SlideShare uma empresa Scribd logo
1 de 93
Rise of the Autobots




Into the Underground of Social Network Bots
Hi! I’m not a bot
•   Tom Eston
•   Social Media Security
    Researcher
•   Pentester
•   Bot lover
•   Blog: spylogic.net
•   Podcast: securityjustice.com
•   Tweet me: agent0x0
WARNING!
What you are about to see violates
the Terms of Service (TOS) and
acceptable use policies of social
networks!

Accounts used in these tests have
been deleted or “removed” (not by
me...)

       Don't try this at home!
             KTHKSBAI
Social Networks
Rise of the Autobots: Into the Underground of Social Network Bots
200 Million Users
Rise of the Autobots: Into the Underground of Social Network Bots
110 Million Users
Rise of the Autobots: Into the Underground of Social Network Bots
35 Million Users
Rise of the Autobots: Into the Underground of Social Network Bots
Grew 752% in 2008
8 Million Visitors in
   March 2009
quot;Social Networks & Blogs
are now the 4th most
popular online activity,
ahead of personal email.quot;

      -Nielsen Online Report,
                 March 2009
It’s a target rich environment...
The Culture of Trust
Why is trust
   important?
• It’s how social networks
  work!
• Trust EVERYONE!
• Share as much as
  possible...the social networks
  don’t mind!
• Social networks are mining
  your data!
Trust exploited
  by Bots??
Rise of the Autobots: Into the Underground of Social Network Bots
Bot or Not?
BOT!!
Bot or Not?
Bot or Not?
BOT!!
Bot or Not?
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
FAIL!
Bot or Not?
BOT!!
Bot or Not?
Bot or Not?
Rise of the Autobots: Into the Underground of Social Network Bots
Not a Bot!
Not a Bot!
 But still...
LOTS OF FAIL!
Bot or Not?
BOT!!
Bot or Not?
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
Biggest
Rick Roll ever?
Biggest
Rick Roll ever?
Biggest
Rick Roll ever?
Biggest
Rick Roll ever?
What’s the point?

• Trust is easy to exploit!
• People will trust bots...
• Accounts were created and
  used with tools we will talk
  about
• Rick Astley is EVIL!
The Rise of
 the Bots
What are bots?
   “...perform tasks that are
both simple and structurally
  repetitive at a much higher
   rate than a human alone.”



   “Applications that run
     automated tasks”
Ever see this?
Why use Bots?
• Automation...on a mass
  scale
• Easy to use
• Multiple purpose
 • Malware, Blackhat SEO,
   phishing...pr0n!
• Highly Effective
The Bot
Underground
“It’s the “Spammers Choice!”
The Underground
 Business Model
• Create and Sell accounts
• Buy and Use accounts
• Custom bot scripts and
  software (Freelancing)
It’s all about
  Blackhat SEO...
  • Not just for search engine
    rankings!
  • Evil Search Engine
    Optimization techniques...
     • PPC (Pay Per Click)
     • PPI (Pay Per Install)
     • Cookie Stuffing
How money is made on the “net”
Want to know
   more?
What’s for Sale?

• Hacked accounts
• Hacked accounts w/friends
  (more friends, more $$)
• Webmail accounts (verified)
• Bot software/scripts
• Services!
Example...
Let’s talk $$




•   Facebook w/30+ Friends = $8
•   Facebook Phone Verified = $5/$6
•   1,000 Gmail Accounts = $13
•   500 YouTube Accounts = $30
But there are controls
    in place, right?
What about
CAPTCHA?
CAPTCHA=FAIL

• Algorithms can be
  cracked
• OCR technology
• They have hawt chix
• and if that doesn’t
  work...
OUTSOURCE IT!
OR...use Melissa!




         She wants you..srsly
What about
Friend Request/
   Messaging
  Controls...
Phone SMS
    Verification?
• Great idea! But...can be
  broken..
It kind of works,
          but...
• Prepaid cell phones
• Overseas virtual
  SMS Services (SMS
  Receive)
• SMS back to ICQ
  and Yahoo
  Messenger (works
  with some socnets)
How about rate
    Limits?
• Easy to bypass...just test it,
  modify your code and/or slow
  down!
Types of Bots on
Social Networks
Good Bots
Twitter Bots
n0taB0t

•   Tweets
    mindless
    rants....
•   Likes to reply
    to you
•   Likes Notacon
•   Mostly
    harmless
Annoying Bots
Rise of the Autobots: Into the Underground of Social Network Bots
Auto Follow/
      Reply




• Bots looking for “keywords” in
  your tweets...
Evil Bots
U-Bot
U-Bot in Action
Webdominator
Webdominator in Action
Need help?
Other Pay Services
Realboy



•   Project to make Twitter bots as
    human as possible!
•   Real interactions with your
    Twitter network
•   Source code available...
Social Network
  Botnets?
• Malware distribution for C&C
 • Koobface!
• DDos botnet via third-party
  applications
 • Facebot!
• Control a botnet via Twitter?
Twitter for Botnet C&C
  • Bot looks for commands on
    legitimate Twitter accounts
  • Takes action based on the
    command
  • Commands are obfuscated
  • Proof of Concept code
    released today at Notacon!
  • “TwitterBot” created by Robin
    Wood aka: @digininja
Twitterbot C&C In Action
TwitterBot
      Enhancements
   • add a hash (or part of) to the
     command to stop fake
     requests
   • encrypt the whole command
     (obfuscation)
   • get the bot to talk back
           Get it now at:
http://www.digininja.org/twitterbot/
Is the end near?




How to stop the bots!
Bot detection
• Look carefully!
• Lots of
  clues..spammer
  s are doing it
  wrong!
• Programs/API’s
  to detect
  (Twitter
  specific)
Some possible
  solutions...
• Account creation/message
  throttling
• Why can you still create
  multiple accounts from the
  same IP?? WTF?
• No more opt-in developer
  models!
• Education of users? We can
  try...the socnets won’t!
But wait...there’s
     more!
• socialnetworkbots.com
• open source project
• Twitter and other bots
  (n0tab0t)....
• get the code...don’t use your
  real account!
• Twitterbot Command & Control
  POC Code:
  www.digininja.org/twitterbot
Questions?

Mais conteúdo relacionado

Destaque

How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]Queue-it
 
Building blocks for building bots
Building blocks for building botsBuilding blocks for building bots
Building blocks for building botsRita Zhang
 
Facebook bots uma nova arma no relacionamento e atendimento ao consumidor
Facebook bots uma nova arma no relacionamento e atendimento ao consumidorFacebook bots uma nova arma no relacionamento e atendimento ao consumidor
Facebook bots uma nova arma no relacionamento e atendimento ao consumidorElife Brasil
 
6 months of experimentation with bots
6 months of experimentation with bots6 months of experimentation with bots
6 months of experimentation with botsChatbots Paris
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Destaque (6)

How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]
 
Building blocks for building bots
Building blocks for building botsBuilding blocks for building bots
Building blocks for building bots
 
Facebook bots uma nova arma no relacionamento e atendimento ao consumidor
Facebook bots uma nova arma no relacionamento e atendimento ao consumidorFacebook bots uma nova arma no relacionamento e atendimento ao consumidor
Facebook bots uma nova arma no relacionamento e atendimento ao consumidor
 
Beyond the Bots
Beyond the BotsBeyond the Bots
Beyond the Bots
 
6 months of experimentation with bots
6 months of experimentation with bots6 months of experimentation with bots
6 months of experimentation with bots
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Semelhante a Rise of the Autobots: Into the Underground of Social Network Bots

Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot Design
Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot DesignChatbot Revolution: Exploring Opportunities, Use Cases, & Bot Design
Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot DesignStefan Kojouharov
 
Integral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science
 
Bot. You said bot? Let build bot then! - Laurent Ellerbach
Bot. You said bot? Let build bot then! - Laurent EllerbachBot. You said bot? Let build bot then! - Laurent Ellerbach
Bot. You said bot? Let build bot then! - Laurent EllerbachITCamp
 
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...ITCamp
 
Webspam (English Version)
Webspam (English Version)Webspam (English Version)
Webspam (English Version)Dirk Haun
 
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life Stories
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life StoriesISTA 2017: Practical Chatbots - Technology Overview with Real-Life Stories
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life StoriesVassil Popovski
 
A Brief Overview of a Possible Digital Near Future
A Brief Overview of a Possible Digital Near Future A Brief Overview of a Possible Digital Near Future
A Brief Overview of a Possible Digital Near Future Antoine Dubuquoy
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckG3 Communications
 
Dc Bar Social Media Twitter Shaun Dakin Dc Bar Presentation
Dc Bar Social Media Twitter Shaun Dakin Dc Bar PresentationDc Bar Social Media Twitter Shaun Dakin Dc Bar Presentation
Dc Bar Social Media Twitter Shaun Dakin Dc Bar PresentationSuzanne Turner
 
NUS-ISS Learning Day 2019- ChatBots: All about Conversational Experiences
NUS-ISS Learning Day 2019- ChatBots: All about Conversational ExperiencesNUS-ISS Learning Day 2019- ChatBots: All about Conversational Experiences
NUS-ISS Learning Day 2019- ChatBots: All about Conversational ExperiencesNUS-ISS
 
The European Bot Landscape (Q1 2016)
The European Bot Landscape (Q1 2016)The European Bot Landscape (Q1 2016)
The European Bot Landscape (Q1 2016)Ziv Reichert
 
Leon Ho: My path to Entrepreneurship
Leon Ho: My path to EntrepreneurshipLeon Ho: My path to Entrepreneurship
Leon Ho: My path to EntrepreneurshipLeon Ho
 
Chatbots AI and Ethics
Chatbots AI and EthicsChatbots AI and Ethics
Chatbots AI and EthicsPaul Walsh
 
The ultimate survey bot v2
The ultimate survey bot v2The ultimate survey bot v2
The ultimate survey bot v2Simon Thompson
 
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...virtual-2021-data.sql_.saturday.la-Building database interactions with users ...
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...Luis Beltran
 
State of the Bot - Sandeep Chivukula for SIPA
State of the Bot - Sandeep Chivukula for SIPA  State of the Bot - Sandeep Chivukula for SIPA
State of the Bot - Sandeep Chivukula for SIPA Sandeep Chivukula
 

Semelhante a Rise of the Autobots: Into the Underground of Social Network Bots (20)

Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot Design
Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot DesignChatbot Revolution: Exploring Opportunities, Use Cases, & Bot Design
Chatbot Revolution: Exploring Opportunities, Use Cases, & Bot Design
 
Integral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud Presentation
 
AutoBotCash
AutoBotCashAutoBotCash
AutoBotCash
 
Chat bots
Chat botsChat bots
Chat bots
 
Bot. You said bot? Let build bot then! - Laurent Ellerbach
Bot. You said bot? Let build bot then! - Laurent EllerbachBot. You said bot? Let build bot then! - Laurent Ellerbach
Bot. You said bot? Let build bot then! - Laurent Ellerbach
 
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
 
Webspam (English Version)
Webspam (English Version)Webspam (English Version)
Webspam (English Version)
 
Bot
BotBot
Bot
 
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life Stories
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life StoriesISTA 2017: Practical Chatbots - Technology Overview with Real-Life Stories
ISTA 2017: Practical Chatbots - Technology Overview with Real-Life Stories
 
Let's Build a Chatbot!
Let's Build a Chatbot!Let's Build a Chatbot!
Let's Build a Chatbot!
 
A Brief Overview of a Possible Digital Near Future
A Brief Overview of a Possible Digital Near Future A Brief Overview of a Possible Digital Near Future
A Brief Overview of a Possible Digital Near Future
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
Dc Bar Social Media Twitter Shaun Dakin Dc Bar Presentation
Dc Bar Social Media Twitter Shaun Dakin Dc Bar PresentationDc Bar Social Media Twitter Shaun Dakin Dc Bar Presentation
Dc Bar Social Media Twitter Shaun Dakin Dc Bar Presentation
 
NUS-ISS Learning Day 2019- ChatBots: All about Conversational Experiences
NUS-ISS Learning Day 2019- ChatBots: All about Conversational ExperiencesNUS-ISS Learning Day 2019- ChatBots: All about Conversational Experiences
NUS-ISS Learning Day 2019- ChatBots: All about Conversational Experiences
 
The European Bot Landscape (Q1 2016)
The European Bot Landscape (Q1 2016)The European Bot Landscape (Q1 2016)
The European Bot Landscape (Q1 2016)
 
Leon Ho: My path to Entrepreneurship
Leon Ho: My path to EntrepreneurshipLeon Ho: My path to Entrepreneurship
Leon Ho: My path to Entrepreneurship
 
Chatbots AI and Ethics
Chatbots AI and EthicsChatbots AI and Ethics
Chatbots AI and Ethics
 
The ultimate survey bot v2
The ultimate survey bot v2The ultimate survey bot v2
The ultimate survey bot v2
 
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...virtual-2021-data.sql_.saturday.la-Building database interactions with users ...
virtual-2021-data.sql_.saturday.la-Building database interactions with users ...
 
State of the Bot - Sandeep Chivukula for SIPA
State of the Bot - Sandeep Chivukula for SIPA  State of the Bot - Sandeep Chivukula for SIPA
State of the Bot - Sandeep Chivukula for SIPA
 

Mais de Tom Eston

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Tom Eston
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadTom Eston
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown Tom Eston
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Tom Eston
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsTom Eston
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on TwitterTom Eston
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-MiddleTom Eston
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With MaltegoTom Eston
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactTom Eston
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkTom Eston
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 

Mais de Tom Eston (18)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on Twitter
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit Framework
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 

Último

Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 

Último (20)

Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 

Rise of the Autobots: Into the Underground of Social Network Bots

Notas do Editor

  1. First...a warning!
  2. Everyone knows what social networks are right? Heck..I was recently told by my mother that she has a Facebook account! Noooo....
  3. I have to keep changing this slide because it keeps getting bigger!
  4. Ummm, yeah..it still exists. The scourge of the Internet still has...
  5. Poor LinkedIn...still...
  6. However, Twitter...the fastest growing social network today...
  7. This shouldnt shock you but social networks are more popular then email! It’s only getting bigger....
  8. With socnets so popular, it’s no surprise its where the attackers are going...
  9. First, lets talk about the culture of trust that makes socnets work.
  10. Socnets want you to share as much as possible, trust everyone..they are mining your data...they are not making money yet...but they have ways to sell bits and pieces of your info.
  11. Why would bot’s exploit trust? Is this possible?
  12. How about Jennifer? Cute..single...
  13. and Tommy...college guy...seems friendly...
  14. Poor Sarah. [READ IT]. Too bad she confirmed the bot as a friend at 8am and at noon, sent this message. Must be because she has 700 friends...
  15. Poor Sarah. [READ IT]. Too bad she confirmed the bot as a friend at 8am and at noon, sent this message. Must be because she has 700 friends...
  16. Poor Sarah. [READ IT]. Too bad she confirmed the bot as a friend at 8am and at noon, sent this message. Must be because she has 700 friends...
  17. Poor Sarah. [READ IT]. Too bad she confirmed the bot as a friend at 8am and at noon, sent this message. Must be because she has 700 friends...
  18. How about 0EPb4a...She likes meeting people and selling “lapto’s”
  19. Now Haley...crappy profile..must be a bot right?
  20. Not a bot! but with 4,974 friends...lots of FAIL
  21. Not a bot! but with 4,974 friends...lots of FAIL
  22. Ok, no way Rick Astley is bot...
  23. It’s amazing the response you get when you are a celebrity..people love u.
  24. It’s amazing the response you get when you are a celebrity..people love u.
  25. It’s amazing the response you get when you are a celebrity..people love u.
  26. It’s amazing the response you get when you are a celebrity..people love u.
  27. It’s amazing the response you get when you are a celebrity..people love u.
  28. It’s amazing the response you get when you are a celebrity..people love u.
  29. This could have been the biggest Rick Roll ever...except that I decided to stop once I hit 666 followers. Bad omen. Not good.
  30. This could have been the biggest Rick Roll ever...except that I decided to stop once I hit 666 followers. Bad omen. Not good.
  31. This could have been the biggest Rick Roll ever...except that I decided to stop once I hit 666 followers. Bad omen. Not good.
  32. The point is that trust is easy to exploit...people want to trust..all these accounts were created or used with bots we will talk about. Rick is EVIL.
  33. Lets talk about the rise of the bots on social networks...
  34. It’s simple really...they automate mundane tasks, right?
  35. Links to SPAM, malware, Porn..etc...we are all familiar.
  36. But this is why spammers and others use bots...its automation on a mass scale! Easy, multi-purpose, EFFECTIVE!
  37. Lets dive into the bot underground to see how they function.
  38. First, you have to understand the business model. Three main methods I have found in the bot underground.
  39. Everything I have found is disguised as “Blackhat SEO”...