SlideShare uma empresa Scribd logo
1 de 23
Practical Security
Ron van der Molen
Wizkunde
Ron van der Molen 2014 - Wizkunde.nl
About me
 Ron van der Molen
 Father of a son, always learning
 @RonvdMolen (twitter)
 RonXS (IRC Freenode)
 ron@wizkunde.nl
 Wizkunde
 My History
Ron van der Molen 2014 - Wizkunde.nl
What is information
security?
 The practice of defending information from
unauthorized access, use, disclosure,
disruption, modification, perusal, inspection,
recording or destruction
 CIA
 Confidentiality
 Integrity
 Availability
Ron van der Molen 2014 - Wizkunde.nl
Impact of Information
Security on WebDev
 A rapid process, where innovation is one of
the largest contradictions to information
security
 Building better, more stable, feature rich
applications by implementing new
tools/frameworks everyday, without knowing
the full extent of knowledge that the
developers have who are writing the code.
Ron van der Molen 2014 - Wizkunde.nl
Impact of Information
Security on WebDev
 Use the tools to build code
 Maintainable
 Updateable
 Reusable
 Interchangeable
 Educationable
 This can also include secure, if the
developers at hand, invest time in good
coding practices and good security
strategies
Ron van der Molen 2014 - Wizkunde.nl
Most used attacks
 Cross Site Scripting (XSS)
 Cross Site Request Forgery (XSRF)
 SQL Injection
 Time Based Attacks
 Sessions Fixation
 Brute Forcing
Ron van der Molen 2014 - Wizkunde.nl
Cross Site Scripting
 Abusing the fact that a user trusts a website
 Trusted content
 Output is said to be genuine
 Example
Ron van der Molen 2014 - Wizkunde.nl
Cross-Site Request
Forgery
 Abusing the fact that a website trusts a
browser
 (Also called “reversed XSS”)
 Example
Ron van der Molen 2014 - Wizkunde.nl
SQL Injection
 Abusing bad coding practises to inject SQL
 Retreive information
 Get unauthorized access
 Damage the system
 Example
Ron van der Molen 2014 - Wizkunde.nl
Time Based Attacks
 Profiling the system, to get data disclosure
without needing explicit access to the
software itself
 Abusing facts or other security flaws get
easier like this
 Example
Ron van der Molen 2014 - Wizkunde.nl
Session Fixation
 Abusing another users session to get
unauthorized access
 Cookie Hijacking
 XSS Scripting
 Sometimes refered to as persistent XSS
 Example
Ron van der Molen 2014 - Wizkunde.nl
Bruteforcing
 Send a huge amount of requests to the
server, and force your way in by trial and
error.
 This can be more effective as you might think
 In combination with time based attacks!
 Example
Ron van der Molen 2014 - Wizkunde.nl
More Attacks
 Code Injection
 Denial of Service (I.E. Syn Flooding)
 Lower layer architectural attacks
 Stack Overflow attacks
 Heap Overflow attacks
 Many many more known and unknown
attacks!
Ron van der Molen 2014 - Wizkunde.nl
Social Engineering
What is it?
 Using social skills, to change facts or hack
and manipulate your way into a normally
secured situation
 Yes, its also social engineering if you
manipulate or LIE to a person by changing
facts to alter the outcome of a problem /
situation
Ron van der Molen 2014 - Wizkunde.nl
Social Engineering
What is it?
 Where is this an issue?
 Everywhere!!!
 Larger organisations
 Inter organisation collaboration
 So how does it work?
Ron van der Molen 2014 - Wizkunde.nl
Social Engineering
How does it work?
 Psychology
 Small Talk
 Common Sense
 Brutality
 Insecurity / Uncertainty
 Emotions
Ron van der Molen 2014 - Wizkunde.nl
Social Engineering
How does it work?
 Reverse Psychology
 The problem solver
 The damsel in distress
 Information by incentives
 Random rewards to buy information
 Discount websites to buy information
Ron van der Molen 2014 - Wizkunde.nl
Social Engineering
How does it work?
 Toolkit of a social engineer
 Guts
 His mouth, you need to be able to talk
 Knowing the targets habits
 Social Media
 Screen Reading
 Sticky notes
Ron van der Molen 2014 - Wizkunde.nl
Social Engineering
Who does this?
 Everybody, including you and me
 Lie
 Cheat
 Manipulate
 Self preservation
Ron van der Molen 2014 - Wizkunde.nl
Social Engineering
How is that even lucrative?
 Information has value, and with value
comes buyers
 Kevin mitnick – The Art of Deception
 Slot Machine example
Ron van der Molen 2014 - Wizkunde.nl
Social Engineering
How to prevent it?
 Security through obscurity
 Create security regulations for your
company
 Train employees on a regular basis
 Assess your organisation by ethical hackers
 It will not rule out Social Engineers!
Ron van der Molen 2014 - Wizkunde.nl
Information Security
 Dont overdo it!
Ron van der Molen 2014 - Wizkunde.nl
Practical Security
 What will you start doing tomorrow to
improve?
 Questions?
Ron van der Molen 2014 - Wizkunde.nl

Mais conteúdo relacionado

Mais procurados

Importance of android firewall
Importance of android firewallImportance of android firewall
Importance of android firewall
Mobiwol
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
Liberteks
 

Mais procurados (20)

Importance of android firewall
Importance of android firewallImportance of android firewall
Importance of android firewall
 
Internet security
Internet securityInternet security
Internet security
 
Cyber security[1118]
Cyber security[1118]Cyber security[1118]
Cyber security[1118]
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Appsecco Sanity Check Baseline Cyber Audit 2018
Appsecco Sanity Check Baseline Cyber Audit 2018Appsecco Sanity Check Baseline Cyber Audit 2018
Appsecco Sanity Check Baseline Cyber Audit 2018
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Public Wi-Fi security 101
Public Wi-Fi security 101Public Wi-Fi security 101
Public Wi-Fi security 101
 
CIA #4
CIA #4CIA #4
CIA #4
 
Internet security
Internet securityInternet security
Internet security
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 
Navigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website OwnersNavigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website Owners
 
An introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh DangwalAn introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh Dangwal
 

Semelhante a Practical security

So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
abnmi
 
CYREN_2015_CyberThreat_Yearbook
CYREN_2015_CyberThreat_YearbookCYREN_2015_CyberThreat_Yearbook
CYREN_2015_CyberThreat_Yearbook
Christian Reuter
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
Kim Minh
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_Brochure
Justyna Majek
 

Semelhante a Practical security (20)

100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
The Unconventional Guide to Cyber Threat Intelligence
The Unconventional Guide to Cyber Threat IntelligenceThe Unconventional Guide to Cyber Threat Intelligence
The Unconventional Guide to Cyber Threat Intelligence
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Why Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small BusinessesWhy Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small Businesses
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
W verb68
W verb68W verb68
W verb68
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
 
CYREN_2015_CyberThreat_Yearbook
CYREN_2015_CyberThreat_YearbookCYREN_2015_CyberThreat_Yearbook
CYREN_2015_CyberThreat_Yearbook
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
ceh pdf work.pdf
ceh pdf work.pdfceh pdf work.pdf
ceh pdf work.pdf
 
Lodi Emmanuel Palle Cybersecurity and Technology Innovation.pptx
Lodi Emmanuel Palle Cybersecurity and Technology Innovation.pptxLodi Emmanuel Palle Cybersecurity and Technology Innovation.pptx
Lodi Emmanuel Palle Cybersecurity and Technology Innovation.pptx
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_Brochure
 

Último

6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 

Practical security

  • 1. Practical Security Ron van der Molen Wizkunde Ron van der Molen 2014 - Wizkunde.nl
  • 2. About me  Ron van der Molen  Father of a son, always learning  @RonvdMolen (twitter)  RonXS (IRC Freenode)  ron@wizkunde.nl  Wizkunde  My History Ron van der Molen 2014 - Wizkunde.nl
  • 3. What is information security?  The practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction  CIA  Confidentiality  Integrity  Availability Ron van der Molen 2014 - Wizkunde.nl
  • 4. Impact of Information Security on WebDev  A rapid process, where innovation is one of the largest contradictions to information security  Building better, more stable, feature rich applications by implementing new tools/frameworks everyday, without knowing the full extent of knowledge that the developers have who are writing the code. Ron van der Molen 2014 - Wizkunde.nl
  • 5. Impact of Information Security on WebDev  Use the tools to build code  Maintainable  Updateable  Reusable  Interchangeable  Educationable  This can also include secure, if the developers at hand, invest time in good coding practices and good security strategies Ron van der Molen 2014 - Wizkunde.nl
  • 6. Most used attacks  Cross Site Scripting (XSS)  Cross Site Request Forgery (XSRF)  SQL Injection  Time Based Attacks  Sessions Fixation  Brute Forcing Ron van der Molen 2014 - Wizkunde.nl
  • 7. Cross Site Scripting  Abusing the fact that a user trusts a website  Trusted content  Output is said to be genuine  Example Ron van der Molen 2014 - Wizkunde.nl
  • 8. Cross-Site Request Forgery  Abusing the fact that a website trusts a browser  (Also called “reversed XSS”)  Example Ron van der Molen 2014 - Wizkunde.nl
  • 9. SQL Injection  Abusing bad coding practises to inject SQL  Retreive information  Get unauthorized access  Damage the system  Example Ron van der Molen 2014 - Wizkunde.nl
  • 10. Time Based Attacks  Profiling the system, to get data disclosure without needing explicit access to the software itself  Abusing facts or other security flaws get easier like this  Example Ron van der Molen 2014 - Wizkunde.nl
  • 11. Session Fixation  Abusing another users session to get unauthorized access  Cookie Hijacking  XSS Scripting  Sometimes refered to as persistent XSS  Example Ron van der Molen 2014 - Wizkunde.nl
  • 12. Bruteforcing  Send a huge amount of requests to the server, and force your way in by trial and error.  This can be more effective as you might think  In combination with time based attacks!  Example Ron van der Molen 2014 - Wizkunde.nl
  • 13. More Attacks  Code Injection  Denial of Service (I.E. Syn Flooding)  Lower layer architectural attacks  Stack Overflow attacks  Heap Overflow attacks  Many many more known and unknown attacks! Ron van der Molen 2014 - Wizkunde.nl
  • 14. Social Engineering What is it?  Using social skills, to change facts or hack and manipulate your way into a normally secured situation  Yes, its also social engineering if you manipulate or LIE to a person by changing facts to alter the outcome of a problem / situation Ron van der Molen 2014 - Wizkunde.nl
  • 15. Social Engineering What is it?  Where is this an issue?  Everywhere!!!  Larger organisations  Inter organisation collaboration  So how does it work? Ron van der Molen 2014 - Wizkunde.nl
  • 16. Social Engineering How does it work?  Psychology  Small Talk  Common Sense  Brutality  Insecurity / Uncertainty  Emotions Ron van der Molen 2014 - Wizkunde.nl
  • 17. Social Engineering How does it work?  Reverse Psychology  The problem solver  The damsel in distress  Information by incentives  Random rewards to buy information  Discount websites to buy information Ron van der Molen 2014 - Wizkunde.nl
  • 18. Social Engineering How does it work?  Toolkit of a social engineer  Guts  His mouth, you need to be able to talk  Knowing the targets habits  Social Media  Screen Reading  Sticky notes Ron van der Molen 2014 - Wizkunde.nl
  • 19. Social Engineering Who does this?  Everybody, including you and me  Lie  Cheat  Manipulate  Self preservation Ron van der Molen 2014 - Wizkunde.nl
  • 20. Social Engineering How is that even lucrative?  Information has value, and with value comes buyers  Kevin mitnick – The Art of Deception  Slot Machine example Ron van der Molen 2014 - Wizkunde.nl
  • 21. Social Engineering How to prevent it?  Security through obscurity  Create security regulations for your company  Train employees on a regular basis  Assess your organisation by ethical hackers  It will not rule out Social Engineers! Ron van der Molen 2014 - Wizkunde.nl
  • 22. Information Security  Dont overdo it! Ron van der Molen 2014 - Wizkunde.nl
  • 23. Practical Security  What will you start doing tomorrow to improve?  Questions? Ron van der Molen 2014 - Wizkunde.nl