SlideShare a Scribd company logo
TRUSTED FRIEND
ATTACK:
GUARDIAN ANGELS STRIKE
Atalk byAshar Javed
@
HackIn The Box,14- 17 October 2013
Kuala Lumpur,Malaysia (HITBSecConf2013)
GRAPH IS BIG
http://theweek.com/article/index/239514/4-things-we-
learned-from-facebooks-confounding-earnings-report
WHO AM I?
A RESEARCHER IN R UHR- U NIVERSITY B OCHUM, RUB ,
GERMANY
A STUDENT WORKING TOWARDS HIS PHD
LISTED IN ALMOST EVERY HALL OF FAME PAGES
@soaj1664ashar
SOME OF YOU WILL WISH FOR THIS FEATURE
...
A SHORT STORY
https://twitter.com/dimitribest/status/230677638358900736
A PASTE@PASTEBIN
http://pastebin.com/ajaYnLYc
WHO TO BLAME?
http://cher-homespun.blogspot.de/2011/07/curiosity-killed-cat-but-satisfaction.html
AFTER TESTING 3 TO 4 RANDOM ACCOUNTS
FROM THE PASTEBIN'S PASTE I FOUND
AN INNOCENT QUESTION ...
WhyisFacebook asking onsomebody's account?
This is me
This isn't me
&
What would beyour answer, if you arean attacker :-)
LEGITIMATE PASSWORD RECOVERY FLOW
You haveanemail addressbutFORGOTYOUR PASSWORD
STEP (1)
Go To https://www.facebook.com/
Click "Forgot YourPassword?"
Provideemail address andclick on "Search"button!
STEP (2)
Enter Your Email,Phone,Username or Full Name
https://www.facebook.com/login/identify?ctx=recover
STEP (3)
Choose your "Password Reset Method" & click"Continue"
STEP (4) A
Receivedpassword secret codeviaemail
Enter code thatyou have receivedinemail & click"Continue"
STEP (4) B
Entry-Point for the SECRET CODERECEIVED:
STEP (5)
Set "New Password"
STEP (6)
WelcometoFacebook, MSc.Ashar
INFORMATIVE EMAIL FROM FACEBOOK
WHAT IF YOU LOST OR FORGOT BOTH
EMAIL ADDRESS
+
PASSWORD
FACEBOOK HAD A SOLUTION NAMED
TRUSTED FRIENDS (TF)
""TF IS BASED ON SOCIAL AUTHENTICATION""
&
"BringingSocialtoSecurity "isGOOD
BUT ...
http://www.cl.cam.ac.uk/~rja14/Papers/socialauthentication.pdf
TRUSTED FRIENDS FEATURE
Introduced in October 2011
(
)
https://www.facebook.com/notes/facebook-
security/national-cybersecurity-awareness-month-
updates/10150335022240766
TRUSTED FRIENDS
"It'ssort ofsimilar to givinga house key to yourfriendswhen
you go onvacation--pick the friends youmost trustincaseyou
need theirhelp"
https://www.facebook.com/notes/facebook-security/national-cybersecurity-awareness-
month-updates/10150335022240766
TRUSTED FRIENDS ACCORDING TO
READWRITE:
"" Who Wants ToBeA Millionaire" lifelineconcept- except it's
not a one-timedeal."
http://readwrite.com/2011/10/27/facebook_adds_security_features_trusted_friends_ap#awesm=~ohkTq
GUARDIAN ANGELS
http://sophosnews.files.wordpress.com/2011/10/facebook-
security-infographic.pdf
HOW TRUSTED FRIENDS FEATURE WORKS?
LIST # 1
LIST # 2
LIST # 3
REVIEW FRIENDS
ENTER CODES & GAIN ACCESS TO YOUR
ACCOUNT
SCREEN-SHOT OF FAKE PROFILE
4 DIGIT CODE
ANOTHER INFORMATIVE EMAIL TO
LEGITIMATE USER FROM FACEBOOK
600,000+ COMPROMISED ACCOUNT LOGINS
EVERY DAY ON FACEBOOK, OFFICIAL FIGURES
REVEAL ( )HTTP://GOO.GL/FNP27Q
by
https://twitter.com/gcluley
@GCLULEY NOTED IN HIS POST
HTTP://GOO.GL/FNP27Q
QUESTION YOU MIGHT THINKING ...
THREAT MODEL
Attacker isonvictim's friends'list &cancreatenew email
address(es) thatare requiredfor compromising accounts.
Attacker can onlyleverage "forgot yourpassword"functionality
inorder to compromise accountsand atthe same timewedon't
consider "compromisingofanemail accountsoflegitimate
user(s)"
EMAIL ADDRESS MUST BE NEW FOR EVERY
TARGET
FACEBOOK FRIEND VS REAL LIFE FRIEND
http://blogs.mcafee.com/consumer/fake-friends
A SHORT FUN STUDY
Created3 FAKEACCOUNTS andsend Friendship requeststo
TWENTY ( 20 ) friends of mine on Facebook.
After some time, 8 friendshave acceptedall3 requests
DATA SCIENCE OF THE FACEBOOK WORLD
On average aFacebook user has 342 friends!
DO YOU THINK ALL 342 ARE REAL LIFE FRIENDS ALSOOR
JUST FACEBOOK FRIENDS OR WHAT ...?
http://blog.stephenwolfram.com/2013/04/data-science-of-the-
facebook-world/
SUMMARIZE EVERYTHING ABOUT FACEBOOK
& REAL LIFE FRIENDS
http://www.lolroflmao.com/2012/02/24/he-had-over-2000-friends-on-facebook-i-thought-it-would-have-more-people-here/
TRUSTED FRIEND ATTACK (TFA)
Inorder to startTFA, we needvictim's Facebookusername and
FYI, it is PUBLIC INFORMATION & part of FacebookURL.
e.g.,
https://www.facebook.com/ashar.javed
" "
ONCE TARGET SELECTED
Repeatthe "Forgot YourPassword" processas mentioned
before until STEP (3) i.e.,
No longer haveaccesstothese?
NO LONGER HAVE ACCESS TO THESE?
sometimes opensthefollowingdialog box(old &new version) :)
HOWAWESOMETHEY ARE?:-)
https://www.facebook.com/recover/extended
Inorder to findtheanswer of" sometimes ",I didan empirical
study (discusslater).
QUESTIONS...
How canFacebook bindthis new emailaddress or phone
number tothe legitimate user's address or phone?
How can Facebookdifferentiatebetweenanaccountrecovery
procedurestarted bya legitimateuser and the one startedby an
attacker?
Is it evenpossible?
Ithink NO!
CREATE NEW EMAIL ADDRESS AND ENTER IN
THE PREVIOUS DIALOG BOX & HERE YOU
HAVE:
QUESTION
WhyisFacebook exposingtheoneselected PRIVATE
SECURITY QUESTION in front ofthe ATTACKER?
Facebook is providinganoptiontotheattacker thathe canselect
from two routes i.e.,
1. Answer SecurityQuestion
2. Choose Three Friends of Attacker's Choice
TFA'S VARIATIONS/FORMS
1. Involveoneattacker i.e., the casewhere attacker will answer
theexposedsecurity question
2. Involvethree friendsi.e., the casewhere attacker chooses three
friendsofhischoice
ATTACKER CHOOSES TRUSTED FRIENDS PATH
ATTACKER'S CHOICES
Do selection offriends in anormalmanner evenwithout
POST-DATA manipulation ( works 100%)
Tryto sendcodes to hiscontrolledaccounts thatarenot on
victim's friendlist.( Doesn't work)
Tryto sendcodes to an attacker's controlled accountsthat are
on victim'sfriendlist but not in the presented listsoftrusted
friends. (works 50% )
Tryto sendcodes to an attacker's controlled accountsthat are
on the presented listof trustedfriendsand use POST-DATA
manipulation (defeat Facebook's shortenof listitems). ( works
100% )
Tryto sendallcodesto himself(evil idea). ( Doesn't work)
POST-DATA MANIPULATION
lsd=AVo8FV8K&profileChooserItems ={"511543064":1}&
checkableitems[] =511543064
511543064ismy Facebooknumeric ID.
HOW TO GET THE FACEBOOK'S USER ID?
Facebook'suser numeric ID isnot public information mostofthe
time and it isnot part of URL all thetime!
https://developers.facebook.com/tools/explorer/?
method=GET& ?fields=id,name
ANSWER: GRAPH API EXPLORER BY
FACEBOOK
path=VICTIM-USERNAME
URL lookslike:
EVIL IDEA
https://www.facebook.com/guardian/confirm.php?
guardians[0]=511543064&guardians[1]=511543064&guardians[2]=511543064
&cuid=AYhhCnxPb9g8xVAUGmuPh4e33s2NcCRj8Qng7wKGN7fxe9hXTQtVUKr0Rm-
0LBeTOCX_Es83lN0_BGe8Yi2GG7iGRbZwIL5rNXktD1mSsnW-
ZFD2fZB1Z7lLuyYdQ4GWPbf9bzhik9zXBpNeOsvUv-
MpzCcAQT2jxLtEa25YGlg_qg&cp=testpurposexss@gmail.com
EVIL IDEA DOESN'T WORK
Facebookcorrectly says:
INTERESTING MESSAGE FROM FACEBOOK
WHAT DOES IT MEAN?
Ithink it means thatif an attacker selecthimself or any particular
account3 to 5times for different victimsthenFacebook's block
access to particular account!
URL MANIPULATION'S RESULT! I.E.,
FACEBOOK'S EMAIL WITH NO FRIENDS'
NAMES
CHAIN TRUSTED FRIENDS ATTACK (CTFA)
InCTFA, attacker can make a chainof compromisedaccounts
and with thehelpofchain he may compromisedaccount(s)that
are evennotinhisfriends list.
FACEBOOK'S DEFAULT & FIXED SECURITY
QUESTIONS SET
FACEBOOK'S SECURITY QUESTIONS SCREEN-
SHOT!
EXCERTS FROM "MIND READER" VIDEO
https://www.youtube.com/watch?v=F7pYHN9iC9I
HOW TO GET THE ANSWERS OF THESE
QUESTIONS?
ACCORDING TO "ME"
Followingways worklike charm:
-- Incase ofsocial network, answer can be foundonpublic profile.
-- Directly ask the answer viaroutine Facebook chat...most of the
time you will getthe answer.
-- Make aQUIZ related to securityquestion and postto yourfriends.
-- In case of family membersorclose friends,youalready know the
answer.
Question:
Remark:
ANOTHER BAD SECURITY PRACTICE
https://www.facebook.com/help/163063243756483
Whathappens ifa userrealize after
answering/settingthequestion thathehaschosena weak
answer?
In caseof compromisedaccounts,if attacker has
proceeded via answering the securityquestion,hecandothe
samething sometime after because "QnA"remains same.
INCONSISTENCY IN SECURITY QUESTIONS'
USER INTERFACE
WHAT IS YOUR REACTION IF YOU HAVE TO
GIVE AN ANSWER TO A SECURITY
QUESTION(S) THAT IS NOT EVEN A PART OF
FACEBOOK'S DEFAULT SECURITY QUESTIONS'
LIST?
MY REACTION :-)
SECURITY QUESTION # 1
SECURITY QUESTION # 2
https://www.facebook.com/
HOW CAN A LEGITIMATE USER GIVE AN
ANSWER TO A SECURITY QUESTION THAT HE
HAS NEVER SET?
No Way ...BUT
I know theanswer that workssometimes :-)
https://www.facebook.com/ashar.javed(ajaved)
mscashar.javed (mjaved)
EMPIRICAL STUDY
Testedreal250 accountsofmy friendsonFacebook.
In 181 cases, Facebookdoesn'tallow us to proceed ...It means no
securityquestion exposed + nooptionoftrustedfriends
In69cases,Facebook allows ustoPROVIDEa NEWEMAIL
ADDRESSandonce provided, wecanhave either security
questionexposedor trusted friends featureappearsor BOTH
If asanattacker, we click on" "
181 CASES WE GOT ...
I Cannot AccessMyEmail
181 CASES (NO EMAIL ACCESS ... WE ARE
SORRY)
https://www.facebook.com/recover/extended/ineligible
IN 69 CASES
Facebookexposed the selectedsecurity questionofthevictim
OR
OptionofTrusted friends' selection
OR
Choiceamong above two options
11 OUT OF 69 ACCOUNTS COMPROMISED
Out of 11 compromised accounts
8 byansweringsecurity question
AND
3 usingtrusted friends feature
ENOUGHFORPOC! #ofcompromised accountscanbe easily
raisedto20-25 but requiresmore work& motivation :-)
SOME INTERESTING OBSERVATIONS
ON FACEBOOK ANYBODY CAN SEND ANYONE A
PASSWORD RESET REQUEST IF HE KNOWS
THE USERNAME WHICH IS PUBLIC
INFORMATION
Attacker doesn't haveaccesstovictim's emailbox inorder to get
thevalid 6 digitcode but he has the above dialog box in frontof
him ...
AT THE SAME TIME DENIAL-OF-SERVICE
(DOS) VICTIM
What ifattacker will enter 20-30 times wrongsecretcode?
" "will benastyexperiencefor thevictim!
We callthis " "
HERE YOU GO:
Tryagain later
Password Reset DoS
In this way,attacker canforce victim to use emailaddress or
phone andifvictim haslost his emailaddress ....
IDENTIFY ACCOUNT ANOTHER WAY
WORST THING
MY FRIEND'S REACTION ON WORST THING
ANOTHER TYPE OF DOS ON FACEBOOK
TRUSTED FRIEND FEATURE DOS
If an attacker hasstarted the passwordrecovery usingTFandat
thesame timevictim tries to use thisfeature...hewill receive the
followingmessage from Facebook
FACEBOOK'S SECURITY MEASURES & HOW
LEGITIMATE USERS REACT & THEIR
BYPASSES
THIS IS HOW COMMON USERS USE
FACEBOOK...
1) SECURITY ALERT VIA EMAIL OR MOBILE
SMS
As soonasattacker starts an account recoveryvia"password
reset" functionality,Facebook immediatelysends an emailor sms
alert tothe legitimate user.
USERS' REACTION ON THIS EMAIL OR SMS
USERS' REACTION ON THIS EMAIL OR SMS
In order torecognize device,Facebook uses
etc.
Whathappensifattacker clicks on " "button?
2) TEMPORARILY LOCKED
OS,IP Address,
Browser &Estimated Location
Continue
WHAT HAPPENS IF AN ATTACKER CLICKS ON "
CONTINUE " BUTTON?
(1)
Click" "after selecting one of the option butremember
whoisdoing selection?
(2)
Continue
An ATTACKER
(3)
(4)
(5)
(6)
(7)
(8)
ANOTHER INTERESTING ASPECT IN CASE IF
LEGITIMATE USER WILL BE ABLE TO REGAIN
ACCESS TO HIS ACCOUNT
REMEMBER (5TH STEP) I.E.,
SNAPSHOT OF ATTACKER'S EMAIL BOX
RECOGNIZED DEVICES
3) 24 HOUR LOCKED-OUT PERIOD
As an attacker this isthe biggest hurdle to cross...
DISAVOW PROCESS
Legitimate user can"disavow"theprocess any timeby clicking
on the linkintheemailhe receivedfrom Facebookor making
Facebook activityduringthis time.
BUT
Majorityoftheusers,as shown in users' reaction consider
Facebook'sinformative/warning emails as spam.
FOR A MOMENT FORGOT DISAVOW
24 HOUR LOCKED OUT PERIOD STARTS LIKE
THAT ...
24 HOUR LOCKED OUT PERIOD ...
24 HOUR LOCKED OUT PERIOD ...
24 HOUR LOCKED OUT PERIOD ...
GAME OVER FOR VICTIM...
HERE WE GO...
ANOTHER EMAIL FROM FACEBOOK AND
LEAKED EMAIL ADDRESS OF THE VICTIM
ETHICAL CONSIDERATIONS
FirstReported toFacebook on19-08-2012
On 23-08-2012, Igotthefollowinganswer from Facebook
SecurityTeam:
TWO QUESTIONS CAME TO MY MIND AFTER
READING THE EMAIL...
Isthere any attack thatisnotvery welltargeted?
Where issocialengineering in this attack?
ON 24-08-2012
BUT I HAVE WAITED UNTIL THE COMPLETE
EMPIRICAL STUDY & AGAIN SENT THE
TECHNICAL REPORT/RESEARCH PAPER ON
27-06-2013
ANSWER FROM SECURITY TEAM ON 09-09-
2013
SORRY FACEBOOK :-(
It doesn't makes sensetoreproduce thisattackonTEST
ACCOUNTS...
The results wouldlook likeFAKE.
ON THE OTHER HAND ...
Our approach issimilar toa recently publishedacademic paper in
Second International Workshopon PrivacyandSecurity in
Online Social Media
Co-located withWWW2013
(
)
http://precog.iiitd.edu.in/events/psosm2013/9psosm3s-
parwani.pdf
FINALLY
All compromisedaccounts are up,runningandunder thecontrol
of their legitimateusers!
YET ANOTHER OBSERVATION I.E., MASKED
EMAIL ADDRESS AND PHONE #
WHERE IS MASKING? EMAIL ADDRESS
EXPOSED
AFTER 5-10 MINUTES MASKING AFFECT
APPEARS
WHAT ABOUT OTHER 49 SOCIAL NETWORKS'
PASSWORD RESET FUNCTIONALITY?
200 millionactive users (Feb2013) +Alexa Rank#11
( )
TWITTER (HTTPS://TWITTER.COM/?
LANG=EN)
http://en.wikipedia.org/wiki/Twitter
ANYBODY CAN SEND ANYBODY A PASSWORD
RESET REQUEST WITH THE HELP OF
TWITTER'S USERNAME WHICH IS PUBLIC
INFORMATION :-(
JUST FOR FUN ...
I REPORTED THIS TO TWITTER SECURITY
TEAM & THIS IS WHAT THEY THINK ABOUT IT
BUT NOW TWITTER HAS ...
MAT HONAN'S STORY
http://www.wired.com/gadgetlab/2012/08/apple-amazon-
mat-honan-hacking/all/
SUPPORT TEAMS
SUPPORT TEAM'S JOB
To helpcustomers...
CAN ALSO BE USED TO COMPROMISE
ACCOUNTS :-)
OUR METHODOLOGY BY KEEPING IN MIND
THREAT MODEL
Registeredthe followingemailaddressonsocialnetworks:
user1@bletgen.net
AND
The followingistheattacker'saddress and goalis to compromise
the victim'saccountlabelled withabove email address
jim@mediaob.de
Attacker's addressis noteven registered onsocialnetworks!
ACADEMIA ( )HTTP://WWW.ACADEMIA.EDU/
OUR EMAIL TO ACADEMIA
INITIAL RESPONSE FROM ACADEMIA
FINAL RESPONSE OF ACADEMIA SUPPORT
TEAM
FREIZEITFREUNDE (A GERMAN-SPECIFIC
SOCIAL NETWORKING SITE)
( )HTTP://WWW.FREIZEITFREUNDE.DE/
OUR EMAIL TO THEM ...
FREIZEITFREUNDE'S SUPPORT TEAM
RESPONSE
LOKALISTEN (A GERMAN SOCIAL
NETWORKING SITE )
( )HTTP://WWW.LOKALISTEN.DE/
INITIAL RESPONSE ON OUR TICKET
OUR RESPONSE WITHOUT ""DATE OF BIRTH""
LOKALISTEN'S SUPPORT TEAM FINAL
RESPONSE
MEETUP
( )HTTP://WWW.MEETUP.COM/FIND/
SUPPORT TEAM BLOCKS ACCOUNT :)
GETGLUE (SOCIAL NETWORKS FOR TV FANS)
HTTP://GETGLUE.COM/FEED
OUR EMAIL TO THEIR SUPPORT TEAM
GETGLUE'S SUPPORT TEAM RESPONSE
They set thenew password for us i.e.,"temp " :)
DELICIOUS ( )HTTPS://DELICIOUS.COM/
DELICIOUS'S SUPPORT TEAM RESPONSE
They have switchedthe emailaddress from victims'toan
attacker controlled email address and havesent passwordreset
linkto the attacker'semail address.
FACEBOOK AS SSO
Outof50surveyed social networks,wefound
26 use Facebook aslogin-provider (SSO)
24 don'thave this feature
IMPLICATIONS OF FACEBOOK CONNECT
(1 MILLION WEBSITES HAVE INTEGRATED
WITH FACEBOOK)*+ ACCOUNT HACK
Controls emailaccounte.g.,Yahoo
Go for shoppinge.g.,Etsy
Create havoc for victim :)
79%ofsocialmedia log insby online retailers are with
Facebook ( )
60 millionusers of FacebookConnectin2009 accordingto
TechCrunchreport( )
http://socialmediatoday.com/node/1656466
http://goo.gl/a6lsCx
*http://goo.gl/x8BKe
HAVOC EXAMPLES
http://goo.gl/2FVTz8
http://goo.gl/uuO7Kq
GUIDELINES FOR USERS
Do not ignore email or SMS alertfrom Facebook
Do not place TOO MUCHinformation onsocialnetwork
Do not accept friend requestsfrom strangers
Enable log-in notifications
GUIDELINES FOR SOCIAL NETWORKS
Train your supportteams.
Facebook should raisethe bar as far ascommunicationwith
theresearchersor bugsubmitters isconcerned.
For Facebook: Please don't send TOOMANYEMAILSbecause
users startbelievingthat thesearespam emails.
Joewrote in his post( ):
In caseofTFA,Facebook failed in "CORRECTLY
IDENTIFYINGandREALIZATION OFAN INFORMATION
FLOWPROBLEM "
http://goo.gl/Wf6QMZ
FOR FACEBOOK
I HOPE NOW FACEBOOK SECURITY TEAM'S
REACTION
THANKS!

More Related Content

What's hot

15k Followers In 90 Days
15k Followers In 90 Days15k Followers In 90 Days
15k Followers In 90 Days
arwa10
 
Online Security
Online SecurityOnline Security
Online Security
Amanda L. Goodman
 
pirater un compte fb
pirater un compte fb
pirater un compte fb
pirater un compte fb
thinkablecan9759
 
Spam works
Spam worksSpam works
Spam works
jallinasmith
 
Dangers of Facebook
Dangers of FacebookDangers of Facebook
Dangers of Facebook
amir khaled
 
Danger of facebook
Danger of facebookDanger of facebook
Danger of facebook
amir khaled
 
What is hacking
What is hackingWhat is hacking
What is hacking
MuhammadUmer411
 
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
RapidSSLOnline.com
 
Scalable Link Building
Scalable Link BuildingScalable Link Building
Scalable Link Building
Venchito Tampon
 
GOOGLE pure SPAM - How does pure spam look like
GOOGLE pure SPAM - How does pure spam look like GOOGLE pure SPAM - How does pure spam look like
GOOGLE pure SPAM - How does pure spam look like
Harald Tschuggnall
 
Penguin recovery penalty
Penguin recovery penaltyPenguin recovery penalty
Penguin recovery penalty
Nilesh Parekh
 
Penguin 2.0 Update - Link Risk Management
Penguin 2.0 Update - Link Risk ManagementPenguin 2.0 Update - Link Risk Management
Penguin 2.0 Update - Link Risk Management
Harald Tschuggnall
 
Social bookmarking websites by
Social bookmarking websites bySocial bookmarking websites by
Social bookmarking websites by
Ravi chouhan
 
Personal internet security
Personal internet securityPersonal internet security
Personal internet security
Mostafa Siraj
 
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
Sarah M. Smart
 
CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingPrathan Phongthiproek
 
Thabet company socail media
Thabet company socail mediaThabet company socail media
Thabet company socail media
THABET - THA CASINO - Nhà Cái THABET
 
7 Current facts about Internet and WWW
7 Current facts about Internet and WWW7 Current facts about Internet and WWW
7 Current facts about Internet and WWW
Syahrul Nizam Junaini
 
Use an Initial Social Media Blast to Increase Your Visibility
Use an Initial Social Media Blast to Increase Your VisibilityUse an Initial Social Media Blast to Increase Your Visibility
Use an Initial Social Media Blast to Increase Your Visibility
lance carlson
 

What's hot (20)

15k Followers In 90 Days
15k Followers In 90 Days15k Followers In 90 Days
15k Followers In 90 Days
 
Online Security
Online SecurityOnline Security
Online Security
 
pirater un compte fb
pirater un compte fb
pirater un compte fb
pirater un compte fb
 
Spam works
Spam worksSpam works
Spam works
 
Dangers of Facebook
Dangers of FacebookDangers of Facebook
Dangers of Facebook
 
Danger of facebook
Danger of facebookDanger of facebook
Danger of facebook
 
Test
TestTest
Test
 
What is hacking
What is hackingWhat is hacking
What is hacking
 
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
 
Scalable Link Building
Scalable Link BuildingScalable Link Building
Scalable Link Building
 
GOOGLE pure SPAM - How does pure spam look like
GOOGLE pure SPAM - How does pure spam look like GOOGLE pure SPAM - How does pure spam look like
GOOGLE pure SPAM - How does pure spam look like
 
Penguin recovery penalty
Penguin recovery penaltyPenguin recovery penalty
Penguin recovery penalty
 
Penguin 2.0 Update - Link Risk Management
Penguin 2.0 Update - Link Risk ManagementPenguin 2.0 Update - Link Risk Management
Penguin 2.0 Update - Link Risk Management
 
Social bookmarking websites by
Social bookmarking websites bySocial bookmarking websites by
Social bookmarking websites by
 
Personal internet security
Personal internet securityPersonal internet security
Personal internet security
 
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
 
CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google Hacking
 
Thabet company socail media
Thabet company socail mediaThabet company socail media
Thabet company socail media
 
7 Current facts about Internet and WWW
7 Current facts about Internet and WWW7 Current facts about Internet and WWW
7 Current facts about Internet and WWW
 
Use an Initial Social Media Blast to Increase Your Visibility
Use an Initial Social Media Blast to Increase Your VisibilityUse an Initial Social Media Blast to Increase Your Visibility
Use an Initial Social Media Blast to Increase Your Visibility
 

Similar to Trusted Friend Attack: Guardian Angels Strike

Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Marco Balduzzi
 
Youemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptx
Youemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptxYouemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptx
Youemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptx
YoueminAngeRoxaneMie
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
Rob Gillen
 
Social engineering via social media
Social engineering via social mediaSocial engineering via social media
Social engineering via social media
b coatesworth
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook Account
KANKIPATI KISHORE
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
Allison Carr Waechter
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
Joint Base Myer-Henderson Hall
 
security procedures
security procedures
security procedures
security procedures
offbeatnominee633
 
Is it good to be paranoid ?
Is it good to be paranoid ?Is it good to be paranoid ?
Is it good to be paranoid ?
Subramanyan Murali
 
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Daniel Billing
 
Social Media Breakfast Edmonton: Optimizing Your Social Presence
Social Media Breakfast Edmonton: Optimizing Your Social PresenceSocial Media Breakfast Edmonton: Optimizing Your Social Presence
Social Media Breakfast Edmonton: Optimizing Your Social Presence
Dana DiTomaso
 
Persona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole WebPersona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole WebFrancois Marier
 
2013 State of Social Media Spam Research Report
2013 State of Social Media Spam Research Report2013 State of Social Media Spam Research Report
2013 State of Social Media Spam Research Report
Prayukth K V
 
hacker un compte facebook
hacker un compte facebook 
hacker un compte facebook
hacker un compte facebook
unsightlyoaf4043
 
How Social Media Can Enhance Your Personal Brand
How Social Media Can Enhance Your Personal BrandHow Social Media Can Enhance Your Personal Brand
How Social Media Can Enhance Your Personal Brand
Leslie Bradshaw
 

Similar to Trusted Friend Attack: Guardian Angels Strike (20)

Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
 
Youemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptx
Youemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptxYouemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptx
Youemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptx
 
hwk1
hwk1hwk1
hwk1
 
hwk1
hwk1hwk1
hwk1
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
Social engineering via social media
Social engineering via social mediaSocial engineering via social media
Social engineering via social media
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook Account
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
security procedures
security procedures
security procedures
security procedures
 
Is it good to be paranoid ?
Is it good to be paranoid ?Is it good to be paranoid ?
Is it good to be paranoid ?
 
Password management
Password managementPassword management
Password management
 
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
 
Social Media Breakfast Edmonton: Optimizing Your Social Presence
Social Media Breakfast Edmonton: Optimizing Your Social PresenceSocial Media Breakfast Edmonton: Optimizing Your Social Presence
Social Media Breakfast Edmonton: Optimizing Your Social Presence
 
Persona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole WebPersona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole Web
 
2013 State of Social Media Spam Research Report
2013 State of Social Media Spam Research Report2013 State of Social Media Spam Research Report
2013 State of Social Media Spam Research Report
 
hacker un compte facebook
hacker un compte facebook 
hacker un compte facebook
hacker un compte facebook
 
How Social Media Can Enhance Your Personal Brand
How Social Media Can Enhance Your Personal BrandHow Social Media Can Enhance Your Personal Brand
How Social Media Can Enhance Your Personal Brand
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Trusted Friend Attack: Guardian Angels Strike