SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
  Jurgens	
  van	
  der	
  Merwe 	
  (jurgens@sensepost.com)	
  
  Junior	
  analyst	
  with	
  SensePost	
  
  Interests:	
  
  Information	
  Security	
  	
  
  Innovative	
  Technologies	
  
  Music	
  
  Skateboarding	
  
  etc	
  
 	
  	
  	
  	
  Purpose 	
   	
  	
  	
  	
  	
  Interface 	
   	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Speed	
  
	
   	
  	
  	
  	
  	
  Value 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Attack	
  surface 	
   	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Complexity	
  
 	
  	
  	
  	
  	
  Purpose 	
   	
  	
  	
  	
  	
  	
  Interface 	
   	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Speed	
  
	
   	
  	
  	
  	
  Value 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Attack	
  surface	
   	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Complexity	
  
  Browser	
  Automation	
  Framework	
  	
  
for	
  Testing	
  Web	
  Applications	
  
  Consists	
  of	
  3	
  parts	
  :	
  
  Selenium	
  IDE	
  
  Selenium	
  Remote	
  Control	
  
  Selenium	
  Grid	
  
  For	
  this	
  talk	
  we	
  will	
  focus	
  on	
  	
  
the	
  core	
  library	
  and	
  functionality	
  
of	
  Selenium	
  Framework	
  	
  
  Automation	
  
  The	
  ability	
  to	
  trigger	
  sequential	
  events	
  without	
  the	
  need	
  of	
  
manual	
  interaction	
  
  Harvesting	
  
  The	
  ability	
  to	
  gather	
  large	
  datasets	
  of	
  common	
  objects	
  
over	
  a	
  period	
  of	
  time	
  
  Extraction	
  
  The	
  ability	
  to	
  extract	
  key	
  elements	
  from	
  an	
  entity	
  in	
  order	
  
to	
  obtain	
  valuable	
  	
  information	
  regarding	
  a	
  specific	
  target	
  
Over	
  700	
  billion	
  minutes	
  a	
  month	
  =	
  	
  19865	
  lifetimes	
  
  Behind	
  the	
  ‘Sannie’	
  experiment	
  
  Purpose	
  
  Showing	
  that	
  bots	
  can	
  act	
  like	
  humans	
  too.	
  
  Goal	
  
  Following	
  logical	
  pathways	
  to	
  mimic	
  human	
  interaction.	
  
  Demo	
  
  The	
  mass	
  friendship	
  harvest	
  
  Purpose	
  
  Harvest	
  user	
  relationships	
  	
  
  Goal	
  
  Determining	
  the	
  theory	
  behind:	
  
  	
  {	
  friends	
  of	
  a	
  friend,	
  of	
  a	
  friend,	
  of	
  a	
  friend,	
  of	
  a	
  friend,	
  of	
  a	
  
friend,	
  of	
  a	
  friend,	
  of	
  a	
  friend,	
  of	
  a	
  friend,	
  of	
  a	
  friend….	
  }	
  
  The	
  Facebook	
  Profiler	
  
  Purpose	
  
  Creating	
  my	
  own	
  personal	
  address	
  book	
  
  Goal	
  
  Extracting	
  user	
  information	
  from	
  facebook	
  profiles	
  
  Demo	
  
  Web	
  Simulator	
  
  Supports	
  various	
  browsers	
  like	
  
  Mozilla	
  Firefox 	
  	
  
  Google	
  Chrome	
  
  Opera	
  
  Safari	
  
  Internet	
  Explorer	
  
  Interacts	
  with	
  the	
  Document	
  Object	
  Model	
  (DOM)	
  
  Latency!!!	
  	
  
  Super	
  fast	
  ZA	
  internet.	
  
  Having	
  to	
  wait	
  for	
  the	
  web	
  element	
  to	
  be	
  completely	
  
constructed	
  within	
  the	
  DOM.	
  
  Complexity	
  of	
  the	
  application	
  
  Understanding	
  the	
  logic	
  behind	
  the	
  application.	
  
  Selenium	
  is	
  a	
  cool	
  technology	
  for	
  interacting	
  with	
  any	
  
Web	
  2.0	
  application.	
  
  Impersonates	
  human-­‐like	
  interaction	
  with	
  a	
  web	
  
application	
  by	
  following	
  logical	
  paths.	
  	
  
  Ability	
  to	
  rely	
  on	
  the	
  browser’s	
  DOM	
  rather	
  than	
  the	
  
source	
  of	
  a	
  web	
  page	
  when	
  extracting	
  information.	
  
  	
  Allow	
  you	
  to	
  actually	
  see	
  the	
  browser	
  execute	
  your	
  code	
  
and	
  navigate	
  through	
  the	
  targeted	
  application.	
  
  The	
  ability	
  to	
  test	
  the	
  functionality	
  of	
  the	
  web	
  
application	
  through	
  various	
  browsers.	
  
???????????????????????????????????????????????????????	
  
Questions	
  
???????????????????????????????????????????????????????	
  

Más contenido relacionado

La actualidad más candente

Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksdhanyashree11
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaperHai Nguyen
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...AbhilashPasupula
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Ketan Patil
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingeiti panchkula
 

La actualidad más candente (18)

Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
3d password
3d password3d password
3d password
 
3D Password
3D Password3D Password
3D Password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
3d password
3d password3d password
3d password
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3D - password
3D - password3D - password
3D - password
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 

Destacado

Anexo a demanda impugnacion laudo sunat comprimido
Anexo a demanda impugnacion laudo sunat   comprimidoAnexo a demanda impugnacion laudo sunat   comprimido
Anexo a demanda impugnacion laudo sunat comprimidoPaola Aliaga
 
2010 za con_ivan_burke
2010 za con_ivan_burke2010 za con_ivan_burke
2010 za con_ivan_burkeJohan Klerk
 
2010 za con_roelof_temmingh
2010 za con_roelof_temmingh2010 za con_roelof_temmingh
2010 za con_roelof_temminghJohan Klerk
 
Arts railway station tv exp
Arts railway station tv expArts railway station tv exp
Arts railway station tv expMezbah Uddin
 
4 pliego reclamo 2015
4 pliego reclamo 20154 pliego reclamo 2015
4 pliego reclamo 2015Paola Aliaga
 
Cv paola aliaga 21
Cv paola aliaga 21Cv paola aliaga 21
Cv paola aliaga 21Paola Aliaga
 
2010 za con_todor_genov
2010 za con_todor_genov2010 za con_todor_genov
2010 za con_todor_genovJohan Klerk
 
2010 za con_jameel_haffejee
2010 za con_jameel_haffejee2010 za con_jameel_haffejee
2010 za con_jameel_haffejeeJohan Klerk
 
2010 za con_georg-christian_pranschke
2010 za con_georg-christian_pranschke2010 za con_georg-christian_pranschke
2010 za con_georg-christian_pranschkeJohan Klerk
 
2010 za con_ian_de_villiers
2010 za con_ian_de_villiers2010 za con_ian_de_villiers
2010 za con_ian_de_villiersJohan Klerk
 
Arts railway station tv exp
Arts railway station tv expArts railway station tv exp
Arts railway station tv expMezbah Uddin
 
2010 za con_daniel_cuthbert
2010 za con_daniel_cuthbert2010 za con_daniel_cuthbert
2010 za con_daniel_cuthbertJohan Klerk
 
2010 za con_haroon_meer
2010 za con_haroon_meer2010 za con_haroon_meer
2010 za con_haroon_meerJohan Klerk
 
2010 za con_barry_irwin
2010 za con_barry_irwin2010 za con_barry_irwin
2010 za con_barry_irwinJohan Klerk
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreuschJohan Klerk
 
Training management
Training managementTraining management
Training managementMezbah Uddin
 

Destacado (16)

Anexo a demanda impugnacion laudo sunat comprimido
Anexo a demanda impugnacion laudo sunat   comprimidoAnexo a demanda impugnacion laudo sunat   comprimido
Anexo a demanda impugnacion laudo sunat comprimido
 
2010 za con_ivan_burke
2010 za con_ivan_burke2010 za con_ivan_burke
2010 za con_ivan_burke
 
2010 za con_roelof_temmingh
2010 za con_roelof_temmingh2010 za con_roelof_temmingh
2010 za con_roelof_temmingh
 
Arts railway station tv exp
Arts railway station tv expArts railway station tv exp
Arts railway station tv exp
 
4 pliego reclamo 2015
4 pliego reclamo 20154 pliego reclamo 2015
4 pliego reclamo 2015
 
Cv paola aliaga 21
Cv paola aliaga 21Cv paola aliaga 21
Cv paola aliaga 21
 
2010 za con_todor_genov
2010 za con_todor_genov2010 za con_todor_genov
2010 za con_todor_genov
 
2010 za con_jameel_haffejee
2010 za con_jameel_haffejee2010 za con_jameel_haffejee
2010 za con_jameel_haffejee
 
2010 za con_georg-christian_pranschke
2010 za con_georg-christian_pranschke2010 za con_georg-christian_pranschke
2010 za con_georg-christian_pranschke
 
2010 za con_ian_de_villiers
2010 za con_ian_de_villiers2010 za con_ian_de_villiers
2010 za con_ian_de_villiers
 
Arts railway station tv exp
Arts railway station tv expArts railway station tv exp
Arts railway station tv exp
 
2010 za con_daniel_cuthbert
2010 za con_daniel_cuthbert2010 za con_daniel_cuthbert
2010 za con_daniel_cuthbert
 
2010 za con_haroon_meer
2010 za con_haroon_meer2010 za con_haroon_meer
2010 za con_haroon_meer
 
2010 za con_barry_irwin
2010 za con_barry_irwin2010 za con_barry_irwin
2010 za con_barry_irwin
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreusch
 
Training management
Training managementTraining management
Training management
 

Similar a 2010 za con_jurgens_van_der_merwe

Ask me anything: A Conversational Interface to Augment Information Security w...
Ask me anything:A Conversational Interface to Augment Information Security w...Ask me anything:A Conversational Interface to Augment Information Security w...
Ask me anything: A Conversational Interface to Augment Information Security w...Matthew Park
 
Artificial intelligence and its application
Artificial intelligence and its applicationArtificial intelligence and its application
Artificial intelligence and its applicationMohammed Abdel Razek
 
Oleksander Krakovetskyi "Artificial Intelligence and Machine Learning for .NE...
Oleksander Krakovetskyi "Artificial Intelligence and Machine Learning for .NE...Oleksander Krakovetskyi "Artificial Intelligence and Machine Learning for .NE...
Oleksander Krakovetskyi "Artificial Intelligence and Machine Learning for .NE...Fwdays
 
2019 04-13 ai for .net developers (fwdays)
2019 04-13 ai for .net developers (fwdays)2019 04-13 ai for .net developers (fwdays)
2019 04-13 ai for .net developers (fwdays)Oleksandr Krakovetskyi
 
Data Visualizations in Cyber Security: Still Home of the WOPR?
Data Visualizations in Cyber Security: Still Home of the WOPR?Data Visualizations in Cyber Security: Still Home of the WOPR?
Data Visualizations in Cyber Security: Still Home of the WOPR?Matthew Park
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshortVincent Ohprecio
 
The Impact of Emerging Technology on Digital Transformation
The Impact of Emerging Technology on Digital TransformationThe Impact of Emerging Technology on Digital Transformation
The Impact of Emerging Technology on Digital TransformationRichard Esplin
 
A knowledge-workbench-for-software-development
A knowledge-workbench-for-software-developmentA knowledge-workbench-for-software-development
A knowledge-workbench-for-software-developmentDimitris Panagiotou
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...Akhil Kumar Pappula
 
The Semantic Knowledge Graph
The Semantic Knowledge GraphThe Semantic Knowledge Graph
The Semantic Knowledge GraphTrey Grainger
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш....NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...NETFest
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackAlistair Gillespie
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityCihan Özhan
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Sourcehack33
 
Freedomotic v1.5 whitepaper
Freedomotic v1.5 whitepaperFreedomotic v1.5 whitepaper
Freedomotic v1.5 whitepaperfreedomotic
 
7 latest-dot-net-interview-questions
7  latest-dot-net-interview-questions7  latest-dot-net-interview-questions
7 latest-dot-net-interview-questionssadiqkhanpathan
 

Similar a 2010 za con_jurgens_van_der_merwe (20)

Ask me anything: A Conversational Interface to Augment Information Security w...
Ask me anything:A Conversational Interface to Augment Information Security w...Ask me anything:A Conversational Interface to Augment Information Security w...
Ask me anything: A Conversational Interface to Augment Information Security w...
 
Artificial intelligence and its application
Artificial intelligence and its applicationArtificial intelligence and its application
Artificial intelligence and its application
 
Manoj_cv
Manoj_cvManoj_cv
Manoj_cv
 
Oleksander Krakovetskyi "Artificial Intelligence and Machine Learning for .NE...
Oleksander Krakovetskyi "Artificial Intelligence and Machine Learning for .NE...Oleksander Krakovetskyi "Artificial Intelligence and Machine Learning for .NE...
Oleksander Krakovetskyi "Artificial Intelligence and Machine Learning for .NE...
 
2019 04-13 ai for .net developers (fwdays)
2019 04-13 ai for .net developers (fwdays)2019 04-13 ai for .net developers (fwdays)
2019 04-13 ai for .net developers (fwdays)
 
Data Visualizations in Cyber Security: Still Home of the WOPR?
Data Visualizations in Cyber Security: Still Home of the WOPR?Data Visualizations in Cyber Security: Still Home of the WOPR?
Data Visualizations in Cyber Security: Still Home of the WOPR?
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
 
The Impact of Emerging Technology on Digital Transformation
The Impact of Emerging Technology on Digital TransformationThe Impact of Emerging Technology on Digital Transformation
The Impact of Emerging Technology on Digital Transformation
 
A knowledge-workbench-for-software-development
A knowledge-workbench-for-software-developmentA knowledge-workbench-for-software-development
A knowledge-workbench-for-software-development
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
 
The Semantic Knowledge Graph
The Semantic Knowledge GraphThe Semantic Knowledge Graph
The Semantic Knowledge Graph
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш....NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision Security
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
 
Freedomotic v1.5 whitepaper
Freedomotic v1.5 whitepaperFreedomotic v1.5 whitepaper
Freedomotic v1.5 whitepaper
 
Mobile Mashups
Mobile MashupsMobile Mashups
Mobile Mashups
 
7 latest-dot-net-interview-questions
7  latest-dot-net-interview-questions7  latest-dot-net-interview-questions
7 latest-dot-net-interview-questions
 

2010 za con_jurgens_van_der_merwe

  • 1.
  • 2.   Jurgens  van  der  Merwe  (jurgens@sensepost.com)     Junior  analyst  with  SensePost     Interests:     Information  Security       Innovative  Technologies     Music     Skateboarding     etc  
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.          Purpose            Interface                          Speed              Value                          Attack  surface                      Complexity  
  • 8.            Purpose              Interface                          Speed            Value                                Attack  surface                      Complexity  
  • 9.   Browser  Automation  Framework     for  Testing  Web  Applications     Consists  of  3  parts  :     Selenium  IDE     Selenium  Remote  Control     Selenium  Grid     For  this  talk  we  will  focus  on     the  core  library  and  functionality   of  Selenium  Framework    
  • 10.   Automation     The  ability  to  trigger  sequential  events  without  the  need  of   manual  interaction     Harvesting     The  ability  to  gather  large  datasets  of  common  objects   over  a  period  of  time     Extraction     The  ability  to  extract  key  elements  from  an  entity  in  order   to  obtain  valuable    information  regarding  a  specific  target  
  • 11. Over  700  billion  minutes  a  month  =    19865  lifetimes  
  • 12.
  • 13.   Behind  the  ‘Sannie’  experiment     Purpose     Showing  that  bots  can  act  like  humans  too.     Goal     Following  logical  pathways  to  mimic  human  interaction.     Demo  
  • 14.   The  mass  friendship  harvest     Purpose     Harvest  user  relationships       Goal     Determining  the  theory  behind:      {  friends  of  a  friend,  of  a  friend,  of  a  friend,  of  a  friend,  of  a   friend,  of  a  friend,  of  a  friend,  of  a  friend,  of  a  friend….  }  
  • 15.   The  Facebook  Profiler     Purpose     Creating  my  own  personal  address  book     Goal     Extracting  user  information  from  facebook  profiles     Demo  
  • 16.   Web  Simulator     Supports  various  browsers  like     Mozilla  Firefox       Google  Chrome     Opera     Safari     Internet  Explorer     Interacts  with  the  Document  Object  Model  (DOM)  
  • 17.   Latency!!!       Super  fast  ZA  internet.     Having  to  wait  for  the  web  element  to  be  completely   constructed  within  the  DOM.     Complexity  of  the  application     Understanding  the  logic  behind  the  application.  
  • 18.   Selenium  is  a  cool  technology  for  interacting  with  any   Web  2.0  application.     Impersonates  human-­‐like  interaction  with  a  web   application  by  following  logical  paths.       Ability  to  rely  on  the  browser’s  DOM  rather  than  the   source  of  a  web  page  when  extracting  information.      Allow  you  to  actually  see  the  browser  execute  your  code   and  navigate  through  the  targeted  application.     The  ability  to  test  the  functionality  of  the  web   application  through  various  browsers.