1 / 20

Team Introduction

Cyber security findings from Hacker Web and Shodan. by Agarwal, Sidharth ; Jain, Anshul; K, Sharan Babu; Solanki, Ankur. Team Introduction. Find 4-6 Research Questions Literature Review including prior work about the Research A rea

keala
Download Presentation

Team Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber security findings from Hacker Web and Shodan by Agarwal, Sidharth; Jain, Anshul; K, Sharan Babu; Solanki, Ankur Team Introduction

  2. Find 4-6 Research Questions Literature Review including prior work about the Research Area Support Research area with the help of Data from Hacker Web or Shodan or both Use Visualizations and analysis to support research findings Project Introduction

  3. To learn the trends for Malwares on different Mobile platforms such as: IOS Android Windows Phone Research Question 1

  4. 13% of smartphone users have Antivirus . 90% of mobile devices most likely will have Wi-Fi by 2015 Compared to Desktops, Users are 30% more likely to click on an unsafe link on mobile device. mobile OS especially Android has become a playground for mobile users and malware writers alike. Introduction to Question 1

  5. 2012 marked the first year that smartphones had out-sold all other computers combined (Web 3.0) Multiple distribution methods available to applications embedded with malware make it the go-to platform of malware authors. Number of mobile malware apps in 2005: 52, 2010: 2500, 2020 projection: 120,000 malware apps Similar to the computing world, there is a clear link between market leadership and the attention of cybercriminals Literature Review 1

  6. Collections: Data is obtained by querying 5 English forums (Hackhound, elitehack, icode,anon and vctool) available in HackerWeb. We have retrieved 12 columns by using SQL Used Search string ‘%iOS%’ have been replaced with ‘%android%’ and ‘%windows phone%’ to get appropriate details Analytics : We have analysed on total posts for each mobile OS across timeline and found that IOS is the most discussed OS. Research Design and Analytics

  7. Distribution of open routers throughout the world, across ISPs and organizations within the country. Research Question 2

  8. Wireless router hacking is a well established niche Linux-powered firmware for a wide range of wireless routers, which wouldn't necessarily get updated otherwise Malicious firmware resides on the router even if users secure their computer, their data still gets stolen Introduction to Question 2

  9. Serious security failings in home routers are getting more attention from both attackers and researchers Attackers exploit the vulnerability in home routers to download a configuration file without authentication Attackers then change the DNS configuration of vulnerable home routers to conduct man-in-the-middle attacks on a large scale 40 malicious DNS servers to attack 4.5 million Brazilian DSL modems, with the goal of stealing bank and credit card information. Literature Review 2

  10. Collection Python API is used to fetch data relevant to open routers from Shodan. Substantial information related to 10,000 routers was fetched Analytics We have analysed no. of open routers across countries we drilled down to the country with maximum no. of open routers i.e. China and then found the ISP that provides services for each router (IP) Research Design and Analytics

  11. Why does Germany has major percentage of vulnerable Raspberry Pi equipped devices in the world ? Research Question 3

  12. Raspberry Pi is an ARM GNU / Linux box or a credit card size mini computer that can be plugged in to a TV using an HDMI cable then to your USB type of keyboard and mouse It is also used by enthusiasts out there as a penetration testing box by installing Ubuntu/Debian/Kali Linux and a couple of tools for information gathering Originally not allowed for sales in Germany but from cyber database data it has been observed that at the same time, most number of devices were present in Germany Why were people in Germany so curious about this device? What are the activities happening in Germany that make use of this device? Introduction to Question 3

  13. Scores of websites and YouTube videos show how to use the Linux-based embedded boards to do everything from water your lawn to power your next Halloween costume. Pi may not be the most open source single board computer available, there are infinitely creative as well as malicious ways people can use it Raspberry Pi hacking by: magikh0e –This article explains steps on how to tweak and program Raspberry Pi to turn it into a manipulative device Literature Review 3

  14. Collection Python API is used to fetch data relevant to devices equipped with Raspberry Pi from Shodan. Substantial information related to these devices in different geographic location has been obtained Analytics: Tableau has been used to analyse the obtained data. We found that Germany has 22.35% vulnerable devices made of Raspberry Pi. Research Design and Analytics

  15. Which among the 5 given IoT devices is the most vulnerable and top 3 countries where these devices are located ? Research Question 4

  16. The Internet of Things (IoT) refers to uniquely identifiable objects and their virtual representations in an Internet-like structure. . Using RFID, the tagging of things may be achieved through such technologies as NFC, barcodes, QR codes and digital watermarking. The 5 devices that have been taken into consideration are: a) Refrigerator, b) Toaster, c) Dreambox, d) Television, e) Web Camera. The reason behind choosing these devices is the extent of their usage and their exposed vulnerability in the hacker world. IoT is the inevitable future, hence learning about the vulnerabilities is highly important Introduction to Question 4

  17. Vulnerability and security – This article discusses cyber-attacks performed on Internet of Thing devices, and how they are guaranteed to provide additional real life problems and not just information troubles.(https://usbusiness.kaspersky.com/internet-of-things-vulnerability-and-security/) As Internet of Things grows, only 4% of UK Consumers trust App Developers with personal data It contains an info-graphic showing the shift in perception about risk and privacy as the world becomes increasingly connected Literature Review 4

  18. Collectibles Python API was used to find details on five IoT(Internet of Things) devices from Shodan. Substantial information related to these devices i.e. 32,091 installed in different geographic location has been obtained. We used Regular expressions to clean and pre-process data and to apply further analysis, we have used excel to store data. Analytics Analysis is done to find which country has maximum vulnerable Internet of Things analysis is done across equipment’s and we found that DreamBox has maximum no. of vulnerable IPs Research Design and Analytics

  19. The research that has been conducted isn’t absolute but we have shared our possible findings and statistical insights. Thanks! Conclusion

  20. Why You Should Care About Mobile Security: http://blog.veracode.com/2012/10/why-you-should-care-about-mobile-security-infographic/ IT Threat Evolution: Q3 2012: https://www.securelist.com/en/analysis/204792250/IT_Threat_Evolution_Q3_2012 CERT POLSKA detected large-scale DNS hacking on home routers: http://securityaffairs.co/wordpress/22081/cyber-crime/cert-polska-detected-large-scale-dns-hacking-home-routers.html Top Wi-Fi routers easy to hack, says study:http://news.cnet.com/8301-1009_3-57579981-83/top-wi-fi-routers-easy-to-hack-says-study/ Backdoor LISTENING ON THE INTERNET confirmed: https://github.com/elvanderb/TCP-32764 PentestingDistributions and Installer Kits for your Raspberry Pi: http://resources.infosecinstitute.com/pentesting-distributions-and-installer-kits-for-your-raspberry-pi/ http://en.wikipedia.org/wiki/Internet_of_Things References

More Related