SlideShare una empresa de Scribd logo
1 de 59
Privacy, the Dark Web, &
Hacker Devices
Brian Pichman
Twitter: @Bpichman
• 9:00
The Dark Side: Privacy, Dark Web & Hacker Devices
Brian Pichman, Director, Strategic Innovation, Evolve Program
Pichman walks through the tools that help provide anonymity and
some ways to help mitigate the ease of being tracked. He goes
beyond private VPNs and Tor Browsing to provide other tips and
tricks. He gives an overview of some of the common devices, either
hardware- or software-based, that are used by the Dark Side, and
some easy-to-use defenses that you and your users can employ to
protect yourselves from these attack vectors. Think of it as a Defense
Against the Dark Arts class! And bring your device to actually try it
out!
Disclaimer
• Technology is inherently neutral.
• It can be used by bad people to bad things
• It can be used by good people to do good things.
• This presentation is provided for informational and technical training
purposes only.
• It is intended to familiarize you with some of the methods, tools, and
services used to provide Internet anonymity.
• It may, at times, “pull back the veil” and offer a look at the other side
of the Internet.
• We do not encourage or support using the information presented in
this session for illegal or unethical purposes.
Why do People Attack?
• Financial Gain
• Stocks
• Getting Paid
• Selling of information
• Data Theft
• For a single person
• For a bundle of people
• Just Because
• Malicious
How to navigate and prevent wrong turns
• Who are the people we’re
trying to void?
Hacker Groups
• Lizard Squad. ...
• Anonymous. ...
• LulzSec. ...
• Syrian Electronic Army. ...
• Chaos Computer Club (CCC) ...
• Iran's Tarh Andishan. ...
• The Level Seven Crew. ...
• globalHell.
Tools For Anonymity
Making yourself more “invisible”
Onion Routing, Tor Browsing
• Technique for anonymous communication to take place over a network.
The encryption takes place at three different times:
• Entry Node
• Relay Node
• Exit Node
• Tor is made up of volunteers running relay servers. No single router knows
the entire network (only its to and from).
• Tor can bypass internet content filtering, restricted government networks
(like China) or allow people to be anonymous whistle blowers.
• Tor allows you to gain access to “.onion” websites that are not accessible
via a normal web browser.
• Communication on the Dark Web happens, via Web, Telnet, IRC, and other
means of communication being developed daily.
Some History
• Originally grew with help from the U.S.
Military as a way to communicate without
detection.
• In 1995 the concept of “onion routing” was
born.
• The Deep Web was coined in 2001 by
BrightPlanet which specializes in locating
content within the dark web.
• In 2004 the U.S. Naval Research Lab
released the Tor code to the public, and in
2006 it was retooled as the Tor Project.
Cloak of Invisibility
Anonymous Browsing tools like the Tor Project
Cloak of Invisibility
Top reasons why people want to hide their IP address:
1. Hide their geographical location
2. Prevent Web tracking
3. Avoid leaving a digital footprint
4. Bypass any bans or blacklisting of their IP address
5. Perform illegal acts without being detected
Cloak of Invisibility
How do you Hide an 800lb Gorilla?
• Use Free Wifi (To Hide your location)
• Use a Secure Web Browser
• Use a Private VPN
• Go back to Dial-up
• Setup RF Data Transfer over CB Radio
Waves
• Use Kali linux to hack someone else’s
Wifi Encryption.
• Setup long-range Wireless Antennas
Cloak of Invisibility
• How to hide yourself?
• Private VPN
• You want a TOTALLY anonymous service.
• Look for one that keeps no log history (Verify via reviews)
• Look at Bandwidth & Available Servers
• Recommendations:
• Private Internet Access (PIA)
• TorGuard VPN
• Pure VPN
• Opera Web Browser
• Avast AntiVirus (SecureLine)
• Worst Case: Free WIFI
Using a VPN Client
Normal Users and How They Appear:
VPN Protected Users
Cloak of Invisibility
• How Tor anonymizes – “You”.
• How VPN keeps ”You” protected.
Dial Up?
• Use an ISPs like NetZero that can be registered with fictitious personal
information, and to which you can connect with caller ID disabled
• Makes it a bit more difficult to identity “you”
Free WiFi
• Sometimes a good alternative if
you need to do something
anonymously
• Nothing is ever 100% anonymous
• Some public wifi does track
websites you access, what you
do, etc.
• Make sure your computer name
you are using doesn’t include your
actual name
Hacked WiFi – Cain and Abel
Best Tips and Practices
Do
• Use a device that you’ve never
signed into anything ”personal
on”.
• Pro Tip: buy a computer from a
Pawn Shop or Garage Sale
• If using public WiFi; don’t make
purchases with a credit card.
Don’t
• While on a VPN or any other
anonymous tool; don’t sign into
personal accounts (banks, social
media, etc).
• If posting, don’t use anything
that could be associated to you
Q and A
Tools to become a hacker
Explore tools hackers use to exploit companies and us
How do you Hide an 800lb Gorilla?
• TorBrowser
• Mainstream browser that helps gain
access to a private collection of
websites and servers. This runs on a
separate, “Parallel Universe” on the
Internet.
• Telnet to a BBS
• Bulletin Board Systems never died.
They just got modernized!
• Kodi
• Leverage tools for your
entertainment.
Tools to become a hacker
• Get a router that allows for VPN at the router
• Install a second VPN Client on the PC
• Use Tor Browser for Browsing
• Access Kodi
• Use other tools form this point
• Keeps everything anonymized
Tools to become a hacker
• The Basics.
• Social Engineering
• Get a Voice that’s not behind a computer.
• Write a Batch File
• Odd, but Windows still has DOS hidden underneath
Top Hacker Tools
• #1 Metasploit.
• #2 Nmap.
• #3 Acunetix WVS.
• #4 Wireshark.
• #5 oclHashcat. ...
• #6 Nessus Vulnerability Scanner. ...
• #7 Maltego. ...
• #8 Social-Engineer Toolkit.
BackTrack can get you ALOT
• BackTrack was a Linux distribution that focused on security based on
the Knoppix Linux distribution aimed at digital forensics and
penetration testing use. In March 2013, the Offensive Security team
rebuilt BackTrack around the Debian distribution and released it
under the name Kali Linux.
https://en.wikipedia.org/wiki/BackTrack
Attacks
• Man in the Middle
• Sitting between a conversation and either listening or altering the data as its sent
across.
• DNS Spoofing (https://null-byte.wonderhowto.com/how-to/hack-like-pro-spoof-dns-
lan-redirect-traffic-your-fake-website-0151620/) set up a fake website and let people
login to it.
• D/DoS Attack (Distributed/Denial of Service Attack)
• Directing a large amount of traffic to disrupt service to a particular box or an entire
network.
• Could be done via sending bad traffic or data
• That device can be brought down to an unrecoverable state to disrupt business
operations.
• Sniffing Attacks
• Monitoring of data and traffic to determine what people are doing.
More Sources
• https://www.reddit.com/r/deepweb/
• DuckDuckGo.Com doesn’t track searches
• Also lets you search of .onion sites when using TorBrowser to access.
Other tricks
• 10 Minute Email
• https://10minutemail.com/10MinuteMail/index.html
• Temporarily get an email box that’s anonymous and disappears after 10
minutes
• Dr Cleaner (Mac) or Eraser (Win) can overwrite files on your
computer with “blank” data to make file recovery near impossible.
• Tools like Recuva is free softwares to allow you to restore deleted files.
Your Library
• Administrative Accounts are easy to figure out if they
are something like “administrator” ”root” or “power
users”. At the same time, no employee should have
their account as a full admin.
• Instead, give them their own username for admin access (like
brian.admin)
• Change the default “login” pages for sites to something
that’s not www.mysitename.com/login. Bots look for
this and attack.
• My Drupal Site login page is www.evolveproject.org/catpower
• User Awareness is key to any secure organization. Teach
users how to identify potential threats and how to
respond quickly.
• Avoid shared accounts. One account should only be
used by one person.
You
• Sites to protect yourself all the time (not free)
• IdentiyGuard.com
• LifeLock.com
• Sites to monitor when breached data gets related (this is free)
• Haveibeenpwned.com
• Password Management Sites (like lastpass.com)
• Don’t have the same password for all your sites.
• Don’t write your passwords down on a post-it-note and leave it at your desk
Google Isn’t Always Your Friend
Dual Factor Authentication
• After logging in; verify login via Email, SMS, or an app with a code.
Credit Card Tools for Online Shopping
• Check out Privacy.Com
• https://privacy.com/join/4
73XB shameless plug
Q and A
• 10:00 Attacks & Responses
• Brian Pichman, Director, Strategic Innovation, Evolve Program
• Includes a look at social media privacy: how do we keep the
advantages of social media participation? What are the differences
between institutional versus personal social media practices and
privacy? Bring your own issues to share with participants and
speakers.
Evolution of Hacking
• Hacking has evolved because of
Social Media
• Core values haven’t changed
• But Social websites have pushed
this Hacktivism to the
mainstream.
• The news keeps covering to drive
more awareness.
Hacking
• With Social Media & a new found Cause, “Hacktivism”
• Born in the era of the Internet
• Rooted in Hacker Culture/Ethics with ties related to Free Speech, Human
Rights, and Freedom of Information.
• Cyber attacks ensue
• Most with a purpose
• Some for fun
• Minimal for Personal Gain
Digital Identity
• Everyone (institution or personal) uses Social Media to define their
online identity
• Many children actually have a digital identity before they are born
(Ultrasound pictures)
• Digital Identities are just another target for access into:
• A business / personal information
• Reputation Management
Basic Tips
• Accept only people you know to personal and professional accounts
• Never click on links from people you don’t know.
• Especially if they are using a url shortner: bit.ly, tinyurl.com, etc
• https://www.urlvoid.com/ - test the website to see if its safe
• https://snapito.com/ gets a screenshot of what will load on the site
• If there are people claiming to be you on social media, it’s best to get
your account “verified” on those social media platforms
• This lets users distinguish that you’re the actual official account
• Dual factor authenticate all of your social media logins
Myths
• I’m not worth being attacked.
• Hackers won’t guess my password.
• I have anti-virus software.
• I’ll know if I been compromised.
Understanding Breaches and Hacks
• A hack involves a person or group to gain authorized access to a
protected computer or network
• A breach typically indicates a release of confidential data (including
those done by accident)
• Both of these require different responses if breaches/hacks occur.
Examples of Hacks/Breaches
• An employee/family member allows a hacker to access their machine
through:
• Email Attachments
• Social Engineering
• Walking away from their computer unattended
• An employee/family member sends information to someone thinking
they are someone else
• “Hi, I’m the CFO assistant, he needs me to collect all the W2s”
• Or more intrusive –
• There is an attack on a database or server that then allowed a hacker in (SQL
Injection)
• There is a brute force attack or someone guessed the password on a key admin
account, on servers/networks, etc.
The Costs Of Breaches
• This year’s study found the average consolidated total cost of a data breach grew
from $3.8 million to $4 million. The study also reports that the average cost
incurred for each lost or stolen record containing sensitive and confidential
information increased from $154 to $158
[IBM 2016
http://www-03.ibm.com/security/data-breach/]
• Data Breached Companies Experience…
• People loose faith in your brand
• Loss in patrons
• Financial Costs
• Government Requirements,
Penalties, Fees, etc.
• Sending of Notifications
• Payment of Identity Protection or
repercussions.
https://betanews.com/2016/02/10/the-economic-cost-of-being-hacked/
Responses
• If someone (SPAM) constantly tags your social brand, you need to
report that account as SPAM
• Sometimes may need to submit a ticket with the social media provider
• Send out communications
• If your account gets hacked, you need to share with your users what occurred
and what you’re doing to resolve the issue.
cyber-insurance
• Policies can be purchased from most major insurance carriers for
between $5,000 and $10,000 per $1 million in protection.
• Policies will generally cover:
• Legal Fees
• Forensic Fees
• Costs for providing customer credit monitoring for those impacted
• Any court costs related to civil litigation and class actions.
• Some policies include access to portals/support so if and when an attack
occurs, you can get guidance and support on what to do.
• Evolve Project
• https://www.linkedin.com/in/bpichman
• Twitter: @bpichman
Brian Pichman
Contact

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
The dark web
The dark webThe dark web
The dark web
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Darknet
DarknetDarknet
Darknet
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark net
Dark netDark net
Dark net
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Dark web
Dark webDark web
Dark web
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Darknet
DarknetDarknet
Darknet
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Deep Web
Deep WebDeep Web
Deep Web
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Darknet
DarknetDarknet
Darknet
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
Deep web
Deep webDeep web
Deep web
 

Similar a Privacy, Dark Web & Hacker Devices

Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR BrowserArjith K Raj
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxIbrahimSami14
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 

Similar a Privacy, Dark Web & Hacker Devices (20)

Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Deep Web
Deep WebDeep Web
Deep Web
 
Internet security
Internet securityInternet security
Internet security
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 

Más de Stephen Abram

Hub Design Inspirations for B-Hive Zone
Hub Design Inspirations for B-Hive  ZoneHub Design Inspirations for B-Hive  Zone
Hub Design Inspirations for B-Hive ZoneStephen Abram
 
Passive Interactive Programming and Surveys 2.pptx
Passive Interactive Programming and Surveys 2.pptxPassive Interactive Programming and Surveys 2.pptx
Passive Interactive Programming and Surveys 2.pptxStephen Abram
 
Hub Design Inspiration Graphics for inspiration
Hub Design Inspiration Graphics for inspirationHub Design Inspiration Graphics for inspiration
Hub Design Inspiration Graphics for inspirationStephen Abram
 
Hub Design Inspiration Graphics for Community Hubs
Hub Design Inspiration Graphics for Community HubsHub Design Inspiration Graphics for Community Hubs
Hub Design Inspiration Graphics for Community HubsStephen Abram
 
Passive Interactive Programming and Surveys 2.pptx
Passive Interactive Programming and Surveys 2.pptxPassive Interactive Programming and Surveys 2.pptx
Passive Interactive Programming and Surveys 2.pptxStephen Abram
 
Hub Design Inspiration Graphics for Brockville Hub
Hub Design Inspiration Graphics for Brockville HubHub Design Inspiration Graphics for Brockville Hub
Hub Design Inspiration Graphics for Brockville HubStephen Abram
 
Hub Design Inspiration Graphics second draft
Hub Design Inspiration Graphics second draftHub Design Inspiration Graphics second draft
Hub Design Inspiration Graphics second draftStephen Abram
 
Brockville-Active-Transportation-Full-Plan.pdf
Brockville-Active-Transportation-Full-Plan.pdfBrockville-Active-Transportation-Full-Plan.pdf
Brockville-Active-Transportation-Full-Plan.pdfStephen Abram
 
Draft Employment Lands 140530 L&G Front Cover.pdf
Draft Employment Lands 140530 L&G Front Cover.pdfDraft Employment Lands 140530 L&G Front Cover.pdf
Draft Employment Lands 140530 L&G Front Cover.pdfStephen Abram
 
BrockvilleHubDesignInspirationGraphics.pptx
BrockvilleHubDesignInspirationGraphics.pptxBrockvilleHubDesignInspirationGraphics.pptx
BrockvilleHubDesignInspirationGraphics.pptxStephen Abram
 
Caregiver Presentation and Product Inspirations Sep 2023 PDF.pdf
Caregiver Presentation and Product Inspirations Sep 2023 PDF.pdfCaregiver Presentation and Product Inspirations Sep 2023 PDF.pdf
Caregiver Presentation and Product Inspirations Sep 2023 PDF.pdfStephen Abram
 
Caregiver Presentation and Product Inspirations Sep 2023 PPT.pptx
Caregiver Presentation and Product Inspirations Sep 2023 PPT.pptxCaregiver Presentation and Product Inspirations Sep 2023 PPT.pptx
Caregiver Presentation and Product Inspirations Sep 2023 PPT.pptxStephen Abram
 
CEEED May 24 2023.pdf
CEEED May 24 2023.pdfCEEED May 24 2023.pdf
CEEED May 24 2023.pdfStephen Abram
 
CEEED May 24 2023.pptx
CEEED May 24 2023.pptxCEEED May 24 2023.pptx
CEEED May 24 2023.pptxStephen Abram
 
CEED Mindfulness in a time of Turbulence.pdf
CEED Mindfulness in a time of Turbulence.pdfCEED Mindfulness in a time of Turbulence.pdf
CEED Mindfulness in a time of Turbulence.pdfStephen Abram
 
CEEED Webinar June 22.pdf
CEEED Webinar June 22.pdfCEEED Webinar June 22.pdf
CEEED Webinar June 22.pdfStephen Abram
 
CIL Stats Workshop April1 2022 Abram Silk.pdf
CIL Stats Workshop April1 2022 Abram Silk.pdfCIL Stats Workshop April1 2022 Abram Silk.pdf
CIL Stats Workshop April1 2022 Abram Silk.pdfStephen Abram
 
Mindfulness in a time of cholera.pptx
Mindfulness in a time of cholera.pptxMindfulness in a time of cholera.pptx
Mindfulness in a time of cholera.pptxStephen Abram
 
Sla canada student nov 25 2021
Sla canada student nov 25 2021Sla canada student nov 25 2021
Sla canada student nov 25 2021Stephen Abram
 
Sla job finding sites
Sla job finding sitesSla job finding sites
Sla job finding sitesStephen Abram
 

Más de Stephen Abram (20)

Hub Design Inspirations for B-Hive Zone
Hub Design Inspirations for B-Hive  ZoneHub Design Inspirations for B-Hive  Zone
Hub Design Inspirations for B-Hive Zone
 
Passive Interactive Programming and Surveys 2.pptx
Passive Interactive Programming and Surveys 2.pptxPassive Interactive Programming and Surveys 2.pptx
Passive Interactive Programming and Surveys 2.pptx
 
Hub Design Inspiration Graphics for inspiration
Hub Design Inspiration Graphics for inspirationHub Design Inspiration Graphics for inspiration
Hub Design Inspiration Graphics for inspiration
 
Hub Design Inspiration Graphics for Community Hubs
Hub Design Inspiration Graphics for Community HubsHub Design Inspiration Graphics for Community Hubs
Hub Design Inspiration Graphics for Community Hubs
 
Passive Interactive Programming and Surveys 2.pptx
Passive Interactive Programming and Surveys 2.pptxPassive Interactive Programming and Surveys 2.pptx
Passive Interactive Programming and Surveys 2.pptx
 
Hub Design Inspiration Graphics for Brockville Hub
Hub Design Inspiration Graphics for Brockville HubHub Design Inspiration Graphics for Brockville Hub
Hub Design Inspiration Graphics for Brockville Hub
 
Hub Design Inspiration Graphics second draft
Hub Design Inspiration Graphics second draftHub Design Inspiration Graphics second draft
Hub Design Inspiration Graphics second draft
 
Brockville-Active-Transportation-Full-Plan.pdf
Brockville-Active-Transportation-Full-Plan.pdfBrockville-Active-Transportation-Full-Plan.pdf
Brockville-Active-Transportation-Full-Plan.pdf
 
Draft Employment Lands 140530 L&G Front Cover.pdf
Draft Employment Lands 140530 L&G Front Cover.pdfDraft Employment Lands 140530 L&G Front Cover.pdf
Draft Employment Lands 140530 L&G Front Cover.pdf
 
BrockvilleHubDesignInspirationGraphics.pptx
BrockvilleHubDesignInspirationGraphics.pptxBrockvilleHubDesignInspirationGraphics.pptx
BrockvilleHubDesignInspirationGraphics.pptx
 
Caregiver Presentation and Product Inspirations Sep 2023 PDF.pdf
Caregiver Presentation and Product Inspirations Sep 2023 PDF.pdfCaregiver Presentation and Product Inspirations Sep 2023 PDF.pdf
Caregiver Presentation and Product Inspirations Sep 2023 PDF.pdf
 
Caregiver Presentation and Product Inspirations Sep 2023 PPT.pptx
Caregiver Presentation and Product Inspirations Sep 2023 PPT.pptxCaregiver Presentation and Product Inspirations Sep 2023 PPT.pptx
Caregiver Presentation and Product Inspirations Sep 2023 PPT.pptx
 
CEEED May 24 2023.pdf
CEEED May 24 2023.pdfCEEED May 24 2023.pdf
CEEED May 24 2023.pdf
 
CEEED May 24 2023.pptx
CEEED May 24 2023.pptxCEEED May 24 2023.pptx
CEEED May 24 2023.pptx
 
CEED Mindfulness in a time of Turbulence.pdf
CEED Mindfulness in a time of Turbulence.pdfCEED Mindfulness in a time of Turbulence.pdf
CEED Mindfulness in a time of Turbulence.pdf
 
CEEED Webinar June 22.pdf
CEEED Webinar June 22.pdfCEEED Webinar June 22.pdf
CEEED Webinar June 22.pdf
 
CIL Stats Workshop April1 2022 Abram Silk.pdf
CIL Stats Workshop April1 2022 Abram Silk.pdfCIL Stats Workshop April1 2022 Abram Silk.pdf
CIL Stats Workshop April1 2022 Abram Silk.pdf
 
Mindfulness in a time of cholera.pptx
Mindfulness in a time of cholera.pptxMindfulness in a time of cholera.pptx
Mindfulness in a time of cholera.pptx
 
Sla canada student nov 25 2021
Sla canada student nov 25 2021Sla canada student nov 25 2021
Sla canada student nov 25 2021
 
Sla job finding sites
Sla job finding sitesSla job finding sites
Sla job finding sites
 

Último

High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...Christina Parmionova
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfCharlynTorres1
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...yalehistoricalreview
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25JSchaus & Associates
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILChristina Parmionova
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 

Último (20)

High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 

Privacy, Dark Web & Hacker Devices

  • 1. Privacy, the Dark Web, & Hacker Devices Brian Pichman Twitter: @Bpichman
  • 2. • 9:00 The Dark Side: Privacy, Dark Web & Hacker Devices Brian Pichman, Director, Strategic Innovation, Evolve Program Pichman walks through the tools that help provide anonymity and some ways to help mitigate the ease of being tracked. He goes beyond private VPNs and Tor Browsing to provide other tips and tricks. He gives an overview of some of the common devices, either hardware- or software-based, that are used by the Dark Side, and some easy-to-use defenses that you and your users can employ to protect yourselves from these attack vectors. Think of it as a Defense Against the Dark Arts class! And bring your device to actually try it out!
  • 3. Disclaimer • Technology is inherently neutral. • It can be used by bad people to bad things • It can be used by good people to do good things. • This presentation is provided for informational and technical training purposes only. • It is intended to familiarize you with some of the methods, tools, and services used to provide Internet anonymity. • It may, at times, “pull back the veil” and offer a look at the other side of the Internet. • We do not encourage or support using the information presented in this session for illegal or unethical purposes.
  • 4.
  • 5. Why do People Attack? • Financial Gain • Stocks • Getting Paid • Selling of information • Data Theft • For a single person • For a bundle of people • Just Because • Malicious
  • 6. How to navigate and prevent wrong turns • Who are the people we’re trying to void? Hacker Groups • Lizard Squad. ... • Anonymous. ... • LulzSec. ... • Syrian Electronic Army. ... • Chaos Computer Club (CCC) ... • Iran's Tarh Andishan. ... • The Level Seven Crew. ... • globalHell.
  • 7. Tools For Anonymity Making yourself more “invisible”
  • 8. Onion Routing, Tor Browsing • Technique for anonymous communication to take place over a network. The encryption takes place at three different times: • Entry Node • Relay Node • Exit Node • Tor is made up of volunteers running relay servers. No single router knows the entire network (only its to and from). • Tor can bypass internet content filtering, restricted government networks (like China) or allow people to be anonymous whistle blowers. • Tor allows you to gain access to “.onion” websites that are not accessible via a normal web browser. • Communication on the Dark Web happens, via Web, Telnet, IRC, and other means of communication being developed daily.
  • 9. Some History • Originally grew with help from the U.S. Military as a way to communicate without detection. • In 1995 the concept of “onion routing” was born. • The Deep Web was coined in 2001 by BrightPlanet which specializes in locating content within the dark web. • In 2004 the U.S. Naval Research Lab released the Tor code to the public, and in 2006 it was retooled as the Tor Project.
  • 10. Cloak of Invisibility Anonymous Browsing tools like the Tor Project
  • 11. Cloak of Invisibility Top reasons why people want to hide their IP address: 1. Hide their geographical location 2. Prevent Web tracking 3. Avoid leaving a digital footprint 4. Bypass any bans or blacklisting of their IP address 5. Perform illegal acts without being detected
  • 12. Cloak of Invisibility How do you Hide an 800lb Gorilla? • Use Free Wifi (To Hide your location) • Use a Secure Web Browser • Use a Private VPN • Go back to Dial-up • Setup RF Data Transfer over CB Radio Waves • Use Kali linux to hack someone else’s Wifi Encryption. • Setup long-range Wireless Antennas
  • 13. Cloak of Invisibility • How to hide yourself? • Private VPN • You want a TOTALLY anonymous service. • Look for one that keeps no log history (Verify via reviews) • Look at Bandwidth & Available Servers • Recommendations: • Private Internet Access (PIA) • TorGuard VPN • Pure VPN • Opera Web Browser • Avast AntiVirus (SecureLine) • Worst Case: Free WIFI
  • 14. Using a VPN Client
  • 15. Normal Users and How They Appear:
  • 17. Cloak of Invisibility • How Tor anonymizes – “You”. • How VPN keeps ”You” protected.
  • 18. Dial Up? • Use an ISPs like NetZero that can be registered with fictitious personal information, and to which you can connect with caller ID disabled • Makes it a bit more difficult to identity “you”
  • 19. Free WiFi • Sometimes a good alternative if you need to do something anonymously • Nothing is ever 100% anonymous • Some public wifi does track websites you access, what you do, etc. • Make sure your computer name you are using doesn’t include your actual name
  • 20. Hacked WiFi – Cain and Abel
  • 21. Best Tips and Practices Do • Use a device that you’ve never signed into anything ”personal on”. • Pro Tip: buy a computer from a Pawn Shop or Garage Sale • If using public WiFi; don’t make purchases with a credit card. Don’t • While on a VPN or any other anonymous tool; don’t sign into personal accounts (banks, social media, etc). • If posting, don’t use anything that could be associated to you
  • 23. Tools to become a hacker Explore tools hackers use to exploit companies and us
  • 24. How do you Hide an 800lb Gorilla? • TorBrowser • Mainstream browser that helps gain access to a private collection of websites and servers. This runs on a separate, “Parallel Universe” on the Internet. • Telnet to a BBS • Bulletin Board Systems never died. They just got modernized! • Kodi • Leverage tools for your entertainment.
  • 25. Tools to become a hacker • Get a router that allows for VPN at the router • Install a second VPN Client on the PC • Use Tor Browser for Browsing • Access Kodi • Use other tools form this point • Keeps everything anonymized
  • 26. Tools to become a hacker • The Basics. • Social Engineering • Get a Voice that’s not behind a computer. • Write a Batch File • Odd, but Windows still has DOS hidden underneath
  • 27. Top Hacker Tools • #1 Metasploit. • #2 Nmap. • #3 Acunetix WVS. • #4 Wireshark. • #5 oclHashcat. ... • #6 Nessus Vulnerability Scanner. ... • #7 Maltego. ... • #8 Social-Engineer Toolkit.
  • 28.
  • 29. BackTrack can get you ALOT • BackTrack was a Linux distribution that focused on security based on the Knoppix Linux distribution aimed at digital forensics and penetration testing use. In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux. https://en.wikipedia.org/wiki/BackTrack
  • 30.
  • 31. Attacks • Man in the Middle • Sitting between a conversation and either listening or altering the data as its sent across. • DNS Spoofing (https://null-byte.wonderhowto.com/how-to/hack-like-pro-spoof-dns- lan-redirect-traffic-your-fake-website-0151620/) set up a fake website and let people login to it. • D/DoS Attack (Distributed/Denial of Service Attack) • Directing a large amount of traffic to disrupt service to a particular box or an entire network. • Could be done via sending bad traffic or data • That device can be brought down to an unrecoverable state to disrupt business operations. • Sniffing Attacks • Monitoring of data and traffic to determine what people are doing.
  • 32. More Sources • https://www.reddit.com/r/deepweb/ • DuckDuckGo.Com doesn’t track searches • Also lets you search of .onion sites when using TorBrowser to access.
  • 33. Other tricks • 10 Minute Email • https://10minutemail.com/10MinuteMail/index.html • Temporarily get an email box that’s anonymous and disappears after 10 minutes • Dr Cleaner (Mac) or Eraser (Win) can overwrite files on your computer with “blank” data to make file recovery near impossible. • Tools like Recuva is free softwares to allow you to restore deleted files.
  • 34. Your Library • Administrative Accounts are easy to figure out if they are something like “administrator” ”root” or “power users”. At the same time, no employee should have their account as a full admin. • Instead, give them their own username for admin access (like brian.admin) • Change the default “login” pages for sites to something that’s not www.mysitename.com/login. Bots look for this and attack. • My Drupal Site login page is www.evolveproject.org/catpower • User Awareness is key to any secure organization. Teach users how to identify potential threats and how to respond quickly. • Avoid shared accounts. One account should only be used by one person.
  • 35. You • Sites to protect yourself all the time (not free) • IdentiyGuard.com • LifeLock.com • Sites to monitor when breached data gets related (this is free) • Haveibeenpwned.com • Password Management Sites (like lastpass.com) • Don’t have the same password for all your sites. • Don’t write your passwords down on a post-it-note and leave it at your desk
  • 36.
  • 37. Google Isn’t Always Your Friend
  • 38. Dual Factor Authentication • After logging in; verify login via Email, SMS, or an app with a code.
  • 39. Credit Card Tools for Online Shopping • Check out Privacy.Com • https://privacy.com/join/4 73XB shameless plug
  • 41.
  • 42.
  • 43. • 10:00 Attacks & Responses • Brian Pichman, Director, Strategic Innovation, Evolve Program • Includes a look at social media privacy: how do we keep the advantages of social media participation? What are the differences between institutional versus personal social media practices and privacy? Bring your own issues to share with participants and speakers.
  • 44. Evolution of Hacking • Hacking has evolved because of Social Media • Core values haven’t changed • But Social websites have pushed this Hacktivism to the mainstream. • The news keeps covering to drive more awareness.
  • 45. Hacking • With Social Media & a new found Cause, “Hacktivism” • Born in the era of the Internet • Rooted in Hacker Culture/Ethics with ties related to Free Speech, Human Rights, and Freedom of Information. • Cyber attacks ensue • Most with a purpose • Some for fun • Minimal for Personal Gain
  • 46. Digital Identity • Everyone (institution or personal) uses Social Media to define their online identity • Many children actually have a digital identity before they are born (Ultrasound pictures) • Digital Identities are just another target for access into: • A business / personal information • Reputation Management
  • 47. Basic Tips • Accept only people you know to personal and professional accounts • Never click on links from people you don’t know. • Especially if they are using a url shortner: bit.ly, tinyurl.com, etc • https://www.urlvoid.com/ - test the website to see if its safe • https://snapito.com/ gets a screenshot of what will load on the site • If there are people claiming to be you on social media, it’s best to get your account “verified” on those social media platforms • This lets users distinguish that you’re the actual official account • Dual factor authenticate all of your social media logins
  • 48.
  • 49.
  • 50. Myths • I’m not worth being attacked. • Hackers won’t guess my password. • I have anti-virus software. • I’ll know if I been compromised.
  • 51. Understanding Breaches and Hacks • A hack involves a person or group to gain authorized access to a protected computer or network • A breach typically indicates a release of confidential data (including those done by accident) • Both of these require different responses if breaches/hacks occur.
  • 52. Examples of Hacks/Breaches • An employee/family member allows a hacker to access their machine through: • Email Attachments • Social Engineering • Walking away from their computer unattended • An employee/family member sends information to someone thinking they are someone else • “Hi, I’m the CFO assistant, he needs me to collect all the W2s” • Or more intrusive – • There is an attack on a database or server that then allowed a hacker in (SQL Injection) • There is a brute force attack or someone guessed the password on a key admin account, on servers/networks, etc.
  • 53.
  • 54. The Costs Of Breaches • This year’s study found the average consolidated total cost of a data breach grew from $3.8 million to $4 million. The study also reports that the average cost incurred for each lost or stolen record containing sensitive and confidential information increased from $154 to $158 [IBM 2016 http://www-03.ibm.com/security/data-breach/] • Data Breached Companies Experience… • People loose faith in your brand • Loss in patrons • Financial Costs • Government Requirements, Penalties, Fees, etc. • Sending of Notifications • Payment of Identity Protection or repercussions. https://betanews.com/2016/02/10/the-economic-cost-of-being-hacked/
  • 55. Responses • If someone (SPAM) constantly tags your social brand, you need to report that account as SPAM • Sometimes may need to submit a ticket with the social media provider • Send out communications • If your account gets hacked, you need to share with your users what occurred and what you’re doing to resolve the issue.
  • 56.
  • 57. cyber-insurance • Policies can be purchased from most major insurance carriers for between $5,000 and $10,000 per $1 million in protection. • Policies will generally cover: • Legal Fees • Forensic Fees • Costs for providing customer credit monitoring for those impacted • Any court costs related to civil litigation and class actions. • Some policies include access to portals/support so if and when an attack occurs, you can get guidance and support on what to do.
  • 58.
  • 59. • Evolve Project • https://www.linkedin.com/in/bpichman • Twitter: @bpichman Brian Pichman Contact

Notas del editor

  1. These are also the people that use TorBrowser as well to hide themselves
  2. http://www.pcmag.com/article2/0,2817,2403388,00.asp
  3. https://en.wikipedia.org/wiki/BackTrack
  4. https://en.wikipedia.org/wiki/BackTrack
  5. Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 in Lubbock, Texas. The group maintains a weblog on its site, also titled "Cult of the Dead Cow". New media are released first through the blog, which also features thoughts and opinions of the group's members. The term was coined in 1994 by a Cult of the Dead Cow (cDc) member known as "Omega" in an e-mail to the group.[2][3] Due to the variety of meanings of its root words, hacktivism is sometimes ambiguous and there exists significant disagreement over the kinds of activities and purposes it encompasses. Some definitions include acts of cyberterrorism while others simply reaffirm the use of technological hacking to effect social change.[ https://en.wikipedia.org/wiki/Hacktivism