SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
SocialNetworkingSecurity
&
BackdooringEmail
Presented by 	

Syarif	

!
Seminar & Workshop Nasional Security System	

Malang, Juni 5 2011	

Universitas Muhammadiyah Malang
• http://www.google.com/search?
q=fl3xu5	

• http://fl3x.us
Whoami
Agenda
• Social Networking ?	

• Social Networking :Attacks & Defense	

• Backdooring Email 	

• There is No Privacy anymore :) 	

• How to protect your self
Social Networking ?
Facebook Statistics
Twitter Statistics
Facebook & twitter attack
Facebook & twitter attack
• Phishing
Facebook & twitter attack
• Session Hijacking	

• Firesheep
facebook & twitter defense
• Be a paranoid & don’t trust anyone on the internet	

• Never put some sensitive information carelessly	

• Keep your eyes, Always check the correct url 	

• Never Subscribe unauthorized applications	

• Always remember, wireless is not secure. Keep “safety” browsing :p	

• Always using https	

• etc
Email attack : Backdooring Email ;)
• Why ?	

• Email is very important	

• as a communication media	

• Email is a privacy 	

• Everything using email	

• User account : facebook, twitter, etc	

• Passwords	

• paypal account 	

• domain & hosting account
Email attack : Backdooring Email ;)
• Motivation ?	

• Just for fun :)	

• Jealous / Revenge	

• Get important data	

• Get Final Exam Task & Answer :p	

• Spy	

• Scamming	

• Money reason : paypal, etc	

• Domain & hosting take over
Email attack : Backdooring Email ;)
• Prelinimary ?	

• Social Engineering	

• password obtained by hacking other websites ~ one password for all
Backdooring Email ?Yes you can ;)
• Using what ? 	

• Why ?	

• most people using it	

• easy to use	

• could be used to impersonate :p	

• high capacity mailbox	

• 10 more accounts could be backdoored in one mailbox	

• no need to log in the target mailbox	

• could be used to backdoor all of mail accounts in some mail server :)
Demo
thereisnoprivacyanymore
someoneiswatchingyou
!
How to ProtectYourself ?
• Always Check Last Log in your email	

• Never put some sensitive information carelessly	

• Be a Paranoid, check the flag messages in your email 	

• Keep on your eyes to check mail in the inbox, sent, draft , and trash	

• Always keep your correct mail setting 	

• Never use “one password for all” :p	

• Changer your mail password regularly	

• don’t use a “weak” security question
Q & A
• twitter : fl3xu5	

• YM : fl3xu5
Thank you :)

Más contenido relacionado

La actualidad más candente

Top 10 microblogging tools
Top 10 microblogging toolsTop 10 microblogging tools
Top 10 microblogging tools
iumstech
 

La actualidad más candente (12)

Communication
CommunicationCommunication
Communication
 
Slideshare
SlideshareSlideshare
Slideshare
 
Hacking
HackingHacking
Hacking
 
Top 10 microblogging tools
Top 10 microblogging toolsTop 10 microblogging tools
Top 10 microblogging tools
 
An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!
 
Cel1
Cel1Cel1
Cel1
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
Twitter General Basics June 2009
Twitter General Basics June 2009Twitter General Basics June 2009
Twitter General Basics June 2009
 
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDUTwitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Twitter for teachers
Twitter for teachersTwitter for teachers
Twitter for teachers
 
Go Incognito!
Go Incognito!Go Incognito!
Go Incognito!
 

Destacado (7)

iCrOSS 2013_Pentest
iCrOSS 2013_PentestiCrOSS 2013_Pentest
iCrOSS 2013_Pentest
 
IPTV Security
IPTV SecurityIPTV Security
IPTV Security
 
Prepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec ProfessionalPrepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec Professional
 
My pwk & oscp journey
My pwk & oscp journeyMy pwk & oscp journey
My pwk & oscp journey
 
Information gath
Information gathInformation gath
Information gath
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
Wireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek KominfoWireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek Kominfo
 

Similar a Social Network Security & Backdooring email

Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
Bill Chea
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
benlangley-efc
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
Luis Grangeia
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
501 Commons
 

Similar a Social Network Security & Backdooring email (20)

Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
 
WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020
 
Phishing
PhishingPhishing
Phishing
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx
 
Internet and Social Media for Beginners
Internet and Social Media for BeginnersInternet and Social Media for Beginners
Internet and Social Media for Beginners
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Social media security
Social media securitySocial media security
Social media security
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 
Phishing
PhishingPhishing
Phishing
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Tablets, Apps and Cybersecurity
Tablets, Apps and CybersecurityTablets, Apps and Cybersecurity
Tablets, Apps and Cybersecurity
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Social Network Security & Backdooring email

  • 1. SocialNetworkingSecurity & BackdooringEmail Presented by Syarif ! Seminar & Workshop Nasional Security System Malang, Juni 5 2011 Universitas Muhammadiyah Malang
  • 3. Agenda • Social Networking ? • Social Networking :Attacks & Defense • Backdooring Email • There is No Privacy anymore :) • How to protect your self
  • 8. Facebook & twitter attack • Phishing
  • 9. Facebook & twitter attack • Session Hijacking • Firesheep
  • 10. facebook & twitter defense • Be a paranoid & don’t trust anyone on the internet • Never put some sensitive information carelessly • Keep your eyes, Always check the correct url • Never Subscribe unauthorized applications • Always remember, wireless is not secure. Keep “safety” browsing :p • Always using https • etc
  • 11. Email attack : Backdooring Email ;) • Why ? • Email is very important • as a communication media • Email is a privacy • Everything using email • User account : facebook, twitter, etc • Passwords • paypal account • domain & hosting account
  • 12. Email attack : Backdooring Email ;) • Motivation ? • Just for fun :) • Jealous / Revenge • Get important data • Get Final Exam Task & Answer :p • Spy • Scamming • Money reason : paypal, etc • Domain & hosting take over
  • 13. Email attack : Backdooring Email ;) • Prelinimary ? • Social Engineering • password obtained by hacking other websites ~ one password for all
  • 14. Backdooring Email ?Yes you can ;) • Using what ? • Why ? • most people using it • easy to use • could be used to impersonate :p • high capacity mailbox • 10 more accounts could be backdoored in one mailbox • no need to log in the target mailbox • could be used to backdoor all of mail accounts in some mail server :)
  • 15. Demo
  • 18. How to ProtectYourself ? • Always Check Last Log in your email • Never put some sensitive information carelessly • Be a Paranoid, check the flag messages in your email • Keep on your eyes to check mail in the inbox, sent, draft , and trash • Always keep your correct mail setting • Never use “one password for all” :p • Changer your mail password regularly • don’t use a “weak” security question
  • 19. Q & A • twitter : fl3xu5 • YM : fl3xu5