SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
HIRING HACKERS 
MARC ROGERS 
09.09.2014
Enterprises need hackers 
The hacker-mindset makes the difference
noun ˈha-kər 
Hacker; 
someone who uses ingenuity to create a 
clever result which accomplishes the desired 
goal without changing the design of the system 
it is embedded in.
pre
noun ˈha-kər 
Hacker; 
a person who secretly gets access to a computer 
system in order to get information, cause damage, etc. : a 
person who hacks into a computer system
noun ˈha-kər 
Hacker; 
A technical genius who likes to explore 
the technical world and reshape it to 
his or her desires in a non-destructive way
HOW HACKERS CAN HELP 
CARRIERS SPECIFICALLY
Botnets are a HUGE 
network threat 
Old-fashioned 
financial fraud 
still causing headaches 
The carrier is becoming 
further and further 
removed from the 
device 
The network is becoming 
IP-based 
and more accessible to intruders
SPAM SOLDIER 12:01 PM 
• Huge SMS spam botnet 
• Spams 100 contacts at a 
time. 
• In one case 16,000 
messages sent from a 
single phone! 
• Estimated 7M spam 
messages sent before it 
was shut down. 
• Shut down through 
cooperation between 
lookout and a carrier 
partner. 
Read more
Botnets are a HUGE 
network threat 
Old-fashioned 
financial fraud 
still causing headaches 
The carrier is becoming 
further and further 
removed from the 
device 
The network is becoming 
IP-based 
and more accessible to intruders
12:01 PM 12:01 PM 12:01 PM 
BAZUC 
• Buys subscriber free SMS allowance 
• Sells artificially cheap bulk SMS to companies 
• Undercuts the carrier’s bulk messaging 
business with its own subscribers 
Read more
Botnets are a HUGE 
network threat 
Old-fashioned 
financial fraud 
still causing headaches 
The carrier is becoming 
further and further 
removed from the 
device 
The network is becoming 
IP-based 
and more accessible to intruders
• Most advanced mobile botnet (yet) 
• Multi-layered C2 architecture with 
end to end encryption and P2P 
command protocols. 
• Installs an unrestricted proxy on 
victim’s handsets 
• Like PC Botnets, the controllers 
resell access to the proxy network 
for various criminal purposes: 
• Transaction Fraud 
• Pumping out spam emails 
• Accessing C99 shell accounts 
• Brute-forcing wordpress accounts 
! 
! 
NOTCOMPATIBLE 
12:01 PM 
Read more
Botnets are still big 
network-suck 
Old-fashioned 
financial fraud 
still causing headaches 
The carrier is becoming 
further and further 
removed from the 
device 
The network is becoming 
IP-based 
and more accessible to intruders
HACKERS WHO HELP
Jeff Moss 
HACKING FOR GOOD 
Kevin Poulsen 
Mark Abene Marc Rogers 
Robert Tappan Morris 
Mudge 
Steve Wozniak 
Chris Wysopal
EVERYTHING IS OK
For more mobile security information, follow

Weitere ähnliche Inhalte

Andere mochten auch

Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
Releasing the Power of Your Network - 17-12-2015 - Phill Butler
Releasing the Power of Your Network - 17-12-2015 - Phill ButlerReleasing the Power of Your Network - 17-12-2015 - Phill Butler
Releasing the Power of Your Network - 17-12-2015 - Phill ButlervisionSynergy
 
Leveraging Social Media For Increased Student Engagement
Leveraging Social Media For Increased Student EngagementLeveraging Social Media For Increased Student Engagement
Leveraging Social Media For Increased Student EngagementRed Rover
 
Foro parte 1 Pereira Nathaly- Economía Popular y Solidaria
Foro parte 1 Pereira Nathaly- Economía Popular y SolidariaForo parte 1 Pereira Nathaly- Economía Popular y Solidaria
Foro parte 1 Pereira Nathaly- Economía Popular y SolidariaNath Pereira
 
Using virtual learning spaces to enhance learning and teaching #SHUspice
Using virtual learning spaces to enhance learning and teaching #SHUspiceUsing virtual learning spaces to enhance learning and teaching #SHUspice
Using virtual learning spaces to enhance learning and teaching #SHUspiceSue Beckingham
 
Hadoop Hackday at the SlideShare office
Hadoop Hackday at the SlideShare officeHadoop Hackday at the SlideShare office
Hadoop Hackday at the SlideShare officeAmit Ranjan
 
Social Media Strategies for Planning
Social Media Strategies for PlanningSocial Media Strategies for Planning
Social Media Strategies for PlanningJennifer Evans-Cowley
 
genuine-highlighter: マクロを認識するClojure向けのシンタックスハイライター
genuine-highlighter: マクロを認識するClojure向けのシンタックスハイライターgenuine-highlighter: マクロを認識するClojure向けのシンタックスハイライター
genuine-highlighter: マクロを認識するClojure向けのシンタックスハイライターsohta
 
ראש אחר מאמרה של לילך וסרמן
ראש אחר מאמרה של לילך וסרמןראש אחר מאמרה של לילך וסרמן
ראש אחר מאמרה של לילך וסרמןhila_el
 
How to Build a Collaborative Approach to Reaching Your UUPG
How to Build a Collaborative Approach to Reaching Your UUPGHow to Build a Collaborative Approach to Reaching Your UUPG
How to Build a Collaborative Approach to Reaching Your UUPGvisionSynergy
 
The Great Pairs Series #1
The Great Pairs Series #1The Great Pairs Series #1
The Great Pairs Series #1Dr. Chris Stout
 
James Caan Business Secrets App
James Caan Business Secrets AppJames Caan Business Secrets App
James Caan Business Secrets AppJamesCaan
 
Picture of the Day - Handouts
Picture of the Day - HandoutsPicture of the Day - Handouts
Picture of the Day - HandoutsJennifer Jones
 
Event Report - Microsoft Connect - No April's Fools - Linux, Google and more
Event Report - Microsoft Connect - No April's Fools - Linux, Google and more Event Report - Microsoft Connect - No April's Fools - Linux, Google and more
Event Report - Microsoft Connect - No April's Fools - Linux, Google and more Holger Mueller
 

Andere mochten auch (20)

Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Smart Mobile Apps
Smart Mobile AppsSmart Mobile Apps
Smart Mobile Apps
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Releasing the Power of Your Network - 17-12-2015 - Phill Butler
Releasing the Power of Your Network - 17-12-2015 - Phill ButlerReleasing the Power of Your Network - 17-12-2015 - Phill Butler
Releasing the Power of Your Network - 17-12-2015 - Phill Butler
 
Leveraging Social Media For Increased Student Engagement
Leveraging Social Media For Increased Student EngagementLeveraging Social Media For Increased Student Engagement
Leveraging Social Media For Increased Student Engagement
 
Foro parte 1 Pereira Nathaly- Economía Popular y Solidaria
Foro parte 1 Pereira Nathaly- Economía Popular y SolidariaForo parte 1 Pereira Nathaly- Economía Popular y Solidaria
Foro parte 1 Pereira Nathaly- Economía Popular y Solidaria
 
Using virtual learning spaces to enhance learning and teaching #SHUspice
Using virtual learning spaces to enhance learning and teaching #SHUspiceUsing virtual learning spaces to enhance learning and teaching #SHUspice
Using virtual learning spaces to enhance learning and teaching #SHUspice
 
Hadoop Hackday at the SlideShare office
Hadoop Hackday at the SlideShare officeHadoop Hackday at the SlideShare office
Hadoop Hackday at the SlideShare office
 
Social Media Strategies for Planning
Social Media Strategies for PlanningSocial Media Strategies for Planning
Social Media Strategies for Planning
 
Matemáticas
MatemáticasMatemáticas
Matemáticas
 
genuine-highlighter: マクロを認識するClojure向けのシンタックスハイライター
genuine-highlighter: マクロを認識するClojure向けのシンタックスハイライターgenuine-highlighter: マクロを認識するClojure向けのシンタックスハイライター
genuine-highlighter: マクロを認識するClojure向けのシンタックスハイライター
 
ראש אחר מאמרה של לילך וסרמן
ראש אחר מאמרה של לילך וסרמןראש אחר מאמרה של לילך וסרמן
ראש אחר מאמרה של לילך וסרמן
 
March Pictures
March PicturesMarch Pictures
March Pictures
 
How to Build a Collaborative Approach to Reaching Your UUPG
How to Build a Collaborative Approach to Reaching Your UUPGHow to Build a Collaborative Approach to Reaching Your UUPG
How to Build a Collaborative Approach to Reaching Your UUPG
 
The Great Pairs Series #1
The Great Pairs Series #1The Great Pairs Series #1
The Great Pairs Series #1
 
James Caan Business Secrets App
James Caan Business Secrets AppJames Caan Business Secrets App
James Caan Business Secrets App
 
Picture of the Day - Handouts
Picture of the Day - HandoutsPicture of the Day - Handouts
Picture of the Day - Handouts
 
Tirrell
TirrellTirrell
Tirrell
 
Event Report - Microsoft Connect - No April's Fools - Linux, Google and more
Event Report - Microsoft Connect - No April's Fools - Linux, Google and more Event Report - Microsoft Connect - No April's Fools - Linux, Google and more
Event Report - Microsoft Connect - No April's Fools - Linux, Google and more
 

Ähnlich wie Hiring Hackers

Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...OWASP Delhi
 
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxShivamBajaj36
 
Bots and malware
Bots and malwareBots and malware
Bots and malwareDoron Segal
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)André Fucs de Miranda
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attackdoiss delhi
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptRohit Yadav
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 

Ähnlich wie Hiring Hackers (20)

BOTLAB excersise
BOTLAB excersiseBOTLAB excersise
BOTLAB excersise
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptx
 
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work NetworkPrivate Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Bots and malware
Bots and malwareBots and malware
Bots and malware
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
cyber crime
cyber crimecyber crime
cyber crime
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 

Mehr von Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise ProductsLookout
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for GoodLookout
 

Mehr von Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Hiring Hackers

  • 1. HIRING HACKERS MARC ROGERS 09.09.2014
  • 2. Enterprises need hackers The hacker-mindset makes the difference
  • 3. noun ˈha-kər Hacker; someone who uses ingenuity to create a clever result which accomplishes the desired goal without changing the design of the system it is embedded in.
  • 4. pre
  • 5. noun ˈha-kər Hacker; a person who secretly gets access to a computer system in order to get information, cause damage, etc. : a person who hacks into a computer system
  • 6.
  • 7. noun ˈha-kər Hacker; A technical genius who likes to explore the technical world and reshape it to his or her desires in a non-destructive way
  • 8. HOW HACKERS CAN HELP CARRIERS SPECIFICALLY
  • 9. Botnets are a HUGE network threat Old-fashioned financial fraud still causing headaches The carrier is becoming further and further removed from the device The network is becoming IP-based and more accessible to intruders
  • 10. SPAM SOLDIER 12:01 PM • Huge SMS spam botnet • Spams 100 contacts at a time. • In one case 16,000 messages sent from a single phone! • Estimated 7M spam messages sent before it was shut down. • Shut down through cooperation between lookout and a carrier partner. Read more
  • 11. Botnets are a HUGE network threat Old-fashioned financial fraud still causing headaches The carrier is becoming further and further removed from the device The network is becoming IP-based and more accessible to intruders
  • 12. 12:01 PM 12:01 PM 12:01 PM BAZUC • Buys subscriber free SMS allowance • Sells artificially cheap bulk SMS to companies • Undercuts the carrier’s bulk messaging business with its own subscribers Read more
  • 13. Botnets are a HUGE network threat Old-fashioned financial fraud still causing headaches The carrier is becoming further and further removed from the device The network is becoming IP-based and more accessible to intruders
  • 14. • Most advanced mobile botnet (yet) • Multi-layered C2 architecture with end to end encryption and P2P command protocols. • Installs an unrestricted proxy on victim’s handsets • Like PC Botnets, the controllers resell access to the proxy network for various criminal purposes: • Transaction Fraud • Pumping out spam emails • Accessing C99 shell accounts • Brute-forcing wordpress accounts ! ! NOTCOMPATIBLE 12:01 PM Read more
  • 15. Botnets are still big network-suck Old-fashioned financial fraud still causing headaches The carrier is becoming further and further removed from the device The network is becoming IP-based and more accessible to intruders
  • 17. Jeff Moss HACKING FOR GOOD Kevin Poulsen Mark Abene Marc Rogers Robert Tappan Morris Mudge Steve Wozniak Chris Wysopal
  • 19.
  • 20.
  • 21. For more mobile security information, follow