Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Figure 2: Noted APT1 Victims over the years (Source: Mandiant APT1 Report)
Installing
Server
Command
and
Control
Case Study
China believed to have copied MQ-1
Predator
Drone
through
Cyber
Hacking
QinetiQ North America (QQ) is a world
leading defense technology and Security
Company providing satellites, drones and
software services to the U.S. Special Forces
deployed in Afghanistan and Middle East.
In 2009, China had almost its complete
control over QinetiQ TSG's computers
stealing 1.3 million pages of documents and
3.3 million pages of Microsoft Excel
containing TSG's code and engineering data.
These Documents were believed to be used
by chinese to build MQ-1 drone.
Skepticism
report
around
the
Mandiant
On the Web
http://intelreport.mandiant.com/
Mandiant Intelligence Report
http://www.youtube.com/watch?v=
3d2gyydHwmY CNN News Crew
being chased
http://www.youtube.com/watch?v=
6p7FqSav6Ho - Video Showing an
Attacker Session
Pranshu Bajpai
bajpai.pranshu@gmail.com
Pranshu Bajpai is a Computer Security
Professional specialized in Systems,
Network and Web Penetration Testing.
He is completing his Masters in
Information Security from the Indian
Institute of Information Technology.
Currently he is also working as a
Freelance Penetration Tester on a
Counter-Hacking Project in a Security
Firm in Delhi, India, where his
responsibilities include 'Vulnerability
Research', 'Exploit kit deployment',
'Maintaining Access' and 'Reporting. He
is an active speaker and author with a
passion for Information security.
Introduction
Bring your own device (BYOD) is the
business policy of letting employees bring
their own devices at workplace for doing
work. The concept has gained popularity in
recent years mainly due to the following
reasons:
Conclusion
BYOD policy seems inevitable in coming
years as the technology advancement in
smart devices helps the employees to
achieve better productivity with flexibility at
the workplace. Instead of denying access
citing the security concerns, it would be best
in business interest to embrace this business
policy which allows people to be more
productive in longer run. No doubt, we do
need
clearly
defined
rules
and
accountability factors which should be
enforced via legal and technological means
for protecting the sensitive corporate data
residing on people devices. But as the
nature of doing business evolves with
technological
advancement,
it's
in
everybody's best interest to accept BYOD
policy since it directly addresses the need to
collaborate and communicate at times when
it matters most. After all, when it comes to
business; time is money!
References:
Manasdeep
manas.deep@niiconsulting.com
Manasdeep currently serves as a Security
Analyst in the Technical Assessment
team at NII Consulting, Mumbai. His
work focuses on conducting Security
Audits, Vulnerability Assessment and
Penetration Testing for NIIs premier
clients. He possesses strong analytical
skills and likes to keep himself involved
in learning new attack vectors, tools and
technologies. He has flair in technical
writing and shares his thoughts on his
blog Experiencing Computing at
http://manasdeeps.blogspot.in. He has
also published information security
paper(s) in International Journal of
Computer Science and Information
Security (IJCSIS) along with various
seminar / conference proceedings.
Drupal Scanner
CMS - What's the Fuss all About?
A Content Management System makes your
life easy. It makes the online presence of
your business more accessible and hence the
probability of the success of your business
soars higher. Incredibly, if you are
unfamiliar with CMSes, the best part is, you
need not be a nerdy, high-tech web
developer to give this touch of virtuality to
your ideas and convert them to online
reality. You need not have your armour
flooding with all sorts of programming and
impressive and crisp UI design skills.
Neither do you need to have those 'supernatural'
scripting
and
back-end
management skills. So that's the power you
get when you use a CMS for you websites.
All that you need is some anciently basic
idea about creating websites and you are
absolutely ready to go and get it done.And
what more, you have different flavours to
choose from. So depending on your
requirements and taste you can go for any of
the three major CMSes out there, viz.
WordPress, Joomla or Drupal.
The Inception
Enter the idea of creating one such tiny little
tool that can be handy enough to just find
out that exact detail about your Drupal
powered websites tool that could be your
compass to guide you to a more secure
version of your websites. And what better
than making use of an already freely
available web application security tool to
start off with this project. Thus it was
decided that IronWasp shall be the mother
for this Drupal security scanner, which for
now we will term as DrupScan to bein
phonetic sync with its counterparts. So
effectively, once the tool gets made and is
available, it can be easily accessed as yet
another module of IronWasp. So put yet
more simply, you download IronWasp and
you know how to access its different
modules, that's it. You know how to ensure
better security for your Drupal powered
websites.
by
and
Taken
care
liveVersionScan().
by
Final words
The scanner on completion can help pin
pointedly highlight the security issues with a
Drupal powered website and of course will
be a completing part in the group of similar
scanners :- WpScan, JoomScan and then
why not DrupScan.
Abhinav Chourasia
abhinav.mr.impractical@gmail.com
By default all firewalls will deny all sourceto-destination traffic unless a rule or access
list is given to permit traffic. So there is no
point in investigating accept logs. But in the
meanwhile when you do log analysis on all
the successful communication of a URL
filtering software you can come across many
Websites which your URL filter dare to filter
those contents. Your employee can create a
website that can be used to host contents
and can be used to transfer files from the
organization to the outside world.
In this dynamic world, Security threats are
changing daily from Phishing mails to a
website hack or by logging your managers
account to apply resignation we must be
aware about all the incidents and need to
think about its preventive measures.
Ben Abraham
ben.abraham@xe04.ey.net
Ben Abraham has more than 5 years of
experience in the field of Information
Security and in implementing,auditing
and optimizing SIEM solutions to the
clients. He also has knowledge in reverse
engineering malware to find the
behaviour and has carried out ISO27001
audits, PCIDSS, firewall audits and IT
security policy development.
Ben has got opportunities to work in
companies like Mphasis, Infosys and
Ernst & Young. He wishes to learn more
about various Information Security
domain and conduct training in this
domain.