Whitehat Vigilante and The Breach that Wasn't HI-TEC July 26, 2012.

Slides:



Advertisements
Similar presentations
Information Gathering. Before an attack What information do we need? WHOIS details OS & web server details (NetCraft, whois.webhosting.info) DNS information,
Advertisements

Effective Assessment and Feedback
Mechelen - 06/02/2014 Telenet Security Day CYBER scrapings putting our 2 cents in.. Christian Van Heurck CERT.be coordinator CERT.be team.
Enhancing ethical culture through ethical decision-making Ethics training.
Research pt 3: Evaluating Websites. The web is like a car boot sale. There is a lot to choose from but not all of it is quality. Some websites are offered.
Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
Ethical Hacking: New Web 2.0 Attacks and Defenses HI-TEC 2011.
PRODUCT TOUR. OUR OBJECTIVES Present an overview of OffenderWatch Get you started right away Provide continuous support.
Prescription for Criminal Justice Forensics. The government has all but declared a national state of emergency regarding computer-related crimes and has.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Air Force Association (AFA) 1. 1.Disaster Recovery Plan 2.Plan to Recover 3.Legal Regulations 4.Cyberlaws 5.Computer Crime 2 AGENDA 6.Attacks on Networks.
ANTI- BULLYING WEEK CYBER BULLYING 16 – 20 November 2009.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
How to Respond to Disruptive, Threatening or Violent Behavior 2013 Presented by Scott M. Drucker, Esq. Arizona Association of REALTORS®
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Hands-On Ethical Hacking and Network Defense
1 Telstra in Confidence Managing Security for our Mobile Technology.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Vulnerabilities. flaws in systems that allow them to be exploited provide means for attackers to compromise hosts, servers and networks.
Cracking down on international cyberterrorism
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
Cyber crime & Security Prepared by : Rughani Zarana.
SX1009 & SX1509 Rights in the Digital Society Wendy Moncur / Phil Marston Dept. of Computing Science.
Background The value and importance adolescent girls place on their friendships has been well documented as has the prevalence of indirect aggression in.
Introduction to Computer Ethics
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Stupid Whitehat Tricks HOPE X July 20, How it Started 2011.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Cyber Security Nevada Businesses Overview June, 2014.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.
1 2 Mark Bowes, Safety Programs Coordinator 3 Life has changed Forever. Effective 9/11/2001 Effective 9/11/2001.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
Whitehat Vigilante BayThreat Dec. 10, Executive Summary This talk has no – Demos – Exploits – 1337ness It's just a sermon about social skills –
Computer crimes.
INTRODUCTION & QUESTIONS.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak Kevin D. MitnickWilliam L. SimonSteve.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Security Mindset Lesson Introduction Why is cyber security important?
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Potemkin Plans: What are the ethical duties of planners asked to give false assurances? Edward P. Richards, JD MPH Program in Law, Science and Public Health.
Full Disclosure: Is It Beneficial? Project Based Information Systems Tim Schultz 12/02/02.
Virginia RULES Teens Learn & Live the Law Crimes Against Persons.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Hacking: public policy
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Crimes Against Persons
Welcome to Milton’s Parts Express
Chapter 11 crime and security in the networked economy
John Butters Running Tiger Teams
How to build a defense-in-depth
Cyber Security in New Jersey State Government
Network Intrusion Responder Program
Hands-On Ethical Hacking and Network Defense
CRITICAL INFRASTRUCTURE CYBERSECURITY
Presentation transcript:

Whitehat Vigilante and The Breach that Wasn't HI-TEC July 26, 2012

Bio

Levels of Security Knowledge Theory – Book-learning Practice – Controlled hands-on projects – Controlled cyber-contests Underworld contacts Dangerous knowledge Accepting responsibility for real problems

Levels of Security Knowledge Real-world Security Work – Security officer – Law enforcement contacts – Underworld contacts – Confidential information – Responsibility for real problems

PBS Hacked

Attitudes

Blend In: Hide Image from presenceinbusiness.com

Make Your Own Rules Images from listentoleon.net & anpop.com

Cyber-Terrorists Masked Mobs Create fear Cause paranoia Intimidate critics into silence

Lone Vigilantes

Nobody's Right if Everybody's Wrong Buffalo Springfield image from freewebs.com

The Middle Way

Laws From cybercrime.gov

CISSP Code of Ethics

Cold Calls

Find Vulnerable Sites Dumped on Pastebin

Verify the Vulnerability Do NOT explore any further Actually injecting commands is a crime

Find a Contact Address

My Letter

Letter Design Simple management-level summary of the problem No technical details Give your real name & contact information Don't demand anything Don't make any threats

Pilot Study 3 days after notification 7/23 Fixed (30%) –

Student Projects Done by CISSP-prep students at CCSF Contacted over 200 sites with SQL injections > 15% of them were fixed

Major Breaches or Vulnerabilities

Breaches or Vulnerabilities I Reported FBI (many times) UK Supreme Court Chinese Government Police departments (many of them) Other Courts CNN, PBS Apple Schools (many of them)

I Sought Personal Contacts

CERT

Positive Results Several good security contacts inside corporations, law enforcement, and government agencies Many problems fixed, several before they were exploited

Negative Results A few of my Twitter followers were offended and suspicious when I found so many high- profile vulnerabilities so fast Accusations – Performing unauthorized vulnerability scans – Peddling bogus security services – Betraying the USA All 100% false & baseless

Ethics Complaint

Fortuitous Timing

Recommendations for Cold Calls

Be Respectful No abuse or criticism Sincere desire to help Accept being ignored without protest Demand nothing Respect their right to leave their servers unpatched

Be Right Report clear-cut vulnerabilities, widely understood and important, like SQL Injection Do nothing illegal or suspicious – No vulnerability scans – No intrusion or exploits – Report only vulnerabilities that are already published by others

Clarity of Purpose Genuine desire to help the people you are contacting No hidden agenda – Desire to sell a product – Desire to belittle or mock – Desire to dominate or control others – Plans to attack sites yourself – Revenge

Expect Abuse If you become visible in the hacking community, you are a target It doesn't matter what you say or do Many hackers are arrogant, insecure, and emotionally immature Cruelty, abuse, and bullying are common

Be Fearless Understand the importance of the sites you are helping Are they worth more than your – Inconvenience – Time expended – Exposure to criticism and humiliation

Acknowledgements I am very grateful for the support of CNIT, MPICT, and CCSF Especially – Carmen Lamha – Maura Devlin-Clancy – Pierre Thiry – James Jones – Tim Ryan It would be much simpler to just fire me than to support my mad actions

The Breach that Wasn't

Outside attacks Insider threat Deluded Insider Threat