This document discusses building a wireless sensor suite called Theia that can intercept and analyze 802.11 WiFi frames to reveal sensitive location and identity information about users. It begins with an overview of the Theia components and live demos showing how it can track a device's locations over time and tag individuals. It then discusses vulnerabilities in the 802.11 protocol and offers recommendations to enhance security. Finally, it provides instructions for configuring and running the different parts of Theia, including building the wireless sensor from scratch.
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...EC-Council
Each year companies spend thousands of dollars on sophisticated security systems to ensure their secrets stay safe. Physical security flaws can be found everywhere from razor wire fences to RFID cards, if you know where to look. In this talk, we will cover dos and don’ts of physical penetration testing, vulnerability trends, and how to combine them for the ultimate takeover.
How to Get into ICS Security byChris SistrunkEC-Council
This document provides information and advice on how to get into the field of industrial control system (ICS) security. It begins by introducing the author and their background in both engineering and ICS security. It then discusses how small mistakes with ICS can lead to major disasters. The rest of the document offers tips for both people with operational technology backgrounds and information technology backgrounds on transitioning into ICS security. It provides recommendations on skills to learn, resources to utilize, and ways to collaborate across IT and OT. The overall message is that both areas are needed to properly secure modern ICS networks.
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
Ведущий: Джефф Кац
По прогнозам Cisco, в этом году 25 млрд устройств будут подключены к интернету, а к 2020 году число увеличится вдвое. Планируя разработку решения в сфере Интернета вещей (IoT), вы должны подумать о том, что в один прекрасный день к вам нагрянет ФСБ . Вопрос безопасности пользователей нужно продумать заранее, не следует откладывать его на потом. Докладчик расскажет, как использовать преимущества IoT-продуктов, не ущемляя личных прав ваших клиентов. Доклад сопровождается примерами услуг, в которых конфиденциальность и безопасность были обеспечены в начале разработки.
Fingerprinting and Attacking a Healthcare InfrastructurePositive Hack Days
The document discusses fingerprinting and attacking healthcare institutions. It notes that healthcare is an easy target due to less security maturity compared to other industries. It provides information on how to fingerprint electronic medical record (EMR) systems, medical devices, and other systems commonly found in hospitals. Specific techniques are presented for searching online databases to find healthcare systems and EMRs. The document also discusses attacks on the HL7 protocol commonly used in medical devices.
Fault Injection on Automotive Diagnosis ProtocolsRiscure
In this work we present fault injection as a technique to bypass the security of automotive diagnosis (UDS) protocol implementations that do not contain any logical vulnerabilities. Therefore, they are protected against traditional logical attacks. Our tests proved that it is possible for an attacker to inject faults and bypass the UDS authentication, obtaining access to the internal Flash and SRAM memories of the targets. By analyzing the dumped firmware, the keys and algorithm that protect the UDS have also been extracted, giving full access to the diagnosis services without requiring the use of fault injection techniques.
Originally presented by Riscure's Niek Timmers at the 2018 ESCAR USA conference.
Kadhambari Anbalagan, a software architect at RedBlackTree Terrace, will give a talk on Monday, April 8th at 5:00pm about security best practices for mobile apps. Research shows that the majority of top free and paid apps have been subjected to hacking. Common mobile app security issues include improper platform usage, insecure data storage, insecure communication, insecure authentication, insufficient cryptography, insecure authorization, code quality issues, code tampering, reverse engineering, and including extraneous functionality. The talk will provide best practices to address each of these issues.
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...EC-Council
Each year companies spend thousands of dollars on sophisticated security systems to ensure their secrets stay safe. Physical security flaws can be found everywhere from razor wire fences to RFID cards, if you know where to look. In this talk, we will cover dos and don’ts of physical penetration testing, vulnerability trends, and how to combine them for the ultimate takeover.
How to Get into ICS Security byChris SistrunkEC-Council
This document provides information and advice on how to get into the field of industrial control system (ICS) security. It begins by introducing the author and their background in both engineering and ICS security. It then discusses how small mistakes with ICS can lead to major disasters. The rest of the document offers tips for both people with operational technology backgrounds and information technology backgrounds on transitioning into ICS security. It provides recommendations on skills to learn, resources to utilize, and ways to collaborate across IT and OT. The overall message is that both areas are needed to properly secure modern ICS networks.
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
Ведущий: Джефф Кац
По прогнозам Cisco, в этом году 25 млрд устройств будут подключены к интернету, а к 2020 году число увеличится вдвое. Планируя разработку решения в сфере Интернета вещей (IoT), вы должны подумать о том, что в один прекрасный день к вам нагрянет ФСБ . Вопрос безопасности пользователей нужно продумать заранее, не следует откладывать его на потом. Докладчик расскажет, как использовать преимущества IoT-продуктов, не ущемляя личных прав ваших клиентов. Доклад сопровождается примерами услуг, в которых конфиденциальность и безопасность были обеспечены в начале разработки.
Fingerprinting and Attacking a Healthcare InfrastructurePositive Hack Days
The document discusses fingerprinting and attacking healthcare institutions. It notes that healthcare is an easy target due to less security maturity compared to other industries. It provides information on how to fingerprint electronic medical record (EMR) systems, medical devices, and other systems commonly found in hospitals. Specific techniques are presented for searching online databases to find healthcare systems and EMRs. The document also discusses attacks on the HL7 protocol commonly used in medical devices.
Fault Injection on Automotive Diagnosis ProtocolsRiscure
In this work we present fault injection as a technique to bypass the security of automotive diagnosis (UDS) protocol implementations that do not contain any logical vulnerabilities. Therefore, they are protected against traditional logical attacks. Our tests proved that it is possible for an attacker to inject faults and bypass the UDS authentication, obtaining access to the internal Flash and SRAM memories of the targets. By analyzing the dumped firmware, the keys and algorithm that protect the UDS have also been extracted, giving full access to the diagnosis services without requiring the use of fault injection techniques.
Originally presented by Riscure's Niek Timmers at the 2018 ESCAR USA conference.
Kadhambari Anbalagan, a software architect at RedBlackTree Terrace, will give a talk on Monday, April 8th at 5:00pm about security best practices for mobile apps. Research shows that the majority of top free and paid apps have been subjected to hacking. Common mobile app security issues include improper platform usage, insecure data storage, insecure communication, insecure authentication, insufficient cryptography, insecure authorization, code quality issues, code tampering, reverse engineering, and including extraneous functionality. The talk will provide best practices to address each of these issues.
IoT Security – Executing an Effective Security Testing Process EC-Council
Deral Heiland CISSP, serves as a the Research Lead (IoT) for Rapid7. Deral has over 20 years of experience in the Information Technology field, and has held multiple positions including: Senior Network Analyst, Network Administrator, Database Manager, Financial Systems Manager and Senior Information Security Analyst. Over the last 10+ years Deral’s career has focused on security research, security assessments, penetration testing, and consulting for corporations and government agencies. Deral also has conducted security research on a numerous technical subjects, releasing white papers, security advisories, and has presented the information at numerous national and international security conferences including Blackhat, Defcon, Shmoocon, DerbyCon, RSAC, Hack In Paris. Deral has been interviewed by and quoted by several media outlets and publications including ABC World News Tonight, BBC, Consumer Reports, MIT Technical Review, SC Magazine, Threat Post and The Register.
This document summarizes an ethical hacking seminar that was presented. It discusses the following key points:
- Ethical hacking involves using the same tools and techniques as hackers but in a legal manner to test security vulnerabilities.
- The hacking process involves footprinting, scanning, gaining access, and maintaining access. Footprinting gathers information, scanning finds open ports and services, and gaining access exploits vulnerabilities.
- Ethical hackers are independent security professionals who evaluate systems without damaging them or stealing data. They find vulnerabilities and report them to owners.
- Skills needed for ethical hacking include knowledge of operating systems, firewalls, networking protocols, and project management. Understanding how hackers think is important to catch security
This document discusses SCADA honeypots, which are devices or systems placed on a network with no operational purpose in order to detect attacks. Honeypots can detect attacks since anything accessing them is suspicious as they have no legitimate use. While some debate their effectiveness, honeypots can provide valuable information by allowing researchers to learn how attackers work when they interact with the honeypot. The level of interaction and visibility of the honeypot must be considered to balance obtaining useful data with security risks.
Inria Tech Talk dédié à une actualité brulante : la sécurité de vos objets connectés.
Aujourd'hui, il est indispensable de développer des outils pour générer les tests de sécurité de ces objets dans des scénarios d’usage réalistes.
Les chercheurs-experts Inria vous présenteront les attaques existantes et celles développées d’une manière artisanale sur des automates programmables industriels et des objets connectés au cours de ces dernières années.
La présentation est disponible ici :
https://french-tech-central.com/events/inria-tech-talk-iot/
Riscure is a global company specializing in hardware security evaluations through side channel analysis, fault injection, and other testing methods. They have over 90 experts across offices in the Netherlands, United States, and China. Riscure helps clients in various industries like payments, IoT, and smart cards improve the security of their products and obtain necessary certifications.
Security Updates Matter: Exploitation for BeginnersEnergySec
Abstract: This is a presentation explaining the purposes behind why security updates should be installed on systems and why it matters to protect the bulk electric system. Many people don’t understand the full purpose of installing security updates and this presentation walks through the reasons at a very high level so that everyone can understand.
The document discusses ethical hacking, which involves legally testing a system's security vulnerabilities to help strengthen security. It describes the process of ethical hacking, including preparation, footprinting, enumeration and fingerprinting, identifying vulnerabilities, and attacking to exploit vulnerabilities. The goal is to help organizations identify and remedy security flaws by emulating real attacks but in a controlled, non-destructive manner.
This document discusses securing the Internet of Things (IoT). It notes that IoT devices differ from traditional devices in ways that impact security, such as limited ability to update firmware. It recommends not relying on security through obscurity and discusses practical crypto implementations for small devices. The document also covers securing communication protocols like MQTT, CoAP and DTLS, as well as approaches like OAuth2 for authentication without passwords on devices. It describes a demonstration of using OAuth2 with MQTT to limit a device's access to an API by giving it a revocable token rather than a static password.
Breaking and entering how and why dhs conducts penetration testsPriyanka Aash
The document discusses how the Department of Homeland Security conducts penetration tests to identify vulnerabilities in networks. It provides examples of common methods used by adversaries like phishing and using default or reused credentials. The penetration tests help organizations identify issues, implement mitigations, and make risk-based security decisions. The services provided by DHS through NCATS include vulnerability scanning, incident response, and risk assessments to help secure systems and protect against cyber threats.
This presentation aims to share working knowledge on how attackers are taking an advantage of connected (IOT) devices for scaling attacks. From hardware to repeatable software exploitation that scale. X-ray on the current security resilience of some of today's connected devices. Typically challenges developers are facing today and a proof of concept attack on a "secure" connected camera with critical consequences. Finally we give valuable takeaways for improving the security of your solutions and avoid these horrible mistakes.
Your Thing is Pwned - Security Challenges for the IoTWSO2
The Internet of Things and Machine to Machine are growing areas, and security and privacy are prime issues. In this session security challenges are examined around using M2M devices with protocols such as MQTT & CoAP - encryption, federated identity and authorisation models in particular.
On the topic of encryption, we’ll examine securing MQTT with TLS, challenges with Arduino, and using hardware encryption for microcontrollers. A key privacy requirement for user-centric IoT use cases will be giving users control over how their things collect and share data. On the Internet, protocols like OAuth 2.0, OpenID Connect & User Managed Access have been defined to enable a privacy-respecting user consent & authorization model. We'll look at the issues with applying these protocols to the M2M world and review existing proposals & activity for extending the above M2M protocols to include federated identity concepts.
The session included a live demonstration of Arduino and Eclipse Paho inter-operating secured by OAuth 2.0.
The document discusses various topics related to cryptography including:
- Introduction to cryptography including definitions of encryption, decryption and cryptanalysis.
- Types of cryptography including private key cryptography, public key cryptography and hash functions. Comparisons are made between private and public key cryptography.
- Examples of cryptography techniques like Caesar cipher, rail fence cipher, steganography, and the one time pad cipher.
- The overall document provides an overview of cryptography concepts, types and examples to explain the field of cryptography.
Vulnerability Inheritance in ICS (English)Digital Bond
This document discusses vulnerability inheritance in programmable logic controllers (PLCs) from third-party libraries and software. It provides a specific example of vulnerabilities found in the CoDeSys runtime and engineering software used by hundreds of industrial control system vendors. The document outlines how two major Japanese PLC vendors were found to be affected by these vulnerabilities due to their use of CoDeSys, and concludes that vendors need to implement secure development practices like security testing to prevent inheriting vulnerabilities from third-party components.
Hijacking a Pizza Delivery Robot (using SQL injection)Priyanka Aash
Welcome to the lighter side of the software security world! We’ll explain complex topics like injection flaws, configuration errors, and parameter tampering with real-world analogies, like breaking into your house through your shed, or sneaking into a Coldplay concert using a reflective yellow vest, a walkie talkie toy, and bravado. If you’ve ever struggled to remember exactly how these issues work or struggled to explain them to someone outside of the security field, this presentation will help (and probably make you laugh). This talk is ideal for anyone who wants to understand core Application Security concepts so they can apply risk mitigation strategies with better context.
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
This document summarizes a presentation on IoT security good practices. It discusses various types of invasive and non-invasive attacks on IoT devices, as well as solutions to improve security such as adding a secure element, using an MCU's security features, and risk management practices. Cryptography methods that can be used for authentication, encryption and integrity are explained. The document also covers topics like secure boot, secure storage, secure communications, and the importance of security over the entire product lifecycle. Recommendations are made to design fortified products, understand risks, use security features and tools, and work with trusted partners.
The Password Is Dead: An Argument for Multifactor Biometric AuthenticationVeridium
In 2015, 63 percent of all confirmed data breaches were the result of weak, default, or stolen passwords. In fact, this was the second primary cause of all data breaches, globally, according to the 2016 Verizon Data Breach Investigations Report.
The death of passwords has been heralded for over a decade now, but these reports were often greatly exaggerated. However, in recent years this has begun to change, as new technologies are allowing companies to change how they secure access to digital assets. From traditional usernames and passwords to two-factor authentication, outdated security practices are failing to keep data secure. Whether it’s a lack of user adoption or actual flaws in the security infrastructure, businesses need a better option to protect access to their most important resources.
In this webinar, we will discuss the prevalence of data breaches today and where passwords and two-factor authentication fall short, followed by how biometrics, when properly deployed through end-to-end solutions like HoyosID, can provide the missing piece for fully securing digital access.
This document discusses penetration testing and ethical hacking. It provides an overview of penetration testing methodology and the services offered by Endava, including regular vulnerability scans, penetration tests, PCI assessments, security trainings, audits, and intrusion monitoring solutions. The presenter, Maxim Catanoi, is an IT security consultant at Endava with over 9 years of experience and multiple security certifications.
The document discusses various security challenges at different levels of IoT architecture. At the sensor level, authentication of small devices with limited resources is challenging. GPS spoofing and hardware attacks are also risks. Networking components like the baseband processor can be vulnerable if firmware exploits exist. Hardening devices like Raspberry Pi that act as IoT hubs is important. When integrating with cloud services and APIs, authentication, privacy, and security configurability need attention.
North Sails was founded in 1958 by Olympic sailor Lowell North who focused on building faster sails through innovative technologies. Over the years, North Sails has continued innovating and has equipped every America's Cup defender and challenger as well as most Volvo Ocean Race competitors, making it the clear leader in sailmaking. North Sails has now expanded into technical sailing apparel and clothing engineered for both sailing and everyday use.
TeaLeaf is the leading provider of online customer experience management solutions. TeaLeaf's TeaLeaf CX family of solutions provide unprecedented visibility into every user's unique online interactions, revealing hidden problems that affect consumers and cost companies more than any single catastrophic event. By providing a patented, powerful 'outside in view' of each individual customer experience, leading e-business executives across a wide range of vertical industries including retail, banking, travel, insurance, telecommunications, pharmaceutical and transportation can eliminate failures that impact profitability, cause customer churn and ultimately damage brand equity. Founded in 1999, TeaLeaf is headquartered in San Francisco, California, and is privately-held.
IoT Security – Executing an Effective Security Testing Process EC-Council
Deral Heiland CISSP, serves as a the Research Lead (IoT) for Rapid7. Deral has over 20 years of experience in the Information Technology field, and has held multiple positions including: Senior Network Analyst, Network Administrator, Database Manager, Financial Systems Manager and Senior Information Security Analyst. Over the last 10+ years Deral’s career has focused on security research, security assessments, penetration testing, and consulting for corporations and government agencies. Deral also has conducted security research on a numerous technical subjects, releasing white papers, security advisories, and has presented the information at numerous national and international security conferences including Blackhat, Defcon, Shmoocon, DerbyCon, RSAC, Hack In Paris. Deral has been interviewed by and quoted by several media outlets and publications including ABC World News Tonight, BBC, Consumer Reports, MIT Technical Review, SC Magazine, Threat Post and The Register.
This document summarizes an ethical hacking seminar that was presented. It discusses the following key points:
- Ethical hacking involves using the same tools and techniques as hackers but in a legal manner to test security vulnerabilities.
- The hacking process involves footprinting, scanning, gaining access, and maintaining access. Footprinting gathers information, scanning finds open ports and services, and gaining access exploits vulnerabilities.
- Ethical hackers are independent security professionals who evaluate systems without damaging them or stealing data. They find vulnerabilities and report them to owners.
- Skills needed for ethical hacking include knowledge of operating systems, firewalls, networking protocols, and project management. Understanding how hackers think is important to catch security
This document discusses SCADA honeypots, which are devices or systems placed on a network with no operational purpose in order to detect attacks. Honeypots can detect attacks since anything accessing them is suspicious as they have no legitimate use. While some debate their effectiveness, honeypots can provide valuable information by allowing researchers to learn how attackers work when they interact with the honeypot. The level of interaction and visibility of the honeypot must be considered to balance obtaining useful data with security risks.
Inria Tech Talk dédié à une actualité brulante : la sécurité de vos objets connectés.
Aujourd'hui, il est indispensable de développer des outils pour générer les tests de sécurité de ces objets dans des scénarios d’usage réalistes.
Les chercheurs-experts Inria vous présenteront les attaques existantes et celles développées d’une manière artisanale sur des automates programmables industriels et des objets connectés au cours de ces dernières années.
La présentation est disponible ici :
https://french-tech-central.com/events/inria-tech-talk-iot/
Riscure is a global company specializing in hardware security evaluations through side channel analysis, fault injection, and other testing methods. They have over 90 experts across offices in the Netherlands, United States, and China. Riscure helps clients in various industries like payments, IoT, and smart cards improve the security of their products and obtain necessary certifications.
Security Updates Matter: Exploitation for BeginnersEnergySec
Abstract: This is a presentation explaining the purposes behind why security updates should be installed on systems and why it matters to protect the bulk electric system. Many people don’t understand the full purpose of installing security updates and this presentation walks through the reasons at a very high level so that everyone can understand.
The document discusses ethical hacking, which involves legally testing a system's security vulnerabilities to help strengthen security. It describes the process of ethical hacking, including preparation, footprinting, enumeration and fingerprinting, identifying vulnerabilities, and attacking to exploit vulnerabilities. The goal is to help organizations identify and remedy security flaws by emulating real attacks but in a controlled, non-destructive manner.
This document discusses securing the Internet of Things (IoT). It notes that IoT devices differ from traditional devices in ways that impact security, such as limited ability to update firmware. It recommends not relying on security through obscurity and discusses practical crypto implementations for small devices. The document also covers securing communication protocols like MQTT, CoAP and DTLS, as well as approaches like OAuth2 for authentication without passwords on devices. It describes a demonstration of using OAuth2 with MQTT to limit a device's access to an API by giving it a revocable token rather than a static password.
Breaking and entering how and why dhs conducts penetration testsPriyanka Aash
The document discusses how the Department of Homeland Security conducts penetration tests to identify vulnerabilities in networks. It provides examples of common methods used by adversaries like phishing and using default or reused credentials. The penetration tests help organizations identify issues, implement mitigations, and make risk-based security decisions. The services provided by DHS through NCATS include vulnerability scanning, incident response, and risk assessments to help secure systems and protect against cyber threats.
This presentation aims to share working knowledge on how attackers are taking an advantage of connected (IOT) devices for scaling attacks. From hardware to repeatable software exploitation that scale. X-ray on the current security resilience of some of today's connected devices. Typically challenges developers are facing today and a proof of concept attack on a "secure" connected camera with critical consequences. Finally we give valuable takeaways for improving the security of your solutions and avoid these horrible mistakes.
Your Thing is Pwned - Security Challenges for the IoTWSO2
The Internet of Things and Machine to Machine are growing areas, and security and privacy are prime issues. In this session security challenges are examined around using M2M devices with protocols such as MQTT & CoAP - encryption, federated identity and authorisation models in particular.
On the topic of encryption, we’ll examine securing MQTT with TLS, challenges with Arduino, and using hardware encryption for microcontrollers. A key privacy requirement for user-centric IoT use cases will be giving users control over how their things collect and share data. On the Internet, protocols like OAuth 2.0, OpenID Connect & User Managed Access have been defined to enable a privacy-respecting user consent & authorization model. We'll look at the issues with applying these protocols to the M2M world and review existing proposals & activity for extending the above M2M protocols to include federated identity concepts.
The session included a live demonstration of Arduino and Eclipse Paho inter-operating secured by OAuth 2.0.
The document discusses various topics related to cryptography including:
- Introduction to cryptography including definitions of encryption, decryption and cryptanalysis.
- Types of cryptography including private key cryptography, public key cryptography and hash functions. Comparisons are made between private and public key cryptography.
- Examples of cryptography techniques like Caesar cipher, rail fence cipher, steganography, and the one time pad cipher.
- The overall document provides an overview of cryptography concepts, types and examples to explain the field of cryptography.
Vulnerability Inheritance in ICS (English)Digital Bond
This document discusses vulnerability inheritance in programmable logic controllers (PLCs) from third-party libraries and software. It provides a specific example of vulnerabilities found in the CoDeSys runtime and engineering software used by hundreds of industrial control system vendors. The document outlines how two major Japanese PLC vendors were found to be affected by these vulnerabilities due to their use of CoDeSys, and concludes that vendors need to implement secure development practices like security testing to prevent inheriting vulnerabilities from third-party components.
Hijacking a Pizza Delivery Robot (using SQL injection)Priyanka Aash
Welcome to the lighter side of the software security world! We’ll explain complex topics like injection flaws, configuration errors, and parameter tampering with real-world analogies, like breaking into your house through your shed, or sneaking into a Coldplay concert using a reflective yellow vest, a walkie talkie toy, and bravado. If you’ve ever struggled to remember exactly how these issues work or struggled to explain them to someone outside of the security field, this presentation will help (and probably make you laugh). This talk is ideal for anyone who wants to understand core Application Security concepts so they can apply risk mitigation strategies with better context.
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
This document summarizes a presentation on IoT security good practices. It discusses various types of invasive and non-invasive attacks on IoT devices, as well as solutions to improve security such as adding a secure element, using an MCU's security features, and risk management practices. Cryptography methods that can be used for authentication, encryption and integrity are explained. The document also covers topics like secure boot, secure storage, secure communications, and the importance of security over the entire product lifecycle. Recommendations are made to design fortified products, understand risks, use security features and tools, and work with trusted partners.
The Password Is Dead: An Argument for Multifactor Biometric AuthenticationVeridium
In 2015, 63 percent of all confirmed data breaches were the result of weak, default, or stolen passwords. In fact, this was the second primary cause of all data breaches, globally, according to the 2016 Verizon Data Breach Investigations Report.
The death of passwords has been heralded for over a decade now, but these reports were often greatly exaggerated. However, in recent years this has begun to change, as new technologies are allowing companies to change how they secure access to digital assets. From traditional usernames and passwords to two-factor authentication, outdated security practices are failing to keep data secure. Whether it’s a lack of user adoption or actual flaws in the security infrastructure, businesses need a better option to protect access to their most important resources.
In this webinar, we will discuss the prevalence of data breaches today and where passwords and two-factor authentication fall short, followed by how biometrics, when properly deployed through end-to-end solutions like HoyosID, can provide the missing piece for fully securing digital access.
This document discusses penetration testing and ethical hacking. It provides an overview of penetration testing methodology and the services offered by Endava, including regular vulnerability scans, penetration tests, PCI assessments, security trainings, audits, and intrusion monitoring solutions. The presenter, Maxim Catanoi, is an IT security consultant at Endava with over 9 years of experience and multiple security certifications.
The document discusses various security challenges at different levels of IoT architecture. At the sensor level, authentication of small devices with limited resources is challenging. GPS spoofing and hardware attacks are also risks. Networking components like the baseband processor can be vulnerable if firmware exploits exist. Hardening devices like Raspberry Pi that act as IoT hubs is important. When integrating with cloud services and APIs, authentication, privacy, and security configurability need attention.
North Sails was founded in 1958 by Olympic sailor Lowell North who focused on building faster sails through innovative technologies. Over the years, North Sails has continued innovating and has equipped every America's Cup defender and challenger as well as most Volvo Ocean Race competitors, making it the clear leader in sailmaking. North Sails has now expanded into technical sailing apparel and clothing engineered for both sailing and everyday use.
TeaLeaf is the leading provider of online customer experience management solutions. TeaLeaf's TeaLeaf CX family of solutions provide unprecedented visibility into every user's unique online interactions, revealing hidden problems that affect consumers and cost companies more than any single catastrophic event. By providing a patented, powerful 'outside in view' of each individual customer experience, leading e-business executives across a wide range of vertical industries including retail, banking, travel, insurance, telecommunications, pharmaceutical and transportation can eliminate failures that impact profitability, cause customer churn and ultimately damage brand equity. Founded in 1999, TeaLeaf is headquartered in San Francisco, California, and is privately-held.
The unit plan spans 5 class periods and has the following objectives:
1) Students will develop an understanding of organelles by acting out their functions in groups. They will compare cell types under a microscope.
2) Students will watch videos on cellular respiration and photosynthesis, then construct diagrams of the processes.
3) After building a closed ecosystem, students will compare and contrast cellular respiration and photosynthesis.
The plan involves lectures, group work, microscopes, videos, and building a closed ecosystem to teach students about organelles, cell types, and the processes of cellular respiration and photosynthesis.
Varun Sharma is seeking a career opportunity in hospitality management where he can utilize his 5 years of experience and academic background. He has a bachelor's degree in hotel management and has worked in various roles at prestigious hotels like The Oberoi, Novotel, and Country Inn & Suites. Currently he is the guest service supervisor at Plaza Premium Lounge airport and is looking to take on a more challenging role. He believes his leadership skills, attention to detail, and strong communication abilities would be an asset to any organization.
What does a PR company actually do? This is our winning formula. Our set-up and a couple of case studies to set the scene. No jargon. Just straight talking, creative work.
Photography is the subject of the document. It discusses Fazeley Studios, a photography studio located in Digbeth. The document was written by Lauren Clarke and provides information about photography at Fazeley Studios in Digbeth.
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
With the advent of IOT, Every 'Thing' is getting Smart, starting from the range of smartwatches, smart refrigerators, smart bulbs to smart car, smart healthcare, smart agriculture, smart retail, smart city and what not, even smart planet. But why is every thing getting smart? People are trying to bridge the gap between Digital World & Physical World by means of ubiquitous connectivity to Internet, and when digital things become physical, digital threats also become physical threats. Security & Privacy issues are rising as never before. What if the microphone in your smart TV can be used to eavesdrop the private communications in your bed room? What if a smart driverless car deliberately crashes itself into an accident? What if you want to be Anonymous over Internet and don't want anybody to track you?
This talk will focus on answering the above questions with a view on 'What are we currently doing to protect ourselves' and 'What we need to do'. What are the new security challenges that are coming up and how privacy & anonymity is taking the lead over security. The talk will also sensitive the audience about the paradigm shift that is happening in IOT DevOps, with help of Docker Containers and how they can be anonymised using TOR.
Protecting Financial Networks from Cyber CrimeLancope, Inc.
Financial services organizations are prime targets for cyber criminals. They must take extreme care to protect customer data, while also ensuring high levels of network availability to allow for 24/7 access to critical financial information. Additionally, industry consolidation has created large, heterogeneous network environments within large financial institutions, making it difficult to ensure that networks have the necessary visibility and protection to prevent a devastating security breach. By leveraging NetFlow from existing network infrastructure, financial services organizations can achieve comprehensive visibility across even the largest, most complex networks. The ability to quickly detect a wide range of potentially malicious activity helps prevent damaging data breaches and network disruptions. Attend this informational webinar, conducted by Lancope’s Director of Security Research, Tom Cross, to learn: How NetFlow can help quickly uncover both internal and external threats How pervasive network insight can accelerate incident response and forensic investigations How to substantially decrease enterprise risks
Leverage the Network to Detect and Manage ThreatsCisco Canada
Session: Leverage the Network to Detect and Manage Threats
Presenter: Michael Moriarta, Lancope - Technical Alliance Manager/SE Southeast US
Date: October 6, 2015
Task Force on IoT Security
About CISO Platform
Largest DDOS Attack Against DYN
How can we minimize the risk?
IoT Architectural Layers
Components of an IoT Node
Weaponizing Intelligence: Interdiction in Today’s Threat LandscapePriyanka Aash
The document discusses threat intelligence and interdiction efforts at Cisco Systems. It describes Cisco's threat intelligence capabilities including hundreds of researchers, billions of daily network requests and emails monitored, and trillions of threats blocked. It then discusses how interdiction involves disrupting threats outside networks through cooperation with law enforcement, hosting providers, and other partners. An example interdiction case study involving the Samsam ransomware actor targeting vulnerable JBoss servers is provided.
The document discusses elements of connected products and platforms. It outlines five key elements: Purpose, People, Process, Product, and Platform. It then discusses local connectivity between devices, sensoring and local intelligence, internet connectivity, and management and application programming interfaces (APIs). The goal is to define an open IoT platform that connects many device types securely, enables remote upgrades, and provides data services through an open-source server.
Lesson 1. General Introduction to IT and Cyber Security.pptxJezer Arces
This document provides an introduction to information and cyber security concepts. It defines information security as protecting data from all threats, while cyber security specifically addresses cyber threats. The three pillars of cybersecurity are outlined as confidentiality, integrity, and availability of data. Common computer protocols like HTTP, HTTPS, FTP, and protocols that make up the TCP/IP model are explained. Basic security terminology and functions of cookies are also covered to introduce fundamental IT and cyber security concepts.
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
The security industry is talking a lot about threat intelligence; external information that a company can leverage to understand where potential threats are knocking on the door and might have already perpetrated the network boundaries. Conversations with many CERTs have shown that we have to stop relying on knowledge about how attacks have been conducted in the past and start 'hunting' for signs of compromises and anomalies in our own environments.
In this presentation we explore how the decade old field of security visualization has emerged. We show how we have applied advanced analytics and visualization to create our own threat intelligence and investigated lateral movement in a Fortune 50 company.
Visualization. Data science. No machine learning. But pretty pictures.
Here is a blog post I wrote a bit ago about the general theme of internal threat intelligence:
http://www.darkreading.com/analytics/creating-your-own-threat-intel-through-hunting-and-visualization/a/d-id/1321225?
The document discusses Internet of Things (IoT) security challenges and countermeasures. It begins with basics of IoT and sensors, then discusses how IoT connects to the internet. It outlines several approaches to securing IoT, including restricted access, encryption of network and data, managing default APIs, addressing human elements of security, and learning from past exploits. Specific threats like denial of service attacks, man-in-the-middle attacks, and brute force/dictionary attacks are examined. The document concludes that IoT security design must enable open yet secure infrastructure while respecting user privacy through individual policies.
Onion routing and tor: Fundamentals and Anonymityanurag singh
Onion Routing and Tor: Fundamentals and anonymity discusses anonymity on the internet and how Tor works to provide anonymity. It explains that traditional IP addresses and browser tracking can be linked to a user's identity. Tor creates circuits through multiple relay nodes to hide a user's location and communications. Key features of Tor include using volunteer-run relay nodes, protecting against traffic analysis, and enabling hidden services to host anonymous websites. While Tor enhances anonymity, it cannot prevent all timing attacks if the start and end of a user's traffic can be observed.
This document discusses hacking and provides an overview of ethical hacking. It begins by defining what a hacker is, noting that historically it referred to an enthusiastic computer hobbyist rather than a criminal. It discusses the evolution of hacking and open source culture. It then discusses ethical hacking and penetration testing, noting it involves authorized attempts to breach systems to test security. It provides an example case study of a large hadron collider being hacked. It also discusses the importance of security given the rise in internet users and potential for attacks on critical networks.
This document discusses Bluetooth security risks. It begins with introductions of two security researchers, Matteo Beccaro and Matteo Collura. It then provides an overview of Bluetooth including its history, specifications over different versions, and layer protocol architecture. The document outlines several known Bluetooth attacks from early 2000s like BlueSnarf and BlueBug. It also discusses risks in legacy pairing procedures and describes improvements in secure simple pairing. The document analyzes vulnerabilities in Android's Bluetooth unlock feature prior to version 5.1 and potential exploits. It notes APIs remain at risk even after fixes to the unlock function. Future work areas mentioned include security of IoT devices, smart locks and fitness bands connected via Bluetooth.
As presented at ITExpo 2017 and the April Peerlyst Tel-Aviv security Meetup.
Can your company afford to ignore VoIP security? With the number of attacks on your telephone services and mobile devices your chance of being attacked and financial liability is at an all time high. This session offers an introductory primer to securing your VoIP PBX. This talk will include explanations about common attacks, how they can find you, and common techniques you can use to defend your company.
Luiz eduardo. introduction to mobile snitchYury Chemerkin
Mobile devices broadcast information passively through protocols like mDNS and NetBios that can be used to profile and fingerprint individuals. This metadata includes a person's name, device details, social media profiles, locations visited and more. While concerning for privacy, there are some mitigation tips like disabling WiFi when not in use. In the future, passive profiling may become more advanced through integration with other tools and online databases to create detailed profiles of individuals based solely on information broadcast from their mobile devices.
Breaking Smart Speakers: We are Listening to You.Priyanka Aash
"In the past two years, smart speakers have become the most popular IoT device, Amazon_ Google and Apple have introduced their own smart speaker products. Most of these smart speakers have natural language recognition, chat, music playback, IoT device control, shopping, and so on. Manufacturers use artificial intelligence technology to make smart speakers have similar human capabilities in the chat conversation. However, with the smart speakers coming into more and more homes, and the function is becoming more powerful, its security has been questioned by many people. People are worried that smart speakers will be hacked to leak their privacy, and our research proves that this concern is very necessary.
In this talk, we will present how to use multiple vulnerabilities to achieve remote attack some of the most popular smart speakers. Our final attack effects include silent listening, control speaker speaking content and other demonstrations. And we're also going to talk about how to extract firmware from BGA packages Flash chips such as EMMC, EMCP, NAND Flash, etc. In addition, it contains how to turn on debug interfaces and get root privileges by modifying firmware content and Re-soldering Flash chips, which can be of great help for subsequent vulnerability analysis and debugging. Finally, we will play several demo videos to demonstrate how we can remotely access some Smart Speaker Root permissions and use smart speakers for eavesdropping and playing voice."
This document discusses myths and realities about wireless network security. It begins by addressing common misconceptions, such as that wireless networks cannot be secured, wired networks are more secure, and that simple techniques like disabling the SSID broadcast provide adequate security. It then explains why these views are myths and why proper security requires centralization, authentication, encryption, authorization, and other best practices. The document advocates an approach following principles of defense in depth and least privilege to provide robust security for wireless networks.
Mobile apps are the entry point to your web applications, APIs and web services. But sometimes the developer implements security in the mobile app that can easily be bypassed by a malicious attacker, allowing the attacker to exploit your web applications and steal confidential information. In this presentation I will show you how easy it is to attack a mobile application, intercept the communication and exploit the trust model of mobile apps. I will also give an overview of the OWASP Top 10 Mobile Risks.
The document outlines 7 steps to Industry 4.0: 1) connect machines and devices using IoT security gateways, 2) securely and remotely access all devices through edge and platform tiers, 3) centrally orchestrate and manage users, devices, and processes, 4) collect data from machines and devices, 5) monitor infrastructure through defined rules and alerts, 6) analyze collected data through dashboards for predictive maintenance and decision making, 7) integrate edge computing and develop innovative business models to welcome Industry 4.0.
This document summarizes a presentation about network traffic monitoring and analysis. It discusses traditional monitoring tools like SNMP and newer tools that provide deeper traffic visibility. It explains how flow monitoring works and standards like NetFlow. The presentation also demonstrates how tools can analyze flow data to detect security issues, troubleshoot problems, and capture packets for forensic analysis. Real examples are shown of using these techniques to identify a malware infection and resolve a email delivery problem.
This document discusses attacks on wearable-mobile communication over Bluetooth Low Energy (BLE). It notes that while BLE uses encryption, any app on a device can subscribe to the same BLE channels and characteristics as legitimate apps to access sensitive data or send commands. This poses a risk as malware could obtain private data like heart rate or put devices into recovery mode. The document proposes mitigations like app-to-device pairing to restrict access to only registered apps and using application-specific keys to protect command integrity and data confidentiality. Future enhancements to mobile platforms and BLE specifications are needed to better support authentication and encryption between apps and devices.
Similar to WiFi Data Leakage by Solomon Sonya (20)
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldEC-Council
Learn how to find peace and happiness within you and around you amidst chaos and understanding how the mind-body-energy connection plays a crucial role in the world of Cyber. Mental health and wellness can be the difference between a Cyber professional and a criminal.
Cloud Security Architecture - a different approachEC-Council
Whether people admit or not, everyone is moving to the cloud and all future business will run somewhere on the internet. Moving to the cloud requires different set of architecture and mindset. Data is stored, accessed and processed on different platforms and devices. Employees are working anywhere from the world, corporate data is no more under company IT custody. CISOs and CIOs need to think differently and set new Cloud Security Architecture. This session will try to draw the main areas of concern from Security perspective while moving to the cloud.
This webinar is primarily intended for those that are in need of an informational overview on how to respond to information security incidents or have a responsibility for doing so. It will also assist with your preparation for a Computer Security Incident Handling certification.
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
The document discusses weaponizing open-source intelligence (OSINT) and outlines potential passive attack paths an attacker could take using only publicly available information. It describes how attackers could profile targets using personal details from social media, pastebins, medical records, business cards, news articles, and other open sources. The document also provides recommendations for prevention, including assessing one's digital footprint and value to attackers, using privacy tools, updating social media settings, and spreading disinformation to obscure true personal details and locations that could be leveraged in attacks.
Hacking Your Career – Hacker Halted 2019 – Keith TurpinEC-Council
HACKING YOUR CAREER
Learn how to take charge of your future and ring success out of every opportunity. I had some hard lessons on my way to becoming the CISO of a billion dollar company and now you can benefit from those experiences. In this candid conversation, you will learn the secrets to kicking your career’s ass.
HACKING DIVERSITY
We talk a lot about why diversity is important and we are all familiar with the woeful inclusion stats. In this talk we will discuss why diversity is important from both the perspective of an organization’s bottom line and the individual contributor.
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverEC-Council
The document provides an overview of cloud proxy technology and cyber security. It discusses how proxies work by terminating connections between users and servers and inspecting transmitted objects. The document then shares several "real world" examples of how proxies can detect and prevent phishing attempts, malware infections, and other cyber threats by analyzing URLs, file downloads, and network traffic patterns. It emphasizes the importance of threat intelligence and how proxies use global intelligence networks to identify and block malicious activity in real-time.
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...EC-Council
This document discusses strategies for reducing DNS data leakage and protecting online privacy. It begins with an introduction and overview of topics to be covered, including why DNS data is important from a privacy perspective, common DNS privacy exploits, insecure DNS resolution processes, and solutions for anonymizing DNS data like DNS over HTTPS and DNS over TLS. The document provides details on how DNS data can be tracked and leaked, as well as tools and techniques for analyzing DNS traffic and protecting privacy, including public secure resolvers, browser-based protections, VPNs, and running one's own recursive resolver. It concludes with taking privacy to varying degrees and balancing privacy with usability.
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoEC-Council
THE $750 BILLION VEHICLE DATA GOLD RUSH – PIRATES AHOY!
Vehicle data may be worth $750b by 2030. Problem: vehicle security, privacy, and user awareness of risks are inadequate. Andrea Amico will share some exploits including his “CarsBlues” which exposes people’s personal data, affects 22 makes, and is still a 0-Day for tens of millions of vehicles.
BREAKING SMART [BANK] STATEMENTS
Explanation of how I find and exploit a security flaw (bad implementation of cryptography) in a bank statement, sent via email, of one of the biggest banks in Mexico.
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanEC-Council
ARE YOUR CLOUD SERVERS UNDER ATTACK
For this presentation, I built out a test lab in AWS and allowed someone to hack the servers. I will talk about what we saw when we opened RDP to the internet, what the hackers did once they got in, and someone trying to kick me off my own servers.
War Game: Ransomware – Global CISO Forum 2019EC-Council
This document describes a tabletop exercise to simulate responding to a ransomware attack. It provides examples of recent ransomware attacks against various organizations, including municipalities and healthcare and private companies. These resulted in ransoms demanded from $51,000 to $600,000 and costs of recovery and lost operations from $17 million to companies having to cease operations. The exercise involves forming an incident response team and working through simulated ransomware attacks, assessing damage, determining payment and recovery options, developing alternative communications, and deciding whether to pay a ransom demand.
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...EC-Council
Behold the powers of behavioral alchemy! Are you ready to unleash 4 "Trojan Horses for the Mind" that will change the way you communicate forever? How about a magic wand that will help manifest secure behaviors and shape culture? Attend this session and harness the power.
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...EC-Council
Present your risk assessments to your board of directors in the language they understand - financial loss. "FAIR" or "Factor Analysis of Information Risk" is the quantitative risk analysis methodology that works with common frameworks while adding context for truly effective risk management.
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerEC-Council
ALEXA IS A SNITCH!
You’re not paranoid, your voice assistant is listening. And what’s worse, Alexa is stitching on you! What is she hearing? Where is she sending it? And is there anything we can do to stop her?!
Join me as we discuss the current state of security around voice assistants. And how to silence them.
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementEC-Council
A man was discovered murdered on a street late at night. Police were called to the scene and began their investigation. They found limited clues but saw footage of a potential suspect. Detectives then used big data analytics to identify individuals near the crime scene around the time of the murder. This led them to three male suspects. Further investigation of these suspects focused on building profiles of their patterns of life in hopes of identifying the killer.
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...EC-Council
This document provides guidance on effective communication when delivering bad news or security incidents to various stakeholders. It discusses targeting communications to different audience levels, including end users, middle management, and C-level executives. For each group, it suggests focusing on the relevant impact and providing information in a concise, judicious, and empathetic manner. The document also emphasizes the importance of non-verbal communication and body language awareness to ensure the intended message is properly conveyed.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
WiFi Data Leakage by Solomon Sonya
1. Wifi Data Leakage: How your phone, laptop, and
smart device can reveal where you live, work,
and places you’ve visited via 802.11 inception
Solomon Sonya @Carpenter1010
The problem always seems to become more tractable when presented with the solution…
2. What to Expect
2
• Hand-Waving!
• Intro / Background
• Building Knowledge Requirement
• Deep Dive into 802.11 Protocol
• Developing the Sensor
• Live Demos!
• Tagging and Geotracking people
• 802.11 Vulnerability Exposure
• Security Protocol Enhancement
• Future Work
• Questions
http://logout.hu/dl/upc/2011-06/230806_gremlin_in_my_computer-lyvind_berget.jpg, Retrieved 17 Sep 13
4. Security at Present…
• How far have we come?
• Is it good enough?
• Discovered vulnerabilities are fixed with patches
• Known malware removed with AV (signature based)
• Emerging malware “detected” via baselining (anomaly)
• Digitally signed software
• We still believe “Detection is the key”
• Avg malware lifespan (depending on source) ~294-300+ days still!
• Fallacy with Security:
• Current [incorrect] view: start-state is secure, bolt on security from here
• We’ll remain ahead of the adversary ;-)
6. Updated Anatomy of a Cyber Attack
Reconnaissance/Research
Scan Targets
Penetration
Pivot
Pillage Paralyze
Privileges++
Stage Exploits
Water-Hole
Drive-By
Phishing
Social Engineering
XSS
Trojan
Ping Sweep
ARP Scan
Port Knock
Active & Passive
DNS Lookups
IP Reservations
Embedded
Devices
Management
Protocols
Insider
Evade Detection Maintain Access
Source: Solomon Sonya @Carpenter1010
7. Security of the Future
• Root of the problem lies with how security is considered during creation and
deployment:
• Bolted-on vrs. Built-in approaches
• Integration of Smart Devices
• A country’s greatest spy
• IoT… Are we ready?
8. Cell Phones: A country’s greatest spy
• When was the last time you audited the permissions granted to your apps?
• Is all of this necessary to show a light? (I would avoid apps like these!)
http://www.snoopwall.com/wp-content/uploads/2014/10/Flashlight-Spyware-Appendix-2014.pdf
Really?!!!
9. Thought Question…
Even if we secured it all… What are
we doing still to secure the protocols
these devices are using to
communicate?
10. How did we get here…
12
• Researching threat intelligence last year
• Sitting at an airport enroute to a conference, watching people pass by, I
wondered if it is possible if I could determine where each person is
coming from a priori…
• Knew people usually carried cell-phone, smart device, and/or laptop on
travels and these devices are constantly probing to connect to a known
network
• Hacker’s Mantra: “I wonder what happens if…”
11. The Research has begun!
• Developed the following research questions to direct new research project:
• Is it possible to intercept PNL (preferred network list) probes to fingerprint certain people?
• If so, can a profile be created to reveal the area-of-habitation (likely places of work, live, play)
• Can we determine a likely device and alert on likely “places of interest” such that we can
identify a person that works/lives at specific places? (Think Intel, Google, military, etc)
• Can we expand profile on a person to determine their previous geolocations, SSIDS, and activity
times within an area such that we can know when to expect a person within a particular area?
(think home and work, etc…)
• Determining each devices’ PNL, can we establish a rogue AP and MiTM a user’s device to
route all traffic through our machine without the victim’s knowledge?!!!!
• Spoiler Alert: YES YOU CAN!!!! Let’s see how!
13
12. Initial Knowledge Required…
• 802.11 Frames:
• Management Frames: Setup and maintain communications
• Authentication, Deauthentication
• Association, Disassociation
• Synchronization Messages
• Probe
• Beacon
• Control Frames: Assist in frame delivery and reduces collisions
• Acknowledgements, Request/Clear to Send, Block, Poll, End
• Data Frames: Transport data from higher layers (HTTP, etc)
• 802.11 Client Authentication Process
14
13. Initial Knowledge Required…
• Distributed Computing (Efficiency, Optimization, Updates)
• Socket Programming (Connections, Tokenization)
• Threads
• Wrappers(Worker Process, Conversion, Parsing, Encryption, etc)
• Coding not your thing? No problem, just use Theia! Demo coming in a few
slides from now!
15
14. 802.11 Pertinent Frame Subtype Identifiers
• Authentication 0x0b
• Deauthentication 0x0c
• Association Request 0x00
• Association Response 0x01
• Reassociation Request 0x02
• Reassociation Response 0x03
• Probe Request 0x04 * * * (NIC is in the area)
• Probe Response 0x05 (now know AP is in the area)
• Beacon 0x08 (now know AP is in the area)
• Request to Send (RTS) 0xb0 (usually present with hidden Aps)
• Clear to Send (CTS) 0xc0
• Control and Data frames handled in future research
• More Info: https://supportforums.cisco.com/document/52391/80211-frames-starter-guide-learn-wireless-sniffer-traces
19
15. Solomon Sonya @Carpenter1010
So… What do we do with this information?
20
Let’s bring it together by understanding the
802.11 Authentication Process, PNL, and then let’s demo!
16. Client Authentication Process and PNL
21
BROADCAST
NETGEAR
linksys
Free_Airport_WiFi
Device routinely probes to discover
available access points in the area and
rejoin previously associated networks
http://www.alohaorganizers.com/4-productivity-tools-already-
exist-iphone/
http://www.alohaorganizers.com/4-productivity-tools-already-exist-iphone/
Device Access Point
Client Authentication Process
Time
Probe Response
Authentication Response
Association Response
Probe Beacon
Client Probe Activity
18. Hardware Setup on the cheap…
• Minimum
• Wireless Card (Alfa Card)
• Wireshark (Tshark)
• *NIX OS (Kali 2.x.x)
• Extra Credit
• Long Range, High Gain WiFi Antennae “BAA” (12dbi Antennae)
• GPS Receiver (GlobalSat BU-353-S4 USB GPS Receiver)
23
http://mindprod.com/jgloss/wireshark.html
TShark
KALI LINUX
19. Intercepting Frames to Begin Analysis
• Collection process: acquire/query, parse, analyze/interpret, present, visualize
• What data should we collect?
• How do we collect it?
• Let’s begin with the protocol analyzer Tshark (shortlist)
• -Y wlan.fc.type –T fields Focus and filter on 802.11 protocol
• -e wlan.fc.subtype Display different frame types (mgt, ctrl)
• -e wlan.sa Display transmitter MAC address
• -e wlan.da Display receiver MAC address
• -e wlan Display WiFi protocol information
• -e wlan_mgt.ssid Display the SSID (if present)
24
20. What can we do at this point?
• Active devices within range
• Preferred Network List broadcasted by active devices
• MAC addresses for devices and access points
• SSIDs broadcasted by non-hidden Access Points
• Vendor identifying information (when linked to OUI database)
23. Solomon Sonya @Carpenter1010
How do we process this information to derive
meaning from the data?
28
“Everything should be made as simple as possible, but not simpler.” – Albert Einstein
24. Frame Acquisition Process
• Process:
• Acquire/Query, Parse, Analyze/Interpret, Present, Visualize
• Recall:
• If we build our own sensor, what components are required?
• Wouldn’t it be nice if we had a tool to process all of this information for us?
• Options you could use: Kismet, NetStumbler, inSSIDer, Airocrack-ng suite… OR, you can
build your own and add custom features specific to your environment… I chose the
latter!
29
27. Theia Sensor Suite
• Distributed Wireless Sensor Suite to acquire, analyze , process, and visualize
data extracted from 802.11 frames
• Extensible: Allows multiple sensor integration back into the central collector
(s)
• Displays linkage between PNL from each device and APs within the area
• Provides geolocation ability to display and map locations where a device (and
user) have been
• Provides tagging, alert, and notification capabilities for entry and departure of
devices and base stations
32
33. So What Have We Discovered so far…
• Device Profile (Vendor, MAC, etc)
• Device PNL (full probing list)
• Relative Proximity of devices within range of sensor (RSSI)
• Arrival and Departure Activity Window
• Encryption Specifications for each requested SSID
• Frequency and communication channel for each device
36. Vulnerability Exposure [1]
• Profiling People (e.g., social engineer connection to planted AP, you can now
specifically tag an individual person to a device)
• Intercepting frames from a device can reveal much more than details about the
device, but locations of the user!
44. Vulnerability Exposure [2]
• 802.11 protocol fails to tuple SSID to geo-location, BSSID
• Your PNL is blindly built on a system of trust… surely the AP that responds to your probe is legit right?... This leaves
room for exploitation since any device will suffice!
• Thus, if another device “suddenly” comes into the area that matches your probe, your device will attempt to
authenticate with it
• This is especially dangerous if authenticating to OPEN WiFi networks!
• Don’t believe me? Welp, let’s start further exploitation with the WiFi Pineapple
and then build our own attacks to go after victim devices
http://www.reidlitchfield.com/these-arent-the-droids-youre-looking-for/
This is the access point you are looking for…
46. Security Recommendation
• 802.11 Protocol Enhancement
• Devices should restrict full broadcast of entire PNL unless within range of known BSSID
• Update required to tuple SSID, BSSID(MAC), and GPS Coordinates to known SSID and base station
• Notify when anomaly detected
• 802.11 MiTM Mitigation
• Never store OPEN WiFi SSIDs on your devices
• If so, device should notify when reassociated to “previous” base station
• Geo-Location tracking and Personnel Profiling Mitigation
• Remove all inactive SSIDs from devices
• Disable WiFi when not in active use
• Audit active WiFi connections on devices
• Rename AP SSID broadcasts (it turns out less unique is actually safer for you in this case…!)
• A new capability is required and we must audit 802.11 spectrum… (stay tuned, Connectionless (C)overt Channel: data-
exfil and C2 module release in the works coming next summer) simply from 802.11 frames… whose auditing this right
now???
“We can't solve problems by using the same kind of thinking
we used when we created them.” – Albert Einstein
48. Establishing Theia Sensor Suite
• theia_oui.exe [*NIX] or [windows]
• Will autostart and establish serversocket for new connections
• theia_geo.exe [*NIX] or [windows]
• Will autostart, establish serversocket for new connections, and allow you to import geo-location database table
• theia_sensor.exe [*NIX only] – because of the wifi drivers
• Will autostart, search for wireless interfaces, bind to interface, establish serversocket for new connections, display 802.11 collected frames ready for
transmission to collector
• GPS_collector.exe [*NIX only]
• GPS agent, autostarts, binds to GPS receiver, displays telemetry data from receiver, establishes serversocket to relay data through sockets
• First time: will download and configure dependencies for GPS reception
• Connect theia_sensor.exe to GPS_collector.exe
• theia_collector.exe [*NIX] or [windows]
• Will autostart and establish serversocket for new connections
• Connects to theia_oui.exe, theia_geo.exe, theia_sensor.exe, theia_interface.exe
• Collected frames will now be processed by the system ready for visualization
• theia_interface.exe [windows only until Java1.8 FX release on *NIX]
• User Interface providing visualization from collector
54
49. Theia_OUI
55
• Provides Vendor lookup information for detected MAC’s
• java –jar theia_oui.jar
• (I have already prepackaged the OUI table within the program. )
51. Theia_Collector
• Heart and Engine of the entire system - Processes raw sensor data from theia_sensor to establish appropriate linkages
ready to visualize in the interface
• Self configures environment ready for you to connect to
theia_geo, theia_oui, theia_sensor, theia_interface
• java –jar theia_collector.jar
57
52. GPS_Collector (OPTIONAL)
• Interfaces with GPS receiver to supply GPS data to all connected sockets
• java –jar gps_collector.jar
• NOTE: If this is the first time running, I programmed it to configure your system for you, and then interface
with GPS receiver
58
53. Theia_Sensor
• Actual sensor capturing 802.11 frames and transmitting to connected Theia_Collectors
• java –jar theia_sensor.jar
• After started, connect to GPS_Collector.jar (if applicable) using command:
• gps_connect <IP> <PORT>
59
54. Theia_Interface
• User Interface to visualize data intercepted by Theia Sensor Suite
• Connects to Theia_Collector
• java –jar theia_interface.jar
60
57. Building the Sensor - 1
• Determine wireless interfaces and place into monitor mode
• ifconfig
• ifconfig wlan<#> down
• iwconfig wlan<#> mode monitor
• ifconfig wlan<#> up
• Frequency Hopping!
• Very important otherwise, you’ll capture only on 1 channel
• There are scripts to do this, we’ll implement programmically based on our interrupt timer
• iwconfig wlan<#> channel <#>
• (we’ll code this later in the presentation)
• GPS Collector
• ServerSocket
• Transmission of frames across connected sockets
63
58. Building Sensor
• //Remaining slides will cover development of the sensor programically
• GPS_Collector
• Interfacing with GPS daemon, process and present telemetry
• Sensor
• Reading 802.11 frames directly from wireless interface card
• Geo
• Wigle.net API
• Database construction
• Google Map API construction
• OUI
• IEEE specification, HashTable construction for efficient retrieval
• Collector
• Most critical and robust component - HashMap, TreeMap, LinkedList required to efficiently store and link devices
• Interface
• Processing all data from Collector into User Interface
• WarDriving
64
60. Upcoming Features / Releases
• Light-weight deployment
module to Raspberry Pi
• Sensor distribution package for
Windows OS
• Simultaneous multi-antennae
integration
• Crowd-source SSID database (distributed sharing)
• Increased accuracy: GEO lat/lon to address
• Additional wardriving compatibility with Kismet and Netstumbler
66
61. Acknowledgements:
TakeDownCon – RocketCity
Devona Valdez
Paul Coggin @PaulCoggin
Wigle.net, @bobzilla
Google
Vivek Ramachandaran, @securitytube
Sushail M. “The Boss” @hackcon
Solomon Sonya @Carpenter1010
Solomon Sonya @Carpenter1010