You are on page 1of 19

Beyond Fear

security
Where are we in ?
How Secure you are ?

 Some Questions for you 


 Do you believe your password is strong ?

 How much personal information do you expose in


Facebook ?
How Secure you are ?

War is not only fought with guns ,jets


and tanks, We took a look at how
hackers , worms, and Trojans are
used in 21st century warzone
Editor ‘Microsoft Futures’
Are we Safe ?

 There are various ways of attacks around you !

Phishing Spamming
Social Engineering Brute Force Attacks
Dictionary Attacks
Rainbow Attacks SQL Injection
Dictionary Attacks

 Is a technique for defeating by


searching likely possibilities in
dictionary .
 Many people use dictionary
words in passwords (nearly 70%)

LE ’
AP P
‘ ‘monkey’
‘chee
se’
Social Engineering
‘Social engineering is the act of
manipulating people into performing actions
or divulging confidential information’
Social Engineering

Have you ever


think the amount
of details you
expose in social
networks ?
Social Engineering

How Social engineering can be devastating ?


 Simple Example
Phishing

 Phishing is a way of attempting to acquire


sensitive information such as usernames,
passwords and credit card details by
‘FAKING’
Phishing Facts

In 2010
 86,985 unique phishing emails scams
 89,920 unique phishing web forms
 821 Brand name hijacking campaigns
Verities of Phishing

 URL confusion attacks

 Malware based attacks

 Search Engine phishing

 Content injection attacks


Verities of Phishing

 Spear phishing

 Whaling

Approaches small number of numbers


Steganography

 Steganography is the art and science of


writing hidden messages
 Cryptography is conversion of
information from a readable
state to apparent nonsense
What's the Difference ?
Cryptography

ExFEX*
Hello 

Steganography
Hello 

Hello 
Steganography

 In February 20001, the USA Today reported


that terrorist have been using
steganography to hide communication in
images on the Internet.
Steganography
Osama bin Laden – Steganography Master ?

 If there's one thing the FBI hates more than Osama bin
Laden, it's when Osama bin Laden starts using the Internet. !
Steganography

 eBay Used for Secret Communication ?

out of 2 Million - 17,000


images in eBay auctions
have hidden data and
messages !
Tools for Steganography

 Lots of tools out there !

Lets see S-Tools


Q&A

You might also like