Owasp 2018 federated confidence
I AGREE
I TOOK THE CONTENT OF THE “TERMS OF SERVICE” OF THE
LEADING ONLINE SERVICES THAT WE USE ON A DAILY BASIS
(INCLUDING FACEBOOK, SNAPCHAT, INSTAGRAM, TINDER
ETC.)
Designer: Dima Yarovinsky
Institution: Bezalel Academy for Art and
Design
City, Country: Jerusalem, Israel
Course: Infographics
Teacher: Roni Levit
https://www.marismith.com/did-cambridge-analytica-get-your-facebook-data/
Owasp 2018 federated confidence
VIRUSTOTAL – TO SERVE AND PROTECT …
AND COLLECT, BUT THIS IS NOT THEIR FAULT
VIRUSTOTAL, A SUBSIDIARY OF GOOGLE, IS A FREE ONLINE SERVICE
THAT ANALYZES FILES AND URLS ENABLING THE IDENTIFICATION OF
VIRUSES, WORMS, TROJANS AND OTHER KINDS OF MALICIOUS
CONTENT DETECTED BY ANTIVIRUS ENGINES AND WEBSITE
SCANNERS
VT SCANS WHAT YOU GIVE IT TO WORK WITH, WE BELIEVE
SERVICES AS GDRIVE DOESN’T USE VT POR ANALYZING STORED
FILES
VT EVERYWHERE
VT – HUNTING
DOWNLOADERSrule pdf_contains_action_link {
meta:
author = "Eduardo Chavarro"
last_updated = "2018-02-08"
tlp = "white"
description = "A pdf that contains a link, working as
an downloader"
strings:
$magic = { 25 50 44 46 }
$s_link_tag = "/Subtype /Link" ascii wide nocase
$s_action_tag = "Type /Action" ascii wide nocase
$s_uri_tag = //URI .{14,}/ ascii wide nocase
condition:
$magic at 0 and all of ($s*)
}
VT – VOYEUR TOTAL
Files Name
------ ----
2 Adult
5 books
2 cert
2 Contracts
2 cryptocoin
23 CV
29 Downloaders
3 email_forms
2 FINANCIAL
1 goverment
2 Medical
1 Pappers
3 possible_portal
3 productsheet
3 secrets
5 user_pwd
9 Vouchers
• DO NOT UPLOAD TO VT (OR ANYWHERE) IF THESE FILE AREN’T
YOURS.
• ASK YOUR HOSTING PROVIDER IF THEY USE VT PLUGINS AND
WHAT KIND OF INFORMATION WILL BE UPLOADED (*.*?).
• IF YOU SET A VT PLUGIN WITHIN YOUR COMPANY, ASK FOR
PERMISSION AND VERIFY WINCH FOLDERS CAN BE MANAGED.
• DON’T TRUST, ALWAYS CONFIRM.
Owasp 2018 federated confidence

More Related Content

PPTX
Chrome Extensions: Masking risks in entertainment
PPTX
Bcsev9 - Defensa Activa en la batalla contral los RAT
PDF
Practical Incident Response - Work Guide
PDF
BSidesCO - echavarro, Forense para delincuentes: Cuando la única amenaza no e...
PDF
Presentación IX Congreso Internacional de Electrónica, Control y Telecomunica...
PPTX
BarcampSE V3: Georeferenciación WiFi "Tracking your opponent" by Echavarro
PPTX
Teensy BarcampSE - tarjetas Teensy como vectores de ataque
PPTX
CORHUILA - Taller al descubierto: Georef WiFi, Bluetooth hacking
Chrome Extensions: Masking risks in entertainment
Bcsev9 - Defensa Activa en la batalla contral los RAT
Practical Incident Response - Work Guide
BSidesCO - echavarro, Forense para delincuentes: Cuando la única amenaza no e...
Presentación IX Congreso Internacional de Electrónica, Control y Telecomunica...
BarcampSE V3: Georeferenciación WiFi "Tracking your opponent" by Echavarro
Teensy BarcampSE - tarjetas Teensy como vectores de ataque
CORHUILA - Taller al descubierto: Georef WiFi, Bluetooth hacking

Recently uploaded (20)

PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
Feature types and data preprocessing steps
PDF
Applications of Equal_Area_Criterion.pdf
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PDF
Cryptography and Network Security-Module-I.pdf
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
ai_satellite_crop_management_20250815030350.pptx
PPTX
Measurement Uncertainty and Measurement System analysis
PDF
First part_B-Image Processing - 1 of 2).pdf
PPTX
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
PPTX
Petroleum Refining & Petrochemicals.pptx
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
August -2025_Top10 Read_Articles_ijait.pdf
MLpara ingenieira CIVIL, meca Y AMBIENTAL
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Feature types and data preprocessing steps
Applications of Equal_Area_Criterion.pdf
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Cryptography and Network Security-Module-I.pdf
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
CyberSecurity Mobile and Wireless Devices
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
ai_satellite_crop_management_20250815030350.pptx
Measurement Uncertainty and Measurement System analysis
First part_B-Image Processing - 1 of 2).pdf
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
Petroleum Refining & Petrochemicals.pptx
Exploratory_Data_Analysis_Fundamentals.pdf
August -2025_Top10 Read_Articles_ijait.pdf
Ad
Ad

Owasp 2018 federated confidence

  • 2. I AGREE I TOOK THE CONTENT OF THE “TERMS OF SERVICE” OF THE LEADING ONLINE SERVICES THAT WE USE ON A DAILY BASIS (INCLUDING FACEBOOK, SNAPCHAT, INSTAGRAM, TINDER ETC.) Designer: Dima Yarovinsky Institution: Bezalel Academy for Art and Design City, Country: Jerusalem, Israel Course: Infographics Teacher: Roni Levit
  • 5. VIRUSTOTAL – TO SERVE AND PROTECT … AND COLLECT, BUT THIS IS NOT THEIR FAULT VIRUSTOTAL, A SUBSIDIARY OF GOOGLE, IS A FREE ONLINE SERVICE THAT ANALYZES FILES AND URLS ENABLING THE IDENTIFICATION OF VIRUSES, WORMS, TROJANS AND OTHER KINDS OF MALICIOUS CONTENT DETECTED BY ANTIVIRUS ENGINES AND WEBSITE SCANNERS VT SCANS WHAT YOU GIVE IT TO WORK WITH, WE BELIEVE SERVICES AS GDRIVE DOESN’T USE VT POR ANALYZING STORED FILES
  • 7. VT – HUNTING DOWNLOADERSrule pdf_contains_action_link { meta: author = "Eduardo Chavarro" last_updated = "2018-02-08" tlp = "white" description = "A pdf that contains a link, working as an downloader" strings: $magic = { 25 50 44 46 } $s_link_tag = "/Subtype /Link" ascii wide nocase $s_action_tag = "Type /Action" ascii wide nocase $s_uri_tag = //URI .{14,}/ ascii wide nocase condition: $magic at 0 and all of ($s*) }
  • 8. VT – VOYEUR TOTAL Files Name ------ ---- 2 Adult 5 books 2 cert 2 Contracts 2 cryptocoin 23 CV 29 Downloaders 3 email_forms 2 FINANCIAL 1 goverment 2 Medical 1 Pappers 3 possible_portal 3 productsheet 3 secrets 5 user_pwd 9 Vouchers
  • 9. • DO NOT UPLOAD TO VT (OR ANYWHERE) IF THESE FILE AREN’T YOURS. • ASK YOUR HOSTING PROVIDER IF THEY USE VT PLUGINS AND WHAT KIND OF INFORMATION WILL BE UPLOADED (*.*?). • IF YOU SET A VT PLUGIN WITHIN YOUR COMPANY, ASK FOR PERMISSION AND VERIFY WINCH FOLDERS CAN BE MANAGED. • DON’T TRUST, ALWAYS CONFIRM.