Blackhat 2013

Lessons from Surviving a 300Gbps Denial of Service Attack
Speaker: Matthew Prince, CEO of Cloudflare 
Date: 2016-12-16
Summary: This talk presents how the attackers use DNS open resolver to conduct a DDoS attack of a size larger than 300Gpbs on Spamhaus. The attack is defeated by 
A similar but less technical talk was given by the speaker in Defcon at the same year. 


Million Browser Botnet

Date: 2016-12-18
Summary:  This talk presents how to hack the browser to crack websites.  The attack is conducted by injecting a javascript to the browser of a client. The secret is to use for-loop to request for resources from the victim website using ftp protocol rather than http to break the ceiling limit in the browser. 




[安全论文阅读笔记]Survey on Web Spam Detection: Principles and Algorithms

Date: 2016-12-16

这篇文章发表在SIGKDD Explorations 2013,作者是来自UIUC的 Nikita Spirin 和 Jiawei Han

这篇文章总结了web spam 检测的主要算法分类。主要针对的spam是搜索引擎spam,而非social media spam。

Spam的分类以及技术
1. Content Spam
因为搜索引擎对网页的内容的排名采用TFIDF模型。因此这些spam会在内容里加入一些popular的词,来提高rank。
2. Link Spam
搜索引擎采用page rank来评估网页排名,因此这些spam会通过提高incoming link数量质量来提高目标页面的排名,他们也会通过购买被抛弃的域名来获取有一定reputation的域名。
3. Cloking and Redirection
对于同一个页面,Spammers会根据不同的clients来展示不同的内容。因此对于搜索引擎爬虫,他们可以放比较有利于rank的内容,而对于普通用户,他们可以展示广告内容。

已有的检测方法大概可以分为三类
1. content-based methods
这些方法主要通过分析word counts, language models, HTML页面的结构,clocking score
2. link-based methods
这些方法主要通过分析link构成的图结构的特性,label propagation,Link pruning and reweighting, graph regularization (建议如果有意通过link结构来做检测的同学可以细读具体内容)
3. data-based methods, e.g., user behavior, clicks, HTTP sessions.
这些方法通过Markov model来分析用户行为等

DEFCON 24 in 2016

Karyn Benson – Examining the Internet’s pollution
Relatedness: ****
Date: 2016-12-08
Summary
Analyzing the trash packets on the Internet to find out the attack activity or software bugs. For example, figure out when the attackers are scanning the internet of thing devices. 

Jay Beale and Larry Pesce – Phishing without Failure and Frustration
Relatedness: *
Summary:
It discusses how to conduct phishing test in an enterprise.

Shane Steiger Are You Playing with a Full Deck
Relatedness: *****
Date: 2016-12-08
Summary:
It discusses how the defenders can act to disrupt the attack life-cycle of attackers. This is exactly what the Moving Target Defense (MTD) is. It is important to figure out the attack patterns in order to decide how the defenders can play effectively in breaking the attacks.effectively in breaking the attacks.effectively.effectively

Luke Young – Attacking Network Infrastructure to Generate a 4 Tbs DDoS
Relatedness: ****
Date: 2016-12-09
Summary:
This talk exploits the devices with large uplinks to gain root privileges. Then they can launch huge DDoS attacks by sending HTTP requests to the victims. Note that rather than DNS amplification attack which can be easily blocked by firewall, attack traffics with normal http requests are hard to be blocked.

Lucas Lundgren, Neal Hindocha – Light Weight Protocol: Critical Implications
Relatedness: ***
Date: 2016-12-09
Summary:
This talk discusses the MQTT protocol and how it can be exploited for critical information. In EQTT, each client is subscribed to several queues for different functions. Each client can listen to what other clients are doing. The attackers can easily change the subscriptions of the devices and to control them. For example, the attackers can  issue a software update to the victim devices.
Take away: Please do not expose MTQQ on the internet.

Willa Cassandra Riggins, abyssknight – Esoteric Exfiltration
Relatedness: ****
Date: 2016-12-09
Summary:
This talk discusses how to avoid leaking information via convert channel. It turns out blacklist doesn’t work due to business requirement and the criticalness of context.

Kai Zhong – 411: A framework for managing security alerts
Relatedness: *
Date: 2016-12-09
Status: 20 minutes
Summary: This talk discusses how they enrich the elastic search framework to have the function to create and notify the alerts.

Joshua Drake, Steve Christey Coley – Vulnerabilities 101
Relatedness: **
Date: 2016-12-12
Summary: This talk gives advice and guidance for the newbies on how to do the vulnerability research.

Weston Hecker – Hacking Hotel Keys and Point of Sale Systems
Relatedness: **
Interestingness: *****
Date: 2016-12-12
Summary: This talk introduces how they hack the hotel keys.

Zack Fasel, Erin Jacobs – Attacks Against Top Consumer Products
Relatedness: **
Date: 2016-12-13
Summary: This talk introduces the security issues in blue tooth, cameras.

Dr Phil – Mouse Jiggler: Offense and Defense
Relatedness: **
Date: 2016-12-13
Summary: This talk introduces how to defend against mouse jiggler which the attackers use  to keep your computer in active mode.

Greg Norcie – My Usability Goes to 11 A Hackers Guide to Use
Relatedness: **
Date: 2016-12-13
Summary: This talk discusses the difficulty of usable security. In designing the usable software, cognitive walkthrough is a good way to go.  It is important to be in the customers’ shoes and think about what customers will react on the functionalities. A user case study would be helpful in evaluating the design.

Grant Bugher – Bypassing Captive Portals and Limited Networks
Relatedness: **
Date: 2016-12-14
Summary: This talk discusses how to bypass to reach the restricted networks. These networks are usually set by the owners and require payment for access.

Delta Zero, KingPhish3r – Weaponizing Data Science for Social Engineering
Relatedness: ****
Date: 2016-12-14
Summary: This talk presents a recurrent neural network that learns to tweet phishing posts targeting specific users. The model is trained using spear phishing pen-testing data. In order to make a click-through more likely, it is dynamically seeded with topics extracted from timeline posts of both the target and the users they retweet or follow. The performance is measured using click-through rate.


Clarence Chio – Machine Duping 101: Pwning Deep Learning Systems
Relatedness: ***
Date: 2016-12-14
Summary: This talk presents attacks on the deep learning model by feeding it with adversarial inputs.
It is important to evaluate the robustness of machine learning system to see what will it turns out when someone tries to bypass it.
It also mentioned that in Facebook spam fighting, the spammers try to alter the spam images to bypass detection. Using fuzzy matching would not be enough to cluster similar images together. However, deep learning is a good way to go. In specific, we can train the images using neural networks and compare the 2nd layers to measure the similarities which allow us to neglect some trivial details on the images.

Alex Chapman and Paul Stone – Toxic Proxies: Bypassing HTTPS
Relatedness: **
Date: 2016-12-14
Summary: This talk presents how the attackers can use new techniques to bypass encryption to monitor your search history and take over your online accounts.
The attackers can extract the information from the users’ searching process. Besides, the CDNs’ only serve contents without encryption, though the URLs are often complicated and are difficult to be guessed, whoever get those URLs would be able to access the resources.

Salvador Mendoza – Samsung Pay: Tokenized Numbers, Flaws and Issues
Relatedness: **
Date: 2016-12-14
Summary: This talk presents the attack on Samsung pay.
Background knowledge: when you pay using your card, a token number will be generated which contains service code, transaction id, and a random number.
Flaws: If Samsung generates a token which is not used, it has a blank expiration date.
Attach approach:
1. Social engineering to get the token
2. Use the token to do purchase

告一段落

这周刚投完paper,一下子好茫然。开始寻找下一篇paper的idea,之前有一个一直很想研究的问题,但是还没有想出解决方案。同时心里又很抗拒,觉得不应该这样找idea,而是应该知道重要的问题是什么,去解决重要的问题才有意义。理论研究固然有意义,但是这并不是我所追求,也不是我所能匹及的。读这个博士让我明白的最深的一点,就是要知道自己能做什么,不能做什么。能力之外的事情,花再多力气也是白费。

索性听了一天的歌,自从实习回来就没有怎么听了。听了杰伦的新歌,一下子回忆起暑假在F实习的日子,真美好。好幸运地遇到了很棒的同事,好棒的风景。马上就要毕业了,好期待毕业以后的日子。同时也希望自己能够在这剩下的时间里,多学习一些知识和待人处事,在正式进入职场之前。

Build a Web Proxy in Amazon EC2

Prerequisite:

  • I already have an amazon ec2 instance (ubuntu) running in the cloud
What I do:
  • I choose to install tinyproxy
    • command: sudo apt-get install tinyproxy
  • Setup the IP you allowed for using the proxy
    • sudo vim /etc/tinyproxy.conf
    • unfortunately, tinyproxy does not support user authentication with username and password
  • Restart tinyproxy
    • sudo /etc/init.d/tinyproxy restart
  • Then you can setup your chrome to use the web proxy
    • it requires the IP address of your amazon ec2 instance and port (tinyproxy default port 8888) in setting up the web proxy
Comments:

  • With this proxy, you will be able to have free internet even if you are in a country with Internet censorship

Security Blogs Lists

From: https://jaq.alibaba.com/community/art/show?articleid=601

1、We Live Security
简介:主要研究网络威胁和恶意软件。
文章更新频率:9篇/周
2、Intel Security | McAfee Blogs
简介:麦咖啡的安全博客。
文章更新频率:88篇/周
3、Krebs on Security
简介:Brian Kerbs的个人博客,致力于调查网络犯罪和计算机安全。
文章更新频率:4篇/周
4、Dark Reading
简介:Dark Reading提供了网络安全热点新闻和攻击,漏洞攻击分析,以及企业数据的保护策略。
文章更新频率:29篇/周
5、Schneier on Security
简介:Bruce Schneier的个人博客,一位国际知名的安全技术专家和作家。
文章更新频率:9篇/周
6、Threatpost
简介:卡巴斯基实验室推送世界各地的安全新闻、技术分析、人物访谈的首发博客平台。
文章更新频率:18篇/周
7、Naked Security
简介:提醒用户关于各种各样的电脑安全威胁,包括最新的Facebook诈骗和流氓行为。
文章更新频率:18篇/周
8、Google Online Security Blog
简介:谷歌在互联网安全的新闻和见解。
文章更新频率:3篇/周
9、Graham Cluley
简介:反病毒专家Graham Cluley的个人博客。
文章更新频率:17篇/周
10、Infosecurity Magazine – Information Security & IT Security
简介:致力于信息安全的策略、行业洞察、技术研究。
文章更新频率:29篇/周
11、CSO Online
简介:提供一系列安全与风险管理的新闻、分析和研究主题。重点领域包括信息安全、数据保护、社会媒体安全、社会工程、安全意识等。
文章更新频率:50篇/周

12、Symantec Connect – Security Response
简介:提供防止恶意软件、安全漏洞、垃圾邮件的研究分析等内容。
文章更新频率:63篇/周

13、Security Affairs
简介:Pierluigi Paganini的个人博客,一个道德黑客,安全传道者和分析师。他还会定期采访黑客。
文章更新频率:29篇/周

14、CIO Security
简介:主要提供数据泄露和互联网威胁的安全新闻、技术分析、行业洞察等内容。
文章更新频率:32篇/周

15、ZoneAlarm Blog
简介:提供网络安全新闻、威胁和安全实践。ZoneAlarm是一款防火墙和杀毒软件。
文章更新频率:1篇/周

16、Troy Hunt
简介:Troy Hunt的个人博客,他是微软-澳大利亚地区主管,他也是许多网络安全课程的最高评级作者。
文章更新频率:3篇/周

17、Speaking of Security – The RSA Blog and Podcast
简介:云安全及网络攻防的安全博客。
文章更新频率:4篇/周

18、Help Net Security
简介:提供日常信息安全新闻。
文章更新频率:30篇/周

19、Paul’s Security Weekly
简介:主要提供安全新闻、漏洞分析、黑客行为研究等内容。
文章更新频率:4篇/周

20、Zero Day | ZDNet
简介:提供最新的软件/硬件安全研究、漏洞分析、安全威胁和网络攻击等内容。
文章更新频率:11篇/周

21、PayPal Stories
简介:PayPal官方博客平台,提供安全支付等相关的安全内容。
文章更新频率:1篇/周

22、Security on TechRepublic
简介:提供了众多的安全行业资源,如安全博客、技术论文和安全数据。
文章更新频率:5篇/周

23、Cybersecurity – Microsoft Secure Blog
简介:微软官方安全博客,深入探讨网络安全和技术趋势的影响,提供安全新闻,趋势分析和实际的安全指导。
文章更新频率:1篇/月

24、Cisco Blog | Security
简介:思科官方安全博客。
文章更新频率:6篇/周
25、Threat Level | WIRED
简介:WIRED杂志是美国著名的网络电子类杂志,反映电脑技术应用于现代和未来人类生活的各个方面。
文章更新频率:3篇/周
26、SANS Institute Security Awareness Tip of the Day
简介:每天SANS会发布一个新的提示,关注并解释一个特定的主题,人们可以采取可行的步骤来保护自己,他们的家庭和他们的组织。
文章更新频率:7篇/周

27、Data and computer security | The Guardian
简介:《卫报》是英国的全国性综合内容日报。这是其数据和计算机安全版块。
文章更新频率:2篇/周

28、Forbes – Security
简介:提供最新的网络安全资讯。
文章更新频率:32篇/周

29、Techworld – Security
简介:Techworld是商业技术行业的领导者,由IDG出版。其安全部分致力于分析最新的恶意软件威胁和0day漏洞。
文章更新频率:1篇/月

30、Connected – Official Blog of Connection, Inc.
简介:Stephen Nardone的个人博客,Stephen Nardone是一名安全主管,有34年在政府和商业方面业务安全的工作经验。
文章更新频率:5篇/周