Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Malware, botnet y y cibercrimen

1,666 views

Published on

Published in: Technology
  • DOWNLOAD THAT BOOKS INTO AVAILABLE FORMAT (2019 Update) ......................................................................................................................... ......................................................................................................................... Download Full PDF EBOOK here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download Full EPUB Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download Full doc Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download PDF EBOOK here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download EPUB Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download doc Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... ......................................................................................................................... ................................................................................................................................... eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader. (An eBook reader can be a software application for use on a computer such as Microsoft's free Reader application, or a book-sized computer that is used solely as a reading device such as Nuvomedia's Rocket eBook.) Users can purchase an eBook on diskette or CD, but the most popular method of getting an eBook is to purchase a downloadable file of the eBook (or other reading material) from a Web site (such as Barnes and Noble) to be read from the user's computer or reading device. Generally, an eBook can be downloaded in five minutes or less ......................................................................................................................... .............. Browse by Genre Available eBooks .............................................................................................................................. Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, ......................................................................................................................... ......................................................................................................................... .....BEST SELLER FOR EBOOK RECOMMEND............................................................. ......................................................................................................................... Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth,-- The Ride of a Lifetime: Lessons Learned from 15 Years as CEO of the Walt Disney Company,-- Call Sign Chaos: Learning to Lead,-- StrengthsFinder 2.0,-- Stillness Is the Key,-- She Said: Breaking the Sexual Harassment Story That Helped Ignite a Movement,-- Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones,-- Everything Is Figureoutable,-- What It Takes: Lessons in the Pursuit of Excellence,-- Rich Dad Poor Dad: What the Rich Teach Their Kids About Money That the Poor and Middle Class Do Not!,-- The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness,-- Shut Up and Listen!: Hard Business Truths that Will Help You Succeed, ......................................................................................................................... .........................................................................................................................
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Download or read that Ebooks here ... ......................................................................................................................... DOWNLOAD FULL PDF EBOOK here { http://bit.ly/2m77EgH } ......................................................................................................................... Download EPUB Ebook here { http://bit.ly/2m77EgH } ......................................................................................................................... Download Doc Ebook here { http://bit.ly/2m77EgH } ......................................................................................................................... .........................................................................................................................
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

Malware, botnet y y cibercrimen

  1. 1. @jorgemieresJorge Mieres jamieres@malwareint.com CriminologíaInformática atravésdeBotnets
  2. 2. Sobremí Investigación de crimeware y recursos asociados Grupos de investigación • Incidents & Insights Group • Botnet-Expert Group (ENISA, Bonn University & Fraunhofer Institute) • Brigada de Investigaciones Tecnológicas – PNE Comunidades de seguridad • Segu-Info - ShadowServer Fundation - Offensive Computing • NoVirusThanks – MalwareDomainList - Infosec Island MalwareIntelligence
  3. 3. CriminologíaInformática Rama de la Criminología General que trata sobre las conductas antisociales y delitos generados a través de, y contra medios informáticos.
  4. 4. ObjetivosDelictivos Tecnologías expuestas  Sistemas, recursos, procesos que manejen recursos críticos (SCADA) Compañías de todo el mundo  Fraude, espionaje, etc., sin limitar su alcance ni tamaño Profesionales de seguridad  Mozilla Sniffer (backdooreado), koobface vs Dancho Danchev, YES Exploit System vs MalwareIntelligence Otros delincuentes  Antes: Beagle vs Netsky. Hoy: SpyEye vs ZeuS, Carberp vs... ZeuS, Limbo, Barracuda, Adrenalin, BlackEnergy, myLoader... ¡Todos nosotros!
  5. 5. http://malwareint.blogspot.com/2010/01/justifying-unjustifiable-in-world.html YES Exploit System vs
  6. 6. BuscandoEvidencias INVESTIGACIÓN EXPLOTACIÓN EVIDENCIAS CIERRE (opc)ESTUDIODESCUBRIMIENTO Análisis de malware URL tracking Datos brutos PPI / PPC Servicios y recursos DNS / AS / Registro Corte Legal Exploits Pack Malware Kit DDoS Framework Sistema de Afiliados Cotejo Triangulación Otras actividades ilícitas
  7. 7. INVESTIGACIÓN DIFUSIÓN (opc) Publicar información de análisis Compartir información para generar mecanismos de mitigación Análisis SpyEye  Regla IDS (Emerging Threats) BuscandoEvidencias
  8. 8. ApoyarEsfuerzos Fuentes de inteligencia • OSINT – Open Source Intelligence • IMINT - Imagery Intelligence • PHOTINT – Photographic Intelligence • SIGINT - Signals Intelligence • COMINT – Communication Intelligence • HUMINT – Human Intelligence Administración Publica • CERT Fuerzas Especiales • FFSS / FFPP / FFAA
  9. 9. ApoyarEsfuerzos Apoyo legal • Legislación en materia de delitos informáticos • Abogados especializados Sector privado • Empresas de seguridad • ISP / NIC Acuerdos de colaboración • Entre profesionales de seguridad • Entre empresas • Entre profesionales y empresas ¿Seguridad Ofensiva?
  10. 10. … a través de Botnets CriminologíaInformática…
  11. 11. PanoramaGlobal No solo se trata de recolectar sino de ROBAR
  12. 12. MásAtacado (2010)
  13. 13. The prize is waiting for you... for your work...
  14. 14. Koobface botnet & Oficla botnet Algunas investigaciones. Parte 1
  15. 15. Algunas investigaciones. Parte 2 SpyEye botnet & Carberp botnet
  16. 16. ¡MuchasGracias! Q&A

×