Russia offers over $100,000 to de-anonymize Tor

Russia1 Russia offers over $100,000 to de anonymize Tor

Patrick Howell O’Neill from the dailydot.com posted about how Russia is offering a reward for de-anonymizing Tor. The original post can be found HERE.

Here are the highlights: Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

PART 2 “The Attack” – THE SOCIAL MEDIA DECEPTION PROJECT : How We Created Emily Williams To Compromise Our Target

 PART 2 “The Attack”   THE SOCIAL MEDIA DECEPTION PROJECT : How We Created Emily Williams To Compromise Our Target

Last year Aamir Lakhani and Joseph Muniz developed a fake identity known as Emily Williams with the purpose of compromising a specific target using social media. We created Emily Williams based on research from Robin Sage, which showcased how a fake identity could obtain sensitive information from social media resources. We wondered if a similar approach could be used for targeted attacks and developed Emily Williams for that purpose. More information on developing Emily Williams via Part 1 of this project can be found HERE. Continue reading

VN:F [1.9.22_1171]
Rating: 4.7/5 (10 votes cast)

THE SOCIAL MEDIA DECEPTION PROJECT : How We Created Emily Williams To Compromise Our Target

Disclaimer: This post has been modified to exclude specific subjects not approved for public viewing


emily1 new THE SOCIAL MEDIA DECEPTION PROJECT : How We Created Emily Williams To Compromise Our Target

Emily Williams and Robin Sage

Emily Williams and Robin Sage don’t exist in the real world. They are fake social network accounts designed to obtain sensitive information. Robin Sage was created in late 2009 to obtain information from intelligence on US military personnel. Her story was presented at the Black Hat hacker conference upsetting many people by exposing the type of sensitive data provided over social networks. Joey Muniz and Aamir Lakhani decided to go one-step further and ask the hard question: “what else can happen outside of data being leaked over social networks”. We decided to find out using Emily Williams. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (8 votes cast)

Penetration Testing Tools At Your Next Security Conference – WIFI Pineapple Mark III

pineapple 942x1024 Penetration Testing Tools At Your Next Security Conference – WIFI Pineapple Mark IIIToday’s highlight – WIFI Pineapple Mark III Wireless Penetration Testing Tool.

There are many cool tools sold at conferences. One tool to check out is the WIFI Pineapple Mark III for around $100 dollars. Basically it’s a wireless honeypot using a man-in-the-middle attack to access data. The way it works is it listens for devices calling out for known wireless networks / SSIDs. The WIFI Pineapple will hear the request and clone the requested SSID so the device believes its connecting to a known trusted network. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (4 votes cast)

Locks Keep the Honest People Out: How the Bad Guys Break In | lock picking.

People lock their doors at night and feel protected from criminals. The scary thing most people are not aware of is locks are easy to bypass with inexpensive tools. You may think these tools are hard to obtain however I watch lock pick kits sellout at security conferences each year with attendance in the thousands. If you search the Internet for terms like “lock picking, bump keys or impressioning” you’ll find hundreds of results including video tutorials. It’s not hard for criminals to break into doors and safes. In most cases, they can do it in under a minute without leaving behind evidence the average users will notice.

Inside a common lock
inside lock 300x250 Locks Keep the Honest People Out: How the Bad Guys Break In | lock picking. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (1 vote cast)