SlideShare a Scribd company logo
1 of 89
SOCIAL ZOMBIES II
 Your Friends Need More Brains
Starring...
tom Eston
Robin
Wood
Kevin Johnson
Social Networks
   Where are we today?
350 Million Users
  (how many of these are fake?)
120 Million Login Daily
6.2 million joining Twitter
      every month
End of 2009:
75 Million Users
It’s all about trust...
Fake accounts? Orly?
Who is the most dangerous
 woman on the Internet?
Advanced
Persistent
Threat
What makes a
 Jessica Biel?
Thank You!


Prabhu Deva
    and
Nathan Hamiel
Lava Roll
  FTW
Still easy to exploit trust!
•   More difficult to tell a bot from a real
    account
•   Accounts are easy to create
•   Socnet User Verification = FAIL
    •   Twitter “Verified” Accounts?
•   Connections based on other “friends”
New Privacy Concerns
New Facebook Privacy
      Settings
•   Your info is even more open!
•   Your Name, Profile Picture, Gender, Current
    City, Networks, Friend List, and Pages are all
    public

•   “Suggested” settings are set to EVERYONE
•   Zuckerburg says users don’t want privacy...
Really?
Epic FAIL?
Blippy FTW
Blippy FTW
"I Joined BLIPPY and all I got
    was Jacked at the ATM"
            - Chris Nickerson (@indi303) via Twitter
What about the ultimate
     stalker tool?
Geo-Location Tracking
Blippy + Foursquare +
Facebook + Twitter +
LinkedIn = PWNAGE
Why the **** would Socnets
         do this??
“The more info you share...
...the more valuable you are”
Real Time Search FTW
How do pen testers and
  attackers use this?
     Thank you Social Networks!
Wealth of recon
              information!
•   Socnet Search Engines
•   Maltego (Twitter and Facebook)
•   Google Hacks
    •   site:facebook.com inurl:group (bofa | "bank of america")
•   Manual Searching
    •   Status Updates

    •   Real Time Search
Infiltrate a company with
     this information!
New Security Concerns
Koobface Evolving
•   Still the #1 socnet
    worm

•   Targets all major
    socnets
•   Socnet chat vectors

•   Now with CAPTCHA

•   Adobe/IE 0day, Zeus
    Trojans FTL
     *Screen shots via McAfee Labs/PandaLabs
Danger!
Social
Network
Applications
Months of Bugs!
• July 2009 - Month of Twitter Bugs (Aviv Raff)
• September 2009 - Month of Facebook Bugs
  (theharmonyguy)
• Vulnerabilities affecting over 9,700 Facebook
  applications
• Over half of vuln apps had passed the Facebook
  “Verified” Application program

• Six of the hacked applications in the “Top
  10” (Farmville and Causes!)
• Most could be used with ClickJacking to install
More than 218 million Facebook users
          were vulnerable!
Facebook Application
       Autopwn Demo
http://www.youtube.com/watch?v=chvwtGPkAIQ
Advanced
Social Network Bots
More Evil Twitter Bots
•   Bots that pull
    trending
    topics...post
    malware links
•   Used recently to
    promote warez like
    pirated movies
•   Easy to code.
    Twitter API FTW
Better Automated Tools

•   Tools are getting more reliable
•   CAPTCHA bypass built in, able to off load to
    outsourced solution
•   Automated tools are cheap!
    Why roll your own?

    (or get it for free via Torrent!)
What is it?


Command and control system
 running over social media
Written in Ruby as a
 proof of concept

Not optimized. Not stealthy.
Currently runs over:


     •Twitter
     • JPEG
     • TinyURL
And now...
Uses LinkedIn API to read
and write the Status field
Also new...
 Windows Support

Basic Ruby install with a few
    gems and off it goes
What’s Next?

Other media types, possibly non-
        HTML based.

    Please give suggestions!
New KreiosC2 Demo
http://www.vimeo.com/9295657
Third Party APIs FTW
SocNet APIs
• Social network
  APIs provide a
  wealth of
  information
• All the big ones
  offer them
   • Some play
      catch up
• We get to play
  with these APIs
Im'ma Let You Finish

• New front end for
  Social Butterfly
• KanyeWestify
  allows us to
  update your wall
Westify'ing someone
• Select a friend
   • Drop down helps
• Their wall now has the
  update
So what did we do?
•   Using the API, we grabbed the user's
    information

•   And their Friends' data

•   In this version we used the FQL
    queries from theHarmonyGuy

     •   Full backup of your account

•   We also used JS to brute force
    browser history

     •   We can map visited pages to user's
         of Facebook!

     •   Marketing FTW!
Have the undead won?
We need more brains!

 •   User education...yeah, it’s hard
 •   Better privacy controls
 •   End opt-in developer models
 •   Tighter control of APIs
Questions?

•   News, Research, Guides,Video’s
    SocialMediaSecurity.com
•   Download KreiosC2
    digininja.org
•   Follow us...if you dare
    @agent0x0, @digininja, @secureideas

More Related Content

What's hot

Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNutt
McNutt
 
Perfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, IrelandPerfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, Ireland
Ian Forrester
 
Inspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it peopleInspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it people
Parisa Mohammadpour
 

What's hot (20)

Charity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreCharity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon Creekmore
 
Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNutt
 
SOSM
SOSMSOSM
SOSM
 
Squiz Launch Presentation
Squiz Launch PresentationSquiz Launch Presentation
Squiz Launch Presentation
 
Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...
 
Craig's List Nonprofit Bootcamp
Craig's List Nonprofit BootcampCraig's List Nonprofit Bootcamp
Craig's List Nonprofit Bootcamp
 
Tech Trends
Tech TrendsTech Trends
Tech Trends
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
 
Norway real-2
Norway real-2Norway real-2
Norway real-2
 
Perfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, IrelandPerfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, Ireland
 
Social media what's going? v3 by Laurent François aka lilzeon
Social media what's going? v3 by Laurent François aka lilzeonSocial media what's going? v3 by Laurent François aka lilzeon
Social media what's going? v3 by Laurent François aka lilzeon
 
Inspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it peopleInspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it people
 
Dave McMurtry: Top Ten Social Media Marketing Mistakes
Dave McMurtry: Top Ten Social Media Marketing MistakesDave McMurtry: Top Ten Social Media Marketing Mistakes
Dave McMurtry: Top Ten Social Media Marketing Mistakes
 
Online 2012 presentation
Online 2012 presentationOnline 2012 presentation
Online 2012 presentation
 
Creative social learning
Creative social learningCreative social learning
Creative social learning
 
Increase Engagement at Your Event
Increase Engagement at Your EventIncrease Engagement at Your Event
Increase Engagement at Your Event
 
Responsible Journalism EPQ
Responsible Journalism EPQ Responsible Journalism EPQ
Responsible Journalism EPQ
 
Crowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi WorkshopCrowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi Workshop
 
The Pluses And Minuses of Google+ Plus
The Pluses And Minuses of Google+ PlusThe Pluses And Minuses of Google+ Plus
The Pluses And Minuses of Google+ Plus
 

Viewers also liked

Viewers also liked (9)

Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.
 
The 'selfie effect' in regular society
The 'selfie effect' in regular societyThe 'selfie effect' in regular society
The 'selfie effect' in regular society
 
Imagine Your Life Without the Internet
Imagine Your Life Without the InternetImagine Your Life Without the Internet
Imagine Your Life Without the Internet
 
The Power of the Selfie
The Power of the SelfieThe Power of the Selfie
The Power of the Selfie
 
The Art of the Presentation
The Art of the PresentationThe Art of the Presentation
The Art of the Presentation
 
Zombie PowerPoint by @ericpesik
Zombie PowerPoint by @ericpesikZombie PowerPoint by @ericpesik
Zombie PowerPoint by @ericpesik
 
The Three Lies About Your Age
The Three Lies About Your AgeThe Three Lies About Your Age
The Three Lies About Your Age
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the World
 
WTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionWTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx version
 

Similar to Social Zombies II: Your Friends Need More Brains

Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
Tom Eston
 
The Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi JacobyThe Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi Jacoby
Razorfish
 

Similar to Social Zombies II: Your Friends Need More Brains (20)

Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Social Media Dataset
Social Media DatasetSocial Media Dataset
Social Media Dataset
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
NPTs
NPTsNPTs
NPTs
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
Social Media and Crisis Management
Social Media and Crisis ManagementSocial Media and Crisis Management
Social Media and Crisis Management
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
The Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi JacobyThe Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi Jacoby
 
Digital Innovation in Asia
Digital Innovation in AsiaDigital Innovation in Asia
Digital Innovation in Asia
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Digital survival guide
Digital survival guideDigital survival guide
Digital survival guide
 
CIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
CIC IWOM Panel: Jiepang CEO David on The New Age of Social NetworkingCIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
CIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
 

More from Tom Eston

Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
Tom Eston
 

More from Tom Eston (16)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on Twitter
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit Framework
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Social Zombies II: Your Friends Need More Brains