SlideShare ist ein Scribd-Unternehmen logo
1 von 93
Rise of the Autobots




Into the Underground of Social Network Bots
Hi! I’m not a bot
•   Tom Eston
•   Social Media Security
    Researcher
•   Pentester
•   Bot lover
•   Blog: spylogic.net
•   Podcast: securityjustice.com
•   Tweet me: agent0x0
WARNING!
What you are about to see violates
the Terms of Service (TOS) and
acceptable use policies of social
networks!

Accounts used in these tests have
been deleted or “removed” (not by
me...)

       Don't try this at home!
             KTHKSBAI
Social Networks
200 Million Users
110 Million Users
35 Million Users
Grew 752% in 2008
8 Million Visitors in
   March 2009
quot;Social Networks & Blogs
are now the 4th most
popular online activity,
ahead of personal email.quot;

      -Nielsen Online Report,
                 March 2009
It’s a target rich environment...
The Culture of Trust
Why is trust
   important?
• It’s how social networks
  work!
• Trust EVERYONE!
• Share as much as
  possible...the social networks
  don’t mind!
• Social networks are mining
  your data!
Trust exploited
  by Bots??
Bot or Not?
BOT!!
Bot or Not?
Bot or Not?
BOT!!
Bot or Not?
FAIL!
Bot or Not?
BOT!!
Bot or Not?
Bot or Not?
Not a Bot!
Not a Bot!
 But still...
LOTS OF FAIL!
Bot or Not?
BOT!!
Bot or Not?
Biggest
Rick Roll ever?
Biggest
Rick Roll ever?
Biggest
Rick Roll ever?
Biggest
Rick Roll ever?
What’s the point?

• Trust is easy to exploit!
• People will trust bots...
• Accounts were created and
  used with tools we will talk
  about
• Rick Astley is EVIL!
The Rise of
 the Bots
What are bots?
   “...perform tasks that are
both simple and structurally
  repetitive at a much higher
   rate than a human alone.”



   “Applications that run
     automated tasks”
Ever see this?
Why use Bots?
• Automation...on a mass
  scale
• Easy to use
• Multiple purpose
 • Malware, Blackhat SEO,
   phishing...pr0n!
• Highly Effective
The Bot
Underground
“It’s the “Spammers Choice!”
The Underground
 Business Model
• Create and Sell accounts
• Buy and Use accounts
• Custom bot scripts and
  software (Freelancing)
It’s all about
  Blackhat SEO...
  • Not just for search engine
    rankings!
  • Evil Search Engine
    Optimization techniques...
     • PPC (Pay Per Click)
     • PPI (Pay Per Install)
     • Cookie Stuffing
How money is made on the “net”
Want to know
   more?
What’s for Sale?

• Hacked accounts
• Hacked accounts w/friends
  (more friends, more $$)
• Webmail accounts (verified)
• Bot software/scripts
• Services!
Example...
Let’s talk $$




•   Facebook w/30+ Friends = $8
•   Facebook Phone Verified = $5/$6
•   1,000 Gmail Accounts = $13
•   500 YouTube Accounts = $30
But there are controls
    in place, right?
What about
CAPTCHA?
CAPTCHA=FAIL

• Algorithms can be
  cracked
• OCR technology
• They have hawt chix
• and if that doesn’t
  work...
OUTSOURCE IT!
OR...use Melissa!




         She wants you..srsly
What about
Friend Request/
   Messaging
  Controls...
Phone SMS
    Verification?
• Great idea! But...can be
  broken..
It kind of works,
          but...
• Prepaid cell phones
• Overseas virtual
  SMS Services (SMS
  Receive)
• SMS back to ICQ
  and Yahoo
  Messenger (works
  with some socnets)
How about rate
    Limits?
• Easy to bypass...just test it,
  modify your code and/or slow
  down!
Types of Bots on
Social Networks
Good Bots
Twitter Bots
n0taB0t

•   Tweets
    mindless
    rants....
•   Likes to reply
    to you
•   Likes Notacon
•   Mostly
    harmless
Annoying Bots
Auto Follow/
      Reply




• Bots looking for “keywords” in
  your tweets...
Evil Bots
U-Bot
U-Bot in Action
Webdominator
Webdominator in Action
Need help?
Other Pay Services
Realboy



•   Project to make Twitter bots as
    human as possible!
•   Real interactions with your
    Twitter network
•   Source code available...
Social Network
  Botnets?
• Malware distribution for C&C
 • Koobface!
• DDos botnet via third-party
  applications
 • Facebot!
• Control a botnet via Twitter?
Twitter for Botnet C&C
  • Bot looks for commands on
    legitimate Twitter accounts
  • Takes action based on the
    command
  • Commands are obfuscated
  • Proof of Concept code
    released today at Notacon!
  • “TwitterBot” created by Robin
    Wood aka: @digininja
Twitterbot C&C In Action
TwitterBot
      Enhancements
   • add a hash (or part of) to the
     command to stop fake
     requests
   • encrypt the whole command
     (obfuscation)
   • get the bot to talk back
           Get it now at:
http://www.digininja.org/twitterbot/
Is the end near?




How to stop the bots!
Bot detection
• Look carefully!
• Lots of
  clues..spammer
  s are doing it
  wrong!
• Programs/API’s
  to detect
  (Twitter
  specific)
Some possible
  solutions...
• Account creation/message
  throttling
• Why can you still create
  multiple accounts from the
  same IP?? WTF?
• No more opt-in developer
  models!
• Education of users? We can
  try...the socnets won’t!
But wait...there’s
     more!
• socialnetworkbots.com
• open source project
• Twitter and other bots
  (n0tab0t)....
• get the code...don’t use your
  real account!
• Twitterbot Command & Control
  POC Code:
  www.digininja.org/twitterbot
Questions?

Weitere ähnliche Inhalte

Andere mochten auch

How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]Queue-it
 
Building blocks for building bots
Building blocks for building botsBuilding blocks for building bots
Building blocks for building botsRita Zhang
 
Facebook bots uma nova arma no relacionamento e atendimento ao consumidor
Facebook bots uma nova arma no relacionamento e atendimento ao consumidorFacebook bots uma nova arma no relacionamento e atendimento ao consumidor
Facebook bots uma nova arma no relacionamento e atendimento ao consumidorElife Brasil
 
6 months of experimentation with bots
6 months of experimentation with bots6 months of experimentation with bots
6 months of experimentation with botsChatbots Paris
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Andere mochten auch (6)

How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]
 
Building blocks for building bots
Building blocks for building botsBuilding blocks for building bots
Building blocks for building bots
 
Facebook bots uma nova arma no relacionamento e atendimento ao consumidor
Facebook bots uma nova arma no relacionamento e atendimento ao consumidorFacebook bots uma nova arma no relacionamento e atendimento ao consumidor
Facebook bots uma nova arma no relacionamento e atendimento ao consumidor
 
Beyond the Bots
Beyond the BotsBeyond the Bots
Beyond the Bots
 
6 months of experimentation with bots
6 months of experimentation with bots6 months of experimentation with bots
6 months of experimentation with bots
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Ähnlich wie Rise of Social Network Bots

Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot Design
Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot DesignChatbot Revolution: Exploring Opportunities, Use Cases, & Bot Design
Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot DesignStefan Kojouharov
 
Integral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science
 
Bot. You said bot? Let build bot then! - Laurent Ellerbach
Bot. You said bot? Let build bot then! - Laurent EllerbachBot. You said bot? Let build bot then! - Laurent Ellerbach
Bot. You said bot? Let build bot then! - Laurent EllerbachITCamp
 
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...ITCamp
 
Webspam (English Version)
Webspam (English Version)Webspam (English Version)
Webspam (English Version)Dirk Haun
 
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life Stories
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life StoriesISTA 2017: Practical Chatbots - Technology Overview with Real-Life Stories
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life StoriesVassil Popovski
 
A Brief Overview of a Possible Digital Near Future
A Brief Overview of a Possible Digital Near Future A Brief Overview of a Possible Digital Near Future
A Brief Overview of a Possible Digital Near Future Antoine Dubuquoy
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckG3 Communications
 
Dc Bar Social Media Twitter Shaun Dakin Dc Bar Presentation
Dc Bar Social Media Twitter Shaun Dakin Dc Bar PresentationDc Bar Social Media Twitter Shaun Dakin Dc Bar Presentation
Dc Bar Social Media Twitter Shaun Dakin Dc Bar PresentationSuzanne Turner
 
NUS-ISS Learning Day 2019- ChatBots: All about Conversational Experiences
NUS-ISS Learning Day 2019- ChatBots: All about Conversational ExperiencesNUS-ISS Learning Day 2019- ChatBots: All about Conversational Experiences
NUS-ISS Learning Day 2019- ChatBots: All about Conversational ExperiencesNUS-ISS
 
The European Bot Landscape (Q1 2016)
The European Bot Landscape (Q1 2016)The European Bot Landscape (Q1 2016)
The European Bot Landscape (Q1 2016)Ziv Reichert
 
Leon Ho: My path to Entrepreneurship
Leon Ho: My path to EntrepreneurshipLeon Ho: My path to Entrepreneurship
Leon Ho: My path to EntrepreneurshipLeon Ho
 
Chatbots AI and Ethics
Chatbots AI and EthicsChatbots AI and Ethics
Chatbots AI and EthicsPaul Walsh
 
The ultimate survey bot v2
The ultimate survey bot v2The ultimate survey bot v2
The ultimate survey bot v2Simon Thompson
 
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...virtual-2021-data.sql_.saturday.la-Building database interactions with users ...
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...Luis Beltran
 

Ähnlich wie Rise of Social Network Bots (20)

Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot Design
Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot DesignChatbot Revolution: Exploring Opportunities, Use Cases, & Bot Design
Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot Design
 
Integral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud Presentation
 
AutoBotCash
AutoBotCashAutoBotCash
AutoBotCash
 
RoboChat Review.pdf
RoboChat Review.pdfRoboChat Review.pdf
RoboChat Review.pdf
 
Chat bots
Chat botsChat bots
Chat bots
 
Bot. You said bot? Let build bot then! - Laurent Ellerbach
Bot. You said bot? Let build bot then! - Laurent EllerbachBot. You said bot? Let build bot then! - Laurent Ellerbach
Bot. You said bot? Let build bot then! - Laurent Ellerbach
 
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
 
Webspam (English Version)
Webspam (English Version)Webspam (English Version)
Webspam (English Version)
 
Bot
BotBot
Bot
 
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life Stories
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life StoriesISTA 2017: Practical Chatbots - Technology Overview with Real-Life Stories
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life Stories
 
Let's Build a Chatbot!
Let's Build a Chatbot!Let's Build a Chatbot!
Let's Build a Chatbot!
 
A Brief Overview of a Possible Digital Near Future
A Brief Overview of a Possible Digital Near Future A Brief Overview of a Possible Digital Near Future
A Brief Overview of a Possible Digital Near Future
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
Dc Bar Social Media Twitter Shaun Dakin Dc Bar Presentation
Dc Bar Social Media Twitter Shaun Dakin Dc Bar PresentationDc Bar Social Media Twitter Shaun Dakin Dc Bar Presentation
Dc Bar Social Media Twitter Shaun Dakin Dc Bar Presentation
 
NUS-ISS Learning Day 2019- ChatBots: All about Conversational Experiences
NUS-ISS Learning Day 2019- ChatBots: All about Conversational ExperiencesNUS-ISS Learning Day 2019- ChatBots: All about Conversational Experiences
NUS-ISS Learning Day 2019- ChatBots: All about Conversational Experiences
 
The European Bot Landscape (Q1 2016)
The European Bot Landscape (Q1 2016)The European Bot Landscape (Q1 2016)
The European Bot Landscape (Q1 2016)
 
Leon Ho: My path to Entrepreneurship
Leon Ho: My path to EntrepreneurshipLeon Ho: My path to Entrepreneurship
Leon Ho: My path to Entrepreneurship
 
Chatbots AI and Ethics
Chatbots AI and EthicsChatbots AI and Ethics
Chatbots AI and Ethics
 
The ultimate survey bot v2
The ultimate survey bot v2The ultimate survey bot v2
The ultimate survey bot v2
 
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...virtual-2021-data.sql_.saturday.la-Building database interactions with users ...
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...
 

Mehr von Tom Eston

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Tom Eston
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadTom Eston
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown Tom Eston
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Tom Eston
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsTom Eston
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on TwitterTom Eston
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-MiddleTom Eston
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With MaltegoTom Eston
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactTom Eston
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkTom Eston
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 

Mehr von Tom Eston (18)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on Twitter
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit Framework
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 

Kürzlich hochgeladen

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Kürzlich hochgeladen (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Rise of Social Network Bots

Hinweis der Redaktion

  1. First...a warning!
  2. Everyone knows what social networks are right? Heck..I was recently told by my mother that she has a Facebook account! Noooo....
  3. I have to keep changing this slide because it keeps getting bigger!
  4. Ummm, yeah..it still exists. The scourge of the Internet still has...
  5. Poor LinkedIn...still...
  6. However, Twitter...the fastest growing social network today...
  7. This shouldnt shock you but social networks are more popular then email! It’s only getting bigger....
  8. With socnets so popular, it’s no surprise its where the attackers are going...
  9. First, lets talk about the culture of trust that makes socnets work.
  10. Socnets want you to share as much as possible, trust everyone..they are mining your data...they are not making money yet...but they have ways to sell bits and pieces of your info.
  11. Why would bot’s exploit trust? Is this possible?
  12. How about Jennifer? Cute..single...
  13. and Tommy...college guy...seems friendly...
  14. Poor Sarah. [READ IT]. Too bad she confirmed the bot as a friend at 8am and at noon, sent this message. Must be because she has 700 friends...
  15. Poor Sarah. [READ IT]. Too bad she confirmed the bot as a friend at 8am and at noon, sent this message. Must be because she has 700 friends...
  16. Poor Sarah. [READ IT]. Too bad she confirmed the bot as a friend at 8am and at noon, sent this message. Must be because she has 700 friends...
  17. Poor Sarah. [READ IT]. Too bad she confirmed the bot as a friend at 8am and at noon, sent this message. Must be because she has 700 friends...
  18. How about 0EPb4a...She likes meeting people and selling “lapto’s”
  19. Now Haley...crappy profile..must be a bot right?
  20. Not a bot! but with 4,974 friends...lots of FAIL
  21. Not a bot! but with 4,974 friends...lots of FAIL
  22. Ok, no way Rick Astley is bot...
  23. It’s amazing the response you get when you are a celebrity..people love u.
  24. It’s amazing the response you get when you are a celebrity..people love u.
  25. It’s amazing the response you get when you are a celebrity..people love u.
  26. It’s amazing the response you get when you are a celebrity..people love u.
  27. It’s amazing the response you get when you are a celebrity..people love u.
  28. It’s amazing the response you get when you are a celebrity..people love u.
  29. This could have been the biggest Rick Roll ever...except that I decided to stop once I hit 666 followers. Bad omen. Not good.
  30. This could have been the biggest Rick Roll ever...except that I decided to stop once I hit 666 followers. Bad omen. Not good.
  31. This could have been the biggest Rick Roll ever...except that I decided to stop once I hit 666 followers. Bad omen. Not good.
  32. The point is that trust is easy to exploit...people want to trust..all these accounts were created or used with bots we will talk about. Rick is EVIL.
  33. Lets talk about the rise of the bots on social networks...
  34. It’s simple really...they automate mundane tasks, right?
  35. Links to SPAM, malware, Porn..etc...we are all familiar.
  36. But this is why spammers and others use bots...its automation on a mass scale! Easy, multi-purpose, EFFECTIVE!
  37. Lets dive into the bot underground to see how they function.
  38. First, you have to understand the business model. Three main methods I have found in the bot underground.
  39. Everything I have found is disguised as “Blackhat SEO”...