Verizon Fios Tech Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 21 May 2013

Hackers that solve problems...

Posted on 23:25 by Unknown
The nation and the world at large are struggling to come to grips with the fact that we are now more than ever vulnerable in our daily lives to adversarial actions in cyberspace.   Digital Operatives has been working in computer/network/cyber security focused engagements since 2005.  Those engagements have included penetration testing, source code auditing, cyber technology development, advanced technology research and development, and just good old fashioned technology hacking.  It's rather hard to believe it has been so long, but as a company, we've learned so many things along the way.  Specifically in this upcoming series of posts, I hope to share some insights with the community into what we've learned as a team, and how the worldwide community in general may better respond to these structural and fundamental vulnerabilities in the current and future digital age.

Having a more effective strategy:

In many client engagements we are asked for advice on best practice security measures that can help counter adversarial threats.  As hackers, we tend to chuckle a little inside, because the best practice security measures simply don't work.  Best practices may offer solace to CIO's and CSO's that need to feel like they are doing something, but strategically speaking, best practice makes you an easy to defeat target of opportunity.

This is why it is so important to think like hackers during these engagements and help the customer understand that strategic and asymmetric thinking are key aspects of successfully defending a computer system and network.   We currently are developing and selling technologies specifically cultured around this asymmetric and strategic thought process.

Take PAINT (Process Attribution In Network Traffic) as an example.  The idea for PAINT came to me one evening in November 2011.  I had recently been analyzing malware communications protocols and infrastructure and had thought to myself that it seemed ridiculous that none of the current network packet analyzers that I knew about or had worked with were able to discern the source or destination of a packet on a system.  At first, it seemed obvious to me that people were already doing this analysis manually.  I, in fact, have many times run the "netstat -ano" command since the release of Windows XP to see which process was handling packets on which ports.  We decided to submit the idea to DARPA's Cyber Fast Track on the basis that it would require research into what was actually possible (beyond the notion of correlating netstat output to Wireshark).

Believe it or not,  the idea seemed so obvious, that the initial response was rather muted.  Once we started to get the prototype working, the government, as our primary customer for PAINT, started to realize how cool the capability actually was.  We believe this is largely due to the fact that, for a rather small investment, a radically more effective and efficient way to conduct malware analysis and network attribution was born.

This is one part of what we do at Digital Operatives.  We develop low-cost, high-payoff technologies that help to radically change the game.  We like using creativity and innovation when advising clients, because at the end of the day, thinking strategically in this age is the only way to be successful.

Trust me your adversaries are thinking that way.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Free Blogger Opp – Timjan Design Malachite 5/1
    Here comes another Visionary Bri blogger opportunity. Sign up now for the Timjan Bloomers Giveaway. Our sponsor, Timjan Design , has offered...
  • Problems with new version of rpmbuild
    The Problem With the new version of rpmbuild installed on CentOS 6.x, if you try to use an old RPM spec file, you will get an error like the...
  • Installing the Android SDK
    These instructions refer to a Ubuntu 12.04.1 LTS system running on an Intel processor. Head to the developer.android.com web site and downl...
  • Meeting The Tate's
       Hello, we are Cody and Aimee Tate. We live in Florida and have been married for 3 years. Recently we have decided to start doing product ...
  • How to Cross-Compile libiconv for Android
    If your legacy C/C++ code includes <iconv.h> to convert the encoding of characters from one coded character set to another, and you ne...
  • Python For Android (Py4A)
    A better solution for cross-compiling Python for Android is to use the Py4A project which is made to be used together with SL4A (Scripting L...
  • Free Blogger Op Getting Ready for Summer Giveaway
    Hosted by:   NYSavingSpecials   and  Your Fashion Resource Come and join us on this great giveaway "Getting ready for Summer" We w...
  • PAINT released to the public for Research Purposes Only
    Digital Operatives is proud to release to the public for Research Purposes Only, a beta version of PAINT, Process Attribution In Network Tra...
  • How to compile busybox with Android NDK for both ARM and x86 architectures
    I was looking for a way to run busybox on a Motorola RAZRi with an x86 Intel Atom processor but I couldn't find any Android app from th...
  • DermOrganics Review
    "DermOrganic ®  products are made using ingredients that are synergistic to your hair and skin to replenish from the outside what your ...

Categories

  • amazon
  • amazon.com
  • Android
  • Apple
  • Arduino
  • ARM
  • baby
  • baby reviews
  • back to school
  • beef jerky
  • bicycle. wagon
  • bike
  • Blanket Buddies
  • blogging
  • Blogging with The Tate's
  • books
  • busybox
  • camera
  • camera giveaway
  • candle giveaway
  • candles
  • CaseApp
  • CentOS
  • coffee
  • david haskell
  • dermorganic
  • DHCP
  • digital camera
  • events
  • Florida
  • Fortran
  • free blogger giveaway
  • free blogger sign-ups
  • full of flavor
  • giveaways
  • GNU
  • GPON
  • hair care
  • happy husband
  • Hot tea
  • Husband and Wife perspective
  • iMac
  • ipad
  • iphone
  • iphone case
  • iphone case review
  • Javascript
  • Keurig Coffee Review
  • Keurig Review
  • Kindle
  • ksh
  • LifeProof iPhone Case Review
  • Linux
  • MacOSX
  • Malachite Bloomers
  • man and women perspective
  • meat
  • Mips
  • Network
  • Pretzel Crisps
  • Pretzels
  • product reviews
  • products
  • Python
  • Router
  • scentsy
  • scentsy candles
  • school
  • scooter
  • security system
  • skin care
  • snacks
  • sony
  • sony cyber-shot
  • Stuff Animal
  • suface pro
  • Summer
  • summer fun
  • surface pro giveaway
  • techno thriller
  • Timjan Design
  • too much information
  • UNIX
  • vegan
  • vegan products
  • verizon
  • verizon fios
  • VitaminsBaby
  • waterproof case
  • Windows
  • x86
  • yummy

Blog Archive

  • ▼  2013 (41)
    • ►  November (2)
    • ►  October (2)
    • ►  September (3)
    • ►  August (3)
    • ►  July (2)
    • ►  June (2)
    • ▼  May (6)
      • Landmine - Advanced Clandestine Defensive System
      • VitaminsBaby.com- Blankie Buddy Review/Giveaway
      • Hackers that solve problems...
      • Scentsy Wickless Candles Review/Giveaway
      • How to compile libogg for Android
      • Surface Pro Giveaway
    • ►  April (8)
    • ►  March (2)
    • ►  February (5)
    • ►  January (6)
  • ►  2012 (17)
    • ►  December (3)
    • ►  November (4)
    • ►  October (8)
    • ►  July (1)
    • ►  June (1)
Powered by Blogger.

About Me

Unknown
View my complete profile