Marc Ruef

Marc Ruef
scip AG · Research Department

About

134
Publications
50,064
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
50
Citations
Introduction
Marc Ruef is active in cybersecurity since the late 1990s. He is well-known for his many publications and books. The last one called "The Art of Penetration Testing" is discussing security testing in detail. He is a lecturer at several universities, like ETH, HWZ, HSLU, and IKF.
Additional affiliations
November 2019 - present
Lucerne University of Applied Sciences and Arts
Position
  • Lecturer
Description
  • Teaching cybersecurity at different courses. My lectures are focusing on Cybercrime, Darknet, Malware, Exploits, Internet of Things (IoT), and Cyber Threat Intelligence (CTI).
April 2017 - present
ETH Zurich
Position
  • Lecturer
Description
  • Guest lecture about the latest research results in the field of Cybersecurity, Darknet, Exploits, Malware Development and Cyber Threat Intelligence
December 2017 - present
Institute of Communication & Leadership
Institute of Communication & Leadership
Position
  • Lecturer
Description
  • Teaching in a course for cybersecurity. My lectures are focusing on Cybercrime, Darknet, Malware, Exploits, Internet of Things (IoT), and Cyber Threat Intelligence (CTI).

Publications

Publications (134)
Chapter
Full-text available
No trust, no use? Oft wird Vertrauen als kritischer Erfolgsfaktor propagiert, wenn es um die Nutzung von neuen Technologien geht, vor allem wenn es sich um intelligente Systeme, sogenannte KI (Künstliche Intelligenz) handelt. Diese finden nämlich immer mehr Eingang in die heutige Gesellschaft, sowohl im privaten (z. B. Einkaufen mit Amazons KI-basi...
Article
Full-text available
There are different ways to develop voice user interfaces. People without programming skills can use Voiceflow to develop their first voice project. Voiceflow is suitable for simple and more complicated voice projects. It can be used for Alexa Skills and Google Actions.
Article
Full-text available
Voice user interfaces are becoming increasingly popular. In addition to technical and functional aspects, brand personas play a role in the design process. A brand persona is a conceptual representation of an immaterial voice application and influences acceptance and user behavior. Embedded in the overall design process, the examination of brand pe...
Article
Full-text available
Trust is often promoted as a success factor for new technologies. There are fundamentally wrong questions that try to implement a "Trust Washing". These include "Does the user trust our AI", "How can we increase trust" and "Should society trust AI". These questions must be asked differently to achieve the true goal.
Article
Full-text available
Cyber Threat Intelligence (CTI) provides new possibilities. Instead of limiting oneself to reacting in a defensive manner, active action can be established thanks to anticipation. In a first step, the activities of actors must be evaluated and assessed. In this way, an interest can be identified which can be used to calculate the probability of att...
Article
Full-text available
Automation aids are increasingly used to increase safety or productivity. Faulty human-automation relationships have led to over-or under reliance on automation aids and thus to fatal consequences. Researchers propose the Perfect Automation Schema (PAS) as an individual difference variable influencing trust in and reliance on automation. PAS is def...
Article
Full-text available
In order to contain the corona crisis, various countries want to use so-called contact tracing apps. These are used to record contacts via smartphones. The DP3T solution from ETH and EPFL is based on a decentralized approach as far as possible in order to respect the security concerns of users. This article summarizes the remaining risks.
Article
Full-text available
Due to the smoldering COVID-19 pandemic more and more meetings, trainings, and lectures are taking place online. Among others, Zoom has become a very popular solution. Attackers are increasingly targeting it. Various measures can be taken to prevent meetings from being compromised or taken over.
Article
Full-text available
Automated vulnerability scanning software can identify potential vulnerabilities quickly and efficiently. But automation goes hand in hand with the risk of false positives. Accordingly, results must be examined to ensure that they are reliable and accurate. Understanding the relevant tests allows conclusions to be drawn with respect to functionalit...
Article
Full-text available
This report offers a theoretical background on trust, outcomes of a workshop on trust and personal reflections of the author. Confusion about terminologies (trust, reliance, trustworthiness) is prevailing and impedes progress. Trustworthiness as a property is distinct from but related to trust as an attitude. Interpersonal trust can be partially tr...
Article
Full-text available
Artificial intelligence is playing an ever greater role in our society. Interest in hacking this technology is therefore on the rise. Hackers can cause trouble by manipulating input, processing, technology stacks and learning mechanisms. The traditional methods of defensive hardware and software development are also essential when implementing secu...
Research Proposal
Full-text available
This is a brief review of artificial intelligence and leadership. it serves as a preparatory text for the Applied Machine Learning Days at EPFL in Lausanne (Switzerland, Jan 2020)
Article
Full-text available
This research project aims to understand, measure, compare, and track changes in the capabilities of conversational AI. It integrates seven categories: Explicit Knowledge, Language Aptitude, Numerical and Verbal Thinking, Working Memory, Critical and Creative Thinking. The evaluation takes place through a multi-level system of response categories a...
Article
Full-text available
Lethal autonomous weapons systems (LAWS) are also called killer robots. LAWS should be able to detect, select and destroy a target without any human oversight (inherent AI). There are strong opinions for and against LAWS, no binding regulations exist so far. With greater technology, comes greater individual responsibility for each and every person.
Article
Full-text available
AI is a dual-use technology that can be used for both civilian and military purposes or alternatively with good or bad intentions. Tech giants are in a precarious position where their technology is being used more and more for military purposes, against the values of users and employees. Responsibility grows on all sides, behavioral alternatives be...
Article
Full-text available
The Titanium Trust Report is a mixed methods analysis with 111 participants from heterogeneous backgrounds and expertise to investigate trust and artificial intelligence. The qualitative section explores fear and skepticism towards artificial intelligence. 14 sub-categories were identified, like fear of robots or AI in healthcare. AI in warfare, lo...
Article
Full-text available
We accidentally discovered a vulnerability in Apple iPhones. For certain videos, Siri responds even though she is not actually summoned. At first, we suspected a special effect in the resonating body. But it could also have been related to audio processing in quiet environments. Apple sees no risk and has not accepted it as a vulnerability. However...
Article
Full-text available
Customer-focused solutions can transform entire industries depending on user acceptance. Smart homes can offer users a lot of convenience through automation. This automation also has direct risks. Attacks on smart homes (e.g. with ransomware) will rise steeply in the future. Product manufacturers, building services engineers and homeowners must be...
Article
Full-text available
A range of sectors are discovering the possibilities afforded by augmented reality (AR) and artificial intelligence (AI). We are conducting an internal research project to develop a tool for our penetration testers. The AR software automatically identifies potentially vulnerable products. It provides background information on the product and its vu...
Article
Full-text available
HSTS, or HTTP Strict Transport Security, is a security policy mechanism. Using the corresponding HTTP header, web servers can tell web browsers which access method to use. This requires that a web browser first manually access the HTTPS version of the page. With HSTS preload established, you can skip this intermediate step. Webmasters, web server a...
Article
Full-text available
Among the grand visions promised by the IoT are smart buildings and smart homes. Electronic sensors are designed so automatisms can behave proactively and reactively. This can include adaptive adjustments to the ventilation system or shades. When designing and implementing smart buildings, cybersecurity must be considered from the outset. In the fu...
Article
Full-text available
AI causes motivational conflicts in many people. Attitude to AI influences consumer and user behavior. Persuasion and compliance can influence attitudes and behavior. Reciprocity, obligation, scarcity, and modeling are crucial influencing techniques. Resistance to AI is mainly due to irritation and reactance.
Article
Full-text available
KEYPOINTS Cognition comprises mental process of the human brain Artificial Intelligence tries to mimic these processes to solve complex problems and handle massive amounts of data Serial vs. parallel and controlled vs. automated processes are the basis of cognitive sciences Logic, probability theory and heuristics represent the pillars of theory fo...
Article
Full-text available
Awake consciousness comprises the complexities of perception, attention and functions of information processing. Artificial intelligence integrates machine consciousness research regarding existence and framework development. Processes, functions, benefits as well as ethical and legal implications are in the center of scientific discourse. Demystif...
Article
Full-text available
The Interdisciplinary Artificial Intelligence Quotient Scale (iA-IQS) is designed for testing AI solutions. A standardized procedure is used to test and measure performance in seven different categories. We have developed a sophisticated framework to automate this analysis. It can be used to test products extensively and efficiently to assess their...
Article
Full-text available
Computer game cheating has been around as long as competitive gaming itself. Manipulation is frequently found in the speedrunning scene. Professional eSports and their commercial trappings are making these tricks ever more lucrative. There are various options for gaining an edge in online games. Technical measures can make cheating more difficult o...
Article
Full-text available
Medical robots are used in rehabilitation and other functions. Constraints in the software are intended to prevent abnormal movements. With networking comes an increase in vulnerabilities, which makes attacks on patients possible. Both manufacturers of devices and clinics must be aware of the risks and learn to deal with them professionally.
Article
Full-text available
Forensic investigations traditionally focus on the file system. Manipulation of Office documents may also be significant. The use of the Track Changes function is one preferred method. Analysis of the Excel format also reveals chronological changes to data. This makes it possible to detect and trace actions.
Article
Full-text available
W3C and FIDO Alliance have introduced a new specification. WebAuthn (Web Authentication) standardizes access to hardware mechanisms for the purpose of secure browser authentication. Major browser makers like Microsoft, Google, and Mozilla have expressed their support and are working on the first implementations. In order to use the mechanism with a...
Article
Full-text available
Many modern car manufacturers offer Internet functions in their vehicles. In early 2018, Mercedes made an experimental API available. As with OBD, it can read vehicle and telemetry data. It also allows the vehicle's current position to be determined. Certain interactions, such as opening the vehicle, are also available. This harbors certain risks i...
Article
Full-text available
Source code analyses are used to identify vulnerabilities in software. The traditional approach here is to concentrate on sequential procedures initiated by specific user input. But this ignores the logic of the graphical user interface (GUI), which means that vulnerabilities can easily be overlooked.
Article
Full-text available
Artificial intelligence (AI) is becoming a central part of our digital society. Speech recognition is essential, so that AI will be perceived as human. For this to happen, a comprehensive understanding of grammar needs to be developed. Question/answer pairs are stored in a database. This database is expanded through learning. A short-term memory an...
Article
Full-text available
Trust as one critical success factor for AI adoption. Hype, complexity, and monopolism prevent trust in AI. A systemic approach investigates the concepts of trust from various perspectives: person, process, environment and time. Competence and reliability as most important trust factors. Development of the A-IQ to foster trust in AI. The A-IQ is an...
Article
Full-text available
2019 will be the year of (AI) enlightenment, which will produce fact-based statements and clearer definitional demarcations. The focus will be on ethics, privacy, security, open science, interdisciplinarity, internationality and narrowly defined, practical applications. The role of privacy and security, and their demarcation criteria in the context...
Poster
Full-text available
Humanity is more than ever confronted with Artificial Intelligence (AI), yet it is still challenging to find common ground. By adopting the term intelligence, AI has inherited a myriad of issues from the history of psychological intelligence research. Our study aims to understand, measure, compare and track changes of AI capabilities. From that, an...
Article
Full-text available
Cyber insurance is gaining importance in our society. There is a clear distinction between policies for private individuals and for companies. Differing terminology makes it difficult to compare policies. Many come with a risk catalog which is used to assess the present state of security. Cyber insurance is worth considering for companies that wish...
Article
Full-text available
Customer-specific malware can be deployed as part of a professional security check. Worms or backdoors are generally used to compromise networked systems. Various stealth techniques can make it difficult to detect and analyze them. The malware usually collects data that is then transferred to the back-end server. This exfiltration can take place th...
Article
Full-text available
Personal assistants are software solutions that are designed to take on concrete tasks. Through voice commands you can send messages or have appointments read out, for example. Recognition of voice commands generally occurs locally, with data processing in the cloud. For products to achieve wide reach, voice input must be natural and simple. Within...
Article
Full-text available
Banks, credit card issuers and online traders are all confronted with the problem of fraud. This article discusses how malicious activities can be identified and responded to, based on the behavior of fraudsters and their access attempts.
Article
Full-text available
The acronym SDLC customarily stands for Systems Development Lifecycle, something that is established in order to develop, expand, and operate systems professionally. Efficiency and reliability need to be optimized and maintained throughout the various phases of the lifecycle. At the same time, however, this makes it possible to consistently provide...
Article
Full-text available
We have been monitoring the commercial market for exploits for years now, and this has allowed us to develop a model for calculating prices. This article analyzes current market structures and details some emerging trends. This allows us to identify what attackers want to achieve, as well as the robustness of various products.
Article
Full-text available
Massive rise of AI research and other channels. AI research inevitably requires an interdisciplinary approach. Psychology and AI are inseparable. AI strikes humanity where it hurts: vulnerability, replacement. Further series will include: brain, conscience, behavior, ethics, practice.
Article
Full-text available
The market for exploits is experiencing rapid growth. Pricing is largely determined by the product under attack. Other influences on price include quality, penetration force and options. Both zero-day and current prices are relevant. Incidents and temporal progress reduce the value of an exploit.
Article
Full-text available
The Common Vulnerability Scoring System is used for the evaluation of vulnerabilities. There is a strong move towards introduction of CVSSv3. Acquisition and expansion of CVSSv2 attributes is possible. Evaluation is more granular, but with unclear vectors. The degree of severity is on an upward trend.
Article
Full-text available
Blockchain got popular thanks to Bitcoin. It makes it possible to validate and document transactions. The same principle is possible within other fields (e.g. luxury, properties). Experts and trusted dealers could become obsolete. This might have a severe impact on society.
Article
Full-text available
Medical devices are an important tool of modern medical treatments. The validation of such devices is a requirement. The real-world usage must be understood. External interfaces, network connectivity and hardware components require deeper analysis. Determines vulnerabilities must be reported to the vendor.
Article
Full-text available
Big data is collecting as much data as possible. This makes it possible to provide suggestions. Artificial intelligence is able to understand the individual needs. The Internet of Things will provide additional sensors and new data. This merge of technologies is going to have a severe impact on society.
Article
Full-text available
File access rights an an important aspect of computer security. DRM adds further possibilities like preventing copy&paste or forwarding by email. Microsoft provides RMS which is the best and most universal solution. The implementation demands a solid concept.
Article
Full-text available
The Darknet is a hidden part of the Internet. It is often used to deal with illegal goods. Every market has its own structure and dynamics. The exploit market is growing very fast. Monitoring of the digital underground helps to identify threats early.
Article
Full-text available
During our research, we were able to determine about 200 different uses for drones. They can be used for entertainment purposes, to deliver parcels, to monitor and observe or to engage in armed conflict. These and other possibilities will have a profound influence on societal, technological and legal aspects. This article summarizes part of our res...
Article
Full-text available
iBeacon is a protocol standardized by Apple that was introduced in 2013. A number of manufacturers support this technology. It works using hardware transmitters that get assigned a unique ID and broadcast it using Bluetooth Low Energy. If a mobile device such as a smartphone approaches an iBeacon, a specific action is being performed.
Article
Full-text available
In the age of smart phones there’s an app for pretty much anything. After all, there’s a reason why Apple advertised in 2009 using the trademarked slogan There is an App for That. By now, many a service offers access using an app. Therefore, the discussion if and how an authentication of such extensions of services should be implemented.
Article
Full-text available
During our security checks it’s not unusual that auditors, clients and partners discuss vulnerabilities and risks. This discussion, assuming that it is civil and all people involved respect each other, is of great importance. Because during those discussions, the quality of the project itself as well as the overall understanding of the subject of i...
Article
Full-text available
In the field of information technology, there’s something new every few years. Something that everyone involved in the field talks about. However, few of these things end up actually being something tangible. Following on the heels of Web 2.0 there was Virtualisation and Cloud Computing. Only after many years the marketing mess untangled itself and...
Article
Full-text available
Skype has been a very popular means to make voice and video calls for the past few years. Its popularity is in no small part due to the ease of use, which leads to a big user base and a plus in attractiveness. From a user’s point of view, Skype has many advantages. From the point of view of a company that is concerned about the protection of its ow...
Article
Full-text available
Intrusion Prevention Systems (IPS) were considered to be the consequence of Intrusion Detection Systems (IDS) around 15 years ago. IDS were to help to recognize and react to attack attempts and successful attacks. IPS go one step further and attempt to stop ongoing attacks as early as possible. The possibilities of a systematic functionality test a...
Article
Full-text available
There are many ways to do a security check. Traditionally, network-based analyses (i.e. Vulnerability Scans or Penetration Tests) are being enforced. There are, however, other approaches such as local audits, Configuration Reviews and Firewall Rule Reviews. A very powerful method of a security check is the Source Code Analysis (SCA). In such an ana...
Article
Full-text available
The subject of Unified Communications (UC) isn’t really all that new. But due the ongoing professionalization of these solutions, the systems have gotten a boost in popularity within company environments. Combining real time communications methods, these systems offer new possibilities and adds efficiency. Microsoft Lync is a commercial solution th...
Article
Full-text available
HP TippingPoint is one of those HIDS/HIPS-Systems (it’s even being advertised as a NGIPS – a Next Generation Intrusion Prevention System). The commercially available product comes with 7000 Protection Filters that use a traditional pattern recognition to detect attack attempts. Users can bundle those filters together into profiles, tie them to cert...
Article
Full-text available
During a penetration test we were confronted with rather unique requirements: The requests should be performed as efficiently as possible without triggering an alarm in the system. Because the target’s infrastructure was not maintained by our client (also our target) but by one of their external partners, we were not to involve the third party in o...
Article
Full-text available
The debate if and how open source can affect the security of a product has been going on for a while. There are, theoretically speaking, three main points that can be made: The security of open source solutions is higher than that of closed solutions, the security of open and closed source projects is equal, the security of open solutions is lower...
Article
Full-text available
RFID has come to attention with the introduction of the electronic passport [2] used in many a country. Security concerns are justified but latent. In this article, I want to illustrate the effective dangers of simple RFID tags.
Article
Full-text available
Im Zuge der Festnahme von Julian Assange und dem politischen Druck gegen Wikileaks haben sich verschiedene Kreise zu einer umstrittenen Distributed Denial of Service-Attacke (DDoS) gegen Wikileaks-Gegner zusammengeschlossen. Dieser Operation Payback [4], die durch Mitglieder des Underground-Forums 4chan orchestriert wird, sind mehrere grosse Dienst...
Article
Full-text available
Die bei Sicherheitsüberprüfungen gefundenen Schwachstellen werden nach Möglichkeiten eingestuft. Dies kann beispielsweise in Bezug auf Schweregrad (Severity), Risiko, Eintrittswahrscheinlichkeit und Auswirkungen geschehen. Die Einstufung von Schwachstellen kann sehr unterschiedlich ausfallen, je nachdem welche Aussage getroffen werden will und wel...
Article
Full-text available
Mit der Einführung von iOS 4.2 hat Apple den entsprechenden Geräten eine neue und interessante Funktionalität spendiert: Mit dem Feature Find my iPhone wird es möglich, auf das Gerät aus der Ferne zuzugreifen.
Article
Full-text available
Modularität ist ein wichtiges Konzept der modernen IT-Landschaft. Viele Produkte bieten mittlerweile das Nachrüsten von Funktionalität mittels Plugins, Addons, Extensions und Apps an. In anderen Bereichen hat dieses Konzept ebenso Früchte getragen und massgeblich zum Erfolg ganzer Industriezweige beigetragen. Zum Beispiel die beim Apple iPhone nutz...
Article
Full-text available
Es wurde durch Salomão Filho auf Vimeo ein Video (39 Sekunden) gepostet, in dem er demonstriert, wie sich die Code-Sperre auf aktuellen iPhone umgehen lässt. Die Code-Sperre wird verwendet, um das Gerät bei Nichtgebrauch unzugänglich zu machen. Erst nach der Eingabe des vierstelligen Zahlencodes kann auf die Funktionen des Telefons zugegriffen werd...
Article
Full-text available
Session-IDs – von nun an durch SID abgekürzt – sind zu einem elementaren Bestandteil moderner Applikationen geworden. Anhand derer werden etablierte und oftmals authentisierte Sitzungen als solche identifiziert. Durch den Austausch der SID zwischen Client und Server kann damit die Authentizität der Sitzung ohne erneute Authentisierung bestätigt wer...
Article
Full-text available
Eine der beliebten Varianten für eine umfassende Prüfung der vielschichtigen IT-Sicherheit eines Unternehmens sind sogenannte Backdoor Tests. Bei diesen pflegen wir explizit für den Kunden einen eigenen Wurm anzufertigen, der eine Kompromittierung durchsetzen und damit Zugriff auf sensitive Daten ermöglichen können soll.
Article
Full-text available
Die angewandte Sicherheit versucht stets das Risiko bzw. die Auswirkungen von Angriffen zu reduzieren. Eine einfache, jedoch gerne übersehene Methode liegt im Erkennen von Multilogin-Versuchen.
Article
Full-text available
Das textrecon project wurde Anfang 2008 ins Leben gerufen. Bei diesem wird sich darum bemüht, mittels statistische Analysen von Texterzeugnissen unterschiedlichen bzw. gleichen Autoren zuordnen zu können.
Article
Full-text available
Ein klassischer und gern diskutierter Tipp im Bereich der angewandten Computersicherheit ist der Einsatz sicherer Passwörter. Diese sollen möglichst lang und möglichst komplex sein sowie möglichst oft gewechselt werden. Das Problem hierbei ist, dass viele Benutzer dieser Kompliziertheit ausweichen möchten. Als zu hoch wird der Aufwand eingeschätzt,...
Article
Full-text available
Viele moderne Dokumentformate unterstützen Meta-Daten, in denen unabhängig vom eigentlichen Inhalt zusätzliche Informationen abgelegt werden. Dies kann zum Beispiel bei Office-Dokumenten und verschiedenen Bild-Formaten (siehe Exif-Standard) beobachtet werden. In gleicher Weise wird bei PDF-Dokumenten verfahren.
Article
Full-text available
Eines der beliebtesten Module seit jeher sind Security Scans, bei denen die Sicherheit eines Netzwerksystems über das Netzwerk/Internet identifiziert wird. Eine Sicherheitsanalyse auf dieser Ebene wird als klassisch verstanden, da sie mit Produkten wie SATAN, Nessus und Qualys schon in einer sehr frühen Phase der angewandten Computersicherheit indu...
Article
Full-text available
Es wird auf der Webseite jailbreakme.com erstmals ein Jailbreak angeboten, der sich online durchführen lässt. Lange wurde gerätselt, ob und wie dieser für iOS 3.x und 4.x funktioniert. Erste Vermutungen legten nahe, dass hierbei eine kritische Schwachstelle in Safari, dem integrierten Webbrowser, ausgenutzt wird. Weitere Forschungen haben jedoch au...
Article
Full-text available
Eine der zentralen Funktionen von HTML5 ist Cross Origin Request [3] und erweitert die Möglichkeiten des Browsers, Ajax-ähnliche Zugriffe domänenübergreifend durchzuführen. Die traditionelle Same Origin Policy sah vor, dass mit Javascript umgesetzte HTTP-Anfragen nur für jene Domain umgesetzt werden kann, von der das Javascript-Dokument geladen wur...
Article
Full-text available
Mit carders.cc wurde ein bekanntes deutsches Forum bereitgestellt, in dem durch kriminelle Cracker (Faker und Carder) mit gestohlenen Informationen gehandelt wurde (z.B. Kreditkarten- und Kontoinformationen). Die Seite selbst wurde nun Opfer einer Attacke, bei der eine komplette Kompromittierung des Webservers und der Datenbank durchgesetzt wurde....
Article
Full-text available
Das Durchführen von Backdoor Tests zur mehrschichtigen Prüfung von Umgebungen ist mehr denn je beliebt bei unseren Kunden. So können sie an einem konkreten Beispiel sehen, wie ein hochgradig professioneller Angreifer eine Attacke vorbereitet, diese durchführt, wie sie sich im Unternehmensnetzwerk verhält und durch die jeweiligen Stellen (Mitarbeite...
Article
Full-text available
Soziale Netzwerke haben sich in den letzten Jahren zu einem festen Bestandteil unserer Informationsgesellschaft entwickelt. Allen voran die kalifornische Firma Facebook, die unter www.facebook.com eine Plattform für den alltäglichen Informationsaustausch unter Freunden und Familie anbietet. In den aktuellen Statistiken der Webseite werden mehr als...
Article
Full-text available
Wie jedes erfolgreiche Unternehmen versucht auch Facebook ihren Erfolg zu vergrössern, wobei sie zunehmends ihre Pflichten und die Rechte ihrer Benutzer offensichtlich vernachlässigen. So bietet Facebook seit einiger Zeit die Möglichkeit an, dass Webmaster auf ihren Seiten einen Like-Button einfügen können. Durch das Klicken auf diesen können Faceb...
Article
Full-text available
Das quelloffene Netzwerkutility nmap kann dank der Nmap Scripting Engine um eigene Mechanismen erweitert werden. Da wir einen Grossteil unserer netzwerkbasierten Sicherheitsüberprüfungen mit der Hilfe von nmap durchführen, schreiben wir stetig neue NSE-Skripte. Eine der grössten Entwicklungen in diesem Bereich ist das nmap NSE Vulscan script. Diese...
Article
Full-text available
Facebook ist darum bemüht, wie auch andere Plattformen, durch offene Schnittstellen die Unterstützung für Applikationen bereitzustellen. Dadurch kann die Funktionalität des Dienstes durch Drittanbieter erweitert werden. In diesem Beitrag werden wir die FQL-Kommunikation mit Facebook erklären und damit eine grundlegende Schwachstelle im Anwendungsde...
Article
Full-text available
Mit der Popularität sozialer Netze und der darin enthaltenen sensitiven Informationen steigt unweigerlich auch das Interesse am Schutz der Daten. Nachfolgend unsere Empfehlungen, wie man sich sicher in sozialen Netzen bewegen kann.
Article
Full-text available
Das norwegische Unternehmen Opera entwickelt und vertreibt den gleichnamigen freien Webbrowser. Dieser ist ebenfalls als Opera Mini für verschiedene Mobiltelefon-Plattformen verfügbar. Durch Apple wird auf dem iPhone standardmässig Safari als Webbrowser angeboten. Seit dem 13. April 2010 wird jedoch als Alternative ebenfalls Opera Mini im AppStore...
Article
Full-text available
Der Bereich der Forensik ist vielfältig. Im Rahmen dessen geht es jeweils um das Identifizieren von verborgenen Informationen und dem Erkennen von Zusammenhängen. Zum Beispiel kann versucht werden mittels Carving einzelne Dateien aus einem Datenträger zu extrahieren. Oder durch das Analysieren von Netzwerkkommunikationen kann versucht werden einen...
Article
Full-text available
Die Entwickler von Nessus haben eine Reihe zusätzlicher generischer Plugins für Web Application Penetration Tests herausgegeben bzw. bestehende Tests erweitert. Das Ziel dieser ist, typische Schwachstellen – wie Cross Site Scripting und SQL-Injection – mittels Fuzzing zu identifizieren. Damit können also nun auch neue und nicht mit dedizierten Plug...
Article
Full-text available
Eine Schwachstelle entsteht dann, wenn auf Grund fehlender Limitierungen eine Zugriffsmöglichkeit entsteht, die so nicht gewollt war. In Bezug auf die Programmierung bedeutet dies, dass man unvertrauenswürdigen Daten vertraut und auf der Basis dieser uneingeschränkt Zugriffe durchführen lässt. Eine Auswertung verschiedener Verwundbarkeitsdatenbanke...
Article
Full-text available
Tyler Shields des Unternehmens Veracode hielt an der ShmooCon 2010 einen Vortrag zur Sicherheit von BlackBerry-Geräten. Dabei diskutierte er in erster Linie die Möglichkeiten von mobiler Spyware. Seine Ausführungen illustrierte er mit einer eigens dafür angefertigten Backdoor namens txsBBSpy. Den Java-Quelltext dieser hat er noch gleichentags veröf...
Article
Full-text available
Der Bereich der Computersicherheit fristet ein gewisses Schattendasein. Nur sehr selten werden Entwicklungen von der breiten Öffentlichkeit wahrgenommen. Nur manchmal gibt es Sicherheitslücken, Malware oder Angriffe, die es in die Tagesmedien schaffen. Die ersten medienwirksamen Meldungen wurden durch Würmer wie Melissa und ILOVEYOU sowie die erste...
Article
Full-text available
In den letzten Monaten haben wir viel Energie in die sicherheitstechnische Analyse von mobilen Geräten investiert. In unterschiedlichen Projekten ging es darum die gegebene Sicherheit und die effektiv möglichen Angriffvektoren zu determinieren. Neben dem Auslesen geschützter Bereiche war jeweils ebenfalls das Entwickeln einer Backdoor als Ziel defi...
Article
Full-text available
Die chinesische Firma NOSEC Technologies Co., Ltd. bietet unter http://www.iiscan.com einen Webdienst namens iiScan Web Application Security Evaluation System an, mit dem Webserver einem automatisierten Scanning unterzogen werden können.
Article
Full-text available
Der Bereich der Computersicherheit ist, vor allem gemessen an traditionellen Disziplinen, unglaublich jung. Doch dies muss nicht zwingend als unumstösslicher Nachteil wahrgenommen werden. So lassen sich nämlich viele Modelle aus anderen Wissenschaften übernehmen und dadurch vom Erfahrungsschatz dieser profitieren. Nachfolgende Statistik zeigt auf,...
Article
Full-text available
Mittels Fingerprinting wird sich bei einer Sicherheitsüberprüfung darum bemüht, das eingesetzte Produkt zu erkennen. Klassischerweise wird zum Beispiel mit dem OS-Fingerprinting das genutzte Betriebssystem identifiziert. Im Rahmen von Application Fingerprinting geht es darum zu erkennen, welche Netzwerkanwendungen eingesetzt werden. Unsere Entwickl...
Article
Full-text available
Gemeinhin wird unter einem Exploit ein Stück Software verstanden, das für die automatisierte oder semi-automatisierte Ausnutzung einer Sicherheitslücke genutzt werden kann. Im einfachsten Fall wird beispielsweise die IP-Adresse des Zielsystems angegeben und auf diesem durch die angegangene Sicherheitslücke erweiterte Rechte erlangt. Durch eine stat...
Article
Full-text available
Der ehemals quelloffene Vulnerability Scanner Nessus galt jahrelang als treibende Kraft für automatisierte Sicherheitsüberprüfungen. Ihm liegt die Nessus Attack Scripting Language (NASL) zu Grunde, welche für das Umsetzen der Plugins verwendet wird. Diese werden eingesetzt, um (1) Daten eines Zielsystems zu sammeln und (2) anhand dieser entsprechen...
Article
Full-text available
Im Zuge der anhaltenden Virtualisierung der letzten 10 Jahre bekam ein artverwandtes – aber nicht zwingend neues – Thema immer mehr Aufmerksamkeit: Cloud Computing. Modularität ist ein wichtiger Aspekt von Cloud Computing. Denn nur dadurch kann die transparente Abstrahierung und dynamische Skalierbarkeit – die mittlerweile auch von Botnet-Betreiber...

Network

Cited By