Verizon Fios Tech Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 21 May 2013

Hackers that solve problems...

Posted on 23:25 by Unknown
The nation and the world at large are struggling to come to grips with the fact that we are now more than ever vulnerable in our daily lives to adversarial actions in cyberspace.   Digital Operatives has been working in computer/network/cyber security focused engagements since 2005.  Those engagements have included penetration testing, source code auditing, cyber technology development, advanced technology research and development, and just good old fashioned technology hacking.  It's rather hard to believe it has been so long, but as a company, we've learned so many things along the way.  Specifically in this upcoming series of posts, I hope to share some insights with the community into what we've learned as a team, and how the worldwide community in general may better respond to these structural and fundamental vulnerabilities in the current and future digital age.

Having a more effective strategy:

In many client engagements we are asked for advice on best practice security measures that can help counter adversarial threats.  As hackers, we tend to chuckle a little inside, because the best practice security measures simply don't work.  Best practices may offer solace to CIO's and CSO's that need to feel like they are doing something, but strategically speaking, best practice makes you an easy to defeat target of opportunity.

This is why it is so important to think like hackers during these engagements and help the customer understand that strategic and asymmetric thinking are key aspects of successfully defending a computer system and network.   We currently are developing and selling technologies specifically cultured around this asymmetric and strategic thought process.

Take PAINT (Process Attribution In Network Traffic) as an example.  The idea for PAINT came to me one evening in November 2011.  I had recently been analyzing malware communications protocols and infrastructure and had thought to myself that it seemed ridiculous that none of the current network packet analyzers that I knew about or had worked with were able to discern the source or destination of a packet on a system.  At first, it seemed obvious to me that people were already doing this analysis manually.  I, in fact, have many times run the "netstat -ano" command since the release of Windows XP to see which process was handling packets on which ports.  We decided to submit the idea to DARPA's Cyber Fast Track on the basis that it would require research into what was actually possible (beyond the notion of correlating netstat output to Wireshark).

Believe it or not,  the idea seemed so obvious, that the initial response was rather muted.  Once we started to get the prototype working, the government, as our primary customer for PAINT, started to realize how cool the capability actually was.  We believe this is largely due to the fact that, for a rather small investment, a radically more effective and efficient way to conduct malware analysis and network attribution was born.

This is one part of what we do at Digital Operatives.  We develop low-cost, high-payoff technologies that help to radically change the game.  We like using creativity and innovation when advising clients, because at the end of the day, thinking strategically in this age is the only way to be successful.

Trust me your adversaries are thinking that way.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to compile busybox with Android NDK for both ARM and x86 architectures
    I was looking for a way to run busybox on a Motorola RAZRi with an x86 Intel Atom processor but I couldn't find any Android app from th...
  • Security and Trust when Everything has a Computer In It
    Security and Trust when Everything has a Computer In It Recently, Panic Software announced that they had opened up an HDMI display adapter ...
  • Sony Cyber-shot DSC-HX200V 18.2 MP 30 x High Zoom GPS Digital Camera - BLACK
    Sony Cyber-shot DSC-HX200V 18.2 MP 30 x High Zoom GPS Digital Camera - BLACK Blogger Opportunity Giveaway from June 17 to  July 12 Come and ...
  • Free Blogger Opp – Timjan Design Malachite 5/1
    Here comes another Visionary Bri blogger opportunity. Sign up now for the Timjan Bloomers Giveaway. Our sponsor, Timjan Design , has offered...
  • Hackers that solve problems...
    The nation and the world at large are struggling to come to grips with the fact that we are now more than ever vulnerable in our daily lives...
  • How to build Python-4-Android for the ARM Neon
    Currently the Py4A project does not compile for the ARM Neon architecture. If you try to run ndk-build on the project by setting the APP_A...
  • How to Cross-Compile libiconv for Android
    If your legacy C/C++ code includes <iconv.h> to convert the encoding of characters from one coded character set to another, and you ne...
  • How to compile libogg for Android
    To compile libogg for Android, you just need to create an appropriate jni/Android.mk makefile with the minimum set of files and options need...
  • Problems with new version of rpmbuild
    The Problem With the new version of rpmbuild installed on CentOS 6.x, if you try to use an old RPM spec file, you will get an error like the...
  • Sony Cyber-shot DSC-HX200V Giveaway
    Hosted by: NYSavingSpecials and Your Fashion Resource ,  Co-hosted by Melissa Say What? ,  Barbara's Beat ,  LibbysLibrary ,  Confessio...

Categories

  • amazon
  • amazon.com
  • Android
  • Apple
  • Arduino
  • ARM
  • baby
  • baby reviews
  • back to school
  • beef jerky
  • bicycle. wagon
  • bike
  • Blanket Buddies
  • blogging
  • Blogging with The Tate's
  • books
  • busybox
  • camera
  • camera giveaway
  • candle giveaway
  • candles
  • CaseApp
  • CentOS
  • coffee
  • david haskell
  • dermorganic
  • DHCP
  • digital camera
  • events
  • Florida
  • Fortran
  • free blogger giveaway
  • free blogger sign-ups
  • full of flavor
  • giveaways
  • GNU
  • GPON
  • hair care
  • happy husband
  • Hot tea
  • Husband and Wife perspective
  • iMac
  • ipad
  • iphone
  • iphone case
  • iphone case review
  • Javascript
  • Keurig Coffee Review
  • Keurig Review
  • Kindle
  • ksh
  • LifeProof iPhone Case Review
  • Linux
  • MacOSX
  • Malachite Bloomers
  • man and women perspective
  • meat
  • Mips
  • Network
  • Pretzel Crisps
  • Pretzels
  • product reviews
  • products
  • Python
  • Router
  • scentsy
  • scentsy candles
  • school
  • scooter
  • security system
  • skin care
  • snacks
  • sony
  • sony cyber-shot
  • Stuff Animal
  • suface pro
  • Summer
  • summer fun
  • surface pro giveaway
  • techno thriller
  • Timjan Design
  • too much information
  • UNIX
  • vegan
  • vegan products
  • verizon
  • verizon fios
  • VitaminsBaby
  • waterproof case
  • Windows
  • x86
  • yummy

Blog Archive

  • ▼  2013 (41)
    • ►  November (2)
    • ►  October (2)
    • ►  September (3)
    • ►  August (3)
    • ►  July (2)
    • ►  June (2)
    • ▼  May (6)
      • Landmine - Advanced Clandestine Defensive System
      • VitaminsBaby.com- Blankie Buddy Review/Giveaway
      • Hackers that solve problems...
      • Scentsy Wickless Candles Review/Giveaway
      • How to compile libogg for Android
      • Surface Pro Giveaway
    • ►  April (8)
    • ►  March (2)
    • ►  February (5)
    • ►  January (6)
  • ►  2012 (17)
    • ►  December (3)
    • ►  November (4)
    • ►  October (8)
    • ►  July (1)
    • ►  June (1)
Powered by Blogger.

About Me

Unknown
View my complete profile