SlideShare is now on Android. 15 million presentations at your fingertips.  Get the app

×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Bt tower v1.1

by on Dec 09, 2013

  • 353 views

During Waking Shark II, some impromptu testing was conducted against a very well-known 'core' Bank with test Phishing Attacks. Having located a user e-mail address, which was extracted from an object ...

During Waking Shark II, some impromptu testing was conducted against a very well-known 'core' Bank with test Phishing Attacks. Having located a user e-mail address, which was extracted from an object which had suffered some Data Leakage, with association with UK Government GSX account, it was simply a matter of sending them an email with a text like ‘Hi, we recently met as a Government Forum in London, and just wanted to get back in touch’ The response was almost immediate with a ‘Yes, probably, what can I do for you’. . It was that easy. The same deployment had also suffered having a connection in place, out to a .com.cn [Chinese set of Servers].
There is no doubt that when it comes to the Logical Environment being compromised, there is a lot of association with what the user does, or does not click upon.

This presentation looks at some of those issues:

Statistics

Views

Total Views
353
Views on SlideShare
353
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via SlideShare as OpenOffice

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

Bt tower v1.1 Bt tower v1.1 Presentation Transcript