Profiliranje Storilcev Kibernetske Kriminalitete: Primer Hekerji
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Information Security Framework for Web Services in Enterprise Networks
AN INFORMATION SECURITY FRAMEWORK FOR WEB SERVICES IN ENTERPRISE NETWORKS A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF INFORMATICS THE MIDDLE EAST TECHNICAL UNIVERSITY BY BAHADIR GÖKHAN SARIKOZ IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN THE DEPARTMENT OF INFORMATION SYSTEM JANUARY 2015 AN INFORMATION SECURITY FRAMEWORK FOR WEB SERVICES IN ENTERPRISE NETWORKS Submitted by Bahadır Gökhan Sarıkoz in partial fulfilment of the requirements for the degree of Master of Science in Information Systems, Middle East Technical University by, Prof. Dr. Nazife Baykal Director, Informatics Institute Prof. Dr. Yasemin Yardımcı Çetin Head of Department, Information Systems Assoc. Prof. Dr. Banu Günel Supervisor, Information Systems, METU Examining Committee Members: Prof. Dr. Nazife Baykal IS, METU Assoc. Prof. Dr. Banu Günel IS, METU Prof. Dr. Şeref Sağıroğlu CENG, Gazi University Assist. Prof. Dr. Pekin Erhan Eren IS, METU Dr. Buğra Karabey META, Microsoft Date: June 21, 2015 I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Surname: Bahadır Gökhan Sarıkoz Signature: iii ABSTRACT AN INFORMATION SECURITY FRAMEWORK FOR WEB SERVICES IN ENTERPRISE NETWORKS Sarıkoz, Bahadır Gökhan M.S., Department of Information Systems Keywords: Web Services, Cyber Security, Security Modeling, Security Controls, Security Measurement. Supervisor: Assoc. Prof. Dr. Banu GÜNEL January 2015, 197 pages Web Service, an open standard based on existing Internet protocols, provides a flexible solution to web application integration. -
Bakalářská Práce 2013
Masarykova univerzita Filozofická fakulta Ústav české literatury a knihovnictví Kabinet informa čních studií a knihovnictví Bakalá řská diplomová práce 2013 Alena Brožová Masarykova univerzita Filozofická fakulta Kabinet informa čních studií a knihovnictví Informa ční studia a knihovnictví Alena Brožová AntiSec: hacktivistická kampa ň za svobodu na internetu Bakalá řská diplomová práce Vedoucí práce: PhDr. Pavla Ková řová 2013 Prohlašuji, že jsem diplomovou práci vypracovala samostatn ě s využitím uvedených pramen ů a literatury. …………………………………………….. Podpis autora práce Zde bych cht ěla pod ěkovat vedoucí práce PhDr. Pavle Ková řové za pomoc a cenné rady v pr ůběhu tvorby bakalá řské diplomové práce. Bibliografický záznam BROŽOVÁ, Alena. AntiSec: hacktivistická kampa ň za svobodu na internetu . Brno: Masarykova univerzita, Filozofická fakulta, Ústav české literatury a knihovnictví, Kabinet informa čních studií a knihovnictví, 2013, 59 s. Vedoucí bakalá řské práce PhDr. Pavla Ková řová. Anotace Bakalá řská diplomová práce „AntiSec: hacktivistická kampa ň za svobodu na internetu“ se zabývá hackerskými útoky v rámci operace AntiSec, které byly uskute čněny pod záštitou propagace svobodného internetu, svobody informací a svobody projevu. Práce se zabývá etickou oprávn ěností provedení útok ů v souvislosti s pravidly definovaných etických teorií a kodex ů. Pro toto hodnocení jsou využity principy dimenzionální analýzy. Výsledkem práce je souhrn informací o prob ěhnuté operaci s důrazem na eti čnost provedených útok ů. Annotation Bachelor thesis „AntiSec: hacktivism campaign for freedom on the internet“ deals with hacker attacks in Operation AntiSec which were made under the auspices of promoting free internet, freedom of information and freedom of expression. The work deals with the ethical legitimacy of carrying out attacks in relation to the rules of defined ethical theories and codes. -
Commander Cialis
EPaper | Today's Paper | SmartInvestor.in | B2B Connect | Apps | BS Products Sign in | Register Thursday, January 15, 2015 | 06:40 PM IST News Stock Quote Authors Advanced Search Home Markets Companies Opinion Politics Technology Specials Personal Finance Portfolio My Page Overview News Features Gadgets & Gizmos People Personal Technology Technology » Columns » Columns Emerging global cyberlaw trends in 2014 2014 was the year when dark web started emerging, primarily due to the iCloud hacking of celebrities' pictures Pavan Duggal January 5, 2015 Last Updated at 13:37 IST Add to My Page Related News Careless and online Keeping it safe Should you worry about the Gmail hack? Now, Ankit Fadia plans to pen a fiction novel Is India prepared to tackle a Sony like cyber attack? Globally, the year 2014 was a year that was dedicated to cybercrimes and hacking. In fact, cybercrime as a phenomenon loomed large and predominant on the firmament of cyberspace landscape. Looking at the predominant events that happened in 2014 across the world, one gets an intrinsic feeling that the year 2014 was a year to remind the world that cyber criminal activities and breaches of cybercrime are going to be an integral part of our daytoday lives. Seen from another perspective, the predominant existing landscape also demonstrates an ongoing struggle between the digital haves and the digital havenots. The worlds saw one of the biggest hacking attacks in the form of Sony hacking. In the said case, hackers reportedly infiltrated the computer network of Sony Pictures Entertainment, a major Hollywood movie studio. -
الجريمة اإللكرتونية يف املجتمع الخليجي وكيفية مواجهتها Cybercrimes in the Gulf Society and How to Tackle Them
مسابقة جائزة اﻷمير نايف بن عبدالعزيز للبحوث اﻷمنية لعام )2015م( الجريمة اﻹلكرتونية يف املجتمع الخليجي وكيفية مواجهتها Cybercrimes in the Gulf Society and How to Tackle Them إعـــــداد رامـــــــــــــي وحـــــــــــــيـد مـنـصــــــــــور باحـــــــث إســـتراتيجي في الشــــــئون اﻷمـــنـــية واﻻقتصـــــــــاد الســــــــياسـي -1- أ ت جملس التعاون لدول اخلليج العربية. اﻷمانة العامة 10 ج إ الجريمة اﻹلكترونية في المجتمع الخليجي وكيفية مواجهتها= cybercrimes in the Gulf:Society and how to tackle them إعداد رامي وحيد منصور ، البحرين . ـ الرياض : جملس التعاون لدول اخلليج العربية ، اﻷمانة العامة؛ 2016م. 286 ص ؛ 24 سم الرقم املوحد ملطبوعات اجمللس : 0531 / 091 / ح / ك/ 2016م. اجلرائم اﻹلكرتونية / / جرائم املعلومات / / شبكات احلواسيب / / القوانني واللوائح / / اجملتمع / مكافحة اجلرائم / / اجلرائم احلاسوبية / / دول جملس التعاون لدول اخلليج العربية. -2- قائمة املحتويات قائمة احملتويات .......................................................................................................... 3 قائمــة اﻷشــكال ........................................................................................................10 مقدمــة الباحــث ........................................................................................................15 مقدمة الدراســة .........................................................................................................21 الفصل التمهيدي )اﻹطار النظري للدراسة( موضوع الدراســة ...................................................................................................... 29 إشــكاليات الدراســة ................................................................................................ -
Geneva Information Security Day
Geneva Information Security Day 17 September 2013 ©2011 High-Tech Bridge SA – www.htbridge.ch # whoami Frédéric BOURLA Chief Security Specialist Head of Ethical Hacking & Computer Forensics Departments High-Tech Bridge SA ~13 years experience in Information Technologies GXPN, LPT, CISSP, CCSE, CCSA, ECSA, CEH, eCPPT GREM, CHFI RHCE, RHCT, MCP [[email protected]] ©2011 High-Tech Bridge SA – www.htbridge.ch # readelf prez Slides in English. Talk in French. 3 rounds of 20’ [not including Q&A] focused on the offensive angle. No need to take notes, the whole slides and demos will be published on High-Tech Bridge website. Given the very short time and the heterogeneous attendees, slides will not dive to far in the technique. Nevertheless, I will also publish an additional low level and step by step guide for all of you who may be interested by the technical part of those hacking principles. ©2011 High-Tech Bridge SA – www.htbridge.ch # readelf prez The first two parts are server-side oriented, whereas the third one focuses on client-side attacks. If you missed previous conferences, you can learn more on server-side attacks here: https://www.htbridge.com/publications/frontal_attacks_fro m_basic_compromise_to_advanced_persistent_threat.ht ml And here are the slides which introduced client-side attacks: https://www.htbridge.com/publications/client_side_threat s_anatomy_of_reverse_trojan_attacks.html ©2011 High-Tech Bridge SA – www.htbridge.ch Table of contents 0x00 - About me 0x01 - About this conference 0x02 - Round 1: Web Servers vs. SQL Injections 0x03 - Round 2: Web Servers vs. Blind SQL Injections 0x04 - Round 3: Web Users vs. Cross-Site Scripting 0x05 - Conclusion ©2011 High-Tech Bridge SA – www.htbridge.ch SQL Injection On 5th February 2011, the security firm HBGary was compromised by LulzSec using a SQL Injection in their CMS-driven website. -
Tensões Em Rede: Os Limites E Possibilidades Da Cidadania Na Internet Universidade Metodista De São Paulo
Tensões em rede: os limiTes e possibilidades da cidadania na inTerneT Universidade Metodista de São Paulo Conselho Diretor Paulo Roberto Lima Bruhn (presidente), Nelson Custódio Fer (vice-presidente), Osvaldo Elias de Almeida (secretário) Titulares: Aires Ademir Leal Clavel, Augusto Campos de Rezende, Aureo Lidio Moreira Ribeiro, Carlos Alberto Ribeiro Simões Junior, Kátia de Mello Santos, Marcos Vinícius Sptizer, Oscar Francisco Alves Suplentes: Regina Magna Araujo, Valdecir Barreros Reitor: Marcio de Moraes Pró-Reitora de Graduação: Vera Lúcia Gouvêa Stivaletti Pró-Reitor de Pós-Graduação e Pesquisa: Fabio Botelho Josgrilberg Faculdade de Comunicação Diretor: Paulo Rogério Tarsitano Conselho de Política Editorial Marcio de Moraes (presidente), Almir Martins Vieira, Fulvio Cristofoli, Helmut Renders, Isaltino Marcelo Conceição, Mário Francisco Boratti, Peri Mesquida (repre sen tante externo), Rodolfo Carlos Martino, Roseli Fischmann, Sônia Maria Ribeiro Jaconi Comissão de Publicações Almir Martins Vieira (presidente), Helmut Renders, José Marques de Melo, Marcelo Módolo, Maria Angélica Santini, Rafael Marcus Chiuzi, Sandra Duarte de Souza Editora executiva Léia Alves de Souza UMESP São Bernardo do Campo, 2012 Dados Internacionais de Catalogação na Publicação (CIP) (Biblioteca Central da Universidade Metodista de São Paulo) T259 Tensões em rede: os limites e possibilidades da cidadania na internet / organização de Sérgio Amadeu da Silveira, Fábio Botelho Josgrilberg. São Bernardo do Campo : Universidade Metodista de São Paulo, 2012. -
Reporting, and General Mentions Seem to Be in Decline
CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations. -
Understanding and Analyzing Malicious Domain Take-Downs
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs Eihal Alowaisheq1,2, Peng Wang1, Sumayah Alrwais2, Xiaojing Liao1, XiaoFeng Wang1, Tasneem Alowaisheq1,2, Xianghang Mi1, Siyuan Tang1, and Baojun Liu3 1Indiana University, Bloomington. fealowais, pw7, xliao, xw7, talowais, xm, [email protected] 2King Saud University, Riyadh, Saudi Arabia. [email protected] 3Tsinghua University, [email protected] Abstract—Take-down operations aim to disrupt cybercrime “clean”, i.e., no longer involved in any malicious activities. involving malicious domains. In the past decade, many successful Challenges in understanding domain take-downs. Although take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. domain seizures are addressed in ICANN guidelines [55] Although it plays an important role in fighting cybercrime, the and in other public articles [14, 31, 38], there is a lack of domain take-down procedure is still surprisingly opaque. There prominent and comprehensive understanding of the process. seems to be no in-depth understanding about how the take-down In-depth exploration is of critical importance for combating operation works and whether there is due diligence to ensure its cybercrime but is by no means trivial. The domain take-down security and reliability. process is rather opaque and quite complicated. In particular, In this paper, we report the first systematic study on domain it involves several steps (complaint submission, take-down takedown. Our study was made possible via a large collection execution, and release, see SectionII). It also involves multiple of data, including various sinkhole feeds and blacklists, passive parties (authorities, registries, and registrars), and multiple DNS data spanning six years, and historical WHOIS informa- domain management elements (DNS, WHOIS, and registry tion. -
Turkey Under Cyber Fire
TURKEY UNDER CYBER FIRE The theater of cyberwar is changing and evolving by the minute. New threats, new attacks, and new actors are emerging daily, with Turkey likely being both the target and the attacker in many cyber attacks. Its young population, the nation’s increasing use of technology, and growing nationalist ideas could place Turkish hackers as one of the main actors in the global cyberwar. However, a number of factors could doom Turkey to only have several different cyber militias rather than a well organized cyber army. Attacks targeting Turkey and the region could speed up the organization of such cyber attack capabilities. Alper Başaran* Spring 2017 * Alper Başaran is the Founder of Garnizon Bilgi Guvenligi, a company specialized in penetration testing and cybersecurity consulting services working with government agencies and enterprises in Turkey. 95 VOLUME 16 NUMBER 1 ALPER BAŞARAN yber attacks have become part of our daily lives. The last great offen- sive occurred on 12 May 2017 in a global attack that compromised over a quarter million computers worldwide. A ransomware (a mali- C cious software that encrypts files on the computer it infects and asks for money to decrypt them) caused delays on German railways, almost halted the UK’s National Health Services, and stopped production in some major French fac- tories. This scenario unfolded on a global scale within a few hours.1 This ransomware was built using an exploit developed by the National Security Agency (NSA) and was leaked by Wikileaks, both of which are key actors in the current arena of cyber warfare. -
Department of Homeland Security Daily Open Source Infrastructure
Daily Open Source Infrastructure Report 15 May 2012 Top Stories • Three former General Electric Co. bankers were convicted May 11 of defrauding cities and the U.S. Internal Revenue Service in a bid-rigging scheme involving hundreds of millions of dollars in municipal bonds. – Bloomberg (See item 10) • Police arrested three high school students accused of setting a massive fire that destroyed part of a high school in Woodburn, Oregon. – Associated Press (See item 38) • DHS issued a bulletin May 10 warning about a previously undisclosed, critical vulnerability in Movicon 11, software used to manage machines used in the manufacturing, energy, and water sectors. – Threatpost (See item 52) • Sheriff’s detectives in Fresno County, California, arrested a man they believe is responsible for stealing miles of phone wire that caused phone service to cut out for many customers. – KSFN 30 Fresno (See item 54) • Authorities were trying to trace the source of a food-borne outbreak that sickened up to 150 people who attended a party and food fair at a Buddhist monastery in Carmel, New York. – Melville Newsday (See item 56) • Seven businesses in downtown Mariposa, California, burned to the ground the weekend of May 12 in a fire that caused about $1 million in structural damage. – Bellingham Herald (See item 60) • Firefighters battled several wildfires in Arizona, May 14, including one that was human- caused, more than 4.5 square miles in size, and forced residents from their homes. – Associated Press (See item 61) - 1 - Fast Jump Menu PRODUCTION INDUSTRIES -
Trends in the Threat Landscape
Trends in the Threat Landscape Thad Mann, CISM, CISSP, CeH, PMP Cybersecurity Black Belt [email protected] , 336-339-7206, October 2013 © 2013 IBM Corporation © 2013 IBM Corporation Several critical security business issues resonate consistently across senior management, and have become the top security focus issues Maximize Develop & Enable Protect the Manage end to retain key Leverage effective Corporate & security end security security security across security Brand image investment personnel the business units Ensure Leverage tools Create optimal The security Avoid a company is and environment to Build a investments breach that getting best technologies secure security DNA & need to could have bang for buck that enable company and culture that support the significant for security limited staff to build a creates business & IT financial and spend & effectively program to security requirements approaches brand impacts integration address acquire mobility & security talent across the with IT/Risk business units projects cloud © 2013 IBM Corporation Vulnerabilities increase with emergence of new business models, new technologies and Big Data Adopting new business models and Exponentially growing and interconnected embracing new technologies and data digital universe Bring your Employees, 30 billion RFID 1 own IT customers, 1 billion tags (products, contractors, workers will passports, outsourcers be remote buildings and or mobile animals) 1 billion mobile 1 trillion connected Mobility Internet users Social business objects (cars, 30 -
Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide