KEMBAR78
Hiring Hackers | PDF
HIRING HACKERS 
MARC ROGERS 
09.09.2014
Enterprises need hackers 
The hacker-mindset makes the difference
noun ˈha-kər 
Hacker; 
someone who uses ingenuity to create a 
clever result which accomplishes the desired 
goal without changing the design of the system 
it is embedded in.
pre
noun ˈha-kər 
Hacker; 
a person who secretly gets access to a computer 
system in order to get information, cause damage, etc. : a 
person who hacks into a computer system
noun ˈha-kər 
Hacker; 
A technical genius who likes to explore 
the technical world and reshape it to 
his or her desires in a non-destructive way
HOW HACKERS CAN HELP 
CARRIERS SPECIFICALLY
Botnets are a HUGE 
network threat 
Old-fashioned 
financial fraud 
still causing headaches 
The carrier is becoming 
further and further 
removed from the 
device 
The network is becoming 
IP-based 
and more accessible to intruders
SPAM SOLDIER 12:01 PM 
• Huge SMS spam botnet 
• Spams 100 contacts at a 
time. 
• In one case 16,000 
messages sent from a 
single phone! 
• Estimated 7M spam 
messages sent before it 
was shut down. 
• Shut down through 
cooperation between 
lookout and a carrier 
partner. 
Read more
Botnets are a HUGE 
network threat 
Old-fashioned 
financial fraud 
still causing headaches 
The carrier is becoming 
further and further 
removed from the 
device 
The network is becoming 
IP-based 
and more accessible to intruders
12:01 PM 12:01 PM 12:01 PM 
BAZUC 
• Buys subscriber free SMS allowance 
• Sells artificially cheap bulk SMS to companies 
• Undercuts the carrier’s bulk messaging 
business with its own subscribers 
Read more
Botnets are a HUGE 
network threat 
Old-fashioned 
financial fraud 
still causing headaches 
The carrier is becoming 
further and further 
removed from the 
device 
The network is becoming 
IP-based 
and more accessible to intruders
• Most advanced mobile botnet (yet) 
• Multi-layered C2 architecture with 
end to end encryption and P2P 
command protocols. 
• Installs an unrestricted proxy on 
victim’s handsets 
• Like PC Botnets, the controllers 
resell access to the proxy network 
for various criminal purposes: 
• Transaction Fraud 
• Pumping out spam emails 
• Accessing C99 shell accounts 
• Brute-forcing wordpress accounts 
! 
! 
NOTCOMPATIBLE 
12:01 PM 
Read more
Botnets are still big 
network-suck 
Old-fashioned 
financial fraud 
still causing headaches 
The carrier is becoming 
further and further 
removed from the 
device 
The network is becoming 
IP-based 
and more accessible to intruders
HACKERS WHO HELP
Jeff Moss 
HACKING FOR GOOD 
Kevin Poulsen 
Mark Abene Marc Rogers 
Robert Tappan Morris 
Mudge 
Steve Wozniak 
Chris Wysopal
EVERYTHING IS OK
For more mobile security information, follow

Hiring Hackers

  • 1.
    HIRING HACKERS MARCROGERS 09.09.2014
  • 2.
    Enterprises need hackers The hacker-mindset makes the difference
  • 3.
    noun ˈha-kər Hacker; someone who uses ingenuity to create a clever result which accomplishes the desired goal without changing the design of the system it is embedded in.
  • 4.
  • 5.
    noun ˈha-kər Hacker; a person who secretly gets access to a computer system in order to get information, cause damage, etc. : a person who hacks into a computer system
  • 7.
    noun ˈha-kər Hacker; A technical genius who likes to explore the technical world and reshape it to his or her desires in a non-destructive way
  • 8.
    HOW HACKERS CANHELP CARRIERS SPECIFICALLY
  • 9.
    Botnets are aHUGE network threat Old-fashioned financial fraud still causing headaches The carrier is becoming further and further removed from the device The network is becoming IP-based and more accessible to intruders
  • 10.
    SPAM SOLDIER 12:01PM • Huge SMS spam botnet • Spams 100 contacts at a time. • In one case 16,000 messages sent from a single phone! • Estimated 7M spam messages sent before it was shut down. • Shut down through cooperation between lookout and a carrier partner. Read more
  • 11.
    Botnets are aHUGE network threat Old-fashioned financial fraud still causing headaches The carrier is becoming further and further removed from the device The network is becoming IP-based and more accessible to intruders
  • 12.
    12:01 PM 12:01PM 12:01 PM BAZUC • Buys subscriber free SMS allowance • Sells artificially cheap bulk SMS to companies • Undercuts the carrier’s bulk messaging business with its own subscribers Read more
  • 13.
    Botnets are aHUGE network threat Old-fashioned financial fraud still causing headaches The carrier is becoming further and further removed from the device The network is becoming IP-based and more accessible to intruders
  • 14.
    • Most advancedmobile botnet (yet) • Multi-layered C2 architecture with end to end encryption and P2P command protocols. • Installs an unrestricted proxy on victim’s handsets • Like PC Botnets, the controllers resell access to the proxy network for various criminal purposes: • Transaction Fraud • Pumping out spam emails • Accessing C99 shell accounts • Brute-forcing wordpress accounts ! ! NOTCOMPATIBLE 12:01 PM Read more
  • 15.
    Botnets are stillbig network-suck Old-fashioned financial fraud still causing headaches The carrier is becoming further and further removed from the device The network is becoming IP-based and more accessible to intruders
  • 16.
  • 17.
    Jeff Moss HACKINGFOR GOOD Kevin Poulsen Mark Abene Marc Rogers Robert Tappan Morris Mudge Steve Wozniak Chris Wysopal
  • 18.
  • 21.
    For more mobilesecurity information, follow