SlideShare ist ein Scribd-Unternehmen logo
1 von 167
Downloaden Sie, um offline zu lesen
TRUSTED FRIEND
ATTACK:
GUARDIAN ANGELS STRIKE
Atalk byAshar Javed
@
HackIn The Box,14- 17 October 2013
Kuala Lumpur,Malaysia (HITBSecConf2013)
GRAPH IS BIG
http://theweek.com/article/index/239514/4-things-we-
learned-from-facebooks-confounding-earnings-report
WHO AM I?
A RESEARCHER IN R UHR- U NIVERSITY B OCHUM, RUB ,
GERMANY
A STUDENT WORKING TOWARDS HIS PHD
LISTED IN ALMOST EVERY HALL OF FAME PAGES
@soaj1664ashar
SOME OF YOU WILL WISH FOR THIS FEATURE
...
A SHORT STORY
https://twitter.com/dimitribest/status/230677638358900736
A PASTE@PASTEBIN
http://pastebin.com/ajaYnLYc
WHO TO BLAME?
http://cher-homespun.blogspot.de/2011/07/curiosity-killed-cat-but-satisfaction.html
AFTER TESTING 3 TO 4 RANDOM ACCOUNTS
FROM THE PASTEBIN'S PASTE I FOUND
AN INNOCENT QUESTION ...
WhyisFacebook asking onsomebody's account?
This is me
This isn't me
&
What would beyour answer, if you arean attacker :-)
LEGITIMATE PASSWORD RECOVERY FLOW
You haveanemail addressbutFORGOTYOUR PASSWORD
STEP (1)
Go To https://www.facebook.com/
Click "Forgot YourPassword?"
Provideemail address andclick on "Search"button!
STEP (2)
Enter Your Email,Phone,Username or Full Name
https://www.facebook.com/login/identify?ctx=recover
STEP (3)
Choose your "Password Reset Method" & click"Continue"
STEP (4) A
Receivedpassword secret codeviaemail
Enter code thatyou have receivedinemail & click"Continue"
STEP (4) B
Entry-Point for the SECRET CODERECEIVED:
STEP (5)
Set "New Password"
STEP (6)
WelcometoFacebook, MSc.Ashar
INFORMATIVE EMAIL FROM FACEBOOK
WHAT IF YOU LOST OR FORGOT BOTH
EMAIL ADDRESS
+
PASSWORD
FACEBOOK HAD A SOLUTION NAMED
TRUSTED FRIENDS (TF)
""TF IS BASED ON SOCIAL AUTHENTICATION""
&
"BringingSocialtoSecurity "isGOOD
BUT ...
http://www.cl.cam.ac.uk/~rja14/Papers/socialauthentication.pdf
TRUSTED FRIENDS FEATURE
Introduced in October 2011
(
)
https://www.facebook.com/notes/facebook-
security/national-cybersecurity-awareness-month-
updates/10150335022240766
TRUSTED FRIENDS
"It'ssort ofsimilar to givinga house key to yourfriendswhen
you go onvacation--pick the friends youmost trustincaseyou
need theirhelp"
https://www.facebook.com/notes/facebook-security/national-cybersecurity-awareness-
month-updates/10150335022240766
TRUSTED FRIENDS ACCORDING TO
READWRITE:
"" Who Wants ToBeA Millionaire" lifelineconcept- except it's
not a one-timedeal."
http://readwrite.com/2011/10/27/facebook_adds_security_features_trusted_friends_ap#awesm=~ohkTq
GUARDIAN ANGELS
http://sophosnews.files.wordpress.com/2011/10/facebook-
security-infographic.pdf
HOW TRUSTED FRIENDS FEATURE WORKS?
LIST # 1
LIST # 2
LIST # 3
REVIEW FRIENDS
ENTER CODES & GAIN ACCESS TO YOUR
ACCOUNT
SCREEN-SHOT OF FAKE PROFILE
4 DIGIT CODE
ANOTHER INFORMATIVE EMAIL TO
LEGITIMATE USER FROM FACEBOOK
600,000+ COMPROMISED ACCOUNT LOGINS
EVERY DAY ON FACEBOOK, OFFICIAL FIGURES
REVEAL ( )HTTP://GOO.GL/FNP27Q
by
https://twitter.com/gcluley
@GCLULEY NOTED IN HIS POST
HTTP://GOO.GL/FNP27Q
QUESTION YOU MIGHT THINKING ...
THREAT MODEL
Attacker isonvictim's friends'list &cancreatenew email
address(es) thatare requiredfor compromising accounts.
Attacker can onlyleverage "forgot yourpassword"functionality
inorder to compromise accountsand atthe same timewedon't
consider "compromisingofanemail accountsoflegitimate
user(s)"
EMAIL ADDRESS MUST BE NEW FOR EVERY
TARGET
FACEBOOK FRIEND VS REAL LIFE FRIEND
http://blogs.mcafee.com/consumer/fake-friends
A SHORT FUN STUDY
Created3 FAKEACCOUNTS andsend Friendship requeststo
TWENTY ( 20 ) friends of mine on Facebook.
After some time, 8 friendshave acceptedall3 requests
DATA SCIENCE OF THE FACEBOOK WORLD
On average aFacebook user has 342 friends!
DO YOU THINK ALL 342 ARE REAL LIFE FRIENDS ALSOOR
JUST FACEBOOK FRIENDS OR WHAT ...?
http://blog.stephenwolfram.com/2013/04/data-science-of-the-
facebook-world/
SUMMARIZE EVERYTHING ABOUT FACEBOOK
& REAL LIFE FRIENDS
http://www.lolroflmao.com/2012/02/24/he-had-over-2000-friends-on-facebook-i-thought-it-would-have-more-people-here/
TRUSTED FRIEND ATTACK (TFA)
Inorder to startTFA, we needvictim's Facebookusername and
FYI, it is PUBLIC INFORMATION & part of FacebookURL.
e.g.,
https://www.facebook.com/ashar.javed
" "
ONCE TARGET SELECTED
Repeatthe "Forgot YourPassword" processas mentioned
before until STEP (3) i.e.,
No longer haveaccesstothese?
NO LONGER HAVE ACCESS TO THESE?
sometimes opensthefollowingdialog box(old &new version) :)
HOWAWESOMETHEY ARE?:-)
https://www.facebook.com/recover/extended
Inorder to findtheanswer of" sometimes ",I didan empirical
study (discusslater).
QUESTIONS...
How canFacebook bindthis new emailaddress or phone
number tothe legitimate user's address or phone?
How can Facebookdifferentiatebetweenanaccountrecovery
procedurestarted bya legitimateuser and the one startedby an
attacker?
Is it evenpossible?
Ithink NO!
CREATE NEW EMAIL ADDRESS AND ENTER IN
THE PREVIOUS DIALOG BOX & HERE YOU
HAVE:
QUESTION
WhyisFacebook exposingtheoneselected PRIVATE
SECURITY QUESTION in front ofthe ATTACKER?
Facebook is providinganoptiontotheattacker thathe canselect
from two routes i.e.,
1. Answer SecurityQuestion
2. Choose Three Friends of Attacker's Choice
TFA'S VARIATIONS/FORMS
1. Involveoneattacker i.e., the casewhere attacker will answer
theexposedsecurity question
2. Involvethree friendsi.e., the casewhere attacker chooses three
friendsofhischoice
ATTACKER CHOOSES TRUSTED FRIENDS PATH
ATTACKER'S CHOICES
Do selection offriends in anormalmanner evenwithout
POST-DATA manipulation ( works 100%)
Tryto sendcodes to hiscontrolledaccounts thatarenot on
victim's friendlist.( Doesn't work)
Tryto sendcodes to an attacker's controlled accountsthat are
on victim'sfriendlist but not in the presented listsoftrusted
friends. (works 50% )
Tryto sendcodes to an attacker's controlled accountsthat are
on the presented listof trustedfriendsand use POST-DATA
manipulation (defeat Facebook's shortenof listitems). ( works
100% )
Tryto sendallcodesto himself(evil idea). ( Doesn't work)
POST-DATA MANIPULATION
lsd=AVo8FV8K&profileChooserItems ={"511543064":1}&
checkableitems[] =511543064
511543064ismy Facebooknumeric ID.
HOW TO GET THE FACEBOOK'S USER ID?
Facebook'suser numeric ID isnot public information mostofthe
time and it isnot part of URL all thetime!
https://developers.facebook.com/tools/explorer/?
method=GET& ?fields=id,name
ANSWER: GRAPH API EXPLORER BY
FACEBOOK
path=VICTIM-USERNAME
URL lookslike:
EVIL IDEA
https://www.facebook.com/guardian/confirm.php?
guardians[0]=511543064&guardians[1]=511543064&guardians[2]=511543064
&cuid=AYhhCnxPb9g8xVAUGmuPh4e33s2NcCRj8Qng7wKGN7fxe9hXTQtVUKr0Rm-
0LBeTOCX_Es83lN0_BGe8Yi2GG7iGRbZwIL5rNXktD1mSsnW-
ZFD2fZB1Z7lLuyYdQ4GWPbf9bzhik9zXBpNeOsvUv-
MpzCcAQT2jxLtEa25YGlg_qg&cp=testpurposexss@gmail.com
EVIL IDEA DOESN'T WORK
Facebookcorrectly says:
INTERESTING MESSAGE FROM FACEBOOK
WHAT DOES IT MEAN?
Ithink it means thatif an attacker selecthimself or any particular
account3 to 5times for different victimsthenFacebook's block
access to particular account!
URL MANIPULATION'S RESULT! I.E.,
FACEBOOK'S EMAIL WITH NO FRIENDS'
NAMES
CHAIN TRUSTED FRIENDS ATTACK (CTFA)
InCTFA, attacker can make a chainof compromisedaccounts
and with thehelpofchain he may compromisedaccount(s)that
are evennotinhisfriends list.
FACEBOOK'S DEFAULT & FIXED SECURITY
QUESTIONS SET
FACEBOOK'S SECURITY QUESTIONS SCREEN-
SHOT!
EXCERTS FROM "MIND READER" VIDEO
https://www.youtube.com/watch?v=F7pYHN9iC9I
HOW TO GET THE ANSWERS OF THESE
QUESTIONS?
ACCORDING TO "ME"
Followingways worklike charm:
-- Incase ofsocial network, answer can be foundonpublic profile.
-- Directly ask the answer viaroutine Facebook chat...most of the
time you will getthe answer.
-- Make aQUIZ related to securityquestion and postto yourfriends.
-- In case of family membersorclose friends,youalready know the
answer.
Question:
Remark:
ANOTHER BAD SECURITY PRACTICE
https://www.facebook.com/help/163063243756483
Whathappens ifa userrealize after
answering/settingthequestion thathehaschosena weak
answer?
In caseof compromisedaccounts,if attacker has
proceeded via answering the securityquestion,hecandothe
samething sometime after because "QnA"remains same.
INCONSISTENCY IN SECURITY QUESTIONS'
USER INTERFACE
WHAT IS YOUR REACTION IF YOU HAVE TO
GIVE AN ANSWER TO A SECURITY
QUESTION(S) THAT IS NOT EVEN A PART OF
FACEBOOK'S DEFAULT SECURITY QUESTIONS'
LIST?
MY REACTION :-)
SECURITY QUESTION # 1
SECURITY QUESTION # 2
https://www.facebook.com/
HOW CAN A LEGITIMATE USER GIVE AN
ANSWER TO A SECURITY QUESTION THAT HE
HAS NEVER SET?
No Way ...BUT
I know theanswer that workssometimes :-)
https://www.facebook.com/ashar.javed(ajaved)
mscashar.javed (mjaved)
EMPIRICAL STUDY
Testedreal250 accountsofmy friendsonFacebook.
In 181 cases, Facebookdoesn'tallow us to proceed ...It means no
securityquestion exposed + nooptionoftrustedfriends
In69cases,Facebook allows ustoPROVIDEa NEWEMAIL
ADDRESSandonce provided, wecanhave either security
questionexposedor trusted friends featureappearsor BOTH
If asanattacker, we click on" "
181 CASES WE GOT ...
I Cannot AccessMyEmail
181 CASES (NO EMAIL ACCESS ... WE ARE
SORRY)
https://www.facebook.com/recover/extended/ineligible
IN 69 CASES
Facebookexposed the selectedsecurity questionofthevictim
OR
OptionofTrusted friends' selection
OR
Choiceamong above two options
11 OUT OF 69 ACCOUNTS COMPROMISED
Out of 11 compromised accounts
8 byansweringsecurity question
AND
3 usingtrusted friends feature
ENOUGHFORPOC! #ofcompromised accountscanbe easily
raisedto20-25 but requiresmore work& motivation :-)
SOME INTERESTING OBSERVATIONS
ON FACEBOOK ANYBODY CAN SEND ANYONE A
PASSWORD RESET REQUEST IF HE KNOWS
THE USERNAME WHICH IS PUBLIC
INFORMATION
Attacker doesn't haveaccesstovictim's emailbox inorder to get
thevalid 6 digitcode but he has the above dialog box in frontof
him ...
AT THE SAME TIME DENIAL-OF-SERVICE
(DOS) VICTIM
What ifattacker will enter 20-30 times wrongsecretcode?
" "will benastyexperiencefor thevictim!
We callthis " "
HERE YOU GO:
Tryagain later
Password Reset DoS
In this way,attacker canforce victim to use emailaddress or
phone andifvictim haslost his emailaddress ....
IDENTIFY ACCOUNT ANOTHER WAY
WORST THING
MY FRIEND'S REACTION ON WORST THING
ANOTHER TYPE OF DOS ON FACEBOOK
TRUSTED FRIEND FEATURE DOS
If an attacker hasstarted the passwordrecovery usingTFandat
thesame timevictim tries to use thisfeature...hewill receive the
followingmessage from Facebook
FACEBOOK'S SECURITY MEASURES & HOW
LEGITIMATE USERS REACT & THEIR
BYPASSES
THIS IS HOW COMMON USERS USE
FACEBOOK...
1) SECURITY ALERT VIA EMAIL OR MOBILE
SMS
As soonasattacker starts an account recoveryvia"password
reset" functionality,Facebook immediatelysends an emailor sms
alert tothe legitimate user.
USERS' REACTION ON THIS EMAIL OR SMS
USERS' REACTION ON THIS EMAIL OR SMS
In order torecognize device,Facebook uses
etc.
Whathappensifattacker clicks on " "button?
2) TEMPORARILY LOCKED
OS,IP Address,
Browser &Estimated Location
Continue
WHAT HAPPENS IF AN ATTACKER CLICKS ON "
CONTINUE " BUTTON?
(1)
Click" "after selecting one of the option butremember
whoisdoing selection?
(2)
Continue
An ATTACKER
(3)
(4)
(5)
(6)
(7)
(8)
ANOTHER INTERESTING ASPECT IN CASE IF
LEGITIMATE USER WILL BE ABLE TO REGAIN
ACCESS TO HIS ACCOUNT
REMEMBER (5TH STEP) I.E.,
SNAPSHOT OF ATTACKER'S EMAIL BOX
RECOGNIZED DEVICES
3) 24 HOUR LOCKED-OUT PERIOD
As an attacker this isthe biggest hurdle to cross...
DISAVOW PROCESS
Legitimate user can"disavow"theprocess any timeby clicking
on the linkintheemailhe receivedfrom Facebookor making
Facebook activityduringthis time.
BUT
Majorityoftheusers,as shown in users' reaction consider
Facebook'sinformative/warning emails as spam.
FOR A MOMENT FORGOT DISAVOW
24 HOUR LOCKED OUT PERIOD STARTS LIKE
THAT ...
24 HOUR LOCKED OUT PERIOD ...
24 HOUR LOCKED OUT PERIOD ...
24 HOUR LOCKED OUT PERIOD ...
GAME OVER FOR VICTIM...
HERE WE GO...
ANOTHER EMAIL FROM FACEBOOK AND
LEAKED EMAIL ADDRESS OF THE VICTIM
ETHICAL CONSIDERATIONS
FirstReported toFacebook on19-08-2012
On 23-08-2012, Igotthefollowinganswer from Facebook
SecurityTeam:
TWO QUESTIONS CAME TO MY MIND AFTER
READING THE EMAIL...
Isthere any attack thatisnotvery welltargeted?
Where issocialengineering in this attack?
ON 24-08-2012
BUT I HAVE WAITED UNTIL THE COMPLETE
EMPIRICAL STUDY & AGAIN SENT THE
TECHNICAL REPORT/RESEARCH PAPER ON
27-06-2013
ANSWER FROM SECURITY TEAM ON 09-09-
2013
SORRY FACEBOOK :-(
It doesn't makes sensetoreproduce thisattackonTEST
ACCOUNTS...
The results wouldlook likeFAKE.
ON THE OTHER HAND ...
Our approach issimilar toa recently publishedacademic paper in
Second International Workshopon PrivacyandSecurity in
Online Social Media
Co-located withWWW2013
(
)
http://precog.iiitd.edu.in/events/psosm2013/9psosm3s-
parwani.pdf
FINALLY
All compromisedaccounts are up,runningandunder thecontrol
of their legitimateusers!
YET ANOTHER OBSERVATION I.E., MASKED
EMAIL ADDRESS AND PHONE #
WHERE IS MASKING? EMAIL ADDRESS
EXPOSED
AFTER 5-10 MINUTES MASKING AFFECT
APPEARS
WHAT ABOUT OTHER 49 SOCIAL NETWORKS'
PASSWORD RESET FUNCTIONALITY?
200 millionactive users (Feb2013) +Alexa Rank#11
( )
TWITTER (HTTPS://TWITTER.COM/?
LANG=EN)
http://en.wikipedia.org/wiki/Twitter
ANYBODY CAN SEND ANYBODY A PASSWORD
RESET REQUEST WITH THE HELP OF
TWITTER'S USERNAME WHICH IS PUBLIC
INFORMATION :-(
JUST FOR FUN ...
I REPORTED THIS TO TWITTER SECURITY
TEAM & THIS IS WHAT THEY THINK ABOUT IT
BUT NOW TWITTER HAS ...
MAT HONAN'S STORY
http://www.wired.com/gadgetlab/2012/08/apple-amazon-
mat-honan-hacking/all/
SUPPORT TEAMS
SUPPORT TEAM'S JOB
To helpcustomers...
CAN ALSO BE USED TO COMPROMISE
ACCOUNTS :-)
OUR METHODOLOGY BY KEEPING IN MIND
THREAT MODEL
Registeredthe followingemailaddressonsocialnetworks:
user1@bletgen.net
AND
The followingistheattacker'saddress and goalis to compromise
the victim'saccountlabelled withabove email address
jim@mediaob.de
Attacker's addressis noteven registered onsocialnetworks!
ACADEMIA ( )HTTP://WWW.ACADEMIA.EDU/
OUR EMAIL TO ACADEMIA
INITIAL RESPONSE FROM ACADEMIA
FINAL RESPONSE OF ACADEMIA SUPPORT
TEAM
FREIZEITFREUNDE (A GERMAN-SPECIFIC
SOCIAL NETWORKING SITE)
( )HTTP://WWW.FREIZEITFREUNDE.DE/
OUR EMAIL TO THEM ...
FREIZEITFREUNDE'S SUPPORT TEAM
RESPONSE
LOKALISTEN (A GERMAN SOCIAL
NETWORKING SITE )
( )HTTP://WWW.LOKALISTEN.DE/
INITIAL RESPONSE ON OUR TICKET
OUR RESPONSE WITHOUT ""DATE OF BIRTH""
LOKALISTEN'S SUPPORT TEAM FINAL
RESPONSE
MEETUP
( )HTTP://WWW.MEETUP.COM/FIND/
SUPPORT TEAM BLOCKS ACCOUNT :)
GETGLUE (SOCIAL NETWORKS FOR TV FANS)
HTTP://GETGLUE.COM/FEED
OUR EMAIL TO THEIR SUPPORT TEAM
GETGLUE'S SUPPORT TEAM RESPONSE
They set thenew password for us i.e.,"temp " :)
DELICIOUS ( )HTTPS://DELICIOUS.COM/
DELICIOUS'S SUPPORT TEAM RESPONSE
They have switchedthe emailaddress from victims'toan
attacker controlled email address and havesent passwordreset
linkto the attacker'semail address.
FACEBOOK AS SSO
Outof50surveyed social networks,wefound
26 use Facebook aslogin-provider (SSO)
24 don'thave this feature
IMPLICATIONS OF FACEBOOK CONNECT
(1 MILLION WEBSITES HAVE INTEGRATED
WITH FACEBOOK)*+ ACCOUNT HACK
Controls emailaccounte.g.,Yahoo
Go for shoppinge.g.,Etsy
Create havoc for victim :)
79%ofsocialmedia log insby online retailers are with
Facebook ( )
60 millionusers of FacebookConnectin2009 accordingto
TechCrunchreport( )
http://socialmediatoday.com/node/1656466
http://goo.gl/a6lsCx
*http://goo.gl/x8BKe
HAVOC EXAMPLES
http://goo.gl/2FVTz8
http://goo.gl/uuO7Kq
GUIDELINES FOR USERS
Do not ignore email or SMS alertfrom Facebook
Do not place TOO MUCHinformation onsocialnetwork
Do not accept friend requestsfrom strangers
Enable log-in notifications
GUIDELINES FOR SOCIAL NETWORKS
Train your supportteams.
Facebook should raisethe bar as far ascommunicationwith
theresearchersor bugsubmitters isconcerned.
For Facebook: Please don't send TOOMANYEMAILSbecause
users startbelievingthat thesearespam emails.
Joewrote in his post( ):
In caseofTFA,Facebook failed in "CORRECTLY
IDENTIFYINGandREALIZATION OFAN INFORMATION
FLOWPROBLEM "
http://goo.gl/Wf6QMZ
FOR FACEBOOK
I HOPE NOW FACEBOOK SECURITY TEAM'S
REACTION
THANKS!

Weitere ähnliche Inhalte

Was ist angesagt?

CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google Hacking
Prathan Phongthiproek
 

Was ist angesagt? (20)

15k Followers In 90 Days
15k Followers In 90 Days15k Followers In 90 Days
15k Followers In 90 Days
 
Online Security
Online SecurityOnline Security
Online Security
 
pirater un compte fb
pirater un compte fb
pirater un compte fb
pirater un compte fb
 
Spam works
Spam worksSpam works
Spam works
 
Dangers of Facebook
Dangers of FacebookDangers of Facebook
Dangers of Facebook
 
Danger of facebook
Danger of facebookDanger of facebook
Danger of facebook
 
Test
TestTest
Test
 
What is hacking
What is hackingWhat is hacking
What is hacking
 
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
 
Scalable Link Building
Scalable Link BuildingScalable Link Building
Scalable Link Building
 
GOOGLE pure SPAM - How does pure spam look like
GOOGLE pure SPAM - How does pure spam look like GOOGLE pure SPAM - How does pure spam look like
GOOGLE pure SPAM - How does pure spam look like
 
Penguin recovery penalty
Penguin recovery penaltyPenguin recovery penalty
Penguin recovery penalty
 
Penguin 2.0 Update - Link Risk Management
Penguin 2.0 Update - Link Risk ManagementPenguin 2.0 Update - Link Risk Management
Penguin 2.0 Update - Link Risk Management
 
Social bookmarking websites by
Social bookmarking websites bySocial bookmarking websites by
Social bookmarking websites by
 
Personal internet security
Personal internet securityPersonal internet security
Personal internet security
 
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
 
CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google Hacking
 
Thabet company socail media
Thabet company socail mediaThabet company socail media
Thabet company socail media
 
7 Current facts about Internet and WWW
7 Current facts about Internet and WWW7 Current facts about Internet and WWW
7 Current facts about Internet and WWW
 
Use an Initial Social Media Blast to Increase Your Visibility
Use an Initial Social Media Blast to Increase Your VisibilityUse an Initial Social Media Blast to Increase Your Visibility
Use an Initial Social Media Blast to Increase Your Visibility
 

Ähnlich wie Trusted Friend Attack: Guardian Angels Strike

Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
Marco Balduzzi
 
Persona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole WebPersona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole Web
Francois Marier
 

Ähnlich wie Trusted Friend Attack: Guardian Angels Strike (20)

Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
 
Youemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptx
Youemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptxYouemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptx
Youemin_Ange_Roxane_Miessan_-_(Final_Exam)_Your_Major-Career_Investigation.pptx
 
hwk1
hwk1hwk1
hwk1
 
hwk1
hwk1hwk1
hwk1
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
Social engineering via social media
Social engineering via social mediaSocial engineering via social media
Social engineering via social media
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook Account
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
security procedures
security procedures
security procedures
security procedures
 
Is it good to be paranoid ?
Is it good to be paranoid ?Is it good to be paranoid ?
Is it good to be paranoid ?
 
Password management
Password managementPassword management
Password management
 
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
 
Social Media Breakfast Edmonton: Optimizing Your Social Presence
Social Media Breakfast Edmonton: Optimizing Your Social PresenceSocial Media Breakfast Edmonton: Optimizing Your Social Presence
Social Media Breakfast Edmonton: Optimizing Your Social Presence
 
Persona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole WebPersona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole Web
 
2013 State of Social Media Spam Research Report
2013 State of Social Media Spam Research Report2013 State of Social Media Spam Research Report
2013 State of Social Media Spam Research Report
 
hacker un compte facebook
hacker un compte facebook 
hacker un compte facebook
hacker un compte facebook
 
How Social Media Can Enhance Your Personal Brand
How Social Media Can Enhance Your Personal BrandHow Social Media Can Enhance Your Personal Brand
How Social Media Can Enhance Your Personal Brand
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Trusted Friend Attack: Guardian Angels Strike