Decision Group launches VOIP-DETECTIVE, VOIP interception and reconstruction tool in 2009. This tool is capable to capture, decode and reconstruct VOIP sessions (RTP sessions). It allows the play back of voice calls on network. Besides, all the voice calls content can be stored and backup for further reference purpose. The supported protocols include SIP (technology that is most commonly used) and H.323. The supported CODECs include G.729, G.711-a law and G.711-u law, G.723, G.726 and ILBC.
Supplier: E-detective, wireless-detective, VoIP-detective, network investigation toolkit (NIT)
Services: Network forensics and lawful interception total solutions provider
HTTPS/SSL Network Forensics Device (HTTPS/SSL Interceptor) is designed specially for forensics purpose where it is used to decrypt HTTPS/SSL traffic. It can be used by legal enforcement bodies, police, investigation units, forensics firms, government departments for tracking or monitoring suspects HTTP and HTTPS activities (through Internet). HTTPS/SSL Device has E-Detective web reconstruction function (HTTP Link and HTTP Content) integrated into the system which allow the administrator to see the web page content of normal and secured web page. HTTPS/SSL Interceptor can works in two modes: 1. Man in the Middle Attack (MITM); and 2. Offline Method (Decrypting HTTPS raw data with Private Key Available). In MITM method, it acts as a proxy to the targeted PC/suspect. All traffic from the targeted PC or suspect will be redirected to the HTTPS/SSL Interceptor. Therefore, it can collect the genuine certificate from SSL Server if the targeted PC access to the SSL Server. At the mean time, the HTTPS/SSL Interceptor returns with its own generated certificate. In this method, it allows the HTTPS/SSL Interceptor to decrypt the HTTPS traffic. In Offline Method, with the HTTPS raw data captured, HTTPS/SSL Interceptor is capable to decrypt the traffic if the private key is available. Login usernames and passwords like Google or Gmail login, Yahoo Mail login, ebay login etc. can be captured by the HTTPS/SSL Interceptor.
E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes and reconstructs various types of Internet traffic. It is commonly used for organization Internet and behavioral monitoring, auditing, record keeping, forensics analysis and investigation as well as legal and lawful interception for lawful enforcement agencies such as Police Intelligence, Military Intelligence, Cyber Security Department, National Security Agencies, Criminal Investigation Agencies, Counter Terrorism Agencies etc. It also provides compliance solution for many standards or acts like Sarbanes Oxley Act (SOX), HIPAA, GLBA, SEC, NASD, E-Discovery and many others. E-Detective is capable to decode, reassembly and reconstruct various Internet applications and services such as Email (POP3, IMAP and SMTP), Webmail (Yahoo Mail, Windows Live Hotmail, Gmail etc.), Instant Messaging (Yahoo, MSN, ICQ, QQ, Google Talk, IRC, UT Chat Room, Skype), File Transfer (FTP, P2P), Online Games, Telnet, HTTP (Link, Content, Reconstruct, Upload and Download, Video Streaming), VOIP (optional module) etc.
Wireless-Detective is a complete and comprehensive Wireless LAN (WLAN) legal interception and forensics investigation solution for the intelligence related units/agencies such as police, military, criminal investigation department, national security department etc. In fact, it is the most reliable solution to trace, identify all illegal Wireless LAN Internet activities or transactions and preserve all of this evidence. Wireless-Detective is the smallest and lightest WLAN forensics investigation tool available. It consists of a small laptop (12.1 inches monitor screen) with Linux base OS integrated with Wireless-Detective software installed. With that small size (mobility), forensic professional can easily carry it out to any places (such as restaurant, shopping mall, airport, café, hotspot etc.) for legal interception and forensics investigation task without the notice of the public and most importantly, the suspect/target won¡¦t know about it. With the capability to scan all WLAN channels (802.11a/b/g 2.4 GHz and 5 GHz frequency bands) to capture/sniff WLAN traffic from available Wi-Fi networks, decrypt WEP encrypted (WPA-PSK optional module) wireless network (automatically or manually), decode and reconstruct captured WLAN raw data, store the raw data captured and store the reconstructed data in its database, and display them in the original and exact content format, it make it the most complete (All-in-One) WLAN interception and forensic investigation tool. Furthermore, the Wireless-Detective user management interface or GUI (accessed through a browser) is very user friendly, easy to operate and manage. Wireless-Detective is capable of decoding and reconstruct WLAN Internet traffic in real time such as Email (POP3, SMTP, IMAP), Webmail (Gmail, Yahoo Mail, Windows Live Hotmail etc.), Instant Messaging/Chat (MSN/Windows Live Messenger, Yahoo Messenger, IRC, ICQ, QQ, UT Chat Room, Google Talk Gmail, Skype Voice Log), FTP, P2P, Online Game, TELNET, HTTP (URL Link, Content, Reconstruct, Download/Upload, Video Stream) etc. After the decoding and reconstruction of the captured traffic, it displays them in its menu list according to different protocol/category types in exact or original content format. With capability of search by keyword or search by parameter (conditional search), it allows further forensics investigation and analysis to be carried out. This has proven that Wireless-Detective is an All-in-One system (all WLAN investigation work is conducted in one machine) that can speed up the entire investigation process.
Performance and features: * SIP v1 (RFC2543), v2(RFC3261) * Support Route,Two 10/100Mbps MACs * Support T.38(Doing) * IP/TCP/UDP/RTP/RTCP * IP/ICMP/ARP/RARP/SNTP * TFTP Client/DHCP Client/ PPPoE Client * Telnet/HTTP Server * DNS Client * NAT/DHCP Server * Support G.723.1 5.3k/6.3k,G.729,G.711 A-Law,¦Ì-Law audio codec algorithm * Dynamic voice detection Echo cancellation Comfort noise generation * Tone generation and Local DTMF generation and detection according with ITU-T * Settings by HTTP web browser (IE6.0) * Advanced settings by Telnet * Voice prompt * Upgrade by TFTP * 2RJ45 Ports,Built-in Router,conference.Auto-provision or updating by HTTP,FTP or TFTP. * For each GT-P302,it can have 5-SIP account and one PSTN phone number,that means each phone own 6 phone numbers,all can be used as callee at anytime.Fo the caller,these 6 account can be selected by dial different relevant prefix(including switch to PSTN as an ordinary PSTN phone) * GT-P302 has a real FXO port to support router call from PSTN to VOIP or VOIP to PSTN. Main technical index: * Main chip: 32-bit RISC CPU with 125MHz clock rate * Data storage: 2MB SDRAM * Program memory: 1MB Flash memory * Application Network environment: Two 10/100Mbps Fast Ethernet MAC * Echo cancellation: G165 16ms * Store quick dial number: 100 * Record phone number of missed call: 80 * Power loss: 2.7W(max) * Power adapter: input AC 220V,output DC 9V 500mA * Employing condition: * Ambience temperature 0-40C(32-104F) * Relative humidity 10-95% * Atmosphere pressure 86-106Kpa * Overall size: 220, 170, 70mm(L, W, H). 220, 170, 70mm(L, W, H) 1.5kg.