Vous êtes sur la page 1sur 48

SOC

vs
Cybercrime Trends

by:
Raditya Iryandi
Disclaimer

Disclaimer
This presentation is intended to
demonstrate the inherent security,
design and configuration flaws in
publicly accessible network, satellite
communication networks and
promote the use of safer Information
Technology systems. Viewers and
readers are responsible for their own
actions and strongly encourage to
behave themselves. No any
documenting allowed during this
session.
Who
the
hack is
Radit?
Who the Hack is Radit?
Who the Hack is Radit?

SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES

INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
Who the Hack is Radit?

SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES

INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
Who the Hack is Radit?

SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES

INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
Who the Hack is Radit?
ON THE
SATELLITE
RESEARCH
LANDSCAPE
Cracker
vs
Hacker
Cracker vs Hacker

Cracker:
Destructive
Stupid
Foo
Cracker vs Hacker

Hacker:
Creative and
Out of The Box
Lucky Bastard
Indonesian
Cybercrime
Trends
Cybercrime TRENDS

1. KEPO
Knowing Every
Particular Objects
Cybercrime TRENDS

Personal
Information via
direct contact and
social media
(social engineering)
Cybercrime TRENDS

[DEMO]
Hack Technique

2. Password
Cracking
Cybercrime TRENDS

name, date of birth,


kids name or
PRODUCT NAME
Cybercrime TRENDS

removed due to credential reasons


Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS

#selfie
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS

removed due to credential reasons


Cybercrime TRENDS
iCloud Nude Leaks: 26 Celebrities
Affected In The Nude Photo
Scandal
Cybercrime TRENDS

4. Packet
Sniffer
Cybercrime TRENDS

To
Internet
Cybercrime TRENDS

To
Internet

Cracker
sniff
Facebook
password
Target
Using
Facebook
Hack Technique
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS

Perdaganan user/pass social media


Cybercrime TRENDS
Cybercrime TRENDS

Internet of
Things (ioT)
removed due to credential reasons
Network Guard Trend(s)

Firewall Reversed back connection

Positive / Negative False Alarm


IDS/IPS Encrypted Traffic
Rule Management
Transparent /
SDM
Hybrid
SOC State of the Art

Trend Analysis

Honeypod

Diff
Q&A

raditya@iryandi.net

Vous aimerez peut-être aussi