Off-Path Attacking the Web
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Investor Presentation
July 2021 Disclaimer 2 This Presentation (together with oral statements made in connection herewith, the “Presentation”) relates to the proposed business combination (the “Business Combination”) between Khosla Ventures Acquisition Co. II (“Khosla”) and Nextdoor, Inc. (“Nextdoor”). This Presentation does not constitute an offer, or a solicitation of an offer, to buy or sell any securities, investment or other specific product, or a solicitation of any vote or approval, nor shall there be any sale of securities, investment or other specific product in any jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such jurisdiction. The information contained herein does not purport to be all-inclusive and none of Khosla, Nextdoor, Morgan Stanley & Co. LLC, and Evercore Group L.L.C. nor any of their respective subsidiaries, stockholders, affiliates, representatives, control persons, partners, members, managers, directors, officers, employees, advisers or agents make any representation or warranty, express or implied, as to the accuracy, completeness or reliability of the information contained in this Presentation. You should consult with your own counsel and tax and financial advisors as to legal and related matters concerning the matters described herein, and, by accepting this Presentation, you confirm that you are not relying solely upon the information contained herein to make any investment decision. The recipient shall not rely upon any statement, representation -
Inferring TCP/IP-Based Trust Relationships Completely Off-Path
ONIS: Inferring TCP/IP-based Trust Relationships Completely Off-Path Xu Zhang Jeffrey Knockel Jedidiah R. Crandall Department of Computer Science Department of Computer Science Department of Computer Science University of New Mexico University of New Mexico University of New Mexico [email protected] [email protected] [email protected] Abstract—We present ONIS, a new scanning technique that researcher in country X who wants to learn if network traffic can perform network measurements such as: inferring TCP/IP- from a host in country Y can connect to a Tor server in country based trust relationships off-path, stealthily port scanning a Z. Performing this measurement off-path is necessary when target without using the scanner’s IP address, detecting off- path packet drops between two international hosts. These tasks vantage points (VPNs, Planet Lab nodes, etc.) are limited or typically rely on a core technique called the idle scan, which is unavailable in some countries. Ensafi et al. detail this off- a special kind of port scan that appears to come from a third path trust relationship testing by using the idle scan in [2]. machine called a zombie. The scanner learns the target’s status Specifically, they measured packet drops from clients to Tor from the zombie by using its TCP/IP side channels. directory servers by using machines with global incrementing Unfortunately, the idle scan assumes that the zombie has IP identifiers (IPIDs) which exhibit the now-discouraged behavior IPIDs as vantage points without those machines being under of being globally incrementing. The use of this kind of IPID their control. -
Sarah Friar the Empathy Flywheel, W/Nextdoor CEO
Masters of Scale Episode Transcript – Sarah Friar The Empathy Flywheel, w/Nextdoor CEO Sarah Friar Click here to listen to the full Masters of Scale episode featuring Sarah Friar. REID HOFFMAN: For today’s show, we’re talking with Sarah Friar, the CEO of Nextdoor, who’s built a reputation in Silicon Valley as both a skilled operator and a beloved leader. But we’ll start the show – as we often do – by hearing from another person who’s renowned in their field. DR. ROBERT ROSENKRANZ: I might not be Mark Zuckerberg, I might not be Sheldon Adelson, I might not be Tom Brady, all right. I'm Robert Rosenkranz, I'm a dentist in Park Slope, and I love my patients. I love what I do. HOFFMAN: Robert Rosenkranz is a dentist in Brooklyn, New York. A dentist who loves his patients so much he sees 80 of them every day. That means he’s in the office almost 14 hours, six days a week. ROSENKRANZ: Okay. A little less on Sunday. Otherwise my wife would leave me. But six days, we're looking like max hours. Max capacity. HOFFMAN: You know the drill on this show. Working long hours isn’t unusual. What sets Robert’s dental practice apart is that his patients keep multiplying. Not because the good people of Park Slope have particularly bad teeth, but because they just love visiting Robert. ROSENKRANZ: One of my very good friends says to me, “Whenever you see someone, they think you're their best friend. When you talk to them, they feel like you're their best friend." I said, "That's what I want." I take that, and I bring it to work, and I bring it to strangers, and it becomes infectious. -
Social Networking for Scientists Using Tagging and Shared Bookmarks: a Web 2.0 Application
Social Networking for Scientists Using Tagging and Shared Bookmarks: a Web 2.0 Application Marlon E. Pierce, Geoffrey C. Fox, Joshua Rosen, Siddharth Maini, and Jong Y. Choi Community Grids Laboratory, Indiana University, Bloomington, IN 47404, USA {marpierc, gcf, jjrosen, smaini, jychoi}@indiana.edu ABSTRACT and researchers to find both useful online resources and also potential collaborators on future research projects. Web-based social networks, online personal profiles, We are particularly interested in helping researchers at keyword tagging, and online bookmarking are staples of Minority Serving Institutions (MSIs) connect with each Web 2.0-style applications. In this paper we report our other and with the education, outreach, and training investigation and implementation of these capabilities as services that are designed to serve them, expanding their a means for creating communities of like-minded faculty participation in cyberinfrastructure research efforts. This and researchers, particularly at minority serving portal is a development activity of the Minority Serving institutions. Our motivating problem is to provide Institution-Cyberinfrastructure Empowerment Coalition outreach tools that broaden the participation of these (MSI-CIEC). The portal’s home page view is shown in groups in funded research activities, particularly in Figure 1. cyberinfrastructure and e-Science. In this paper, we The MSI-CIEC social networking Web portal combines discuss the system design, implementation, social social bookmarking and tagging with online curricula network seeding, and portal capabilities. Underlying our vitae profiles. The display shows the logged-in user’s tag system, and folksonomy systems generally, is a graph- cloud (“My Tags” on left), taggable RSS feeds (center), based data model that links external URLs, system users, and tag clouds of all users (“Favorite Tags” and “Recent and descriptive tags. -
Building Relationships on Social Networking Sites from a Social Work Approach
Journal of Social Work Practice Psychotherapeutic Approaches in Health, Welfare and the Community ISSN: 0265-0533 (Print) 1465-3885 (Online) Journal homepage: https://www.tandfonline.com/loi/cjsw20 Building relationships on social networking sites from a social work approach Joaquín Castillo De Mesa, Luis Gómez Jacinto, Antonio López Peláez & Maria De Las Olas Palma García To cite this article: Joaquín Castillo De Mesa, Luis Gómez Jacinto, Antonio López Peláez & Maria De Las Olas Palma García (2019) Building relationships on social networking sites from a social work approach, Journal of Social Work Practice, 33:2, 201-215, DOI: 10.1080/02650533.2019.1608429 To link to this article: https://doi.org/10.1080/02650533.2019.1608429 Published online: 16 May 2019. Submit your article to this journal Article views: 204 View related articles View Crossmark data Citing articles: 2 View citing articles Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=cjsw20 JOURNAL OF SOCIAL WORK PRACTICE 2019, VOL. 33, NO. 2, 201–215 https://doi.org/10.1080/02650533.2019.1608429 Building relationships on social networking sites from a social work approach Joaquín Castillo De Mesa a, Luis Gómez Jacinto a, Antonio López Peláez b and Maria De Las Olas Palma García a aDepartment of Social Psychology, Social Work, Social Anthropology and East Asian Studies, University of Málaga, Málaga, Spain; bDepartment of Social Work, National Distance Education University, Madrid, Spain ABSTRACT KEYWORDS Our current age of connectedness has facilitated a boom in inter- Relationships; active dynamics within social networking sites. It is, therefore, possi- connectedness; interaction; ble for the field of Social Work to draw on these advantages in order communities; social mirror; to connect with the unconnected by strengthening online mutual social work support networks among users. -
Engineering Egress with Edge Fabric Steering Oceans of Content to the World
Engineering Egress with Edge Fabric Steering Oceans of Content to the World Brandon Schlinker,?y Hyojeong Kim,? Timothy Cui,? Ethan Katz-Bassett,yz Harsha V. Madhyasthax Italo Cunha,] James Quinn,? Saif Hasan,? Petr Lapukhov,? Hongyi Zeng? ? Facebook y University of Southern California z Columbia University x University of Michigan ] Universidade Federal de Minas Gerais ABSTRACT 1 INTRODUCTION Large content providers build points of presence around the world, Internet traffic has very different characteristics than it did a decade each connected to tens or hundreds of networks. Ideally, this con- ago. The traffic is increasingly sourced from a small number of large nectivity lets providers better serve users, but providers cannot content providers, cloud providers, and content delivery networks. obtain enough capacity on some preferred peering paths to han- Today, ten Autonomous Systems (ASes) alone contribute 70% of the dle peak traffic demands. These capacity constraints, coupled with traffic [20], whereas in 2007 it took thousands of ASes to add up to volatile traffic and performance and the limitations of the 20year this share [15]. This consolidation of content largely stems from old BGP protocol, make it difficult to best use this connectivity. the rise of streaming video, which now constitutes the majority We present Edge Fabric, an SDN-based system we built and of traffic in North America [23]. This video traffic requires both deployed to tackle these challenges for Facebook, which serves high throughput and has soft real-time latency demands, where over two billion users from dozens of points of presence on six the quality of delivery can impact user experience [6]. -
Hacking Techniques & Intrusion Detection
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail All materials is licensed under a Creative Commons “Share Alike” license. • http://creativecommons.org/licenses/by-sa/3.0/ 2 # whoami • Ali Al-Shemery • Ph.D., MS.c., and BS.c., Jordan • More than 14 years of Technical Background (mainly Linux/Unix and Infosec) • Technical Instructor for more than 10 years (Infosec, and Linux Courses) • Hold more than 15 well known Technical Certificates • Infosec & Linux are my main Interests 3 Scanning and Fingerprinting Outline • Diving into Important Network Protocols (TCP, UDP, ICMP, ARP, etc) • Nmap – Intro. • Host Discovery • Tracing the Route • Port Scanning • OS and Service Fingerprinting • Learning Python in 4 Slides • Packet Crafting 5 Diving into Important Network Protocols • Diving into Important Network Protocols: – TCP – UDP – ICMP – ARP – HTTP – etc 6 Nmap • "Network Mapper” is a free and open source utility for network discovery and security auditing. - Fyodor • IMO: #1 tool in your security arsenal! Important Note: A huge difference between running Nmap as a privileged/unprivileged user! 7 Host Discovery • Identifying Live Systems • Also called “Network Sweep” • Nmap ping sweeps: – Ping Only (-sP) – ARP Ping (-PR) – ICMP Echo Request Ping (-PE) – TCP SYN Ping (-PS) – TCP ACK Ping (-PA) – UDP Ping (-PU) DEMO 8 Assignment #1 • Why do host discovery or network sweeping if we already have the target list of IP(s)? 9 Tracing the Route • Nmap --traceroute option • DEMO DEMO 10 Port Scanning • The act of testing a remote -
How to Scan a Network with Hping3
How To Scan a Network With Hping3 Hping3 Hping3 is a command-line oriented TCP/IP packet assembler and analyser and works like Nmap. The application is able to send customizes TCP/IP packets and display the reply as ICMP echo packets, even more Hping3 supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features like DDOS flooding attacks. Hping3 can be used to perform: OS fingerprinting ICMP pings Traceroute Port scanning Firewall testing Test IDSes Network testing and auditing MTU discovery Exploit and vulnerabilities discovery DDOS and ICMP flooding Hping3 comes pre-installed with Kali Linux but and can also be installed on most Linux distros, also you need to run the commands with sudo privileges. Visit the official documentation at to learn more on how you can use Hping3 http://www.hping.org/documentation.php Useful Options -h Show this help -v Show version -c Packet count -i –interval –flood -V Verbose mode -D Debugging -f Fragment packets -Q Display sequence number -0 RAW IP mode -1 ICMP mode -2 UDP mode -8 SCAN mode -9 listen mode -F Set the FIN flag -S Set the SYN flag -P Set the PUSH flag -A Set the ACK flag -U Set the URG flag Commands Send a ACK packet to a target hping3 –A 192.168.100.11 HPING 192.168.100.11 (eth0 192.168.100.11): A set, 40 headers + 0 data bytes len=46 ip=192.168.100.11 ttl=128 id=29627 sport=0 flags=R seq=0 win=32767 rtt=4.0 ms len=46 ip=192.168.100.11 ttl=128 id=29628 sport=0 flags=R seq=1 win=32767 rtt=2.0 ms len=46 ip=192.168.100.11 -
Koo Seunghwui Is a Sculptor Based in New York
[Silence Is Accurate] KARToISToS Seunghwui POP UP EXHIBITIONS STORE website: www.kooseunghwui.com ABOUT US CONTACT social media: @kooseunghwui (Insta & twitter) kooseunghwui (facebook) “There is no correct answer. No one is perfect.” ...this is my own personal quote or thought. Born in South Korea, Koo Seunghwui is a sculptor based in New York. She uses resin, acrylic, plaster, clay, and mixed media to create her works. The pig is a recurring image in her art. It’s hard not to instantaneously love Koo. She is worldly and charismatic, has a playful spirit and underlying strength. Her work is born of love and precision. Also, she wore a necklace with a dinosaur! Out of the rain, we snuggled in Koo’s beautiful studio as she told us about her time with Chashama Organization (loves it!), the most authentic restaurant in Koreatown as well as her exciting upcoming exhibitions which include a few awards: ACRoTpyright ©2015 [Silence is Accurate] When I was young, my parents owned a butcher shop. During that time, I saw a lot of butchered pig heads. In Korea, when one opens a new business, buys a new car, or starts a big new endeavor, it is tradition to have a celebration with a pig's head in the center, while money is put into the pig's mouth. The person then bows and prays for a good and comfortable life. There is a belief that when one dreams of a pig, the next day one should buy a lottery ticket and put a lucky pig charm on their cellphone. -
CORPORATE VENTURE INVESTMENTS John Park May 23, 2019
CORPORATE VENTURE INVESTMENTS John Park May 23, 2019 © 2019 Morgan, Lewis & Bockius LLP Overview: Current Trend • Corporate Venture Capital investment is on the rise – The global number of active CVCs tripled between 2011 and 2018 (Forbes). – Most deals were $10-25M in 2018 – CVCs currently constitute more than 20% of venture deals. – Almost 2/3 of the deals were in the mobile and internet sectors 2 Overview • How and when does a CVC typically enter an investment? – CVCs as lead • Usually for strategic alignment that is tightly linked between the investment company’s operations and the startup company. – VCs as lead • Having a VC co-investor can help mitigate conflict of interest issues (i.e., separate the investment decision from the decision to enter into a business/vendor relationship) – Up rounds/down rounds • MLB CVC Survey for 2018—almost all of the transactions we reviewed involved a higher valuation than previous rounds. Only one down-round was observed. 3 Overview – Stages of a Financing I. Term sheet for Investment II. Diligence III. Capitalization Table (current and pro forma) IV. Financing Documents, Side Letter and any Strategic Commercial Agreement 4 Negotiating Deal Terms – Basics • Things to consider when negotiating deal terms: – Any prior rounds or investments (equity, convertible debt or other form of investment) with other VC/sophisticated investors? – Warrants? If provided, companies will often couple warrants with milestone conditions and exercise limitations so that the equity kicker is tied to tangible benefits for the company. – Be mindful of NDAs: strategic investors may now or in the future be actively competing with the issuer. -
Arxiv:1403.5206V2 [Cs.SI] 30 Jul 2014
What is Tumblr: A Statistical Overview and Comparison Yi Chang‡, Lei Tang§, Yoshiyuki Inagaki† and Yan Liu‡ † Yahoo Labs, Sunnyvale, CA 94089, USA § @WalmartLabs, San Bruno, CA 94066, USA ‡ University of Southern California, Los Angeles, CA 90089 [email protected],[email protected], [email protected],[email protected] Abstract Traditional blogging sites, such as Blogspot6 and Living- Social7, have high quality content but little social interac- Tumblr, as one of the most popular microblogging platforms, tions. Nardi et al. (Nardi et al. 2004) investigated blogging has gained momentum recently. It is reported to have 166.4 as a form of personal communication and expression, and millions of users and 73.4 billions of posts by January 2014. showed that the vast majority of blog posts are written by While many articles about Tumblr have been published in ordinarypeople with a small audience. On the contrary, pop- major press, there is not much scholar work so far. In this pa- 8 per, we provide some pioneer analysis on Tumblr from a va- ular social networking sites like Facebook , have richer so- riety of aspects. We study the social network structure among cial interactions, but lower quality content comparing with Tumblr users, analyze its user generated content, and describe blogosphere. Since most social interactions are either un- reblogging patterns to analyze its user behavior. We aim to published or less meaningful for the majority of public audi- provide a comprehensive statistical overview of Tumblr and ence, it is natural for Facebook users to form different com- compare it with other popular social services, including blo- munities or social circles. -
PDF/UA Competence Center | Structure Elements Best Practice Guide 0.1 1
Tagged PDF Best Practice Guide PDF Association, PDF/UA Competence Center | Document Version 0.1.1 | January 19, 2015 Table of Contents Document History ......................................................................................................................................... 2 Background ..................................................................................................................................................... 2 About PDF/UA ........................................................................................................................................................... 2 Introduction to the Structure Elements Best Practice Guide ........................................................ 2 What this Guide is not ............................................................................................................................................. 2 Additional reading ................................................................................................................................................... 2 A view towards PDF 2.0 .......................................................................................................................................... 3 PDF documents .............................................................................................................................................. 3 PDF pages .......................................................................................................................................................