SlideShare a Scribd company logo
Cats and Mice
Ever evolving attackers and other game changers
By: Eric Kmetz (aka vect0rx)
Who Am I
● I’m a software developer, researcher, security enthusiast
● I’ve been interested in hacker stuff since the early 90s
● DEFCON since 11. On/off security goon since DC 15.
● Contact:
○ Twitter: @vect0rx
○ email: ekmetz650@gmail.com
What My Talk is About
● This talk isn’t about host/network level security, CVEs, DDoS, etc.
● This talk is about “8th layer” (aka ‘user layer’) security, specifically social
● Prevention, Detection and Mitigation of Bad Actors on Social sites:
○ Spammers
○ Scam/Fraud
○ Other abuse
Why Do We Care?
● Because you’re a researcher
● Or anyone a vested interest in a product’s success
● You use social networking sites
● What do you guys think?
What Can We Do?
● Manual Intervention
● Deconstruction
● Research
● Application of Research
Manual Intervention
● Find abusers through web interface and reports
● Deal with each case as it comes
● Pros: Diplomatic solutions, very low false positives
● Cons: Uses up lots of business resources, does not scale well
Deconstruction
● Quantify Social Criteria
● Classify Criteria
● Research Solutions
● Fine-Tune
Research
● The paper that changed everything
● Cliff notes
● Inspirations and Take aways
Applied Research
● Spammers love string obfuscation:
○ IM me camgirl80 at wahoo ,cpm
○ hxxp://pwning.nu/BofA/phish/
● There are many algorithms available to help
● Longest Common Subsequences
LCS application
● LCS basics
● But wait…. there’s more
● Abstraction of Behavior for Digital Signatures
Not the end-all solution
● Best deployed in layers and not as sole countermeasure
● Synergies of Layers to Improve Accuracy
● Inliers and Outliers
● System Integrity and Efficiency
Confusing The Mice
● Attackers Evolve
● Social Sites need to evolve with them
● Countermeasures
○ Multiple Layers of Detection
○ Asynchronous Response
● What Would This System Look Like
Cool! Wait, What?
Take-homes
● Solving abuse problems through leveraged intelligence and deconstruction
● Think outside the box
● It’s the war, not the battle
● H4v3 funn with thiiis!
Questions?
● Questions, thoughts on topic...
● Feel free to contact if one comes up later!
○ Twitter: @vect0rx
○ email: ekmetz650@gmail.com
● FIN
Acknowledgements
● Rich Friedberg - For the help early on in understanding
a mental framework and nomenclature with which I
could understand and categorize attackers by
commonalities, TTP, etc.
● Javvad Malik - For helping me prepare my first talk for
BSivesLV 2015
References
● Peter Christen. A Comparison of Personal Name Matching:
Techniques and Practical Issues, Joint Computer Science Technical
Report Series. The Australian National University. TR-CS-06-02. Web
<https://cs.anu.edu.au/techreports/2006/TR-CS-06-02.pdf>

More Related Content

Viewers also liked

geoffrey aguirre updated veterinarian small
geoffrey aguirre updated veterinarian smallgeoffrey aguirre updated veterinarian small
geoffrey aguirre updated veterinarian smallgeoffrey aguirre
 
Carta a Gobierno por colombianos presos en China
Carta a Gobierno por colombianos presos en ChinaCarta a Gobierno por colombianos presos en China
Carta a Gobierno por colombianos presos en China
HSBnoticias
 
Key Findings from Sivantos Life@50+ Survey
Key Findings from Sivantos Life@50+ SurveyKey Findings from Sivantos Life@50+ Survey
Key Findings from Sivantos Life@50+ Survey
Sivantos
 
Trevor LaRive_Resume 2015
Trevor LaRive_Resume 2015Trevor LaRive_Resume 2015
Trevor LaRive_Resume 2015Trevor Larive
 
tawuran antar pelajar (B.INDONESIA)
tawuran antar pelajar (B.INDONESIA)tawuran antar pelajar (B.INDONESIA)
tawuran antar pelajar (B.INDONESIA)
windyaulia1
 
Informe gira r01 valle de sula dic2015
Informe gira r01 valle de sula dic2015Informe gira r01 valle de sula dic2015
Informe gira r01 valle de sula dic2015
DOCFONAC
 
Oddonegames office tour in english
Oddonegames office tour in englishOddonegames office tour in english
Oddonegames office tour in english
MsPluto
 
Oddonegames office tour in korean
Oddonegames office tour in koreanOddonegames office tour in korean
Oddonegames office tour in korean
MsPluto
 

Viewers also liked (9)

geoffrey aguirre updated veterinarian small
geoffrey aguirre updated veterinarian smallgeoffrey aguirre updated veterinarian small
geoffrey aguirre updated veterinarian small
 
Ayan_Resume
Ayan_ResumeAyan_Resume
Ayan_Resume
 
Carta a Gobierno por colombianos presos en China
Carta a Gobierno por colombianos presos en ChinaCarta a Gobierno por colombianos presos en China
Carta a Gobierno por colombianos presos en China
 
Key Findings from Sivantos Life@50+ Survey
Key Findings from Sivantos Life@50+ SurveyKey Findings from Sivantos Life@50+ Survey
Key Findings from Sivantos Life@50+ Survey
 
Trevor LaRive_Resume 2015
Trevor LaRive_Resume 2015Trevor LaRive_Resume 2015
Trevor LaRive_Resume 2015
 
tawuran antar pelajar (B.INDONESIA)
tawuran antar pelajar (B.INDONESIA)tawuran antar pelajar (B.INDONESIA)
tawuran antar pelajar (B.INDONESIA)
 
Informe gira r01 valle de sula dic2015
Informe gira r01 valle de sula dic2015Informe gira r01 valle de sula dic2015
Informe gira r01 valle de sula dic2015
 
Oddonegames office tour in english
Oddonegames office tour in englishOddonegames office tour in english
Oddonegames office tour in english
 
Oddonegames office tour in korean
Oddonegames office tour in koreanOddonegames office tour in korean
Oddonegames office tour in korean
 

Similar to Cats and mice ever evolving attackers and other game changers

Hacking - Breaking Into It
Hacking - Breaking Into ItHacking - Breaking Into It
Hacking - Breaking Into It
CTruncer
 
International Cooperative: APT Hunting
International Cooperative: APT HuntingInternational Cooperative: APT Hunting
International Cooperative: APT Hunting
Joshua Lawton, MBA
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst
 
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
John Bambenek
 
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and FameThe Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Abhinav Mishra
 
MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.
MaryConcepcion10
 
earning by s/doing/h4ck1ng/ - Our experience learning application security th...
earning by s/doing/h4ck1ng/ - Our experience learning application security th...earning by s/doing/h4ck1ng/ - Our experience learning application security th...
earning by s/doing/h4ck1ng/ - Our experience learning application security th...
NECST Lab @ Politecnico di Milano
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
Felipe Prado
 
Evolution of Offensive Assessments - RootCon
Evolution of Offensive Assessments - RootConEvolution of Offensive Assessments - RootCon
Evolution of Offensive Assessments - RootCon
Jorge Orchilles
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
DallasHaselhorst
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
Kit O'Connell
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Michael Rushanan
 
How you can become a hacker with no security experience
How you can become a hacker with no security experienceHow you can become a hacker with no security experience
How you can become a hacker with no security experienceAvădănei Andrei
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
Kit O'Connell
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
DallasHaselhorst
 
Unmasking miscreants
Unmasking miscreantsUnmasking miscreants
Unmasking miscreants
Brandon Levene
 
YOW2018 CTO Summit: Working at netflix
YOW2018 CTO Summit: Working at netflixYOW2018 CTO Summit: Working at netflix
YOW2018 CTO Summit: Working at netflix
Brendan Gregg
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
Hessan Adnani
 
CP vs Project - Elevate Ep. 02.pdf
CP vs Project  - Elevate Ep. 02.pdfCP vs Project  - Elevate Ep. 02.pdf
CP vs Project - Elevate Ep. 02.pdf
preetikumara
 

Similar to Cats and mice ever evolving attackers and other game changers (20)

Hacking - Breaking Into It
Hacking - Breaking Into ItHacking - Breaking Into It
Hacking - Breaking Into It
 
International Cooperative: APT Hunting
International Cooperative: APT HuntingInternational Cooperative: APT Hunting
International Cooperative: APT Hunting
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
 
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and FameThe Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
 
MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.
 
earning by s/doing/h4ck1ng/ - Our experience learning application security th...
earning by s/doing/h4ck1ng/ - Our experience learning application security th...earning by s/doing/h4ck1ng/ - Our experience learning application security th...
earning by s/doing/h4ck1ng/ - Our experience learning application security th...
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
 
Evolution of Offensive Assessments - RootCon
Evolution of Offensive Assessments - RootConEvolution of Offensive Assessments - RootCon
Evolution of Offensive Assessments - RootCon
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
How you can become a hacker with no security experience
How you can become a hacker with no security experienceHow you can become a hacker with no security experience
How you can become a hacker with no security experience
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
 
Unmasking miscreants
Unmasking miscreantsUnmasking miscreants
Unmasking miscreants
 
YOW2018 CTO Summit: Working at netflix
YOW2018 CTO Summit: Working at netflixYOW2018 CTO Summit: Working at netflix
YOW2018 CTO Summit: Working at netflix
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
 
CP vs Project - Elevate Ep. 02.pdf
CP vs Project  - Elevate Ep. 02.pdfCP vs Project  - Elevate Ep. 02.pdf
CP vs Project - Elevate Ep. 02.pdf
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Cats and mice ever evolving attackers and other game changers

  • 1. Cats and Mice Ever evolving attackers and other game changers By: Eric Kmetz (aka vect0rx)
  • 2. Who Am I ● I’m a software developer, researcher, security enthusiast ● I’ve been interested in hacker stuff since the early 90s ● DEFCON since 11. On/off security goon since DC 15. ● Contact: ○ Twitter: @vect0rx ○ email: ekmetz650@gmail.com
  • 3. What My Talk is About ● This talk isn’t about host/network level security, CVEs, DDoS, etc. ● This talk is about “8th layer” (aka ‘user layer’) security, specifically social ● Prevention, Detection and Mitigation of Bad Actors on Social sites: ○ Spammers ○ Scam/Fraud ○ Other abuse
  • 4. Why Do We Care? ● Because you’re a researcher ● Or anyone a vested interest in a product’s success ● You use social networking sites ● What do you guys think?
  • 5. What Can We Do? ● Manual Intervention ● Deconstruction ● Research ● Application of Research
  • 6. Manual Intervention ● Find abusers through web interface and reports ● Deal with each case as it comes ● Pros: Diplomatic solutions, very low false positives ● Cons: Uses up lots of business resources, does not scale well
  • 7. Deconstruction ● Quantify Social Criteria ● Classify Criteria ● Research Solutions ● Fine-Tune
  • 8. Research ● The paper that changed everything ● Cliff notes ● Inspirations and Take aways
  • 9. Applied Research ● Spammers love string obfuscation: ○ IM me camgirl80 at wahoo ,cpm ○ hxxp://pwning.nu/BofA/phish/ ● There are many algorithms available to help ● Longest Common Subsequences
  • 10.
  • 11. LCS application ● LCS basics ● But wait…. there’s more ● Abstraction of Behavior for Digital Signatures
  • 12. Not the end-all solution ● Best deployed in layers and not as sole countermeasure ● Synergies of Layers to Improve Accuracy ● Inliers and Outliers ● System Integrity and Efficiency
  • 13. Confusing The Mice ● Attackers Evolve ● Social Sites need to evolve with them ● Countermeasures ○ Multiple Layers of Detection ○ Asynchronous Response ● What Would This System Look Like
  • 14. Cool! Wait, What? Take-homes ● Solving abuse problems through leveraged intelligence and deconstruction ● Think outside the box ● It’s the war, not the battle ● H4v3 funn with thiiis!
  • 15. Questions? ● Questions, thoughts on topic... ● Feel free to contact if one comes up later! ○ Twitter: @vect0rx ○ email: ekmetz650@gmail.com ● FIN
  • 16. Acknowledgements ● Rich Friedberg - For the help early on in understanding a mental framework and nomenclature with which I could understand and categorize attackers by commonalities, TTP, etc. ● Javvad Malik - For helping me prepare my first talk for BSivesLV 2015
  • 17. References ● Peter Christen. A Comparison of Personal Name Matching: Techniques and Practical Issues, Joint Computer Science Technical Report Series. The Australian National University. TR-CS-06-02. Web <https://cs.anu.edu.au/techreports/2006/TR-CS-06-02.pdf>