Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Cyber Crime in Nowadays Businesses - A Real Case Study of Targeted Attack

Cyber Crime in Nowadays Businesses - A Real Case Study of Targeted Attack

Ratings: (0)|Views: 54 |Likes:
Published by High-Tech Bridge
The time where information threats were mostly limited to blind attacks of random targets has gone. Video available: https://www.htbridge.ch/publications/cybercrime_in_nowadays_businesses_a_real_case_study_of_targeted_attack.html
The time where information threats were mostly limited to blind attacks of random targets has gone. Video available: https://www.htbridge.ch/publications/cybercrime_in_nowadays_businesses_a_real_case_study_of_targeted_attack.html

More info:

Published by: High-Tech Bridge on Dec 04, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF or read online from Scribd
See more
See less

09/24/2012

pdf

 
ORIGINAL SWISS ETHICAL HACKING
Your texte here ….
©2011 High-Tech Bridge SA – www.htbridge.ch
 
Hashdays 2011Cybercrime in nowadays businesses:A real case study of targeted attack 
Frédéric BOURLAHead of Ethical Hacking Department
©2011 High-Tech Bridge SA – www.htbridge.ch
 
ORIGINAL SWISS ETHICAL HACKING
Your texte here ….
©2011 High-Tech Bridge SA – www.htbridge.ch
0x00 - #whoami
 
Frédéric BOURLAHead of Ethical Hacking DepartmentHigh-Tech Bridge SA~12 years experience in Information SecurityLPT, CISSP, CCSE, CCSA, ECSA, CEH, eCPPTCHFI, GCFA & GREM in progressRHCE, RHCT, MCPfrederic.bourla@htbridge.ch
 
ORIGINAL SWISS ETHICAL HACKING
Your texte here ….
©2011 High-Tech Bridge SA – www.htbridge.ch
0x01 - #readelf prez
 
CyberCyberCyberCyber attacksattacksattacksattacks havehavehavehave evolvedevolvedevolvedevolved:
They became moremoremoremore sophisticatedsophisticatedsophisticatedsophisticated
They are oftenoftenoftenoften targetedtargetedtargetedtargeted
It is not uncommon anymore to observeattacks managedmanagedmanagedmanaged bybybyby specializedspecializedspecializedspecialized groupsgroupsgroupsgroups andinitiated by unfairunfairunfairunfair competitorscompetitorscompetitorscompetitors
This talk is an example of such threats. It isbased on a postpostpostpost----incidentincidentincidentincident investigationinvestigationinvestigationinvestigation whichtook place inininin OctoberOctoberOctoberOctober 2010201020102010. To preserveclient’s anonymity, let’slet’slet’slets callcallcallcall himhimhimhim FedorFedorFedorFedor----TradingTradingTradingTrading.
1 round of 50’. To save time, pleasepleasepleaseplease keepkeepkeepkeepyouryouryouryour questionsquestionsquestionsquestions until the end.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->