Defense

Cybersecurity

Data Collection Architecture Tool

Modern reconnaissance tools are “noisy” and use predictable patterns, signatures, or probe types. This can lead to unreliable results due to defensive deception or blocking.  These tools also leave a large footprint on the targeted system's logs that can potentially provide leads back to the collection source.

To overcome these limitations, our DCA tool conducts slow scans from a large number of nodes scattered across the Internet, using obfuscation techniques such as proxy reflection and legitimate connection methods to remain “below the radar” of common IDS/IPS.  Our DCA tool is flexible, allowing for rapid customization to meet requirements.

  • Discreetly collects data without leaving a detectable trail
  • Flexible architecture can be customized to specific requirements

 

BackReturn to previous page

Contact Us

For more information about our Data Collection Architecture tool, please contact us today.