2014 EFF Unintended Consequences 2
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Biting Into Forbidden Fruit
Biting into the forbidden fruit Lessons from trusting Javascript crypto Krzysztof Kotowicz, OWASP Appsec EU, June 2014 About me • Web security researcher • HTML5 • UI redressing • browser extensions • crypto • I was a Penetration Tester @ Cure53 • Information Security Engineer @ Google Disclaimer: “My opinions are mine. Not Google’s”. Disclaimer: All the vulns are fixed or have been publicly disclosed in the past. Introduction JS crypto history • Javascript Cryptography Considered Harmful http://matasano.com/articles/javascript- cryptography/ • Final post on Javascript crypto http://rdist.root.org/2010/11/29/final-post-on- javascript-crypto/ JS crypto history • Implicit trust in the server to deliver the code • SSL/TLS is needed anyway • Any XSS can circumvent the code • Poor library quality • Poor crypto support • No secure keystore • JS crypto is doomed to fail Doomed to fail? Multiple crypto primitives libraries, symmetric & asymmetric encryption, TLS implementation, a few OpenPGP implementations, and a lot of user applications built upon them. Plus custom crypto protocols. https://crypto.cat/ https://www.mailvelope.com/ http://openpgpjs.org/ JS crypto is a fact • Understand it • Look at the code • Find the vulnerabilities • Analyze them • Understand the limitations and workarounds • Answer the question: can it be safe? JS crypto vulns in the wild • Language issues • Caused by a flaw of the language • Web platform issues • Cased by the web • Other standard bugs • out of scope for this presentation Language issues Language issues matter -
Analyse De Maliciels Sur Android Par L'analyse De La Mémoire Vive
Analyse de maliciels sur Android par l’analyse de la mémoire vive Mémoire Bernard Lebel Maîtrise en informatique Maître ès sciences (M. Sc.) Québec, Canada © Bernard Lebel, 2018 Analyse de maliciels sur Android par l’analyse de la mémoire vive Mémoire Bernard Lebel Sous la direction de: Mohamed Mejri, directeur de recherche Résumé Les plateformes mobiles font partie intégrante du quotidien. Leur flexibilité a permis aux développeurs d’applications d’y proposer des applications de toutes sortes : productivité, jeux, messageries, etc. Devenues des outils connectés d’agrégation d’informations personnelles et professionnelles, ces plateformes sont perçues comme un écosystème lucratif par les concepteurs de maliciels. Android est un système d’exploitation libre de Google visant le marché des appareils mobiles et est l’une des cibles de ces attaques, en partie grâce à la popularité de celui- ci. Dans la mesure où les maliciels Android constituent une menace pour les consommateurs, il est essentiel que la recherche visant l’analyse de maliciels s’intéresse spécifiquement à cette plateforme mobile. Le travail réalisé dans le cadre de cette maîtrise s’est intéressé à cette problématique, et plus spécifiquement par l’analyse de la mémoire vive. À cette fin, il a fallu s’intéresser aux tendances actuelles en matière de maliciels sur Android et les approches d’analyses statiques et dynamiques présentes dans la littérature. Il a été, par la suite, proposé d’explorer l’analyse de la mémoire vive appliquée à l’analyse de maliciels comme un complément aux approches actuelles. Afin de démontrer l’intérêt de l’approche pour la plateforme Android, une étude de cas a été réalisée où un maliciel expérimental a été conçu pour exprimer les comportements malicieux problématiques pour la plupart des approches relevées dans la littérature. -
Unintended Consequences: Twelve Years Under the DMCA
Unintended Consequences: Twelve Years under the DMCA By Fred Von Lohmann, [email protected] February 2010 ELECTRONIC FRONTIER FOUNDATION eff.org Unintended Consequences: Twelve Years under the DMCA This document collects reported cases where the anti-circumvention provisions of the DMCA have been invoked not against pirates, but against consumers, scientists, and legitimate compet- itors. It will be updated from time to time as additional cases come to light. The latest version can always be obtained at www.eff.org. 1. Executive Summary Since they were enacted in 1998, the “anti-circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the “black box” devices intended for that purpose. 1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities: The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Profes- sor Edward Felten’s team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, stu- dents, program¬mers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally elimi- nate the public’s fair use rights. -
Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide -
How the Best Hackers Learn Their Craft
#RSAC SESSION ID: HUM-F02 HOW THE BEST HACKERS LEARN THEIR CRAFT David Brumley CEO, ForAllSecure Professor, Carnegie Mellon University @thedavidbrumley George Hotz • First IPhone JailBreak • Playstation 3 • Zero-days in Adobe, Firefox, … Image Credit: https://goo.gl/rhmFEb 2 Richard Zhu • Mozilla Firefox (’18) • Microsoft Edge (‘17 & ’18) • iOS Safari (‘17) Image Credit: https://goo.gl/yY5FRg 3 #1 US Team since 2011 #1 Overall 3 of past 7 years 4 DEFCON wins – most wins in DEFCON history 4 Learning Objectives #RSAC 1. Understand how top experts use capture the flag competitions for deliberate practice. 2. See how hacking competitions gamify learning computer security. 3. Learn how to set up a system for building a top-ranked hacker culture. 5 Basic Knowledge Question Flag 6 Basic Knowledge Answer: FAT 7 Jeopardy-Style CTF Categories Basic Reverse Network Program Cryptography Forensics Difficulty Knowledge engineering security Exploitation Caesar Cipher ... ... ... ... ... 10 pts Frequency analysis ... ... ... ... ... 20 pts RSA Encryption ... ... ... ... ... 40 pts RSA Low Exponent ... ... ... ... ... 100 pts 8 Gamify Learning 9 1 Applied, deliberate practice CTF Principles 2 Autodidactic learning 3 Creative problem solving 10 1 Applied, deliberate practice Reverse Network Program Cryptography Forensics engineering security Exploitation 11 ”Buffer Overflow” User input size programmed Class: 90 minutes lecture 1. Sophomore course 10 bytes 2. Students understand concept long Challenge: Apply knowledge 50 bytes long 1. Real program buffer size? 2. Create long user input? User input given 3. Create specific attack input? 4. … 12 CTF Problem: Show You Can Do It 13 2 Autodidactic Learning Auto: self didactic: learn 14 Romantic, but not real Image: http://www.starwars.com/news/6-great-quotes-about-the-force 2 Auto-didactic Learning Richard didn’t know either. -
Thesis (844.6Kb)
ABSTRACT You Should Have Expected Us – An Explanation of Anonymous Alex Gray Director: Linda Adams; PhD Anonymous is a decentralized activist collective that has evolved using the technology of the information age. This paper traces its origins as a way of contextualizing and better understanding its actions. The groups composition is examined using its self‐ascribed imagery to illustrate its’ unique culture and relational norms. Its structure and motivation are analyzed using the framework developed for social movements and terrorist networks. Finally a discussion of a splinter cell and official reaction delineate both strengths and weaknesses of the movement while suggesting its future development. The conclusion serves to expound on the ideal end for the online anonymous community as a new frontier in meritocratic activism. APPROVED BY DIRECTOR OF HONORS THESIS: ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Dr. Linda Adams, Department of Political Science APPROVED BY THE HONORS PROGRAM: ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Dr. Andrew Wisely, Director. DATE: ________________________ YOU SHOULD HAVE EXPECTED US AN EXPLANATION OF ANONYMOUS A Thesis Submitted to the Faculty of Baylor University In Partial Fulfillment of the Requirements for the Honors Program By Alex Gray Waco, Texas May 2012 TABLE OF CONTENTS Preface iii Acknowledgements iv Dedication v CHAPTER ONE 1 Introduction CHAPTER TWO 4 The Story of Anonymous CHAPTER THREE 20 A Group with No Head and No Members CHAPTER FOUR 39 Activists or Terrorists CHAPTER FIVE 56 Distraction, Diversion, Division CHAPTER SIX 67 Conclusion Bibliography 71 ii PREFACE Writing a paper about a decentralized, online collective of similarly minded individuals presents a unique set of challenges. In spending so much time with this subject, it is my goal to be both intellectually honest and as thorough as I can be. -
Hacktivism Cyberspace Has Become the New Medium for Political Voices
White Paper Hacktivism Cyberspace has become the new medium for political voices By François Paget, McAfee Labs™ Table of Contents The Anonymous Movement 4 Origins 4 Defining the movement 6 WikiLeaks meets Anonymous 7 Fifteen Months of Activity 10 Arab Spring 10 HBGary 11 The Sony ordeal 11 Lulz security and denouncements 12 Groups surrounding LulzSec 13 Green rights 14 Other operations 15 AntiSec, doxing, and copwatching 16 Police responses 17 Anonymous in the streets 18 Manipulation and pluralism 20 Operation Megaupload 21 Communications 21 Social networks and websites 21 IRC 22 Anonymity 23 DDoS Tools 24 Cyberdissidents 25 Telecomix 26 Other achievements 27 Patriots and Cyberwarriors 28 Backlash against Anonymous 29 TeaMp0isoN 30 Other achievements 30 Conclusion 32 2 Hacktivism What is hacktivism? It combines politics, the Internet, and other elements. Let’s start with the political. Activism, a political movement emphasising direct action, is the inspiration for hacktivism. Think of Greenpeace activists who go to sea to disrupt whaling campaigns. Think of the many demonstrators who protested against human rights violations in China by trying to put out the Olympic flame during its world tour in 2008. Think of the thousands of activists who responded to the Adbusters call in July 2011 to peacefully occupy a New York City park as part of Occupy Wall Street. Adding the online activity of hacking (with both good and bad connotations) to political activism gives us hacktivism. One source claims this term was first used in an article on the filmmaker Shu Lea Cheang; the article was written by Jason Sack and published in InfoNation in 1995. -
Skylanders Imaginators Free Download Pc Skylanders Imaginators Free Download Pc
skylanders imaginators free download pc Skylanders imaginators free download pc. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67d5a1e4dfe7c401 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Skylanders Spyro Adventure Pc Iso Torrent. Skylanders Spyro Adventure Pc Iso Torrent Posted on 1/4/2018by admin .ﻟﻤﻦ ﯾﺮﯾﺪ ﺗﺤﻤﯿﻞ اﻟﻠﻌﺒﺔ ﻟﯿﺬھﺐ اﻟﻰ ھﺬا اﻟﻤﻮﻗﻊ / وﻟﺘﺤﻤﯿﻞ ﺑﺮﻧﺎﻣﺞ اﻟﺘﻮرﻧﺖ Skylanders® Imaginators is subject to the Software License Agreement available. Opening the game box and using the software constitutes acceptance of the Software License Agreement. © 2011-2017 Activision Publishing. Skylanders: Spyro's Adventure - Walkthrough - Part 1 - Shattered Island (PC) HD Playlist - https://www.youtube.com/playlist?list=PLpBVLiNEBDUauWNmNbkno28G. Skylanders - Spyro's Adventure (USA) (En,Fr,De,Es,It,Nl,Sv,No,Da,Fi) An icon used to represent a menu that can be toggled by interacting with this icon. Skylanders Spyro Adventure Pc Iso Torrent. 10 Octobre 2017 0. Skylanders Spyros Adventure Free Download for PCSkylanders Spyros Adventure Free. -
Kicks Into Gear in Anticipation of the Launch of Skylanders SWAP Force™
"SWAPtober" Kicks into Gear in Anticipation of the Launch of Skylanders SWAP Force™ Skylanders® takes over Times Square for "SWAPtoberfest" Celebration on October 10 Daily Skylanders SWAP Force Starter Pack Giveaways and Activities Begin October 1 through the end of the month SANTA MONICA, Calif.--(BUSINESS WIRE)-- Activision Publishing, Inc., a wholly owned subsidiary of Activision Blizzard, Inc. (NASDAQ: ATVI), is celebrating the month of "SWAPtober" as the magic of Skylanders SWAP Force sweeps the globe heading into the game's launch on Sunday, SWAPtober 13th and beyond. Lucky Portal Masters will have chances to win copies of the Skylanders SWAP Force game, explore the world of Skylanders in Times Square, and more during the month-long activities. Kicking off SWAPtober, Activision will be giving away one Skylanders SWAP Force Starter Pack per day from October 1-31 via the official Skylanders Twitter channel (@SkylandersGames). Portal Masters can visit Skylanders.com to mix and match their favorite SWAP Force™characters out of the more than 250 possible combinations. Fans can then tweet their favorite SWAP Force character combination along with a suggested catchphrase using the hashtags #SWAPtober and #Skylanders for the chance to win one of the daily Skylanders SWAP Force Starter Pack giveaways, which will be available after the game's launch. On October 10, Skylanders, one of the world's most successful video game franchises1, is partnering with Toys"R"Us® to bring Skylands to life with "SWAPtoberfest"—a celebration in Times Square where fans will have the chance to be among the very first to play the game before it's available at retail. -
TECHNIQUE Men’S Lacrosse Defeats #15 Students Place in National “The South’S Liveliest College Newspaper” Ranked Auburn
Friday, April 18, 2003 Taking down the Tigers! Making paper airplanes! Tech TECHNIQUE Men’s Lacrosse defeats #15 students place in national “The South’s Liveliest College Newspaper” ranked Auburn. paper gliding competition. ONLINE http://cyberbuzz.gatech.edu/technique SPORTS page 29 FOCUS page 13 Serving Georgia Tech since 1911 • Volume 88, Issue 31 • 32 pages Opinions␣ 6 · Wall Street Journal · Focus␣ 13 · Entertainment␣ 19 · Comics␣ 24 · Sports␣ 32 Sharing Opinions on the War in Iraq BuzzCard maker silences student By Tim Cailloux CampusWide to Tech, served Hoff- Senior News Photographer man with a temporary restraining order that kept him from giving his At a computer security confer- presentation. ence last weekend, Billy Hoffman, Hoffman planned to present in- a fourth year CS major, planned to formation on the network protocol present his research on Campus- used by the BuzzCard readers and Wide, the network the BuzzCard demonstrate his version of a reader system uses. that could be used as any other nor- Hoffman began researching ways mal reader connected to the the system could be circumnavigat- BuzzCard network. ed nearly two years ago. His research Along with Virgil Griffith, an led to the discovery that it is possi- Alabama University at New Col- ble to fool the system into thinking lege student, Hoffman explored the that a real BuzzCard was used when protocol used by the BuzzCard read- in fact, one was not. This flaw would, ers to see how it worked and what for example, allow someone to get information was being transmitted. free laundry service. The readers send all data to the cen- When the number of sexual as- tral server via a communications stan- saults on campus increased, Hoff- dard known as RS-485; in other man started investigating how the words, the data is sent across the By Scott Meuleners / STUDENT PUBLICATIONS system could be used to gain unau- campus local area network via a spe- College Republicans chair Alexander Brunk voices his opinion at a war in Iraq teach-in last Friday. -
Skylanders Giants™ Remains Best-Selling Video Game in the U.S
Skylanders Giants™ Remains Best-Selling Video Game in the U.S. and Europe Year to Date1 Skylanders Figures Continue to Outsell the Top Action Figure Properties Year-to-Date 20133 SANTA MONICA, Calif.--(BUSINESS WIRE)-- Activision Publishing, Inc., a wholly owned subsidiary of Activision Blizzard, Inc. (NASDAQ: ATVI), announced today that Skylanders Giants is the #1 best-selling console and hand-held video game year-to- date overall in dollars, including toys and accessories, in the U.S. and Europe and remains the biggest kids' videogame launch in the last 12 months in the U.S. and Europe.5 In its first two weeks, Skylanders Giants sold more than 500,000 Starter Packs and Portal Owner Packs globally.2 Additionally, Skylanders figures are expected to have outsold the top action-figure properties in the U.S. and Europe for the first eight months of the year.3 Life to date, the Skylanders® franchise has generated more than $1.5 billion in worldwide retail sales.4 "Skylanders is the biggest video game including toys and accessories and the biggest action figure line in the industry in the U.S. and Europe so far this year. Skylanders Giants also delivered the biggest kid's video game launch of the last 12 months1," said Eric Hirshberg, CEO of Activision Publishing, Inc. "We've accomplished this unmatched level of success by consistently delivering magic to our passionate, young fans. And the best is yet to come. With next month's release of Skylanders SWAP ForceTM, we will take this category that we've pioneered to a new level of innovation and creativity." "The Skylanders franchise continues to be one of our top selling video game properties," said Laura Phillips, senior vice president of entertainment for Walmart U.S. -
Skylanders Accessories Showcased in Powera Booth at E3 Controllers
FOR IMMEDIATE RELEASE Skylanders Accessories Showcased in PowerA Booth at E3 Controllers, Cases and More To Debut at E3 EXPO June 5-7 in Los Angeles Los Angeles, CA. – June 5, 2012 (E3 EXPO, Booth #5222 West Hall) -- PowerA today announced that it will debut an expansive collection of officially licensed Skylanders video game accessories at the E3 Expo June 5-7 in Los Angeles. Skylanders: Spyro's AdventureTM from Activision was the #1 new kids video game IP of 2011 and the franchise has achieved phenomenal success worldwide with its game that brings toys to life. Since game launch, PowerA has experienced unprecedented demand for its Skylanders Tower Case and Adventure Case video game storage and display products and Bobble Styluses. This year look for even more offerings for Skylanders fans, including accessories for the game’s upcoming sequel -- Skylanders GiantsTM. "The Skylanders phenomenon appears to be showing no signs of slowing down, and the response to PowerA Skylanders products has been amazing," said John Moore, divisional vice president of product development and marketing for PowerA. "Skylanders fans are clamoring for everything the franchise has to offer, and as the exclusive video game accessory licensee, our assortment of cases, controllers and accessories amplify their experience." “PowerA has already been a great partner in translating the elements of the game into engaging accessories that delight Skylanders fans,” said Ashley Maidy, Head of Global Licensing and Partnerships for Activision. “As we expand this license on a global scale, we’ll be working with PowerA to bring officially licensed Skylanders accessories to new territories.” This year, PowerA will be releasing Skylanders editions of its three most popular video game controllers: the Pro Pack Mini™ controller set for Nintendo Wii™, the Mini Pro EX Controller for PLAYSTATION® 3 and the officially licensed Mini Pro EX Wired Controller for Xbox 360®.