SlideShare uma empresa Scribd logo
1 de 24
What we learned since MFW 09 Pirates vs. Ninjas
We Misunderstand Each Other… Forensic Scientists: Hackers are those misguided criminal pirates (aargh!) who care little for methodology and science… and they smell like cheese. Hackers: Forensic Scientists are those talentless nerds in the lab on CSI who care little for ingenious solutions… and they smell like cheese.
Merging Subcultures BUT the forensic science community and “hacker” communities share some overlapping goals: Use (or develop) best technologies available for the job Use clean, beautiful code and techniques Create an environment that fosters peer review Inspire others to contribute and build on existing projects Mutual interest in ridding the world of bad guys ™
Minor Differences…
Forensics Community: Professional attire provides a visual cue as to the expert’s discipline Appearance
Hacker Community: Fat people are harder to kidnap Appearance
Forensics Community: Felon: Any individual who commits a felony Vocabulary
Hacker Community: Felon: Any individual who commits a felony … and gets caught. Vocabulary
Forensics Community: Suspect: Someone who is under suspicion Perspective
Hacker Community: Suspect: That piece of S*** WHO MUST BE SET ON FIRE.  Perspective
OK, Not So Minor Differences…
Forensics Community: OPEN SOURCE Tools: Jailbreaking using A crude method to brute force access into a device Technology
Hacking Community: OPEN SOURCE Tools: A foundation for ELEGANT, safe disk-level tools, using REPRODUCIBLE TECHNIQUES… but making it look so awesome you’d think we used black magic Technology
FORENSICS Community: LEGAL:  Whatever Apple says is legal. Legal
HACKER Community: LEGAL: Whatever the law says is legal, based on fair use case law. Legal
But we can get along…
Best Technology and Practices… We already had the best technology at the time, but… MFW 09 communicated the importance of: Simplifying tools to reduce mistakes Reducing dependence on third party applications Making our methods more understandable Making our imaging time faster Taking a minimalist approach to imaging
ICAC Workshop Oct 19-22 “Forensics Camp 2010” 40 seats available: ICAC members ONLY Registration is FREE You’ll receive around $10,000 of training FREE. Jonathan Zdziarski, Andrew Hoog, Sam Brothers, Ryan Kubasiak, RCFL: 4 days of intense broad-based digital forensic training Oh, and some of us are hackers.
Best Technology and Practices… The latest iPhone/iPad forensic suite: Simplifying tools to reduce mistakes No more deep firmware manipulation Just a couple simple scripts Reducing dependence on third party applications No more Pwnage “jailbreak” tool, no more iTunes  Making our methods more understandable Better documentation and workshop slides Making our imaging time faster Ride atop Apple’s high speed usbmux protocol Taking a minimalist approach to imaging No firmware rewrite, no kernel patching All OS-level operations performed from RAM
Clean/Beautiful Code Don’t hate me because I’m beautiful… Recovery agent ~20 lines of code, < 10K All shell scripts are, by definition, open source; cleanly written Tiny (10K) footprint in protected, read-only OS space Password removal is now a controlled 2-byte write to user
Peer Review Approved for use by three-letter law enforcement agencies and in the defense sector Still the highest scored iPhone tool in Andrew Hoog’s white paper Tested daily by over 1,000 law enforcement agencies world-wide Presently being validated by Sam Brothers (US Customs / Border Protection) Latest documentation replacing obsolete book free for download Chicks dig it
Contributions http://www.iphoneinsecurity.com set up for posting submissions, articles, and papers All source code readily available on website A number of very bright people in both communities have been quietly contributing their code and ideas … the forensics community is invited to participate!
Mutual Interest Hackers hate rapists, murderers, child molesters, (and sometimes even drug dealers) just as much as the forensics community. We’re willing to play by your rules and use your requirements to help put together highly advanced solutions. Please, continue to share your needs (and wants)
Shall we play a game? Pirates vs. Ninjas

Mais conteúdo relacionado

Semelhante a Pirates vs.-ninjas

Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solutionShohag Prodhan
 
An Analytical Paper. How To Write An Analysis Paper. 2
An Analytical Paper. How To Write An Analysis Paper. 2An Analytical Paper. How To Write An Analysis Paper. 2
An Analytical Paper. How To Write An Analysis Paper. 2Cecilia Lucero
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Best Online Paper Writing Service By E
Best Online Paper Writing Service By EBest Online Paper Writing Service By E
Best Online Paper Writing Service By ETrina Jackson
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Open source: can you ignore it?
Open source: can you ignore it?Open source: can you ignore it?
Open source: can you ignore it?CS, NcState
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsShoaib Sheikh
 
Introduction - How To Write An Essay - LibGuides At Univer
Introduction - How To Write An Essay - LibGuides At UniverIntroduction - How To Write An Essay - LibGuides At Univer
Introduction - How To Write An Essay - LibGuides At UniverMaria Perkins
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
the answer does not have to be long at all the question just has to .docx
the answer does not have to be long at all the question just has to .docxthe answer does not have to be long at all the question just has to .docx
the answer does not have to be long at all the question just has to .docxanhcrowley
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf722820106121SARANS
 
The Role of Security and Penetration Testers
The Role of Security and Penetration TestersThe Role of Security and Penetration Testers
The Role of Security and Penetration Testersyasirabdullah15
 

Semelhante a Pirates vs.-ninjas (20)

Software piracy
Software piracySoftware piracy
Software piracy
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solution
 
An Analytical Paper. How To Write An Analysis Paper. 2
An Analytical Paper. How To Write An Analysis Paper. 2An Analytical Paper. How To Write An Analysis Paper. 2
An Analytical Paper. How To Write An Analysis Paper. 2
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
hacking
hackinghacking
hacking
 
Best Online Paper Writing Service By E
Best Online Paper Writing Service By EBest Online Paper Writing Service By E
Best Online Paper Writing Service By E
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Open source: can you ignore it?
Open source: can you ignore it?Open source: can you ignore it?
Open source: can you ignore it?
 
Hacking
HackingHacking
Hacking
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethics
 
Introduction - How To Write An Essay - LibGuides At Univer
Introduction - How To Write An Essay - LibGuides At UniverIntroduction - How To Write An Essay - LibGuides At Univer
Introduction - How To Write An Essay - LibGuides At Univer
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
the answer does not have to be long at all the question just has to .docx
the answer does not have to be long at all the question just has to .docxthe answer does not have to be long at all the question just has to .docx
the answer does not have to be long at all the question just has to .docx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
 
The Role of Security and Penetration Testers
The Role of Security and Penetration TestersThe Role of Security and Penetration Testers
The Role of Security and Penetration Testers
 

Pirates vs.-ninjas

  • 1. What we learned since MFW 09 Pirates vs. Ninjas
  • 2. We Misunderstand Each Other… Forensic Scientists: Hackers are those misguided criminal pirates (aargh!) who care little for methodology and science… and they smell like cheese. Hackers: Forensic Scientists are those talentless nerds in the lab on CSI who care little for ingenious solutions… and they smell like cheese.
  • 3. Merging Subcultures BUT the forensic science community and “hacker” communities share some overlapping goals: Use (or develop) best technologies available for the job Use clean, beautiful code and techniques Create an environment that fosters peer review Inspire others to contribute and build on existing projects Mutual interest in ridding the world of bad guys ™
  • 5. Forensics Community: Professional attire provides a visual cue as to the expert’s discipline Appearance
  • 6. Hacker Community: Fat people are harder to kidnap Appearance
  • 7. Forensics Community: Felon: Any individual who commits a felony Vocabulary
  • 8. Hacker Community: Felon: Any individual who commits a felony … and gets caught. Vocabulary
  • 9. Forensics Community: Suspect: Someone who is under suspicion Perspective
  • 10. Hacker Community: Suspect: That piece of S*** WHO MUST BE SET ON FIRE. Perspective
  • 11. OK, Not So Minor Differences…
  • 12. Forensics Community: OPEN SOURCE Tools: Jailbreaking using A crude method to brute force access into a device Technology
  • 13. Hacking Community: OPEN SOURCE Tools: A foundation for ELEGANT, safe disk-level tools, using REPRODUCIBLE TECHNIQUES… but making it look so awesome you’d think we used black magic Technology
  • 14. FORENSICS Community: LEGAL: Whatever Apple says is legal. Legal
  • 15. HACKER Community: LEGAL: Whatever the law says is legal, based on fair use case law. Legal
  • 16. But we can get along…
  • 17. Best Technology and Practices… We already had the best technology at the time, but… MFW 09 communicated the importance of: Simplifying tools to reduce mistakes Reducing dependence on third party applications Making our methods more understandable Making our imaging time faster Taking a minimalist approach to imaging
  • 18. ICAC Workshop Oct 19-22 “Forensics Camp 2010” 40 seats available: ICAC members ONLY Registration is FREE You’ll receive around $10,000 of training FREE. Jonathan Zdziarski, Andrew Hoog, Sam Brothers, Ryan Kubasiak, RCFL: 4 days of intense broad-based digital forensic training Oh, and some of us are hackers.
  • 19. Best Technology and Practices… The latest iPhone/iPad forensic suite: Simplifying tools to reduce mistakes No more deep firmware manipulation Just a couple simple scripts Reducing dependence on third party applications No more Pwnage “jailbreak” tool, no more iTunes Making our methods more understandable Better documentation and workshop slides Making our imaging time faster Ride atop Apple’s high speed usbmux protocol Taking a minimalist approach to imaging No firmware rewrite, no kernel patching All OS-level operations performed from RAM
  • 20. Clean/Beautiful Code Don’t hate me because I’m beautiful… Recovery agent ~20 lines of code, < 10K All shell scripts are, by definition, open source; cleanly written Tiny (10K) footprint in protected, read-only OS space Password removal is now a controlled 2-byte write to user
  • 21. Peer Review Approved for use by three-letter law enforcement agencies and in the defense sector Still the highest scored iPhone tool in Andrew Hoog’s white paper Tested daily by over 1,000 law enforcement agencies world-wide Presently being validated by Sam Brothers (US Customs / Border Protection) Latest documentation replacing obsolete book free for download Chicks dig it
  • 22. Contributions http://www.iphoneinsecurity.com set up for posting submissions, articles, and papers All source code readily available on website A number of very bright people in both communities have been quietly contributing their code and ideas … the forensics community is invited to participate!
  • 23. Mutual Interest Hackers hate rapists, murderers, child molesters, (and sometimes even drug dealers) just as much as the forensics community. We’re willing to play by your rules and use your requirements to help put together highly advanced solutions. Please, continue to share your needs (and wants)
  • 24. Shall we play a game? Pirates vs. Ninjas