RCS on a low bandwith What happens if an agent is running on a device with very slow Internet connection? An improper configuration may lead to loss of the Agent. If you use all the bandwidth available, the Target will notice. An Agent that produces too much evidence may be unable to transfer it. EMPYRICAL TESTS Test on a low bandwith A Windows target has been infected, but the bandwith available to the agent is limited to 3 kB/s The following modules can be freely used in a low bandwith environment: • Device • Position • Addressbook (21 contacts in few seconds) • Application • Calendar • Chat • Clipboard • Keylogger • Password • URL Test on a low bandwith The following modules need particular attention when used in a low bandwith environment: • Camera + Screenshot • Medium quality: 50 seconds to sync one evidence • Low quality: 25 seconds to sync one evidence • • ADVISE: use low quality and never take more than 1 screenshot or camera per minute Call • Quality 5: 3 minutes to sync 46 seconds of call • Quality 1: 1m50s to sync 46 seconds of call (still good quality) • • CAUTION: avoid or use for a very limited period of time; use lowest quality File • Easy calculation: the bigger the file the longer the synchronization time • 12 minutes to sync a file of 1Mb • CAUTION: absolutely avoid downloading more than 3Mb in files Test on a low bandwith The following modules need particular attention when used in a low bandwith environment: • Mail • In a test mailbox, in one month 75 emails have been received. Limiting the agent to collect emails <=50kB in size, it took 20 minutes to synchronize all emails received in the last month • ADVISE: start syncing only one day of emails, then slowly increase the timeframe according to your needs. Keep a low maximum size limit. • Mic • It takes 1m50s to synchronize 1 minute of recording • CAUTION: avoid or use for a very limited period of time EXAMPLE CONFIGURATIONS First Configuration This configuration is to be used for the first infection: • Device only • Sync every 15 minutes • Limit bandwith to 3kB/s The device module will give you the basic information to understand what kind of device has been infected. A 15 minutes period between syncs will give you the chance to promptly change the configuration when needed. First Configuration Second Configuration This configuration will include all evidence that is known to work without issues on a low bandwith target: • Device, Position (every 5 minutes), Addressbook, Application, Calendar, Chat, Clipboard, Keylogger, Password, URL • Sync every 30 minutes • Limit bandwith to 3kB/s Most of the useful information that can be obtained from an infected device is collected. A 30 minutes period between syncs will prevent bandwith saturation, thus allowing to change the configuration in reasonable time. Second Configuration Third Configuration This configuration adds the retrieval of emails to the Second Configuration. It starts collecting emails smaller than 50kB and up to 2 days old. • Device, Position (every 5 minutes), Addressbook, Application, Calendar, Chat, Clipboard, Keylogger, Password, URL, Mail • Sync every 60 minutes • Limit bandwith to 3kB/s A longer period between syncs will minimize the use of bandwith from the agent. Third Configuration Third Configuration You can evaluate to collect email bigger than 50kb and in intervals longer than 2 days. Check how many email were collected for the last two days. Configure the agent according to the following table to collect email from the past: Collected emails Days to collect 50+ 1 day 30-50 2 days 15-30 3 days 1-15 5 days Be very careful when configuring a new Agent!
© Copyright 2026 Paperzz