SlideShare a Scribd company logo
SocialNetworkingSecurity
&
BackdooringEmail
Presented by 	

Syarif	

!
Seminar & Workshop Nasional Security System	

Malang, Juni 5 2011	

Universitas Muhammadiyah Malang
• http://www.google.com/search?
q=fl3xu5	

• http://fl3x.us
Whoami
Agenda
• Social Networking ?	

• Social Networking :Attacks & Defense	

• Backdooring Email 	

• There is No Privacy anymore :) 	

• How to protect your self
Social Networking ?
Facebook Statistics
Twitter Statistics
Facebook & twitter attack
Facebook & twitter attack
• Phishing
Facebook & twitter attack
• Session Hijacking	

• Firesheep
facebook & twitter defense
• Be a paranoid & don’t trust anyone on the internet	

• Never put some sensitive information carelessly	

• Keep your eyes, Always check the correct url 	

• Never Subscribe unauthorized applications	

• Always remember, wireless is not secure. Keep “safety” browsing :p	

• Always using https	

• etc
Email attack : Backdooring Email ;)
• Why ?	

• Email is very important	

• as a communication media	

• Email is a privacy 	

• Everything using email	

• User account : facebook, twitter, etc	

• Passwords	

• paypal account 	

• domain & hosting account
Email attack : Backdooring Email ;)
• Motivation ?	

• Just for fun :)	

• Jealous / Revenge	

• Get important data	

• Get Final Exam Task & Answer :p	

• Spy	

• Scamming	

• Money reason : paypal, etc	

• Domain & hosting take over
Email attack : Backdooring Email ;)
• Prelinimary ?	

• Social Engineering	

• password obtained by hacking other websites ~ one password for all
Backdooring Email ?Yes you can ;)
• Using what ? 	

• Why ?	

• most people using it	

• easy to use	

• could be used to impersonate :p	

• high capacity mailbox	

• 10 more accounts could be backdoored in one mailbox	

• no need to log in the target mailbox	

• could be used to backdoor all of mail accounts in some mail server :)
Demo
thereisnoprivacyanymore
someoneiswatchingyou
!
How to ProtectYourself ?
• Always Check Last Log in your email	

• Never put some sensitive information carelessly	

• Be a Paranoid, check the flag messages in your email 	

• Keep on your eyes to check mail in the inbox, sent, draft , and trash	

• Always keep your correct mail setting 	

• Never use “one password for all” :p	

• Changer your mail password regularly	

• don’t use a “weak” security question
Q & A
• twitter : fl3xu5	

• YM : fl3xu5
Thank you :)

More Related Content

What's hot

Communication
CommunicationCommunication
Communication
krmartens
 
Hacking
HackingHacking
Top 10 microblogging tools
Top 10 microblogging toolsTop 10 microblogging tools
Top 10 microblogging toolsiumstech
 
An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!
Joyce C. Arias
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
Devlog Integrated Services
 
Twitter General Basics June 2009
Twitter General Basics June 2009Twitter General Basics June 2009
Twitter General Basics June 2009
mollysly
 
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDUTwitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Joshua Murdock
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
sanjeev kumar
 
Twitter for teachers
Twitter for teachersTwitter for teachers
Twitter for teachers
Jennifer L. Scheffer
 
Go Incognito!
Go Incognito!Go Incognito!
Go Incognito!
Jhansi Pailla, GISP
 

What's hot (12)

Communication
CommunicationCommunication
Communication
 
Slideshare
SlideshareSlideshare
Slideshare
 
Hacking
HackingHacking
Hacking
 
Top 10 microblogging tools
Top 10 microblogging toolsTop 10 microblogging tools
Top 10 microblogging tools
 
An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!
 
Cel1
Cel1Cel1
Cel1
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
Twitter General Basics June 2009
Twitter General Basics June 2009Twitter General Basics June 2009
Twitter General Basics June 2009
 
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDUTwitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Twitter for teachers
Twitter for teachersTwitter for teachers
Twitter for teachers
 
Go Incognito!
Go Incognito!Go Incognito!
Go Incognito!
 

Viewers also liked

iCrOSS 2013_Pentest
iCrOSS 2013_PentestiCrOSS 2013_Pentest
iCrOSS 2013_Pentest
M.Syarifudin, ST, OSCP, OSWP
 
IPTV Security
IPTV SecurityIPTV Security
Prepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec ProfessionalPrepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec Professional
M.Syarifudin, ST, OSCP, OSWP
 
My pwk & oscp journey
My pwk & oscp journeyMy pwk & oscp journey
My pwk & oscp journey
M.Syarifudin, ST, OSCP, OSWP
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
M.Syarifudin, ST, OSCP, OSWP
 
Wireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek KominfoWireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek Kominfo
M.Syarifudin, ST, OSCP, OSWP
 

Viewers also liked (7)

iCrOSS 2013_Pentest
iCrOSS 2013_PentestiCrOSS 2013_Pentest
iCrOSS 2013_Pentest
 
IPTV Security
IPTV SecurityIPTV Security
IPTV Security
 
Prepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec ProfessionalPrepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec Professional
 
My pwk & oscp journey
My pwk & oscp journeyMy pwk & oscp journey
My pwk & oscp journey
 
Information gath
Information gathInformation gath
Information gath
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
Wireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek KominfoWireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek Kominfo
 

Similar to Social Network Security & Backdooring email

Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social changeBill Chea
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safetybenlangley-efc
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
Luis Grangeia
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
Barry Caplin
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag501 Commons
 
WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020
stk_jj
 
Phishing
PhishingPhishing
Internet safety update
Internet safety updateInternet safety update
Internet safety update
14071828
 
7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx
Mumara Campaigns
 
Internet and Social Media for Beginners
Internet and Social Media for BeginnersInternet and Social Media for Beginners
Internet and Social Media for Beginners
becarreno
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
Brian T. O'Hara CISA, CISM, CRISC, CCSP, CISSP
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 
Social media security
Social media securitySocial media security
Social media security
Mosoco Ltd
 
Email final1111111111111111111111111.ppt
Email final1111111111111111111111111.pptEmail final1111111111111111111111111.ppt
Email final1111111111111111111111111.ppt
TechflowIndia
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
zaimorkai
 
Phishing
PhishingPhishing
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
jitiyaashwin
 
Tablets, Apps and Cybersecurity
Tablets, Apps and CybersecurityTablets, Apps and Cybersecurity
Tablets, Apps and Cybersecurity
Open University and others
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
Jonathan Bacon
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
Andrew Schwabe
 

Similar to Social Network Security & Backdooring email (20)

Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
 
WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020
 
Phishing
PhishingPhishing
Phishing
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx
 
Internet and Social Media for Beginners
Internet and Social Media for BeginnersInternet and Social Media for Beginners
Internet and Social Media for Beginners
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Social media security
Social media securitySocial media security
Social media security
 
Email final1111111111111111111111111.ppt
Email final1111111111111111111111111.pptEmail final1111111111111111111111111.ppt
Email final1111111111111111111111111.ppt
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 
Phishing
PhishingPhishing
Phishing
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Tablets, Apps and Cybersecurity
Tablets, Apps and CybersecurityTablets, Apps and Cybersecurity
Tablets, Apps and Cybersecurity
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

Social Network Security & Backdooring email

  • 1. SocialNetworkingSecurity & BackdooringEmail Presented by Syarif ! Seminar & Workshop Nasional Security System Malang, Juni 5 2011 Universitas Muhammadiyah Malang
  • 3. Agenda • Social Networking ? • Social Networking :Attacks & Defense • Backdooring Email • There is No Privacy anymore :) • How to protect your self
  • 8. Facebook & twitter attack • Phishing
  • 9. Facebook & twitter attack • Session Hijacking • Firesheep
  • 10. facebook & twitter defense • Be a paranoid & don’t trust anyone on the internet • Never put some sensitive information carelessly • Keep your eyes, Always check the correct url • Never Subscribe unauthorized applications • Always remember, wireless is not secure. Keep “safety” browsing :p • Always using https • etc
  • 11. Email attack : Backdooring Email ;) • Why ? • Email is very important • as a communication media • Email is a privacy • Everything using email • User account : facebook, twitter, etc • Passwords • paypal account • domain & hosting account
  • 12. Email attack : Backdooring Email ;) • Motivation ? • Just for fun :) • Jealous / Revenge • Get important data • Get Final Exam Task & Answer :p • Spy • Scamming • Money reason : paypal, etc • Domain & hosting take over
  • 13. Email attack : Backdooring Email ;) • Prelinimary ? • Social Engineering • password obtained by hacking other websites ~ one password for all
  • 14. Backdooring Email ?Yes you can ;) • Using what ? • Why ? • most people using it • easy to use • could be used to impersonate :p • high capacity mailbox • 10 more accounts could be backdoored in one mailbox • no need to log in the target mailbox • could be used to backdoor all of mail accounts in some mail server :)
  • 15. Demo
  • 18. How to ProtectYourself ? • Always Check Last Log in your email • Never put some sensitive information carelessly • Be a Paranoid, check the flag messages in your email • Keep on your eyes to check mail in the inbox, sent, draft , and trash • Always keep your correct mail setting • Never use “one password for all” :p • Changer your mail password regularly • don’t use a “weak” security question
  • 19. Q & A • twitter : fl3xu5 • YM : fl3xu5