Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Offensive Threat Modeling for Attackers 2: Exploiting Defenders’ Weaknesses

Moving on with the subject, Rafal Los provides a step-by-step insight into preliminary measures and the right strategy for attacking the adversary’s assets. So, how do we use weaknesses of defenders as a weapon? I found a really cool quote that I like to use a lot: “To lack intelligence is to be in...

Offensive Threat Modeling for Attackers: Turning Threat Modeling on its Head

Rafal M. Los, HP Software’s Chief Security Evangelist, and Shane MacDougall, principal partner at Tactical Intelligence, give a presentation at Black Hat Europe 2012 to show a non-standard perspective of threat modeling as an offensive tool. Rafal M. Los: Hi! I’m Raf, that’s Shane right over here....

Making Attackers’ Lives Miserable 3: How to Spot and Attack the Bad Guys

Paul Asadoorian and John Strand give finishing touches to their research, highlighting methods of attribution and counterattacking, and listing the relevant precautions. Paul Asadoorian: Now along to attribution. So, if we can annoy attackers and draw them into certain places inside of our website or inside...

Making Attackers’ Lives Miserable 2: Setting Traps with Recursive Directories

In this section, Paul Asadoorian and John Strand elaborate on the aspect of annoyance that deals with making an attacker repeatedly go through a loop of directories on the targeted website. John Strand: Infinitely recursive directories are another one of the areas that you can mess with attackers’ lives....

Offensive Countermeasures – Making Attackers’ Lives Miserable

PaulDotCom’s Paul Asadoorian and John Strand present an intriguing research at RSA Conference 2012 about ways to confuse, upset and geolocate cyber intruders. Paul Asadoorian: Hello everyone and welcome to Offensive Countermeasures – Making Attackers’ Lives Miserable. My name is Paul...

The Art of Effectively Communicating with a Cyber Predator 3: Example of a Matching Conversation

To make the presentation more vivid, Janice Niederhofer now provides a demo of the conversation with a cyber predator, demonstrating the art of matching. Let’s move on. Conversely, if you want to decrease rapport, you can deliberately mismatch. We’ve been matching the cyber predator’s communication and...

The Art of Effectively Communicating with a Cyber Predator 2: Building Rapport with the Scammer

Janice Niederhofer now elaborates on establishing rapport with a cyber predator, focusing on language matching techniques and the use of so-called VAK senses. Build Rapport, then Move Forward For rapport to exist between you and a cyber predator, you have to have 3 things: understanding, appreciation, and...

Luring Your Prey – The Art of Effectively Communicating with a Cyber Predator

Janice Niederhofer, founder and CEO of Peerage Consulting, Inc., gives a captivating presentation at RSA Conference, dissecting the subtle yet very significant components of online communication with scammers and other ill-minded individuals seeking preys on the Internet. Welcome to the session:...

VX – The Virus Underground 6: Hoaxes, Social Engineering and Cryptography

At the end of the Q&A part, SkyOut touches upon VXer’s attitude to hoaxes, cryptography, and the blurred line between the legal and illegal in their activity. QUESTIONS? – You mentioned hoaxes. You say you do viruses and you don’t want to harm anybody, but to prove that hoaxes work you need to...

VX – The Virus Underground 5: Discussing Interaction with Antivirus Companies

SkyOut now invites 24C3 conference attendees to participate in a more down-to-earth discussion which starts with insight into relation between AVs and VXers. QUESTIONS? Ok, we have a lot of time, so we can have a little discussion if you want. – So, first question would be: in the beginning and the end...