Smart Bombs: Mobile Vulnerability and ExploitationSecureState
Tom Eston has spent quite a bit of time evaluating mobile applications. In this presentation he will provide the audience with a high level understanding of what the risks are, how to evaluate mobile applications and provide examples of how things have been done wrong. Tom has used a variety of the top 25 applications downloaded from the Apple App Store and Google Play to provide real world examples of the problems applications face. Tom has mapped out how these applications are vulnerable to the OWASP Mobile Top 10 security issues.
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
Kevin Johnson, John Sawyer and Tom Eston have spent quite a bit of time evaluating mobile applications in their respective jobs. In this presentation they will provide the audience an understanding of how to evaluate mobile applications, examples of how things have been done wrong and an understanding of how you can perform this testing within your organization.
This talk will work with applications from the top three main platforms; iOS, Android and Blackberry. Kevin, Tom and John have used a variety of the top 25 applications for each of these platforms to provide real world examples of the problems applications face.
Internet of Things means every household or handy device which is used to make our world easy and better and connected with IP which transmit some data.
This slide covers IOT description, OWASP Top 10 2014 & its recommendations.
Smart Bombs: Mobile Vulnerability and ExploitationSecureState
Tom Eston has spent quite a bit of time evaluating mobile applications. In this presentation he will provide the audience with a high level understanding of what the risks are, how to evaluate mobile applications and provide examples of how things have been done wrong. Tom has used a variety of the top 25 applications downloaded from the Apple App Store and Google Play to provide real world examples of the problems applications face. Tom has mapped out how these applications are vulnerable to the OWASP Mobile Top 10 security issues.
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
Kevin Johnson, John Sawyer and Tom Eston have spent quite a bit of time evaluating mobile applications in their respective jobs. In this presentation they will provide the audience an understanding of how to evaluate mobile applications, examples of how things have been done wrong and an understanding of how you can perform this testing within your organization.
This talk will work with applications from the top three main platforms; iOS, Android and Blackberry. Kevin, Tom and John have used a variety of the top 25 applications for each of these platforms to provide real world examples of the problems applications face.
Internet of Things means every household or handy device which is used to make our world easy and better and connected with IP which transmit some data.
This slide covers IOT description, OWASP Top 10 2014 & its recommendations.
Viruși. Spam. Malware. Botnets. Phishing. Rootkits. Ce au toate în comun? Cum ne putem proteja? O detaliere a tendințelor din domeniu, cu soluții practice.
Tudor Damian - Comparing Microsoft Cloud with VMware CloudITSpark Community
The session plans to review the key capabilities of the latest release of Hyper-V and see how they match with the latest release of VMware vSphere across four key areas: scalability and performance, security and multi-tenant environments.
Mihai Tataran - Building web applications with HTML 5 and related technologiesITSpark Community
In today’s world, clients and users are more and more demanding when it comes to the applications they use. Whether we are talking about performance, fluid interface design, or availability on different screen sizes and devices, web applications need all these and even more. During this session we will explore how we can enrich the web user’s experience with technologies like: HTML5, web sockets (and Microsoft’s SignalR), and JavaScript libraries.
Managing code quality with SonarQube - Radu VunvuleaITSpark Community
In this session we will discover different metrics that can be used when we want to measure the code quality of a project. To calculate and interpret this metrics we will use SonarQube.
Viruși. Spam. Malware. Botnets. Phishing. Rootkits. Ce au toate în comun? Cum ne putem proteja? O detaliere a tendințelor din domeniu, cu soluții practice.
Tudor Damian - Comparing Microsoft Cloud with VMware CloudITSpark Community
The session plans to review the key capabilities of the latest release of Hyper-V and see how they match with the latest release of VMware vSphere across four key areas: scalability and performance, security and multi-tenant environments.
Mihai Tataran - Building web applications with HTML 5 and related technologiesITSpark Community
In today’s world, clients and users are more and more demanding when it comes to the applications they use. Whether we are talking about performance, fluid interface design, or availability on different screen sizes and devices, web applications need all these and even more. During this session we will explore how we can enrich the web user’s experience with technologies like: HTML5, web sockets (and Microsoft’s SignalR), and JavaScript libraries.
Managing code quality with SonarQube - Radu VunvuleaITSpark Community
In this session we will discover different metrics that can be used when we want to measure the code quality of a project. To calculate and interpret this metrics we will use SonarQube.
25. Produs Preț
Instalare adware 30 cenţi in US, până la 2 cenţi in alte ţări
Pachet malware, versiunea basic 1.000$ – 2.000$
Add-ons pentru pachete malware Preţuri variabile pornind de la 20$
Închiriere de “exploit” - o oră De la 0,99$ la 1$
Închiriere de “exploit” - 2,5 ore De la 1,60$ la 2$
Închiriere de “exploit” - 5 ore 4$
Troian nedetectabil 80$
Atac DDOS 100$ pe zi
Acces la 10.000 de PC-uri compromise 1.000$
Informaţii despre conturi bancare Preţuri variabile pornind de la 50$
Un milion de mesaje e-mail De la 8$ în sus
o listă de prețuri
Informațiile se refera la anul 2007, sursa: TrendMicro
26. Changes in the Threat Landscape
de la hackeri... ...la hoţi
”zgomotoși” și vizibili ”ninja”
motivaţi de faimă motivaţi financiar
fără discriminări ţinte precise
schimbări în amenințări
35. dacă am pune toate fișierele rele în
stânga și cele bune în dreapta...
36. ...am avea o distribuție ”long tail”
Nici o tehnică nu funcţionează
pentru cele zeci de milioane de
fișiere din această zonă de mijloc
(Și aici e și zona unde majoritatea
malware-ului se găsește)
fișiere rele fișiere bune
număr
Whitelisting
funcţionează aici
Pentru acest ”long tail” e
nevoie de o metodă nouă
Blacklisting
funcţionează aici
56. Botnet
Numărul de boți
estimat
Capacitatea de generare de
spam
Grum 600.000 40 miliarde mesaje pe zi
Bobax 100.000 27 miliarde mesaje pe zi
Cutwail 1.500.000 19 miliarde mesaje pe zi
Rustock 150.000 17 miliarde mesaje pe zi
Bagle 500.000 14 miliarde mesaje pe zi
top 5 botnets in 2010
58. Network C
Network B
Network A
Attacker
Computer
Computer
Computer
Workstation Workstation Workstation
Laptop
Computer
Computer Workstation
Broadcast Address
Broadcast Address
Broadcast Address
ICMP Echo
ICMP Echo
ICMP Echo
ICMP Echo
ICMP Echo
ICMP Echo
Target system
Replies from every
terminal in the
Network
Replies from every
terminal in the
Network
Replies from every
terminal in the
Network
Smurf
60. Attack
er
DNS 2
DNS 3
DNS 4
Target
Query with spoofed IP
Query with spoofed IP
Query with spoofed IP
Query with spoofed IP
Results from attackers query
Results from attackers query
Results from attackers query
Results from attackers query
DNS 1
DNS DoS
61. DDoS
Server Software
(Zombie)
Server Software
(Zombie)
Server Software
(Zombie)
Server Software
(Zombie)
Server Software
(Zombie)
Client Software
Command
CommandCommand
Target Host
Packets
Packets
Packets
Packets
Packets
Attacker
Client
Attacker’s Commands
Attacker’s Coomand
139. engineers begin knowing a little bit about a lot
they learn less and less about more and more
until they know nothing about everything
140. architects begin knowing a lot about a little
they learn more and more about less and less
until they know everything about nothing
141. contractors begin knowing
everything about everything
but end up knowing nothing about anything
because of their association
with architects and engineers
156. Win7 & Windows Server 2008 R2
(DirectAccess), UAC, non-admin
login, NAP, Active Directory (Group
Policy), autentificare cu certificate
(X.509), IPSec, IPv6 (Teredo), DNSv6,
Firewall, BitLocker, BitLocker to Go
etc.