SlideShare a Scribd company logo
The Great Firewall &
The Great Cannon
1
Ivan Ortega
@ivanortegaalba
Slides:
http://es.slideshare.net/IvanOrtega14
1
The Great Firewall
2
China and their censure policy
Until now China has been using its system:
Great Firewall
a part of
Golden Shield Project
3
Great Firewall
30.000 - 50.000 police agents involved.
800.000.000 $ invested
8 years
All this to censor the
Internet as we know it
4
How do Great Firewall block sites?
5
How do Great Firewall block sites?
1. The Great Firewall search in DNS servers if
the domain is censored
6
How do Great Firewall block sites?
1. The Great Firewall search in DNS servers if
the domain is censored
2. If IP is obtained, Great Firewall search if
this IP is saved as blocked
7
How do Great Firewall block sites?
1. The Great Firewall search in DNS servers if
the domain is censored
2. If IP is obtained, Great Firewall search if
this IP is saved as blocked
3. The Great Firewall analyse the URL to find
word forbidden
8
How do Great Firewall block sites?
1. The Great Firewall search in DNS servers if
the domain is censored
2. If IP is obtained, Great Firewall search if
this IP is saved as blocked
3. The Great Firewall analyse the URL to find
word forbidden
4. The Great Firewall search text forbidden
that is sowed as text plain 9
How do Great Firewall block sites?
1. The Great Firewall search in DNS servers if
the domain is censored
2. If IP is obtained, Great Firewall search if
this IP is saved as blocked
3. The Great Firewall analyse the URL to find
word forbidden
4. The Great Firewall search text forbidden
that is sowed as text plain 10
How do Great Firewall block sites?
1. The Great Firewall search in DNS
servers if the domain is censored
2. If IP is obtained, Great Firewall
search if this IP is saved as blocked
3. The Great Firewall analyse the URL to
find word forbidden
4. The Great Firewall search text
forbidden that is sowed as text plain
11
How do Great Firewall block sites?
1. The Great Firewall search in DNS
servers if the domain is censored
2. If IP is obtained, Great Firewall
search if this IP is saved as blocked
3. The Great Firewall analyse the URL to
find word forbidden
4. The Great Firewall search text
forbidden that is sowed as text plain
12
Forbidden sites
13
Forbidden sites
14
Alternatives
15
Alternatives
16
What is the
Great Cannon?
17
A Great Firewall with a Great Cannon
18
A Great Firewall with a Great Cannon
19
A Great Firewall with a Great Cannon
20
A Great Firewall with a Great Cannon
21
1. China establish IP targets to be attacked.
Mirror & Forbidden sites:
22
2. China ear the traffic from outside of China Network
to Baidu
23
3. China reroute a percent of this traffic and inject a
malicious JS
24
4. This malicious JS will do request constantly to target
server
25
Great Cannon discovered
Great cannon was discovered as result of DDoS on Github
repositories when a lot page was allocated as mirror of
forbidden sites.
https://www.fayerwayer.com/2015/04/asi-es-como-china-ataco-y-tumbo-github-con-su-gran-canon/ 26
Conclusion
China have a new weapon to censor by
force
China goverment don’t recognize this
attack and The Great Cannon but all
investigation point to this, so all this
is a augmented supposition
It’s effective? Now, Chinese people are
seeing the same pages attacked
27
Conclusion, bibliography and more to investigate
Citizen Lab investigation: https://citizenlab.
org/2015/04/chinas-great-cannon/
GreatFire.org: https://en.greatfire.
org/blog/2015/mar/chinese-authorities-compromise-millions-
cyberattacks
How the Grand Cannon was discovered: http://arstechnica.
com/security/2015/04/ddos-attacks-that-crippled-github-
linked-to-great-firewall-of-china/
28
Thank you!
Questions?
Ivan Ortega
@ivanortegaalba
Slides:
http://es.slideshare.net/IvanOrtega14 29

More Related Content

Viewers also liked

RESUME_JANEEN_P_POMASIN (1)
RESUME_JANEEN_P_POMASIN (1)RESUME_JANEEN_P_POMASIN (1)
RESUME_JANEEN_P_POMASIN (1)Janeen Pomasin
 
M2-1
M2-1M2-1
M2-1
IES JFK
 
buje tri funcional, qué es?
buje tri funcional, qué es?buje tri funcional, qué es?
buje tri funcional, qué es?
GAFF Official
 
Productos Nuevos Gaff Mayo 2016
Productos Nuevos Gaff Mayo 2016Productos Nuevos Gaff Mayo 2016
Productos Nuevos Gaff Mayo 2016
GAFF Official
 
Buje trifuncional aprovecha- hendrickson- 13510
Buje trifuncional aprovecha- hendrickson- 13510Buje trifuncional aprovecha- hendrickson- 13510
Buje trifuncional aprovecha- hendrickson- 13510
GAFF Official
 
Top 15 brands which you may find difficult to Say or pronounce
Top 15 brands which you may find difficult to Say or pronounce Top 15 brands which you may find difficult to Say or pronounce
Top 15 brands which you may find difficult to Say or pronounce
ajithnandanam
 
Power point effects of drug abuse
Power point effects of drug abusePower point effects of drug abuse
Power point effects of drug abuse
Shamori Williams
 
Prejardheja e shiptarve
Prejardheja e shiptarvePrejardheja e shiptarve
Prejardheja e shiptarve
JURIST
 
Prepositions and Case Theory
Prepositions and Case TheoryPrepositions and Case Theory
Prepositions and Case Theory
Diego Krivochen
 
Trashegimia kulturore arberore
Trashegimia kulturore arberoreTrashegimia kulturore arberore
Trashegimia kulturore arberore
joni pashaj
 
Bridging the Gap through Experiential Education: Planning and Implementing Ov...
Bridging the Gap through Experiential Education: Planning and Implementing Ov...Bridging the Gap through Experiential Education: Planning and Implementing Ov...
Bridging the Gap through Experiential Education: Planning and Implementing Ov...
North Carolina Association for Middle Level Education
 
Yeast two hybrid system for Protein Protein Interaction Studies
Yeast two hybrid system for Protein Protein Interaction StudiesYeast two hybrid system for Protein Protein Interaction Studies
Yeast two hybrid system for Protein Protein Interaction Studies
ajithnandanam
 
6 Lessons for nurturing creativity from Pixar
6 Lessons for nurturing creativity from Pixar6 Lessons for nurturing creativity from Pixar
6 Lessons for nurturing creativity from Pixar
Work Monkey Labs
 

Viewers also liked (14)

RESUME_JANEEN_P_POMASIN (1)
RESUME_JANEEN_P_POMASIN (1)RESUME_JANEEN_P_POMASIN (1)
RESUME_JANEEN_P_POMASIN (1)
 
M2-1
M2-1M2-1
M2-1
 
M1 1.D
M1 1.DM1 1.D
M1 1.D
 
buje tri funcional, qué es?
buje tri funcional, qué es?buje tri funcional, qué es?
buje tri funcional, qué es?
 
Productos Nuevos Gaff Mayo 2016
Productos Nuevos Gaff Mayo 2016Productos Nuevos Gaff Mayo 2016
Productos Nuevos Gaff Mayo 2016
 
Buje trifuncional aprovecha- hendrickson- 13510
Buje trifuncional aprovecha- hendrickson- 13510Buje trifuncional aprovecha- hendrickson- 13510
Buje trifuncional aprovecha- hendrickson- 13510
 
Top 15 brands which you may find difficult to Say or pronounce
Top 15 brands which you may find difficult to Say or pronounce Top 15 brands which you may find difficult to Say or pronounce
Top 15 brands which you may find difficult to Say or pronounce
 
Power point effects of drug abuse
Power point effects of drug abusePower point effects of drug abuse
Power point effects of drug abuse
 
Prejardheja e shiptarve
Prejardheja e shiptarvePrejardheja e shiptarve
Prejardheja e shiptarve
 
Prepositions and Case Theory
Prepositions and Case TheoryPrepositions and Case Theory
Prepositions and Case Theory
 
Trashegimia kulturore arberore
Trashegimia kulturore arberoreTrashegimia kulturore arberore
Trashegimia kulturore arberore
 
Bridging the Gap through Experiential Education: Planning and Implementing Ov...
Bridging the Gap through Experiential Education: Planning and Implementing Ov...Bridging the Gap through Experiential Education: Planning and Implementing Ov...
Bridging the Gap through Experiential Education: Planning and Implementing Ov...
 
Yeast two hybrid system for Protein Protein Interaction Studies
Yeast two hybrid system for Protein Protein Interaction StudiesYeast two hybrid system for Protein Protein Interaction Studies
Yeast two hybrid system for Protein Protein Interaction Studies
 
6 Lessons for nurturing creativity from Pixar
6 Lessons for nurturing creativity from Pixar6 Lessons for nurturing creativity from Pixar
6 Lessons for nurturing creativity from Pixar
 

Similar to Great Firewall & Great cannon

Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Zoltan Balazs
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
Zoltan Balazs
 
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataPacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
APNIC
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
IKT-Norge
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Cyren, Inc
 
Hunting Attackers with Network Audit Trails
Hunting Attackers with Network Audit TrailsHunting Attackers with Network Audit Trails
Hunting Attackers with Network Audit Trails
Lancope, Inc.
 

Similar to Great Firewall & Great cannon (6)

Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataPacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Hunting Attackers with Network Audit Trails
Hunting Attackers with Network Audit TrailsHunting Attackers with Network Audit Trails
Hunting Attackers with Network Audit Trails
 

More from Ivan Ortega

Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Ivan Ortega
 
Plan de empresa: Cómetec
Plan de empresa: CómetecPlan de empresa: Cómetec
Plan de empresa: Cómetec
Ivan Ortega
 
Presentación #hackathonugr ultimo día (1)
Presentación #hackathonugr ultimo día (1)Presentación #hackathonugr ultimo día (1)
Presentación #hackathonugr ultimo día (1)
Ivan Ortega
 
Presentación Evenge #hackathonugr
Presentación Evenge #hackathonugrPresentación Evenge #hackathonugr
Presentación Evenge #hackathonugrIvan Ortega
 
Proyect Evenge. Event manager
Proyect Evenge. Event managerProyect Evenge. Event manager
Proyect Evenge. Event manager
Ivan Ortega
 
Apache, getting the best version
Apache, getting the best versionApache, getting the best version
Apache, getting the best version
Ivan Ortega
 
Learning j query
Learning j queryLearning j query
Learning j query
Ivan Ortega
 
Implementing Telematic Services
Implementing Telematic ServicesImplementing Telematic Services
Implementing Telematic Services
Ivan Ortega
 

More from Ivan Ortega (8)

Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
 
Plan de empresa: Cómetec
Plan de empresa: CómetecPlan de empresa: Cómetec
Plan de empresa: Cómetec
 
Presentación #hackathonugr ultimo día (1)
Presentación #hackathonugr ultimo día (1)Presentación #hackathonugr ultimo día (1)
Presentación #hackathonugr ultimo día (1)
 
Presentación Evenge #hackathonugr
Presentación Evenge #hackathonugrPresentación Evenge #hackathonugr
Presentación Evenge #hackathonugr
 
Proyect Evenge. Event manager
Proyect Evenge. Event managerProyect Evenge. Event manager
Proyect Evenge. Event manager
 
Apache, getting the best version
Apache, getting the best versionApache, getting the best version
Apache, getting the best version
 
Learning j query
Learning j queryLearning j query
Learning j query
 
Implementing Telematic Services
Implementing Telematic ServicesImplementing Telematic Services
Implementing Telematic Services
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Great Firewall & Great cannon

  • 1. The Great Firewall & The Great Cannon 1 Ivan Ortega @ivanortegaalba Slides: http://es.slideshare.net/IvanOrtega14 1
  • 3. China and their censure policy Until now China has been using its system: Great Firewall a part of Golden Shield Project 3
  • 4. Great Firewall 30.000 - 50.000 police agents involved. 800.000.000 $ invested 8 years All this to censor the Internet as we know it 4
  • 5. How do Great Firewall block sites? 5
  • 6. How do Great Firewall block sites? 1. The Great Firewall search in DNS servers if the domain is censored 6
  • 7. How do Great Firewall block sites? 1. The Great Firewall search in DNS servers if the domain is censored 2. If IP is obtained, Great Firewall search if this IP is saved as blocked 7
  • 8. How do Great Firewall block sites? 1. The Great Firewall search in DNS servers if the domain is censored 2. If IP is obtained, Great Firewall search if this IP is saved as blocked 3. The Great Firewall analyse the URL to find word forbidden 8
  • 9. How do Great Firewall block sites? 1. The Great Firewall search in DNS servers if the domain is censored 2. If IP is obtained, Great Firewall search if this IP is saved as blocked 3. The Great Firewall analyse the URL to find word forbidden 4. The Great Firewall search text forbidden that is sowed as text plain 9
  • 10. How do Great Firewall block sites? 1. The Great Firewall search in DNS servers if the domain is censored 2. If IP is obtained, Great Firewall search if this IP is saved as blocked 3. The Great Firewall analyse the URL to find word forbidden 4. The Great Firewall search text forbidden that is sowed as text plain 10
  • 11. How do Great Firewall block sites? 1. The Great Firewall search in DNS servers if the domain is censored 2. If IP is obtained, Great Firewall search if this IP is saved as blocked 3. The Great Firewall analyse the URL to find word forbidden 4. The Great Firewall search text forbidden that is sowed as text plain 11
  • 12. How do Great Firewall block sites? 1. The Great Firewall search in DNS servers if the domain is censored 2. If IP is obtained, Great Firewall search if this IP is saved as blocked 3. The Great Firewall analyse the URL to find word forbidden 4. The Great Firewall search text forbidden that is sowed as text plain 12
  • 17. What is the Great Cannon? 17
  • 18. A Great Firewall with a Great Cannon 18
  • 19. A Great Firewall with a Great Cannon 19
  • 20. A Great Firewall with a Great Cannon 20
  • 21. A Great Firewall with a Great Cannon 21
  • 22. 1. China establish IP targets to be attacked. Mirror & Forbidden sites: 22
  • 23. 2. China ear the traffic from outside of China Network to Baidu 23
  • 24. 3. China reroute a percent of this traffic and inject a malicious JS 24
  • 25. 4. This malicious JS will do request constantly to target server 25
  • 26. Great Cannon discovered Great cannon was discovered as result of DDoS on Github repositories when a lot page was allocated as mirror of forbidden sites. https://www.fayerwayer.com/2015/04/asi-es-como-china-ataco-y-tumbo-github-con-su-gran-canon/ 26
  • 27. Conclusion China have a new weapon to censor by force China goverment don’t recognize this attack and The Great Cannon but all investigation point to this, so all this is a augmented supposition It’s effective? Now, Chinese people are seeing the same pages attacked 27
  • 28. Conclusion, bibliography and more to investigate Citizen Lab investigation: https://citizenlab. org/2015/04/chinas-great-cannon/ GreatFire.org: https://en.greatfire. org/blog/2015/mar/chinese-authorities-compromise-millions- cyberattacks How the Grand Cannon was discovered: http://arstechnica. com/security/2015/04/ddos-attacks-that-crippled-github- linked-to-great-firewall-of-china/ 28