SlideShare a Scribd company logo
1 of 89
SOCIAL ZOMBIES II
 Your Friends Need More Brains
Starring...
tom Eston
Robin
Wood
Kevin Johnson
Social Networks
   Where are we today?
Social Zombies II: Your Friends Need More Brains
350 Million Users
  (how many of these are fake?)
120 Million Login Daily
Social Zombies II: Your Friends Need More Brains
6.2 million joining Twitter
      every month
End of 2009:
75 Million Users
It’s all about trust...
Fake accounts? Orly?
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Who is the most dangerous
 woman on the Internet?
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Advanced
Persistent
Threat
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
What makes a
 Jessica Biel?
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Thank You!


Prabhu Deva
    and
Nathan Hamiel
Lava Roll
  FTW
Still easy to exploit trust!
•   More difficult to tell a bot from a real
    account
•   Accounts are easy to create
•   Socnet User Verification = FAIL
    •   Twitter “Verified” Accounts?
•   Connections based on other “friends”
New Privacy Concerns
New Facebook Privacy
      Settings
•   Your info is even more open!
•   Your Name, Profile Picture, Gender, Current
    City, Networks, Friend List, and Pages are all
    public

•   “Suggested” settings are set to EVERYONE
•   Zuckerburg says users don’t want privacy...
Really?
Epic FAIL?
Blippy FTW
Blippy FTW
"I Joined BLIPPY and all I got
    was Jacked at the ATM"
            - Chris Nickerson (@indi303) via Twitter
What about the ultimate
     stalker tool?
Geo-Location Tracking
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Blippy + Foursquare +
Facebook + Twitter +
LinkedIn = PWNAGE
Why the **** would Socnets
         do this??
Social Zombies II: Your Friends Need More Brains
“The more info you share...
...the more valuable you are”
Real Time Search FTW
How do pen testers and
  attackers use this?
     Thank you Social Networks!
Wealth of recon
              information!
•   Socnet Search Engines
•   Maltego (Twitter and Facebook)
•   Google Hacks
    •   site:facebook.com inurl:group (bofa | "bank of america")
•   Manual Searching
    •   Status Updates

    •   Real Time Search
Infiltrate a company with
     this information!
New Security Concerns
Koobface Evolving
•   Still the #1 socnet
    worm

•   Targets all major
    socnets
•   Socnet chat vectors

•   Now with CAPTCHA

•   Adobe/IE 0day, Zeus
    Trojans FTL
     *Screen shots via McAfee Labs/PandaLabs
Danger!
Social
Network
Applications
Months of Bugs!
• July 2009 - Month of Twitter Bugs (Aviv Raff)
• September 2009 - Month of Facebook Bugs
  (theharmonyguy)
• Vulnerabilities affecting over 9,700 Facebook
  applications
• Over half of vuln apps had passed the Facebook
  “Verified” Application program

• Six of the hacked applications in the “Top
  10” (Farmville and Causes!)
• Most could be used with ClickJacking to install
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
More than 218 million Facebook users
          were vulnerable!
Facebook Application
       Autopwn Demo
http://www.youtube.com/watch?v=chvwtGPkAIQ
Advanced
Social Network Bots
More Evil Twitter Bots
•   Bots that pull
    trending
    topics...post
    malware links
•   Used recently to
    promote warez like
    pirated movies
•   Easy to code.
    Twitter API FTW
Better Automated Tools

•   Tools are getting more reliable
•   CAPTCHA bypass built in, able to off load to
    outsourced solution
•   Automated tools are cheap!
    Why roll your own?

    (or get it for free via Torrent!)
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
What is it?


Command and control system
 running over social media
Written in Ruby as a
 proof of concept

Not optimized. Not stealthy.
Currently runs over:


     •Twitter
     • JPEG
     • TinyURL
And now...
Uses LinkedIn API to read
and write the Status field
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Also new...
 Windows Support

Basic Ruby install with a few
    gems and off it goes
What’s Next?

Other media types, possibly non-
        HTML based.

    Please give suggestions!
New KreiosC2 Demo
http://www.vimeo.com/9295657
Third Party APIs FTW
SocNet APIs
• Social network
  APIs provide a
  wealth of
  information
• All the big ones
  offer them
   • Some play
      catch up
• We get to play
  with these APIs
Im'ma Let You Finish

• New front end for
  Social Butterfly
• KanyeWestify
  allows us to
  update your wall
Westify'ing someone
• Select a friend
   • Drop down helps
• Their wall now has the
  update
So what did we do?
•   Using the API, we grabbed the user's
    information

•   And their Friends' data

•   In this version we used the FQL
    queries from theHarmonyGuy

     •   Full backup of your account

•   We also used JS to brute force
    browser history

     •   We can map visited pages to user's
         of Facebook!

     •   Marketing FTW!
Have the undead won?
We need more brains!

 •   User education...yeah, it’s hard
 •   Better privacy controls
 •   End opt-in developer models
 •   Tighter control of APIs
Questions?

•   News, Research, Guides,Video’s
    SocialMediaSecurity.com
•   Download KreiosC2
    digininja.org
•   Follow us...if you dare
    @agent0x0, @digininja, @secureideas

More Related Content

What's hot

Charity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreCharity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreEC-Council
 
Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0davidsc13
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNuttMcNutt
 
Squiz Launch Presentation
Squiz Launch PresentationSquiz Launch Presentation
Squiz Launch PresentationMike Barrett
 
Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Dave Briggs
 
Craig's List Nonprofit Bootcamp
Craig's List Nonprofit BootcampCraig's List Nonprofit Bootcamp
Craig's List Nonprofit BootcampBeth Kanter
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...EC-Council
 
Perfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, IrelandPerfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, IrelandIan Forrester
 
Social media what's going? v3 by Laurent François aka lilzeon
Social media what's going? v3 by Laurent François aka lilzeonSocial media what's going? v3 by Laurent François aka lilzeon
Social media what's going? v3 by Laurent François aka lilzeonLaurent François
 
Inspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it peopleInspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it peopleParisa Mohammadpour
 
Dave McMurtry: Top Ten Social Media Marketing Mistakes
Dave McMurtry: Top Ten Social Media Marketing MistakesDave McMurtry: Top Ten Social Media Marketing Mistakes
Dave McMurtry: Top Ten Social Media Marketing MistakesSocial Media for Nonprofits
 
Online 2012 presentation
Online 2012 presentationOnline 2012 presentation
Online 2012 presentationPhil Bradley
 
Increase Engagement at Your Event
Increase Engagement at Your EventIncrease Engagement at Your Event
Increase Engagement at Your EventElizabeth Glau, CMP
 
Crowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi WorkshopCrowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi WorkshopBrian Herbert
 
The Pluses And Minuses of Google+ Plus
The Pluses And Minuses of Google+ PlusThe Pluses And Minuses of Google+ Plus
The Pluses And Minuses of Google+ PlusAdria Richards
 

What's hot (20)

Charity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreCharity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon Creekmore
 
Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNutt
 
SOSM
SOSMSOSM
SOSM
 
Squiz Launch Presentation
Squiz Launch PresentationSquiz Launch Presentation
Squiz Launch Presentation
 
Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...
 
Craig's List Nonprofit Bootcamp
Craig's List Nonprofit BootcampCraig's List Nonprofit Bootcamp
Craig's List Nonprofit Bootcamp
 
Tech Trends
Tech TrendsTech Trends
Tech Trends
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
 
Norway real-2
Norway real-2Norway real-2
Norway real-2
 
Perfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, IrelandPerfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, Ireland
 
Social media what's going? v3 by Laurent François aka lilzeon
Social media what's going? v3 by Laurent François aka lilzeonSocial media what's going? v3 by Laurent François aka lilzeon
Social media what's going? v3 by Laurent François aka lilzeon
 
Inspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it peopleInspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it people
 
Dave McMurtry: Top Ten Social Media Marketing Mistakes
Dave McMurtry: Top Ten Social Media Marketing MistakesDave McMurtry: Top Ten Social Media Marketing Mistakes
Dave McMurtry: Top Ten Social Media Marketing Mistakes
 
Online 2012 presentation
Online 2012 presentationOnline 2012 presentation
Online 2012 presentation
 
Creative social learning
Creative social learningCreative social learning
Creative social learning
 
Increase Engagement at Your Event
Increase Engagement at Your EventIncrease Engagement at Your Event
Increase Engagement at Your Event
 
Responsible Journalism EPQ
Responsible Journalism EPQ Responsible Journalism EPQ
Responsible Journalism EPQ
 
Crowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi WorkshopCrowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi Workshop
 
The Pluses And Minuses of Google+ Plus
The Pluses And Minuses of Google+ PlusThe Pluses And Minuses of Google+ Plus
The Pluses And Minuses of Google+ Plus
 

Viewers also liked

Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Aspenware
 
The 'selfie effect' in regular society
The 'selfie effect' in regular societyThe 'selfie effect' in regular society
The 'selfie effect' in regular societyUpekha Vandebona
 
The Power of the Selfie
The Power of the SelfieThe Power of the Selfie
The Power of the Selfieanas-hasan
 
The Art of the Presentation
The Art of the PresentationThe Art of the Presentation
The Art of the PresentationJeffrey Stevens
 
Zombie PowerPoint by @ericpesik
Zombie PowerPoint by @ericpesikZombie PowerPoint by @ericpesik
Zombie PowerPoint by @ericpesikEric Pesik
 
The Three Lies About Your Age
The Three Lies About Your AgeThe Three Lies About Your Age
The Three Lies About Your AgeSean Si
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldSean Si
 
WTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionWTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionTim O'Reilly
 

Viewers also liked (9)

Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.
 
The 'selfie effect' in regular society
The 'selfie effect' in regular societyThe 'selfie effect' in regular society
The 'selfie effect' in regular society
 
Imagine Your Life Without the Internet
Imagine Your Life Without the InternetImagine Your Life Without the Internet
Imagine Your Life Without the Internet
 
The Power of the Selfie
The Power of the SelfieThe Power of the Selfie
The Power of the Selfie
 
The Art of the Presentation
The Art of the PresentationThe Art of the Presentation
The Art of the Presentation
 
Zombie PowerPoint by @ericpesik
Zombie PowerPoint by @ericpesikZombie PowerPoint by @ericpesik
Zombie PowerPoint by @ericpesik
 
The Three Lies About Your Age
The Three Lies About Your AgeThe Three Lies About Your Age
The Three Lies About Your Age
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the World
 
WTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionWTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx version
 

Similar to Social Zombies II: Your Friends Need More Brains

Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Behrouz Sadeghipour
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
Social Media and Crisis Management
Social Media and Crisis ManagementSocial Media and Crisis Management
Social Media and Crisis ManagementMark Gibbs
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadTom Eston
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!InnoTech
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012inf8nity
 
The Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi JacobyThe Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi JacobyRazorfish
 
Digital Innovation in Asia
Digital Innovation in AsiaDigital Innovation in Asia
Digital Innovation in AsiaBenjamin Joffe
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedFelipe Prado
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Digital survival guide
Digital survival guideDigital survival guide
Digital survival guideAlex Stonehill
 
CIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
CIC IWOM Panel: Jiepang CEO David on The New Age of Social NetworkingCIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
CIC IWOM Panel: Jiepang CEO David on The New Age of Social NetworkingKantar Media CIC
 

Similar to Social Zombies II: Your Friends Need More Brains (20)

Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Social Media Dataset
Social Media DatasetSocial Media Dataset
Social Media Dataset
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
NPTs
NPTsNPTs
NPTs
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
Social Media and Crisis Management
Social Media and Crisis ManagementSocial Media and Crisis Management
Social Media and Crisis Management
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
The Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi JacobyThe Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi Jacoby
 
Digital Innovation in Asia
Digital Innovation in AsiaDigital Innovation in Asia
Digital Innovation in Asia
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Digital survival guide
Digital survival guideDigital survival guide
Digital survival guide
 
CIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
CIC IWOM Panel: Jiepang CEO David on The New Age of Social NetworkingCIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
CIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
 

More from Tom Eston

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Tom Eston
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown Tom Eston
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Tom Eston
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on TwitterTom Eston
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-MiddleTom Eston
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsTom Eston
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With MaltegoTom Eston
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactTom Eston
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkTom Eston
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 

More from Tom Eston (16)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on Twitter
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit Framework
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 

Recently uploaded

Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 

Recently uploaded (20)

Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 

Social Zombies II: Your Friends Need More Brains