SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
SocialNetworkingSecurity
&
BackdooringEmail
Presented by 	

Syarif	

!
Seminar & Workshop Nasional Security System	

Malang, Juni 5 2011	

Universitas Muhammadiyah Malang
• http://www.google.com/search?
q=fl3xu5	

• http://fl3x.us
Whoami
Agenda
• Social Networking ?	

• Social Networking :Attacks & Defense	

• Backdooring Email 	

• There is No Privacy anymore :) 	

• How to protect your self
Social Networking ?
Facebook Statistics
Twitter Statistics
Facebook & twitter attack
Facebook & twitter attack
• Phishing
Facebook & twitter attack
• Session Hijacking	

• Firesheep
facebook & twitter defense
• Be a paranoid & don’t trust anyone on the internet	

• Never put some sensitive information carelessly	

• Keep your eyes, Always check the correct url 	

• Never Subscribe unauthorized applications	

• Always remember, wireless is not secure. Keep “safety” browsing :p	

• Always using https	

• etc
Email attack : Backdooring Email ;)
• Why ?	

• Email is very important	

• as a communication media	

• Email is a privacy 	

• Everything using email	

• User account : facebook, twitter, etc	

• Passwords	

• paypal account 	

• domain & hosting account
Email attack : Backdooring Email ;)
• Motivation ?	

• Just for fun :)	

• Jealous / Revenge	

• Get important data	

• Get Final Exam Task & Answer :p	

• Spy	

• Scamming	

• Money reason : paypal, etc	

• Domain & hosting take over
Email attack : Backdooring Email ;)
• Prelinimary ?	

• Social Engineering	

• password obtained by hacking other websites ~ one password for all
Backdooring Email ?Yes you can ;)
• Using what ? 	

• Why ?	

• most people using it	

• easy to use	

• could be used to impersonate :p	

• high capacity mailbox	

• 10 more accounts could be backdoored in one mailbox	

• no need to log in the target mailbox	

• could be used to backdoor all of mail accounts in some mail server :)
Demo
thereisnoprivacyanymore
someoneiswatchingyou
!
How to ProtectYourself ?
• Always Check Last Log in your email	

• Never put some sensitive information carelessly	

• Be a Paranoid, check the flag messages in your email 	

• Keep on your eyes to check mail in the inbox, sent, draft , and trash	

• Always keep your correct mail setting 	

• Never use “one password for all” :p	

• Changer your mail password regularly	

• don’t use a “weak” security question
Q & A
• twitter : fl3xu5	

• YM : fl3xu5
Thank you :)

Contenu connexe

Tendances

Communication
CommunicationCommunication
Communicationkrmartens
 
Top 10 microblogging tools
Top 10 microblogging toolsTop 10 microblogging tools
Top 10 microblogging toolsiumstech
 
An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!Joyce C. Arias
 
Twitter General Basics June 2009
Twitter General Basics June 2009Twitter General Basics June 2009
Twitter General Basics June 2009mollysly
 
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDUTwitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDUJoshua Murdock
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 

Tendances (12)

Communication
CommunicationCommunication
Communication
 
Slideshare
SlideshareSlideshare
Slideshare
 
Hacking
HackingHacking
Hacking
 
Top 10 microblogging tools
Top 10 microblogging toolsTop 10 microblogging tools
Top 10 microblogging tools
 
An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!
 
Cel1
Cel1Cel1
Cel1
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
Twitter General Basics June 2009
Twitter General Basics June 2009Twitter General Basics June 2009
Twitter General Basics June 2009
 
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDUTwitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
Twitter: Not just about Miley Cyrus and Weird #hashtags #FLBlogConEDU
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Twitter for teachers
Twitter for teachersTwitter for teachers
Twitter for teachers
 
Go Incognito!
Go Incognito!Go Incognito!
Go Incognito!
 

En vedette (7)

iCrOSS 2013_Pentest
iCrOSS 2013_PentestiCrOSS 2013_Pentest
iCrOSS 2013_Pentest
 
IPTV Security
IPTV SecurityIPTV Security
IPTV Security
 
Prepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec ProfessionalPrepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec Professional
 
My pwk & oscp journey
My pwk & oscp journeyMy pwk & oscp journey
My pwk & oscp journey
 
Information gath
Information gathInformation gath
Information gath
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
Wireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek KominfoWireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek Kominfo
 

Similaire à Social Network Security & Backdooring email

Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social changeBill Chea
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safetybenlangley-efc
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag501 Commons
 
WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 stk_jj
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptxMumara Campaigns
 
Internet and Social Media for Beginners
Internet and Social Media for BeginnersInternet and Social Media for Beginners
Internet and Social Media for Beginnersbecarreno
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Social media security
Social media securitySocial media security
Social media securityMosoco Ltd
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Homezaimorkai
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 

Similaire à Social Network Security & Backdooring email (20)

Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
 
WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020
 
Phishing
PhishingPhishing
Phishing
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx
 
Internet and Social Media for Beginners
Internet and Social Media for BeginnersInternet and Social Media for Beginners
Internet and Social Media for Beginners
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Social media security
Social media securitySocial media security
Social media security
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 
Phishing
PhishingPhishing
Phishing
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Tablets, Apps and Cybersecurity
Tablets, Apps and CybersecurityTablets, Apps and Cybersecurity
Tablets, Apps and Cybersecurity
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 

Dernier

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 

Dernier (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Social Network Security & Backdooring email

  • 1. SocialNetworkingSecurity & BackdooringEmail Presented by Syarif ! Seminar & Workshop Nasional Security System Malang, Juni 5 2011 Universitas Muhammadiyah Malang
  • 3. Agenda • Social Networking ? • Social Networking :Attacks & Defense • Backdooring Email • There is No Privacy anymore :) • How to protect your self
  • 8. Facebook & twitter attack • Phishing
  • 9. Facebook & twitter attack • Session Hijacking • Firesheep
  • 10. facebook & twitter defense • Be a paranoid & don’t trust anyone on the internet • Never put some sensitive information carelessly • Keep your eyes, Always check the correct url • Never Subscribe unauthorized applications • Always remember, wireless is not secure. Keep “safety” browsing :p • Always using https • etc
  • 11. Email attack : Backdooring Email ;) • Why ? • Email is very important • as a communication media • Email is a privacy • Everything using email • User account : facebook, twitter, etc • Passwords • paypal account • domain & hosting account
  • 12. Email attack : Backdooring Email ;) • Motivation ? • Just for fun :) • Jealous / Revenge • Get important data • Get Final Exam Task & Answer :p • Spy • Scamming • Money reason : paypal, etc • Domain & hosting take over
  • 13. Email attack : Backdooring Email ;) • Prelinimary ? • Social Engineering • password obtained by hacking other websites ~ one password for all
  • 14. Backdooring Email ?Yes you can ;) • Using what ? • Why ? • most people using it • easy to use • could be used to impersonate :p • high capacity mailbox • 10 more accounts could be backdoored in one mailbox • no need to log in the target mailbox • could be used to backdoor all of mail accounts in some mail server :)
  • 15. Demo
  • 18. How to ProtectYourself ? • Always Check Last Log in your email • Never put some sensitive information carelessly • Be a Paranoid, check the flag messages in your email • Keep on your eyes to check mail in the inbox, sent, draft , and trash • Always keep your correct mail setting • Never use “one password for all” :p • Changer your mail password regularly • don’t use a “weak” security question
  • 19. Q & A • twitter : fl3xu5 • YM : fl3xu5