Académique Documents
Professionnel Documents
Culture Documents
vs
Cybercrime Trends
by:
Raditya Iryandi
Disclaimer
Disclaimer
This presentation is intended to
demonstrate the inherent security,
design and configuration flaws in
publicly accessible network, satellite
communication networks and
promote the use of safer Information
Technology systems. Viewers and
readers are responsible for their own
actions and strongly encourage to
behave themselves. No any
documenting allowed during this
session.
Who
the
hack is
Radit?
Who the Hack is Radit?
Who the Hack is Radit?
SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES
INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
Who the Hack is Radit?
SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES
INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
Who the Hack is Radit?
SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES
INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
Who the Hack is Radit?
ON THE
SATELLITE
RESEARCH
LANDSCAPE
Cracker
vs
Hacker
Cracker vs Hacker
Cracker:
Destructive
Stupid
Foo
Cracker vs Hacker
Hacker:
Creative and
Out of The Box
Lucky Bastard
Indonesian
Cybercrime
Trends
Cybercrime TRENDS
1. KEPO
Knowing Every
Particular Objects
Cybercrime TRENDS
Personal
Information via
direct contact and
social media
(social engineering)
Cybercrime TRENDS
[DEMO]
Hack Technique
2. Password
Cracking
Cybercrime TRENDS
#selfie
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
4. Packet
Sniffer
Cybercrime TRENDS
To
Internet
Cybercrime TRENDS
To
Internet
Cracker
sniff
Facebook
password
Target
Using
Facebook
Hack Technique
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Internet of
Things (ioT)
removed due to credential reasons
Network Guard Trend(s)
Trend Analysis
Honeypod
Diff
Q&A
raditya@iryandi.net