Social Network Security & Backdooring email

M.Syarifudin, ST, OSCP, OSWP
M.Syarifudin, ST, OSCP, OSWP Information Security Trainer
SocialNetworkingSecurity
&
BackdooringEmail
Presented by 	

Syarif	

!
Seminar & Workshop Nasional Security System	

Malang, Juni 5 2011	

Universitas Muhammadiyah Malang
• http://www.google.com/search?
q=fl3xu5	

• http://fl3x.us
Whoami
Agenda
• Social Networking ?	

• Social Networking :Attacks & Defense	

• Backdooring Email 	

• There is No Privacy anymore :) 	

• How to protect your self
Social Networking ?
Facebook Statistics
Twitter Statistics
Facebook & twitter attack
Facebook & twitter attack
• Phishing
Facebook & twitter attack
• Session Hijacking	

• Firesheep
facebook & twitter defense
• Be a paranoid & don’t trust anyone on the internet	

• Never put some sensitive information carelessly	

• Keep your eyes, Always check the correct url 	

• Never Subscribe unauthorized applications	

• Always remember, wireless is not secure. Keep “safety” browsing :p	

• Always using https	

• etc
Email attack : Backdooring Email ;)
• Why ?	

• Email is very important	

• as a communication media	

• Email is a privacy 	

• Everything using email	

• User account : facebook, twitter, etc	

• Passwords	

• paypal account 	

• domain & hosting account
Email attack : Backdooring Email ;)
• Motivation ?	

• Just for fun :)	

• Jealous / Revenge	

• Get important data	

• Get Final Exam Task & Answer :p	

• Spy	

• Scamming	

• Money reason : paypal, etc	

• Domain & hosting take over
Email attack : Backdooring Email ;)
• Prelinimary ?	

• Social Engineering	

• password obtained by hacking other websites ~ one password for all
Backdooring Email ?Yes you can ;)
• Using what ? 	

• Why ?	

• most people using it	

• easy to use	

• could be used to impersonate :p	

• high capacity mailbox	

• 10 more accounts could be backdoored in one mailbox	

• no need to log in the target mailbox	

• could be used to backdoor all of mail accounts in some mail server :)
Demo
thereisnoprivacyanymore
someoneiswatchingyou
!
How to ProtectYourself ?
• Always Check Last Log in your email	

• Never put some sensitive information carelessly	

• Be a Paranoid, check the flag messages in your email 	

• Keep on your eyes to check mail in the inbox, sent, draft , and trash	

• Always keep your correct mail setting 	

• Never use “one password for all” :p	

• Changer your mail password regularly	

• don’t use a “weak” security question
Q & A
• twitter : fl3xu5	

• YM : fl3xu5
Thank you :)
1 of 20

Recommended

Instagram account hack by
Instagram account hackInstagram account hack
Instagram account hackInstagramhacks
109 views2 slides
Safety social media for positive social change by
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social changeMoses Ngeth
286 views12 slides
Online Safety -- Securing your space as a Netizen by
Online Safety -- Securing your space as a NetizenOnline Safety -- Securing your space as a Netizen
Online Safety -- Securing your space as a NetizenKofi Kafui Kornu
500 views9 slides
Staying Safe & Secure on Twitter by
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on TwitterTom Eston
1.9K views20 slides
What’s a’twitter by
What’s a’twitterWhat’s a’twitter
What’s a’twitterRyan Harrell
215 views24 slides
Preventions of Email Hacking by
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email HackingUsmanKhan429
1.8K views13 slides

More Related Content

What's hot

Communication by
CommunicationCommunication
Communicationkrmartens
73 views5 slides
Slideshare by
SlideshareSlideshare
Slidesharestuartamber
79 views7 slides
Hacking by
HackingHacking
HackingMo Irshad Ansari
190 views21 slides
Top 10 microblogging tools by
Top 10 microblogging toolsTop 10 microblogging tools
Top 10 microblogging toolsiumstech
261 views14 slides
An introduction to the Basics of Twitter! by
An introduction to the Basics of Twitter!An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!Joyce C. Arias
80 views14 slides
Cel1 by
Cel1Cel1
Cel1angbeelee
365 views32 slides

What's hot(12)

Viewers also liked

iCrOSS 2013_Pentest by
iCrOSS 2013_PentestiCrOSS 2013_Pentest
iCrOSS 2013_PentestM.Syarifudin, ST, OSCP, OSWP
14.8K views39 slides
IPTV Security by
IPTV SecurityIPTV Security
IPTV SecurityM.Syarifudin, ST, OSCP, OSWP
18.4K views17 slides
Prepare Yourself to Become Infosec Professional by
Prepare Yourself to Become Infosec ProfessionalPrepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec ProfessionalM.Syarifudin, ST, OSCP, OSWP
14.4K views26 slides
My pwk & oscp journey by
My pwk & oscp journeyMy pwk & oscp journey
My pwk & oscp journeyM.Syarifudin, ST, OSCP, OSWP
25.6K views14 slides
Information gath by
Information gathInformation gath
Information gathM.Syarifudin, ST, OSCP, OSWP
14K views21 slides
Pentest with Metasploit by
Pentest with MetasploitPentest with Metasploit
Pentest with MetasploitM.Syarifudin, ST, OSCP, OSWP
23.7K views36 slides

Similar to Social Network Security & Backdooring email

Safety social media for positive social change by
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social changeBill Chea
314 views12 slides
Precautions to ensure safety by
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safetybenlangley-efc
150 views6 slides
Man vs Internet - Current challenges and future tendencies of establishing tr... by
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
3.6K views56 slides
Online Self Defense by
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
760 views47 slides
Security and Privacy Brown Bag by
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag501 Commons
1.3K views20 slides
WordPress Security 101 - Meetup Nairobi March 2020 by
WordPress Security 101 - Meetup Nairobi March 2020 WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 stk_jj
776 views36 slides

Similar to Social Network Security & Backdooring email(20)

Safety social media for positive social change by Bill Chea
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
Bill Chea314 views
Precautions to ensure safety by benlangley-efc
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
benlangley-efc150 views
Man vs Internet - Current challenges and future tendencies of establishing tr... by Luis Grangeia
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
Luis Grangeia3.6K views
Security and Privacy Brown Bag by 501 Commons
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
501 Commons 1.3K views
WordPress Security 101 - Meetup Nairobi March 2020 by stk_jj
WordPress Security 101 - Meetup Nairobi March 2020 WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020
stk_jj776 views
Internet safety update by 14071828
Internet safety updateInternet safety update
Internet safety update
14071828443 views
Internet and Social Media for Beginners by becarreno
Internet and Social Media for BeginnersInternet and Social Media for Beginners
Internet and Social Media for Beginners
becarreno368 views
Creating a digital toolkit for users: How to teach our users how to limit the... by Justin Denton
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton186 views
Social media security by Mosoco Ltd
Social media securitySocial media security
Social media security
Mosoco Ltd605 views
11 Commandments of Cyber Security for the Home by zaimorkai
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
zaimorkai77 views
Mobile Security for the Modern Tech Mogul by Andrew Schwabe
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
Andrew Schwabe334 views
Spam & Phishing by GrittyCC
Spam & PhishingSpam & Phishing
Spam & Phishing
GrittyCC108 views
Hacking iOS Applications with Proxies by Karl Fosaaen
Hacking iOS Applications with ProxiesHacking iOS Applications with Proxies
Hacking iOS Applications with Proxies
Karl Fosaaen2.5K views

Recently uploaded

Six Sigma Concept by Sahil Srivastava.pptx by
Six Sigma Concept by Sahil Srivastava.pptxSix Sigma Concept by Sahil Srivastava.pptx
Six Sigma Concept by Sahil Srivastava.pptxSahil Srivastava
51 views11 slides
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 by
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37MysoreMuleSoftMeetup
54 views17 slides
What is Digital Transformation? by
What is Digital Transformation?What is Digital Transformation?
What is Digital Transformation?Mark Brown
41 views11 slides
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023 by
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023A Guide to Applying for the Wells Mountain Initiative Scholarship 2023
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023Excellence Foundation for South Sudan
87 views26 slides
Papal.pdf by
Papal.pdfPapal.pdf
Papal.pdfMariaKenney3
73 views24 slides

Recently uploaded(20)

Six Sigma Concept by Sahil Srivastava.pptx by Sahil Srivastava
Six Sigma Concept by Sahil Srivastava.pptxSix Sigma Concept by Sahil Srivastava.pptx
Six Sigma Concept by Sahil Srivastava.pptx
Sahil Srivastava51 views
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 by MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
What is Digital Transformation? by Mark Brown
What is Digital Transformation?What is Digital Transformation?
What is Digital Transformation?
Mark Brown41 views
EILO EXCURSION PROGRAMME 2023 by info33492
EILO EXCURSION PROGRAMME 2023EILO EXCURSION PROGRAMME 2023
EILO EXCURSION PROGRAMME 2023
info33492208 views
UNIT NO 13 ORGANISMS AND POPULATION.pptx by Madhuri Bhande
UNIT NO 13 ORGANISMS AND POPULATION.pptxUNIT NO 13 ORGANISMS AND POPULATION.pptx
UNIT NO 13 ORGANISMS AND POPULATION.pptx
Madhuri Bhande43 views
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice by Taste
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceCreative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Taste52 views
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx by Niranjan Chavan
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptxGuidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Niranjan Chavan42 views
INT-244 Topic 6b Confucianism by S Meyer
INT-244 Topic 6b ConfucianismINT-244 Topic 6b Confucianism
INT-244 Topic 6b Confucianism
S Meyer49 views
NodeJS and ExpressJS.pdf by ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR350 views
Retail Store Scavenger Hunt.pptx by jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15453 views

Social Network Security & Backdooring email

  • 1. SocialNetworkingSecurity & BackdooringEmail Presented by Syarif ! Seminar & Workshop Nasional Security System Malang, Juni 5 2011 Universitas Muhammadiyah Malang
  • 3. Agenda • Social Networking ? • Social Networking :Attacks & Defense • Backdooring Email • There is No Privacy anymore :) • How to protect your self
  • 8. Facebook & twitter attack • Phishing
  • 9. Facebook & twitter attack • Session Hijacking • Firesheep
  • 10. facebook & twitter defense • Be a paranoid & don’t trust anyone on the internet • Never put some sensitive information carelessly • Keep your eyes, Always check the correct url • Never Subscribe unauthorized applications • Always remember, wireless is not secure. Keep “safety” browsing :p • Always using https • etc
  • 11. Email attack : Backdooring Email ;) • Why ? • Email is very important • as a communication media • Email is a privacy • Everything using email • User account : facebook, twitter, etc • Passwords • paypal account • domain & hosting account
  • 12. Email attack : Backdooring Email ;) • Motivation ? • Just for fun :) • Jealous / Revenge • Get important data • Get Final Exam Task & Answer :p • Spy • Scamming • Money reason : paypal, etc • Domain & hosting take over
  • 13. Email attack : Backdooring Email ;) • Prelinimary ? • Social Engineering • password obtained by hacking other websites ~ one password for all
  • 14. Backdooring Email ?Yes you can ;) • Using what ? • Why ? • most people using it • easy to use • could be used to impersonate :p • high capacity mailbox • 10 more accounts could be backdoored in one mailbox • no need to log in the target mailbox • could be used to backdoor all of mail accounts in some mail server :)
  • 15. Demo
  • 18. How to ProtectYourself ? • Always Check Last Log in your email • Never put some sensitive information carelessly • Be a Paranoid, check the flag messages in your email • Keep on your eyes to check mail in the inbox, sent, draft , and trash • Always keep your correct mail setting • Never use “one password for all” :p • Changer your mail password regularly • don’t use a “weak” security question
  • 19. Q & A • twitter : fl3xu5 • YM : fl3xu5