SlideShare a Scribd company logo
hacking/cracking
the other side of the story


jim geovedi

guide to ict megatrend
31 January 2008 — Hotel Shangri-La, Jakarta
‣   information security

‣   0-day vulnerabilities
infosec ≠ satpam


‣   current trends: identity thefts, botnet,
    mobile communication hacking, 0-day
    vulnerabilities, corporate espionage,
    wiretapping
industry status


‣       big security companies acquire small
        start-up or spin-off companies to offer
        more solutions
    ‣    "palugada" propaganda
Hacking Cracking 2008
Hacking Cracking 2008
Hacking Cracking 2008
Hacking Cracking 2008
software
development


‣   cheap software development?
    outsource to india or china!
security investment

‣       companies bought a lot of security
        devices or applications
    ‣    firewall, anti virus, spam and content
         filtering, ids, ips, patch management,
         etc.
common issues

‣       companies do not have enough
        resources.
‣       vendors re-introducing:
    ‣    weak and easy guessed passwords
    ‣    clear-text protocols
    ‣    misconfigurations
‣   information security

‣   0-day vulnerabilities
‣   0-day, pronounce zero-day, sometimes
    oh day, means new.

‣   the term has it's origin in the warez scene,
    but has become firmly entrenched in the
    exploit trading scene.
‣   0-day is used to refer to exploits,
    software, media or vulnerability
    information released today and those
    that have not yet released.
vendor noticed   patch released
   intrusion




                                                 time




value             life cycle of 0-day
                  (quick response from vendor)
vendor noticed      patch released
   intrusion




                                                         time




value          life cycle of 0-day
               (very late response from vendor)
Hacking Cracking 2008
Hacking Cracking 2008
‣   0-day users: intelligence agents,
    professional penetration testers, product
    vendors, random hackers/crackers
obtaining 0-day

‣   conducting research (source code/
    binary audit)
‣   share/trade between friends
‣   install honeypot
‣   buy from 0-day brokers
market


‣       current 0-day business model is
        considered weak
    ‣    the auction model
the players

‣   corporate: ISS, eEye, iDEFENSE,
    TippingPoint (3Com/ZDI), Immunity,
    Gleg, Argeniss, wabisabilabi, etc
‣   group or personal: cirt.dk, piotr bania,
    inge henriksen, mario ballano, neil kettle,
    etc.
programs

‣   https://labs.idefense.com/vcp/
‣   http://www.wslabi.com/wabisabilabi/
    rrp.do?
‣   http://www.zerodayinitiative.com/
    details.html
prizes
‣   remote arbitrary code execution vulnerabilities
    in specified e-mail clients and servers (outlook,
    outlook express, thunderbird, sendmail,
    exchange)
    $8,000 - $12,000
‣   remote arbitrary code execution vulnerabilities
    in specified critical internet infrastructure
    applications (apache httpd, bind, sendmail,
    openssh, iis, exchange):
    $16.00 - $24.000
how many?

‣       every complex software have bugs
    ‣    we should assume every popular
         application exist has at least one 0-day
         exploit in wild
‣       professionals keep their own 0-day!
fin.
jim@geovedi.com

More Related Content

PDF
Keynote - Jim Geovedi - professional-hackers
PPTX
Ethical Hacking Presentation
PPTX
Ethical Hacking
PDF
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
PPTX
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
PPTX
Ethical hacking
PPT
Introduction to Hacking
PPT
Ethical Hacking
Keynote - Jim Geovedi - professional-hackers
Ethical Hacking Presentation
Ethical Hacking
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Ethical hacking
Introduction to Hacking
Ethical Hacking

What's hot (20)

DOCX
Ethical Hacking (CEH) - Industrial Training Report
PPTX
Hacking Mobile Apps
PPTX
Ethical hacking course
PPT
Ethical hacking
PPT
Ethical hacking
PPTX
IOT Security FUN-damental
PDF
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
PDF
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
DOCX
Full seminar report on ethical hacking
PPTX
ethical hacking
PPTX
Ethical Hacking
PPT
Ethical hacking
PPT
Ethical Hacking
PPTX
Hacking
PPTX
Ethical hacking
PPTX
Ethical hacking course ppt
PPTX
Ethical hacking for information security
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PPTX
Cyber Threat Intelligence
PPTX
Ethical Hacking
Ethical Hacking (CEH) - Industrial Training Report
Hacking Mobile Apps
Ethical hacking course
Ethical hacking
Ethical hacking
IOT Security FUN-damental
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Full seminar report on ethical hacking
ethical hacking
Ethical Hacking
Ethical hacking
Ethical Hacking
Hacking
Ethical hacking
Ethical hacking course ppt
Ethical hacking for information security
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Cyber Threat Intelligence
Ethical Hacking

Viewers also liked (20)

PDF
Wireless Hotspot Security
PDF
Professional Hackers
PDF
IDS & Log Management
PDF
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
PDF
Internet Worms
PDF
Hacking Satellite: A New Universe to Discover
PDF
Wireless Hotspot: The Hackers Playground
PDF
AI & NLP pada @begobet
PDF
Cheating the 10,000 hour rule
PDF
Waluku: Answering Astronomy Questions through Social Media
PDF
Hacking Trust
PDF
Hacking a Bird in the Sky: The Revenge of Angry Birds
PDF
Satellite Telephony Security
PDF
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
PDF
Satellite Hacking — Intro by Indianz (2012)
PDF
Hacking a Bird in the Sky: Hijacking VSAT Connection
PDF
The 21st Century Bank Job
PDF
Is Cyber-offence the New Cyber-defence?
PDF
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
PDF
Warezzman - DVB-Satellite Hacking
Wireless Hotspot Security
Professional Hackers
IDS & Log Management
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Internet Worms
Hacking Satellite: A New Universe to Discover
Wireless Hotspot: The Hackers Playground
AI & NLP pada @begobet
Cheating the 10,000 hour rule
Waluku: Answering Astronomy Questions through Social Media
Hacking Trust
Hacking a Bird in the Sky: The Revenge of Angry Birds
Satellite Telephony Security
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Satellite Hacking — Intro by Indianz (2012)
Hacking a Bird in the Sky: Hijacking VSAT Connection
The 21st Century Bank Job
Is Cyber-offence the New Cyber-defence?
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Warezzman - DVB-Satellite Hacking

Similar to Hacking Cracking 2008 (20)

PPTX
Ten Security Product Categories You've Probably Never Heard Of
PPTX
Ten security product categories you've (probably) never heard of
PPT
Security Opportunities A Silicon Valley VC Perspective
PPTX
(Isc)² secure johannesburg
PDF
Exodus intel slideshare 2019
PDF
Exodus intel slideshare 2019
PDF
The Magic of Symbiotic Security
PPTX
Découvrez le Rugged DevOps
PPTX
Security in the age of open source - Myths and misperceptions
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PDF
Threat Landscape Lessons from IoTs and Honeynets
PPTX
Understanding Your Attack Surface and Detecting & Mitigating External Threats
PDF
Asset Discovery in India – Redhunt Labs
PDF
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
PPTX
HITCON 2017: Building a Public RPZ Service to Protect the World's Consumers
PDF
Application Security by Ethical Hackers
PDF
SignaturesAreDead Long Live RESILIENT Signatures
PDF
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
PDF
When Insiders ATT&CK!
Ten Security Product Categories You've Probably Never Heard Of
Ten security product categories you've (probably) never heard of
Security Opportunities A Silicon Valley VC Perspective
(Isc)² secure johannesburg
Exodus intel slideshare 2019
Exodus intel slideshare 2019
The Magic of Symbiotic Security
Découvrez le Rugged DevOps
Security in the age of open source - Myths and misperceptions
Wfh security risks - Ed Adams, President, Security Innovation
Ryan Wilson - ryanwilson.com - IoT Security
Threat Landscape Lessons from IoTs and Honeynets
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Asset Discovery in India – Redhunt Labs
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
HITCON 2017: Building a Public RPZ Service to Protect the World's Consumers
Application Security by Ethical Hackers
SignaturesAreDead Long Live RESILIENT Signatures
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
When Insiders ATT&CK!

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Big Data Technologies - Introduction.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced methodologies resolving dimensionality complications for autism neur...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
Big Data Technologies - Introduction.pptx

Hacking Cracking 2008

  • 1. hacking/cracking the other side of the story jim geovedi guide to ict megatrend 31 January 2008 — Hotel Shangri-La, Jakarta
  • 2. information security ‣ 0-day vulnerabilities
  • 3. infosec ≠ satpam ‣ current trends: identity thefts, botnet, mobile communication hacking, 0-day vulnerabilities, corporate espionage, wiretapping
  • 4. industry status ‣ big security companies acquire small start-up or spin-off companies to offer more solutions ‣ "palugada" propaganda
  • 9. software development ‣ cheap software development? outsource to india or china!
  • 10. security investment ‣ companies bought a lot of security devices or applications ‣ firewall, anti virus, spam and content filtering, ids, ips, patch management, etc.
  • 11. common issues ‣ companies do not have enough resources. ‣ vendors re-introducing: ‣ weak and easy guessed passwords ‣ clear-text protocols ‣ misconfigurations
  • 12. information security ‣ 0-day vulnerabilities
  • 13. 0-day, pronounce zero-day, sometimes oh day, means new. ‣ the term has it's origin in the warez scene, but has become firmly entrenched in the exploit trading scene.
  • 14. 0-day is used to refer to exploits, software, media or vulnerability information released today and those that have not yet released.
  • 15. vendor noticed patch released intrusion time value life cycle of 0-day (quick response from vendor)
  • 16. vendor noticed patch released intrusion time value life cycle of 0-day (very late response from vendor)
  • 19. 0-day users: intelligence agents, professional penetration testers, product vendors, random hackers/crackers
  • 20. obtaining 0-day ‣ conducting research (source code/ binary audit) ‣ share/trade between friends ‣ install honeypot ‣ buy from 0-day brokers
  • 21. market ‣ current 0-day business model is considered weak ‣ the auction model
  • 22. the players ‣ corporate: ISS, eEye, iDEFENSE, TippingPoint (3Com/ZDI), Immunity, Gleg, Argeniss, wabisabilabi, etc ‣ group or personal: cirt.dk, piotr bania, inge henriksen, mario ballano, neil kettle, etc.
  • 23. programs ‣ https://labs.idefense.com/vcp/ ‣ http://www.wslabi.com/wabisabilabi/ rrp.do? ‣ http://www.zerodayinitiative.com/ details.html
  • 24. prizes ‣ remote arbitrary code execution vulnerabilities in specified e-mail clients and servers (outlook, outlook express, thunderbird, sendmail, exchange) $8,000 - $12,000 ‣ remote arbitrary code execution vulnerabilities in specified critical internet infrastructure applications (apache httpd, bind, sendmail, openssh, iis, exchange): $16.00 - $24.000
  • 25. how many? ‣ every complex software have bugs ‣ we should assume every popular application exist has at least one 0-day exploit in wild ‣ professionals keep their own 0-day!