SlideShare a Scribd company logo
1 of 31
Hacktivism for profit
and glory
Using technology offensively and
profitably against world powers and
major corporations.
One person can change the world.
• You can easily fight powers
that appear bigger and
stronger than you.
• I make lots of history,
influencing nation states and
Fortune 500 companies.
• I do this with no external
capital or influence.
• Everybody who tried to stop
me failed.
Andrew “weev” Auernheimer
Professional hacktivist.
Why I became a hacktivist
• The status quo is not
fair to hackers
• Tech industry
billionaires can’t even
buy influence.
• America makes its
hackers suffer greatly:
Swartz, Moore, Love
Changing the world is profitable.
• Know the outcome of an economic event?
Profit in financial markets.
• In financial markets, you only have to be right
for a few hours.
• Know the outcome of an election? You can
make profit in prediction markets.
I started small.
• Pick a venture
capitalist that funds
tech startups
• Announce your
presence.
• Destroy his portfolio
company by company
until he pays you to
go away.
2008: First nation-state attack
2009: First Fortune 500 attack
• XSRF: Cross site request forgery – no unique
token to scrape to perform command on a
site. Site wrongly trusts user’s browser.
• Can we use this to troll a corporation and shift
a its value by billions of dollars?
Amazon had a XSRF-vuln
• There was a “Report Inappropriate Content”
button on every Amazon page for logged in
users that was a simple HTTP GET with any
product ID at the end.
• Function automatically removed content from
the search rankings if it got enough reports. It
was still sold, but you couldn’t search for it.
This was so easy. Really bad code.
• An enumerated list of gay book product IDs:
Reported all gay books as
inappropriate thousands of times.
• Put a hidden iframe on many websites that
did a 302 redirect to the report as
inappropriate function.
• Used cookies from bot-registered Amazon
accounts to report it myself
• Net effect: you couldn’t search for gay faggot
books on Amazon anymore.
What next? Make markets react.
• Contact gay bloggers, say Amazon was
censoring homosexuals: #amazonfail
This bug was stupid.
• I couldn’t have ever sold it to anyone.
• Amazon wouldn’t reward me for reporting it.
• Objective market value was $0
• But I used it to drop Amazon’s market cap by
$3.2 BILLION dollars for long enough for a
short position to be profitable.
2010: Second Fortune 500 attack
• June of 2010, first Apple iPad 3G released,
exclusive to AT&T.
• On iPad billing/registration server a simple
HTTP GET with no authentication.
• Integer in URL is the integrated circuit card
identifier (ICCID) – unique ID for device SIM
• Takes ICCID and returns email of registered
user.
Oops.
• Apple and AT&T made this for convenience, so
when you visit the billing site it would
automatically fill in the email of your device to
login faster.
• It’s just an HTTP GET, and the ID is just a
number. What they really did was publish a
complete list of iPad users on the Internet.
Exploitation
• Once again, very simple. Numerical IDs are in
sequence. As simple as let count, while true, do curl
$i, done.
• I have a full list of Apple iPad 3G owner emails and
the corresponding ICC-IDs.
• What can I do now?
Risk assessment
• If I were a bad guy, I would send a Safari
exploit to every iPad. (and we had one)
• The IMSI can be derived from the ICCID
(unique to AT&T) which would allow for IMSI
catchers and man in the middle attacks.
• Targeted advertisements: iPad accessories.
• I could do any of these things, but I’d rather
do the right thing and change the world.
Public disclosure.
• We had an name from
offensive Internet
meme: Goatse Security.
If you have not heard of
the Goatse meme do
not look it up.
• “Subsidiary of” GNAA
troll organization
• Adds embarrassment for
AT&T and Apple.
I disclose the issue to a journalist.
If you want to change the world:
social sophistication is equally as
needed as technical sophistication.
Surprise! I
Now the hard part comes
• Kidnapped thousands of
kilometers to foreign
territory, beaten by US
Marshalls along the way
• The parts of America that
the feds bring you to are
hell on earth
• Banned from the Internet
for years
Liberty must be defended.
• I accessed a public
webserver and told a
journalist about what
was on it.
• This is unequivocally not
criminal activity.
• If accessing a public
webserver is a crime the
Internet only contains
criminal activities.
• None of this mattered to
American courts.
Free at last
Eventually a higher
court admitted my
conviction was based
on lies from the FBI
and DOJ and violated
my rights.
Total time lost:
39 months
Let’s do more of this.
Have it your way USA, I’ll go.
August 2016: methods are mainstream
• Muddy Waters now
using software vulns
for financial
intelligence
• The FBI said my desire
to short sell off of vuln
was evidence of
criminal intent, and
now it is a common
industry practice.
2016: Latest nation-state attack
Takeaway
• Technology enables agile individuals to act
with more efficacy than the world’s biggest
empires.
• Every day that goes by, smaller entities grow
more effective than big entities.
• Be relentless, you’ll eventually be proven right
and see your positions legitimized.
Fin.
@rabite
weevlos
weev0
weev

More Related Content

Similar to Andrew Auernheimer - Hacktivism for profit and glory

ACCA Cybersecurity Competition 1st Place Presentation (2018)
ACCA Cybersecurity Competition 1st Place Presentation (2018)ACCA Cybersecurity Competition 1st Place Presentation (2018)
ACCA Cybersecurity Competition 1st Place Presentation (2018)Tyler Silva
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
Chapter four AI and modern world part two.pptx
Chapter four AI and modern world part two.pptxChapter four AI and modern world part two.pptx
Chapter four AI and modern world part two.pptxbestboybulshaawi
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxCyber Security Partners
 
2013.05.16 cfaa powerpoint for ima.v1
2013.05.16 cfaa powerpoint for ima.v12013.05.16 cfaa powerpoint for ima.v1
2013.05.16 cfaa powerpoint for ima.v1Shawn Tuma
 
Mike Hearn - Beyond Tradenet
Mike Hearn - Beyond TradenetMike Hearn - Beyond Tradenet
Mike Hearn - Beyond TradenetSogetiLabs
 
Legitimate Millionaire
Legitimate MillionaireLegitimate Millionaire
Legitimate Millionaireguest65e71c
 
Tik Tok's Sleight of Hand: The Trojan Horse invited to reside on our smartpho...
Tik Tok's Sleight of Hand: The Trojan Horse invited to reside on our smartpho...Tik Tok's Sleight of Hand: The Trojan Horse invited to reside on our smartpho...
Tik Tok's Sleight of Hand: The Trojan Horse invited to reside on our smartpho...Sarma Vangala
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
Conclusion - How To Write An Essay - LibGuides At Univers
Conclusion - How To Write An Essay - LibGuides At UniversConclusion - How To Write An Essay - LibGuides At Univers
Conclusion - How To Write An Essay - LibGuides At UniversSusan White
 
Nation-State Attacks On PKI
Nation-State Attacks On PKI Nation-State Attacks On PKI
Nation-State Attacks On PKI CASCouncil
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Disrupt you! strategies for billion dollar success in the era of endless inn...
Disrupt you!  strategies for billion dollar success in the era of endless inn...Disrupt you!  strategies for billion dollar success in the era of endless inn...
Disrupt you! strategies for billion dollar success in the era of endless inn...Jay Samit
 
What went right or wrong on election day - Nov 8th, 2016 USA
What went right or wrong on election day - Nov 8th, 2016 USAWhat went right or wrong on election day - Nov 8th, 2016 USA
What went right or wrong on election day - Nov 8th, 2016 USAMarshall Sponder
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 

Similar to Andrew Auernheimer - Hacktivism for profit and glory (20)

ACCA Cybersecurity Competition 1st Place Presentation (2018)
ACCA Cybersecurity Competition 1st Place Presentation (2018)ACCA Cybersecurity Competition 1st Place Presentation (2018)
ACCA Cybersecurity Competition 1st Place Presentation (2018)
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Chapter four AI and modern world part two.pptx
Chapter four AI and modern world part two.pptxChapter four AI and modern world part two.pptx
Chapter four AI and modern world part two.pptx
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
 
2013.05.16 cfaa powerpoint for ima.v1
2013.05.16 cfaa powerpoint for ima.v12013.05.16 cfaa powerpoint for ima.v1
2013.05.16 cfaa powerpoint for ima.v1
 
Mike Hearn - Beyond Tradenet
Mike Hearn - Beyond TradenetMike Hearn - Beyond Tradenet
Mike Hearn - Beyond Tradenet
 
Legitimate Millionaire
Legitimate MillionaireLegitimate Millionaire
Legitimate Millionaire
 
Regulation and Innovation, Yared Haile-Meskel
Regulation and Innovation, Yared Haile-MeskelRegulation and Innovation, Yared Haile-Meskel
Regulation and Innovation, Yared Haile-Meskel
 
Tik Tok's Sleight of Hand: The Trojan Horse invited to reside on our smartpho...
Tik Tok's Sleight of Hand: The Trojan Horse invited to reside on our smartpho...Tik Tok's Sleight of Hand: The Trojan Horse invited to reside on our smartpho...
Tik Tok's Sleight of Hand: The Trojan Horse invited to reside on our smartpho...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Search
SearchSearch
Search
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Conclusion - How To Write An Essay - LibGuides At Univers
Conclusion - How To Write An Essay - LibGuides At UniversConclusion - How To Write An Essay - LibGuides At Univers
Conclusion - How To Write An Essay - LibGuides At Univers
 
Nation-State Attacks On PKI
Nation-State Attacks On PKI Nation-State Attacks On PKI
Nation-State Attacks On PKI
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Disrupt you! strategies for billion dollar success in the era of endless inn...
Disrupt you!  strategies for billion dollar success in the era of endless inn...Disrupt you!  strategies for billion dollar success in the era of endless inn...
Disrupt you! strategies for billion dollar success in the era of endless inn...
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
What went right or wrong on election day - Nov 8th, 2016 USA
What went right or wrong on election day - Nov 8th, 2016 USAWhat went right or wrong on election day - Nov 8th, 2016 USA
What went right or wrong on election day - Nov 8th, 2016 USA
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

More from HackIT Ukraine

"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен..."CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен...HackIT Ukraine
 
"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей ГолубевHackIT Ukraine
 
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир ОбризанHackIT Ukraine
 
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий КайдаловHackIT Ukraine
 
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей КаракуловHackIT Ukraine
 
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим МирошниченкоHackIT Ukraine
 
"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий ГадомскийHackIT Ukraine
 
"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii BaranovskyiHackIT Ukraine
 
"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр ЧубарукHackIT Ukraine
 
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii LukinHackIT Ukraine
 
"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro BudorinHackIT Ukraine
 
"Using cryptolockers as a cyber weapon", Alexander Adamov
"Using cryptolockers as a cyber weapon", Alexander Adamov"Using cryptolockers as a cyber weapon", Alexander Adamov
"Using cryptolockers as a cyber weapon", Alexander AdamovHackIT Ukraine
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...HackIT Ukraine
 
"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer AmirHackIT Ukraine
 
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ..."Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...HackIT Ukraine
 
"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser Ali"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser AliHackIT Ukraine
 
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo..."Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...HackIT Ukraine
 
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim HegazyHackIT Ukraine
 
Владимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesВладимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesHackIT Ukraine
 
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?HackIT Ukraine
 

More from HackIT Ukraine (20)

"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен..."CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
 
"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев
 
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
 
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
 
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
 
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
 
"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский
 
"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi
 
"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук
 
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
 
"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin
 
"Using cryptolockers as a cyber weapon", Alexander Adamov
"Using cryptolockers as a cyber weapon", Alexander Adamov"Using cryptolockers as a cyber weapon", Alexander Adamov
"Using cryptolockers as a cyber weapon", Alexander Adamov
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir
 
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ..."Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
 
"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser Ali"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser Ali
 
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo..."Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
 
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
 
Владимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesВладимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challenges
 
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

Andrew Auernheimer - Hacktivism for profit and glory

  • 1. Hacktivism for profit and glory Using technology offensively and profitably against world powers and major corporations.
  • 2. One person can change the world. • You can easily fight powers that appear bigger and stronger than you. • I make lots of history, influencing nation states and Fortune 500 companies. • I do this with no external capital or influence. • Everybody who tried to stop me failed.
  • 4. Why I became a hacktivist • The status quo is not fair to hackers • Tech industry billionaires can’t even buy influence. • America makes its hackers suffer greatly: Swartz, Moore, Love
  • 5. Changing the world is profitable. • Know the outcome of an economic event? Profit in financial markets. • In financial markets, you only have to be right for a few hours. • Know the outcome of an election? You can make profit in prediction markets.
  • 6. I started small. • Pick a venture capitalist that funds tech startups • Announce your presence. • Destroy his portfolio company by company until he pays you to go away.
  • 8. 2009: First Fortune 500 attack • XSRF: Cross site request forgery – no unique token to scrape to perform command on a site. Site wrongly trusts user’s browser. • Can we use this to troll a corporation and shift a its value by billions of dollars?
  • 9. Amazon had a XSRF-vuln • There was a “Report Inappropriate Content” button on every Amazon page for logged in users that was a simple HTTP GET with any product ID at the end. • Function automatically removed content from the search rankings if it got enough reports. It was still sold, but you couldn’t search for it.
  • 10. This was so easy. Really bad code. • An enumerated list of gay book product IDs:
  • 11. Reported all gay books as inappropriate thousands of times. • Put a hidden iframe on many websites that did a 302 redirect to the report as inappropriate function. • Used cookies from bot-registered Amazon accounts to report it myself • Net effect: you couldn’t search for gay faggot books on Amazon anymore.
  • 12. What next? Make markets react. • Contact gay bloggers, say Amazon was censoring homosexuals: #amazonfail
  • 13. This bug was stupid. • I couldn’t have ever sold it to anyone. • Amazon wouldn’t reward me for reporting it. • Objective market value was $0 • But I used it to drop Amazon’s market cap by $3.2 BILLION dollars for long enough for a short position to be profitable.
  • 14. 2010: Second Fortune 500 attack • June of 2010, first Apple iPad 3G released, exclusive to AT&T. • On iPad billing/registration server a simple HTTP GET with no authentication. • Integer in URL is the integrated circuit card identifier (ICCID) – unique ID for device SIM • Takes ICCID and returns email of registered user.
  • 15. Oops. • Apple and AT&T made this for convenience, so when you visit the billing site it would automatically fill in the email of your device to login faster. • It’s just an HTTP GET, and the ID is just a number. What they really did was publish a complete list of iPad users on the Internet.
  • 16. Exploitation • Once again, very simple. Numerical IDs are in sequence. As simple as let count, while true, do curl $i, done. • I have a full list of Apple iPad 3G owner emails and the corresponding ICC-IDs. • What can I do now?
  • 17. Risk assessment • If I were a bad guy, I would send a Safari exploit to every iPad. (and we had one) • The IMSI can be derived from the ICCID (unique to AT&T) which would allow for IMSI catchers and man in the middle attacks. • Targeted advertisements: iPad accessories. • I could do any of these things, but I’d rather do the right thing and change the world.
  • 18. Public disclosure. • We had an name from offensive Internet meme: Goatse Security. If you have not heard of the Goatse meme do not look it up. • “Subsidiary of” GNAA troll organization • Adds embarrassment for AT&T and Apple.
  • 19. I disclose the issue to a journalist.
  • 20. If you want to change the world: social sophistication is equally as needed as technical sophistication.
  • 22. Now the hard part comes • Kidnapped thousands of kilometers to foreign territory, beaten by US Marshalls along the way • The parts of America that the feds bring you to are hell on earth • Banned from the Internet for years
  • 23. Liberty must be defended. • I accessed a public webserver and told a journalist about what was on it. • This is unequivocally not criminal activity. • If accessing a public webserver is a crime the Internet only contains criminal activities. • None of this mattered to American courts.
  • 24.
  • 25. Free at last Eventually a higher court admitted my conviction was based on lies from the FBI and DOJ and violated my rights. Total time lost: 39 months
  • 26. Let’s do more of this.
  • 27. Have it your way USA, I’ll go.
  • 28. August 2016: methods are mainstream • Muddy Waters now using software vulns for financial intelligence • The FBI said my desire to short sell off of vuln was evidence of criminal intent, and now it is a common industry practice.
  • 30. Takeaway • Technology enables agile individuals to act with more efficacy than the world’s biggest empires. • Every day that goes by, smaller entities grow more effective than big entities. • Be relentless, you’ll eventually be proven right and see your positions legitimized.