tagged as coming from internet but the file contained in the rar won't have the tag attached to it.

Kind regards

Staff CP: https://support.hackingteam.com/staff

--

2014-03-26 16:24:50

luis.solis@senain.gob.ec

RE: TeamViewer Password

Try with Noespos1Bl3.# or lacasita2014

--

2014-04-04 08:38:19

[!XDW-180-45671]: Licence

SIN updated #XDW-180-45671

Licence

Ticket ID: XDW-180-45671

URL: https://support.hackingteam.com/staff/index.php?/Tickets/Ticket/View/2518

Name: SENAIN

Email address: luis.solis@sin.gob.ec

Creator: User

Department: General

Staff (Owner): Bruno Muschitiello

Type: Feature Request

Status: In Progress

Priority: High

Template group: Default

Created: 03 April 2014 04:09 PM

Updated: 04 April 2014 03:38 AM

Cool, don't forget the licence please.

Kind Regards

Staff CP: https://support.hackingteam.com/staff

--

2014-04-11 14:10:44

[!AHO-671-73267]: Exploit docx

IN updated #AHO-671-73267

Exploit docx

Ticket ID: AHO-671-73267

URL: https://support.hackingteam.com/staff/index.php?/Tickets/Ticket/View/2479

Name: SENAIN

Email address: luis.solis@sin.gob.ec

Creator: User

Department: Exploit requests

Staff (Owner): Bruno Muschitiello

Type: Task

Status: In Progress

Priority: Urgent

Template group: Default

Created: 26 March 2014 10:22 AM

Updated: 11 April 2014 09:10 AM

Hello,

Just a question, with the new update of flash player, their 0-day exploits are functional? or we need news exploits?

because we send several zero days to the targets.

Thanks

Staff CP: https://support.hackingteam.com/staff

--

2014-04-11 14:10:45

[!AHO-671-73267]: Exploit docx

SIN updated #AHO-671-73267

Exploit docx

Ticket ID: AHO-671-73267

URL: https://support.hackingteam.com/staff/index.php?/Tickets/Ticket/View/2479

Name: SENAIN

Email address: luis.solis@sin.gob.ec

Creator: User

Department: Exploit requests

Staff (Owner): Bruno Muschitiello

Type: Task

Status: In Progress

Priority: Urgent

Template group: Default

Created: 26 March 2014 10:22 AM

Updated: 11 April 2014 09:10 AM

Hello,

Just a question, with the new update of flash player, their 0-day exploits are functional? or we need news exploits?

because we send several zero days to the targets.

Thanks

Staff CP: https://support.hackingteam.com/staff

--

2014-04-28 15:38:30

[!AHO-671-73267]: Exploit docx

SIN updated #AHO-671-73267

Exploit docx

Ticket ID: AHO-671-73267

URL: https://support.hackingteam.com/staff/index.php?/Tickets/Ticket/View/2479

Name: SENAIN

Email address: luis.solis@sin.gob.ec

Creator: User

Department: Exploit requests

Staff (Owner): Bruno Muschitiello

Type: Task

Status: In Progress

Priority: Urgent

Template group: Default

Created: 26 March 2014 10:22 AM

Updated: 28 April 2014 10:38 AM

Hello,

We send the links to the targets but do not click, We need try with zero-day docx, please help me with this.

Question about evil upgrade

We hava a target that use mac pc, but we can't access your pc, there is the possibility to send a link with fake udate? for example iTunes, etc.

Thanks

Staff CP: https://support.hackingteam.com/staff

--

2014-05-20 18:28:49

Re: Ecuador POC on Apple devices

Sorry we have the same problem when a new jailbreakable Major is released: we must buy a device as soon as possible to be sure the ios shipped on the idevice will be supported by rcs. The only chance is to courtesy ask the seller which ios is running on the phone.

--

2014-05-20 15:34:29

Ecuador POC on Apple devices

Hi,

As requested during a call with Alex and Marco,

SENAIN (Ecuador) wants some magic next week, but we are not there to do

that.

The target and, as far as I understand, of their request, is a

demonstration of that RCS works and they want to see their system

working on the platforms they bought.

I have a Windows 7 laptop, an Android 4.1.2 phone and a BB6.

I can reject demos on WinPhone as I have no certificate to do that.

What I don´t have as explained in call is an iOS with jailbreak and

supported OS version, neither a OSX device to perform such tests, and

don´t think they have.

So, as asked in my email sent 12/05/2014 to you, how we do manage this?

Hugo requested me a skype call this evening to arrange the next week

meeting.

Thanks

Sergio Rodriguez-Solís y Guerrero

Field Application Engineer

Hacking TeamA

--

2014-05-31 13:22:34

Report of week with SENAIN in Ecuador

Hi,

This is just brief report cause you will have a better detailed one. Local partner worried about listing all activities performed and making clients sign in order to demonstrate systems work cause they were claiming it doesn´t.

Monday we were doing tests ourselves, parters, Alex and me, on Windows, OSX, BB, Android and iOS.

Rest of the week, with client, we have tested with their own platform, almost all available infection vectors of the platform.

Main problem there, is that only one person of the team (Luis Solís) got the original training and he has not much idea, and of course has no trained the new guys that are doing their best, at least a couple of them. He was not very cooperative and was not paying attention to me and my awesome explanations.

Captain Macarena, direct leader of the team, is, politely speaking, a very proud of her own knowledge lady that wants magic buttons and infections done as send exploit and get info in minutes.

Her Major looks more comprehensible, so lets see. While I was training, testing and supporting.

Alex won Major´s heart first day with his presentation, and then Major started thinking on ideas and asking about using other tools they have that would support operations, like fake GSM BTSs to send spoofed SMSs. And, apart from this, Alex and partner were managing at Ministry level to let them understand everything works and that they need to build a team of people that cooperate in all areas of investigation pre, during and post infection.

To sum up:

system works people is now more trained, at least the privates analysts were trained (and introduced into correlation to make them ask their bosses for it ;) ) people of client that saw FinFisher demos told us that they fail a lot even in demos.

So, once more, we did the job. Thanks a lot to all of you for supporting me with the doubts, and to Andrea, Alor, Kiodo, ... and probably more.

As soon as partner sends Alex and/or me the scanned and signed report, we will forward it to you.

Regards

--

2014-05-12 16:21:12

Hi,

@MarcoC

I´ve been checking the POC doc. I just suggest to change monitor resoltution to 1280x800. Just a typo. And I have a couple of questions:

In drug dealers example, does "Visiting a linked previously setup, infection of the smartphone is fast and flawless." means the standard QRcode/URL for smartphones or is another thing? Is just drug dealing the only scenario?

@ALL

Things in Ecuador have change and only one technician remains there from the time they bought the system. We can´t count on him as he will say or do what new bosses decide because he saw all his colleagues moved or fired.

Daniele and me had a phone conversation with SENAIN´s capitana that we considered successful. Now she says she is unhappy with that.

From my point of view, we have to consider them hostile and not really wanting things to work.

Now, what they want us to do there. You are focusing it as a "standard" POC, what is a presales activity, but this is not presales, is postsales, with people that knows, at least something, about the product, and that are unhappy with it (with or without reasons).

They asked 3 things:

That HT comes to Ecuador to demonstrate ON SITE in tests of infection of PCs / Smartphones and demonstrate that RCS works as promissed in all the platforms sold. That HT checks the log file of the platform to verify what has been done with RCS from the moment of delivery. Once 1) and 2) are met, they will be willing to purchase more training, the "Connector" module, and expand the functionalities

and targets to the current platform, and also buying a 2nd system.

First point is what we are talking about in this email.

Second is something I do not understand: do they want us to tell them their historical use of RCS reading logs? what is the purpose of that?

Third is another topic for future.

Focusing on infection demos:

SENAIN has next platforms: Windows, OSX, Android, iOS, Blackberry, WinPhone, WinMobile and Simbian.

From my point of view, we can forget about WinMobile and Simbian, and we can explain that Blackberry is only supported for v5 & v6 while v10 is under development.

What I understood from their emails is not that they want a POC, or not a standard presales one. They want a demonstration of every single infection vector based on the platforms and tools they purchased. I don´t think they are now worried about scenarios.

That makes as target:

Local installation: Blackberry, iOS Installation package: Android, Blackberry, iOS, WinPhone Melted application: Android Wap-Push: Android, Blackberry QR / URL: Android, Blackbberry Exploit: iOS

That, regarding phones, sum 12 infections and that, if we not consider different kind of messages in Wap-Push menu.

For desktop is almost the same but just with windows and OSX:

Silent installer: Win, OSX

Melted application: Win, OSX

Offline installation: Win (USB), OSX (CD)

Exploit: Win (Office and IE)

Network Injector: (EXE, Youtube, URL, Replace)

Summing 12 infections.

Total with desktop and mobile: 24

As told, I don´t think they are worried about scenarios but about if RCS is able to do what we says. Why we have to demonstrate it, we have not to, but we don´t want to loose a client or have a bad report about us shared with other countries.

So question is: have we sincerely clear what are we going to do in Ecuador and which is our target?

Thanks a lot

--

2014-05-12 16:21:12

Sergio,

Although these are clients and, supposedly, should have at least a minimum understanding of the product, seems that they don’t know exactly what they want. What they probably want is not seeing an example of all possible infection vector, but:

See that RCS can be used as they expect, and we can show it by demonstrating how it can work in the proposed scenario Learn how to use RCS, which can happen during a training to be scheduled

It is in our interest to approach this POC (or however we want to call it) in a way that will give us a chance to show the potentials of RCS, and I believe that performing a series of infections is not a meaningful way to do so.

About your questions: “Visiting a link perviously setup” is just a way to show how quickly you can infect the device if you have it in your hands, and yes I am referring to the standard QR/URL I think that one scenario is enough. It is anyways just a starting point. Symbian and Windows Phone require certificates to install the Agent. It is long and complicated to get a certificate for Windows Phone and it is impossible to get a certificate for Symbian. So, if they don’t have them already, these platforms cannot be tested on their System. They can be shown on a demo chain, with the proper preparation.

Ciao, M.

--

2014-05-12 14:47:33

Hi Marco,

You are right, I think present people related with RCS in SENAIN do not really know what they have in their hands and, as you said, Preparing it as a scenario could help.

Thanks for the explanation and, regarding QR, which application do you suggest for that? because both I hav in my demo chain samsung access the link but do not start the download, just remain as freeze. Only works if opening link with Chrome or Android default Browser

Thanks a lot

--

2014-05-14 11:48:41

[!NFV-855-70601]: HTML exploit

SIN updated #NFV-855-70601

HTML exploit

Ticket ID: NFV-855-70601

URL: https://support.hackingteam.com/staff/index.php?/Tickets/Ticket/View/2599

Name: SIN

Email address: luis.solis@sin.gob.ec

Creator: User

Department: Exploit requests

Staff (Owner): Bruno Muschitiello

Type: Issue

Status: In Progress

Priority: Normal

Template group: Default

Created: 22 April 2014 12:45 PM

Updated: 14 May 2014 06:48 AM

Sorry, the final request with agent updated to 9.2.3

http://www.anonynews.info/2014/04/la-vida-de-los-otros-en-manos-de-este.html

http://www.anonynews.info/2014/04/asi-piensa-el-espia-rommy-vallejo-del.html

http://www.eluniverso.com/2012/06/05/1/1422/policia-investiga-origen-avioneta-hallada-santa-elena.html

http://www.hoy.com.ec/noticias-ecuador/sarango-jimenez-villavicencio-y-figueroa-abandonaron-sarayaku-606277.html

We need a redirect

Staff CP: https://support.hackingteam.com/staff

--

2014-05-31 12:59:34

URL Exploit "feedback"

Hi,

Attached is a picture of the response that a target gave to a

technician of SENAIN after sending her a URL exploited.

She analyzed it and returned with a WTF are you sending me and the

picture.

I asked client for the picture. Manage this picture and share it

with whoever you consider.

Regards

Sergio Rodriguez-Solís y Guerrero

Field Application Engineer

Hacking Team

Milan Singapore Washington DC

www.hackingteam.com

email: s.solis@hackingteam.com

phone: +39 0229060603

mobile: +34 608662179

--

2014-08-25 10:02:38

[!POQ-206-65880]: Assignment - WARNING: Message may contain malicious content

Cristian Vardaro updated #POQ-206-65880

Staff (Owner): Cristian Vardaro (was: -- Unassigned --)

Status: Closed (was: Open)

WARNING: Message may contain malicious content

Ticket ID: POQ-206-65880

URL: https://support.hackingteam.com/staff/index.php?/Tickets/Ticket/View/3136

Name: websense

Email address: websense@senain.gob.ec

Creator: User

Department: General

Staff (Owner): Cristian Vardaro

Type: Issue

Status: Closed

Priority: Normal

Template group: Default

Created: 25 August 2014 10:13 AM

Updated: 25 August 2014 10:40 AM

The message sent to luis.solis@sin.gob.ec on Mon Aug 25 03:13:15 2014 may contain malicious content.

Sender: support@hackingteam.it

Subject: Lost password request for HackingTeam helpdesk

Policy name: Inbound Default

Rule name: Anti-Spam

Action on the message: drop

Staff CP: https://support.hackingteam.com/staff

--

2014-11-03 09:26:08

Problem installing 9.4.0 collector

Ciao,

SENAIN (Luis Solís) is was being helped by Daniele yesterday to

install RCS Collector. Problem still happening and this morning I

have been trying what Daniele already did because Luis was asking

for help.

Problem is that installer says that system can be installed just

in Win Server 2008 r2. I think problem is that they have 2 servers

with Master Node hardware requirements, so Collector server is

Enterprise, not Standard and, maybe that could be the problem.

Any idea about how to solve it?

Today I´m departing to Morocco so I can work on it just for a

little while.

Just in case, his skype is "beto.solis" and his email

luis.solis@sin.gob.ec

Anyway I will stay a bit longer around here

Thanks a lot

--

2015-01-30 10:59:14

Re: Follow up on Colombia and Ecuador

Hello Marco:

Thank you for your contact. I was just telling Alex about the need to

have Eduardo´s support to the proper follow up of the leads found

during our exhibition in Colombia at the Trade Show "Expodefensa"

Customers:

Senain - Ecuador

Comaco - Ecuador

--

2015-03-27 15:29:34

Reporting two support activities SENAIN and PHANTOM

Ciao,

Yesterday I got a skype message from SENAIN (Ecuador). Luis Solís was trying to perform a persistent installation of android agent on a S4 Mini I9192 with Android 4.2.2 but was not getting success. I told him that next version is improving and coming probably next week. Meanwhile he tried with Installation package and its working.

I already created a ticket about that.

Is there any special procedure to know about persistent isntallation for Android?

Today I got a whatsapp message from Chile (PHANTOM client) they told me they were traveling to an operation scenario where they would probably have access to phone and computer but they only have TNI with them. I asked if somebody was in office to generate vectors and deliver them to the traveling team, but all team was traveling so I just suggested to try to use target computer to be infected with TNI and forget about the phone.

None of the activities were more than 15 min.

Thats all folks

--

2015-04-29 12:34:03

Re: Visita en Robotec

hardila@robotec.com

Estimado Philippe

Muchas gracias por tu visita. De nuestro lado también consideramos que fue productiva y provechosa. Hablamos con Luis Solis, el operador de Senain para establecer la situación de su requerimiento. Acordamos que hablara con su Jefe, Paul Lopez y volverá a nosotros con la información. Te mantendremos informado.Saludos

--

2015-05-11 16:48:10

SENAIN Ecuador

Ciao,

Luis Solís is going to generate a ticket about something he just asked me through skype.

In case his question is not clear, what he wants is the procedure to change the public IP of a collector.

I answered he has to change it in firewall and reboot collector. Then check in console that it has new IP and last apply change to the chain.

In case change is not applied in frontend, move annons out of the chain, select collector, delete it. Reboot collector. Check new ip is ok. Add annons again and apply changes.

Let me know whatever you need and much more important, if I was wrong.

Best regards (and welcome to Enrico!)

--

2015-05-11 17:02:43

Re: SENAIN Ecuador

Ciao

Bruno,

He may need that support, but he never told me about it. Try

giving him just the explanation, then if needed, the remote

connection for support.

He told me that they want to change public IP because they think

somebody would be scanning the present public IP they have.

I suggested to keep that IP with a regular PC to study who could

be scanning, if it is happening.

Regards

--

2015-05-11 17:21:35

Re: SENAIN Ecuador

Hi Sergio,

there is no need to change the collector ip if everything is configured

correctly.

The firewall rules imply that nothing can pass thru the firewall, just

connections from the first anonymizer.

If it's not their case, they need to fix it as soon as possible,

otherwise maybe we can just explain and avoid this not so trivial operation.

What do you think?

Regards,

Fabio

--

2015-05-14 07:15:30

Nuova offerta - 20150514.009-1.MB

Cliente:

Senain Ecuador

Partner:

Robotec

Tematica:

13 - offensiva

Prodotti:

€ 200.000,00

Servizi:

€ 100.000,00

--

2015-06-25 16:09:44

Re: SIPOL and SENAIN today's activities

Ciao Ale,

You may want to delete them. They were postponed again until further notice.

For now, just the Demo for Ecuador new prospect for the 9th of July. As tentative.

There would be the Chile visit but we are still waiting for partners confirmation.

Thank you,

Eduardo Pardo

Field Application Engineer

Hacking Team