<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1682241822228148612</id><updated>2026-01-24T01:55:55.321-03:00</updated><category term="forense"/><category term="resposta a incidentes"/><category term="segurança em profundidade"/><category term="vulnerabilidade"/><category term="treinamento"/><category term="cyberwar"/><category term="conferência"/><category term="forense de memória"/><category term="hackers"/><category term="malware"/><category term="blogs"/><category term="windows"/><category term="ddos"/><category term="vazamento de informações"/><category term="china"/><category term="criptografia"/><category term="dns"/><category term="exploit"/><category term="google"/><category term="microsoft"/><category term="ferramenta"/><category term="memoria"/><category term="botnet"/><category term="csirt"/><category term="forense de disco"/><category term="forense de rede"/><category term="ftk"/><category term="legislação"/><category term="phishing"/><category term="0-day"/><category term="NIST"/><category term="accessdata"/><category term="encase"/><category term="evento"/><category term="ferramentas"/><category term="kaspersky"/><category term="linux"/><category term="negação de serviço"/><category term="netwitness"/><category term="sans"/><category term="volatility"/><category term="cert.br"/><category term="correlacionamento"/><category term="desafios"/><category term="forense corporativa"/><category term="internet explorer"/><category term="livros"/><category term="pageviews"/><category term="pci"/><category term="twitter"/><category term="usa"/><category term="APURA"/><category term="Guidance Software"/><category term="espionagem industrial"/><category term="governo"/><category term="iccyber"/><category term="metasploit"/><category term="monitoração"/><category term="privacidade"/><category term="skype"/><category term="techbiz"/><category term="0day"/><category term="CDCiber"/><category term="blackhat"/><category term="brasil"/><category term="dlp"/><category term="falha"/><category term="fbi"/><category term="ids"/><category term="inteligencia"/><category term="java"/><category term="memoryze"/><category term="modelagem de ameaças"/><category term="métricas"/><category term="nsa"/><category term="patch"/><category term="pdf"/><category term="policia federal"/><category term="python"/><category term="registry"/><category term="richard bejtlich"/><category term="rsa"/><category term="segurança"/><category term="segurança de rede"/><category term="siem"/><category term="CyberCrime"/><category term="Enscript"/><category term="adobe reader"/><category term="algoritmo"/><category term="android"/><category term="anti-forense"/><category term="anti-virus"/><category term="arcsight"/><category term="auditoria"/><category term="backdoor"/><category term="backtrack"/><category term="campus party"/><category term="ccc"/><category term="certificação digital"/><category term="ciberespionagem"/><category term="defacement"/><category term="drive-by"/><category term="estatísticas"/><category term="exploit kit"/><category term="firefox"/><category term="fud"/><category term="gsi"/><category term="mandiant"/><category term="md5"/><category term="online"/><category term="pentest"/><category term="programação"/><category term="safe browsing"/><category term="sandbox"/><category term="slowloris"/><category term="ssl"/><category term="storm worm"/><category term="stuxnet"/><category term="trojan"/><category term="wikileaks"/><category term="windows7"/><category term=".gov"/><category term="ameaça"/><category term="blackberry"/><category term="ceic"/><category term="chrome"/><category term="ciberguerra"/><category term="cloud"/><category term="conscientização"/><category term="crackers"/><category term="cymru"/><category term="dan geer"/><category term="defesa"/><category term="dsic"/><category term="engenharia social"/><category term="enisa"/><category term="evidence"/><category term="fast flux"/><category term="forense digital"/><category term="hardware"/><category term="htcia"/><category term="https"/><category term="imperva"/><category term="intel"/><category term="ips"/><category term="live cd"/><category term="logs"/><category term="man in the middle"/><category term="networkminer"/><category term="perícia digital"/><category term="processo"/><category term="ransomware"/><category term="registro"/><category term="reportagem"/><category term="revista"/><category term="risco"/><category term="secunia"/><category term="shodan"/><category term="sox"/><category term="sql injection"/><category term="tools"/><category term="truecrypt"/><category term="verizon"/><category term="virus"/><category term="vista"/><category term="voip"/><category term="worm"/><category term=".mil"/><category term="BSIMM"/><category term="Encase Enterprise"/><category term="JDFSL"/><category term="TPM"/><category term="Virustotal"/><category term="XSS"/><category term="adobe flash"/><category term="aduc"/><category term="amazon"/><category term="apache"/><category term="apple"/><category term="autenticação"/><category term="bloqueador de escrita"/><category term="breno silva"/><category term="bruce schneier"/><category term="bundestrojaner"/><category term="cache poisoning"/><category term="caine"/><category term="carders"/><category term="carnegie mellon"/><category term="carolina dieckmann"/><category term="carving"/><category term="censura"/><category term="cipav"/><category term="cofee"/><category term="coldboot"/><category term="comodogate"/><category term="conficker"/><category term="consciência situacional"/><category term="cooperação"/><category term="core"/><category term="cucko´s egg"/><category term="cuda"/><category term="cyberwarfare"/><category term="database security"/><category term="digital intelligence"/><category term="direito digital"/><category term="dnschanger"/><category term="dpf"/><category term="engenharia elétrica"/><category term="engenharia reversa"/><category term="etir"/><category term="expressões regulares"/><category term="f-response"/><category term="finfisher"/><category term="fingerprinting"/><category term="firmware"/><category term="flash"/><category term="fraude"/><category term="ftkimager"/><category term="full disclosure"/><category term="fuzzy"/><category term="gsm"/><category term="hacktivismo"/><category term="hbgary"/><category term="heap spray"/><category term="iOS"/><category term="immunity"/><category term="impacto"/><category term="insecure magazine"/><category term="insiders"/><category term="interceptação"/><category term="iphone"/><category term="irc"/><category term="irã"/><category term="jaquith"/><category term="loic"/><category term="mac"/><category term="mastercard"/><category term="mestrado"/><category term="mobile"/><category term="ms08-067"/><category term="openioc"/><category term="openssl"/><category term="otan"/><category term="palantir"/><category term="paypal"/><category term="pcap"/><category term="pdgmail"/><category term="portugal"/><category term="presidência"/><category term="prisão"/><category term="proxies"/><category term="ptfinder"/><category term="rbn"/><category term="recompensa"/><category term="recuperação"/><category term="regripper"/><category term="relatório"/><category term="resumo"/><category term="rio de janeiro"/><category term="ross anderson"/><category term="russia"/><category term="securid"/><category term="segurança por obscuridade"/><category term="shell"/><category term="sift"/><category term="snort"/><category term="snowden"/><category term="sony"/><category term="sorteio"/><category term="spam"/><category term="spoofing"/><category term="spyeye"/><category term="sql"/><category term="ssd"/><category term="stealth"/><category term="suricata"/><category term="sysinternals"/><category term="tecnologia"/><category term="trend micro"/><category term="unb"/><category term="usb"/><category term="virtualização"/><category term="visa"/><category term="vulnerability"/><category term="waf"/><category term="winen"/><category term="wireless"/><category term="wpa"/><category term="wpa2"/><category term="xry"/><category term="zeus"/><category term=".edu"/><category term=".pac"/><category term="3g"/><category term="ABNT"/><category term="AR-Drone"/><category term="AppleGate"/><category term="Asterisk"/><category term="Audit Viewer"/><category term="BIOS"/><category term="CCDCOE"/><category term="CEF"/><category term="CERT"/><category term="CSI Cyber"/><category term="CarbonBlack"/><category term="Craig Wright"/><category term="DC3"/><category term="Diginotar"/><category term="Dilma"/><category term="DoD"/><category term="Equation"/><category term="FACE"/><category term="FRED"/><category term="Facebook"/><category term="Fred Cohen"/><category term="GPU"/><category term="Gene Spafford"/><category term="HP"/><category term="ICOFCS"/><category term="ICS"/><category term="IDMEF"/><category term="IJDCF"/><category term="IJDE"/><category term="IJOFCS"/><category term="INFOSEG"/><category term="IODEF"/><category term="IPv6"/><category term="ISIS"/><category term="ISO"/><category term="MAEC"/><category term="MCT"/><category term="MMEF"/><category term="Michael Cloppert"/><category term="Ministério da Defesa"/><category term="Netwtiness"/><category term="OVAL"/><category term="PL84/99"/><category term="RH2.5"/><category term="RNP"/><category term="SDDFJ"/><category term="SbSeg"/><category term="Seccubus"/><category term="Stratfor"/><category term="TED"/><category term="TJX"/><category term="TV5"/><category term="TV5Monde"/><category term="Tallinn"/><category term="USCyberPatriot"/><category term="USSTRATCOM"/><category term="VERIS"/><category term="VRT"/><category term="WPS"/><category term="WiPhire"/><category term="Wifi Protected Setup"/><category term="Windows10"/><category term="XMLHttpRequest"/><category term="YARA"/><category term="a5/1"/><category term="a5/3"/><category term="active defense"/><category term="adeona"/><category term="adhd"/><category term="aes"/><category term="afflib"/><category term="akamai"/><category term="alemanha"/><category term="ambev"/><category term="angler"/><category term="anti-theft"/><category term="antisec"/><category term="anubisnetworks"/><category term="apt"/><category term="apwg"/><category term="aquisição"/><category term="arbor"/><category term="armoring"/><category term="artefatos"/><category term="artillery"/><category term="asprox"/><category term="assinaturas"/><category term="atenção seletiva"/><category term="attack"/><category term="aurora"/><category term="australia"/><category term="autonomous systems"/><category term="avg"/><category term="avi rubin"/><category term="avware"/><category term="awards"/><category term="baixaki"/><category term="bash"/><category term="bbc"/><category term="bear trap"/><category term="belkasoft"/><category term="bgp"/><category term="birthday attack"/><category term="bitlocker"/><category term="black tulip"/><category term="blackhat seo"/><category term="blacklist"/><category term="blind sql injection"/><category term="bluepex"/><category term="bluepill"/><category term="breaking point"/><category term="bug"/><category term="bulk_extractor"/><category term="byod"/><category term="c2c"/><category term="capacidade"/><category term="carbon black"/><category term="careto"/><category term="carnivore"/><category term="cartão de crédito"/><category term="cbs"/><category term="cellebrite"/><category term="celular"/><category term="centera"/><category term="cerberus"/><category term="certificações"/><category term="cheat sheet"/><category term="chip"/><category term="chris paget"/><category term="chromium"/><category term="citrix"/><category term="clean pipe"/><category term="cliff stoll"/><category term="cloudfare"/><category term="cloudflare"/><category term="cloudshield"/><category term="cnasi"/><category term="cnet"/><category term="cnn"/><category term="codenomicon"/><category term="coleta"/><category term="comodo"/><category term="comodobr"/><category term="compliance"/><category term="comsic"/><category term="convenção de budapeste"/><category term="convergence"/><category term="copa do mundo"/><category term="coreia do norte"/><category term="corey johnson"/><category term="cpbr"/><category term="crime na rede"/><category term="crise"/><category term="cristine hoepers"/><category term="cuckoo"/><category term="cyberattack"/><category term="cyberbunker"/><category term="daemonlogger"/><category term="dam"/><category term="dancho danchev"/><category term="darkmarket"/><category term="dcom"/><category term="decaf"/><category term="decaf v2"/><category term="decloack"/><category term="deepweb"/><category term="defcon"/><category term="deutche telekom"/><category term="dfrws"/><category term="digitask"/><category term="dimmit"/><category term="diário oficial"/><category term="dnsbl"/><category term="dnssec"/><category term="dou"/><category term="downadup"/><category term="drdos"/><category term="drwxr"/><category term="dsd"/><category term="dumpcap"/><category term="dumpit"/><category term="duqu"/><category term="e-evidence"/><category term="ediscovery"/><category term="eff"/><category term="elcomsoft"/><category term="emc"/><category term="emprego"/><category term="energia"/><category term="enigma"/><category term="entrevista"/><category term="escola nacional de defesa cibernetica"/><category term="eset"/><category term="esteganografia"/><category term="estonia"/><category term="estratégia"/><category term="etld"/><category term="europa"/><category term="eventos"/><category term="evil maid"/><category term="evilgrade"/><category term="exercito"/><category term="exploit-db"/><category term="exportação"/><category term="extorsão"/><category term="f-secure"/><category term="falso positivo"/><category term="fantastico"/><category term="fatal error"/><category term="fecomercio"/><category term="fernando carbone"/><category term="ff4"/><category term="finlândia"/><category term="flame"/><category term="flexispy"/><category term="foremost"/><category term="forense de vídeo"/><category term="forensic focus"/><category term="forensic magazine"/><category term="forensics"/><category term="forensics.wiki.br"/><category term="forensicswiki"/><category term="força bruta"/><category term="frança"/><category term="full disk encryption"/><category term="g1"/><category term="gauss"/><category term="gcih"/><category term="ghostnet"/><category term="globo"/><category term="gmail"/><category term="gpcode"/><category term="gpl"/><category term="gps"/><category term="grampo"/><category term="guardium"/><category term="guerra"/><category term="guilherme venere"/><category term="hack"/><category term="hackerazzi"/><category term="hackingteam"/><category term="hakin9"/><category term="hardening"/><category term="harlan carvey"/><category term="hash"/><category term="helix"/><category term="hitler"/><category term="holanda"/><category term="honeynet"/><category term="honeypot"/><category term="hope"/><category term="hosts"/><category term="hotmail"/><category term="httpry"/><category term="iPhoneTracker"/><category term="idefense"/><category term="ig"/><category term="impressoras"/><category term="india"/><category term="info exame"/><category term="insecure maganize"/><category term="intenção"/><category term="interpol"/><category term="interview"/><category term="into the boxes"/><category term="investimento"/><category term="ioerror"/><category term="iphone forensics"/><category term="ironport"/><category term="isc2"/><category term="israel"/><category term="j2ee"/><category term="jacomo dimmit"/><category term="jailbreak"/><category term="javascript"/><category term="jesse kornblum"/><category term="jotti"/><category term="junho 2008"/><category term="kaminsky"/><category term="kasumi"/><category term="kgb"/><category term="kits"/><category term="klaus steding-jessen"/><category term="kntools"/><category term="kraken"/><category term="langner"/><category term="lime"/><category term="limites"/><category term="lista"/><category term="lm"/><category term="locaweb"/><category term="lockheed martin"/><category term="lynis"/><category term="lógica"/><category term="mac memory reader"/><category term="mac memoryze"/><category term="macosx"/><category term="magic lantern"/><category term="map"/><category term="marcapasso"/><category term="marcelo caiado"/><category term="marcos ferrari"/><category term="mawlare"/><category term="mbr"/><category term="mcafee"/><category term="mcgraw"/><category term="memscript"/><category term="metasploitable"/><category term="mindmap"/><category term="mit"/><category term="mitigação"/><category term="mitm"/><category term="moonsols"/><category term="moxie"/><category term="mrtg"/><category term="ms08-033"/><category term="nac"/><category term="nessus"/><category term="netcontinuum"/><category term="netflow"/><category term="networking"/><category term="ngrep"/><category term="nit"/><category term="nmap"/><category term="norma"/><category term="norse"/><category term="notebook"/><category term="ntlm"/><category term="ntop"/><category term="ntp"/><category term="nuclear"/><category term="obama"/><category term="oi"/><category term="oisf"/><category term="oiss"/><category term="olimpiadas"/><category term="openbts"/><category term="openvas"/><category term="opm"/><category term="oportunidade"/><category term="oracle"/><category term="orkut"/><category term="otp"/><category term="owasp"/><category term="packers"/><category term="panda"/><category term="pattern matching"/><category term="payback"/><category term="pcre"/><category term="pedofilia"/><category term="pentesting"/><category term="perforce"/><category term="pericia"/><category term="perl"/><category term="perícia"/><category term="pfsense"/><category term="pgp disk"/><category term="phonecrypt"/><category term="pki"/><category term="ploks"/><category term="poisoning attack"/><category term="policia civil"/><category term="polypack"/><category term="port knocking"/><category term="português"/><category term="post-mortem"/><category term="postgres"/><category term="powershell"/><category term="prefeitura"/><category term="premiação"/><category term="preparação"/><category term="princeton"/><category term="provedores"/><category term="ps3"/><category term="psn"/><category term="psyb0t"/><category term="pushpin"/><category term="pwn2own"/><category term="pymail"/><category term="quebra de sigilo"/><category term="r2d2"/><category term="rainbow tables"/><category term="rar"/><category term="realengo"/><category term="reação"/><category term="record"/><category term="referência"/><category term="regex"/><category term="registry viewer"/><category term="regulamentação"/><category term="remnux"/><category term="renato maia"/><category term="renault"/><category term="replay"/><category term="reversing labs"/><category term="roi"/><category term="rootkit"/><category term="router"/><category term="rpc"/><category term="ruby"/><category term="sanitização"/><category term="santoku"/><category term="sc magazine"/><category term="scada"/><category term="scanner"/><category term="scm"/><category term="secerno"/><category term="second life"/><category term="security"/><category term="securityonion"/><category term="senasic"/><category term="sentrigo"/><category term="sep"/><category term="sequestro de dados"/><category term="sha1"/><category term="shadowserver"/><category term="shmoocon"/><category term="siemens"/><category term="sites"/><category term="skorobogatov"/><category term="slideshare"/><category term="smartcard"/><category term="snapcell"/><category term="software"/><category term="sotirov"/><category term="sp"/><category term="spamhaus"/><category term="spidertrap"/><category term="squid"/><category term="sri"/><category term="ssdeep"/><category term="sseguranca"/><category term="sslstrip"/><category term="sting"/><category term="stj"/><category term="street view"/><category term="sucuri"/><category term="superinteressante"/><category term="são paulo"/><category term="takedown"/><category term="teamcymru"/><category term="technosecurity"/><category term="telefônica"/><category term="terra"/><category term="terrorismo"/><category term="timeline"/><category term="tizor"/><category term="tls"/><category term="token"/><category term="topcell gsm"/><category term="tresor"/><category term="trustwave"/><category term="tse"/><category term="turquia"/><category term="txtBBSpy"/><category term="umass"/><category term="unix"/><category term="urna eletrônica"/><category term="us-cert"/><category term="usenix"/><category term="userassist"/><category term="vazamentos"/><category term="venda de senhas"/><category term="venere"/><category term="verdasys"/><category term="verisign"/><category term="videntifier"/><category term="visualização"/><category term="visualize"/><category term="vivo"/><category term="vm"/><category term="votação"/><category term="wargaming"/><category term="wasc"/><category term="web 2.0"/><category term="weblabyrinth"/><category term="websense"/><category term="whitelisting"/><category term="whois"/><category term="wigle"/><category term="win32dd"/><category term="winacq"/><category term="windbg"/><category term="windd"/><category term="winifixer"/><category term="wipe"/><category term="wired"/><category term="wireshark"/><category term="wlan"/><category term="wordpress"/><category term="wrf"/><category term="xerxes"/><category term="xp"/><category term="zdi"/><category term="zlob"/><title type='text'>SSegurança #infosec #DFIR</title><subtitle type='html'>&lt;p align=&quot;left&quot;&gt;&lt;b&gt;Incident Response, Computer Forensics and Hot topics on Security, by &lt;a href=&quot;http://twitter.com/suffert&quot;&gt;&lt;u&gt;Sandro Süffert&lt;/u&gt;&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default?max-results=10&amp;redirect=false'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default?start-index=11&amp;max-results=10&amp;redirect=false'/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>273</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>10</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1682241822228148612.post-5277025363991420277</id><published>2018-06-28T14:01:00.002-03:00</published><updated>2018-06-28T14:01:27.039-03:00</updated><title type='text'>Aniversário de 10 anos do Blog.</title><content type='html'>Apenas um post comemorativo. Viva! ;)&lt;br /&gt;
&lt;br /&gt;
S.S.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Inscreva-se no RSS Feed e receba atualizações automáticas&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/5277025363991420277/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://sseguranca.blogspot.com/2018/06/aniversario-de-10-anos-do-blog.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/5277025363991420277'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/5277025363991420277'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/2018/06/aniversario-de-10-anos-do-blog.html' title='Aniversário de 10 anos do Blog.'/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1682241822228148612.post-2017712851896778883</id><published>2017-01-31T23:33:00.000-02:00</published><updated>2018-06-28T14:05:36.177-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ferramentas"/><category scheme="http://www.blogger.com/atom/ns#" term="forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="powershell"/><category scheme="http://www.blogger.com/atom/ns#" term="tools"/><title type='text'>Powershell Forensics Framework</title><content type='html'>Uma ótima dica para quem busca alternativas (e elas são sempre boas, por mais bem equipado que você esteja) para investigações em sistemas de arquivo NTFS (em breve ext4 tb):&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://github.com/Invoke-IR/PowerForensics/&quot;&gt;https://github.com/Invoke-IR/PowerForensics/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&quot;PowerForensics is a PowerShell digital forensics framework. It currently supports NTFS and is in the process of adding support for the ext4 file system.&quot; &lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;&lt;br /&gt;Boot Sector:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;Get-ForensicMasterBootRecord - gets the MasterBootRecord from the first sector of the hard drive
Get-ForensicGuidPartitionTable - gets the GuidPartitionTable from the first sector of the hard drive
Get-ForensicBootSector - gets the appropriate boot sector (MBR or GPT) from the specified drive
Get-ForensicPartitionTable - gets the partition table for the specified drive
&lt;br /&gt;&lt;br /&gt;New Technology File System (NTFS):&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;Get-ForensicAttrDef - gets definitions of MFT Attributes (parses $AttrDef)
Get-ForensicBitmap - determines if a cluster is marked as in use (parses $Bitmap)
Get-ForensicFileRecord - gets Master File Table entries (parses $MFT)
Get-ForensicFileRecordIndex - gets a file&#39;s MFT record index number
Get-ForensicUsnJrnl - getss Usn Journal Entries (parses $UsnJrnl:$J)
Get-ForensicUsnJrnlInformation - getss UsnJrnl Metadata (parses $UsnJrnl:$Max)
Get-ForensicVolumeBootRecord - gets the VolumeBootRecord from the first sector of the volume (parses $Boot)
Get-ForensicVolumeInformation - gets the $Volume file&#39;s $VOLUME_INFORMATION attribute
Get-ForensicVolumeName - gets the $Volume file&#39;s $VOLUME_NAME attribute
Get-ForensicFileSlack - gets the specified volume&#39;s slack space
Get-ForensicMftSlack - gets the Master File Table (MFT) slack space for the specified volume
Get-ForensicUnallocatedSpace - gets the unallocated space on the specified partition/volume (parses $Bitmap)
&lt;br /&gt;&lt;br /&gt;Windows Artifacts:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;Get-AlternateDataStream - gets the NTFS Alternate Data Streams on the specified volume
Get-ForensicEventLog - gets the events in an event log or in all event logs
Get-ForensicExplorerTypedPath - gets the file paths that have been typed into the Windows Explorer application
Get-ForensicNetworkList - gets a list of networks that the system has previously been connected to 
Get-ForensicOfficeFileMru - gets a files that have been recently opened in Microsoft Office
Get-ForensicOfficeOutlookCatalog - gets a Outlook pst file paths
Get-ForensicOfficePlaceMru - gets a directories that have recently been opened in Microsoft Office
Get-ForensicOfficeTrustRecord - gets files that have been explicitly trusted within MicrosoftOffice
Get-ForensicPrefetch - gets Windows Prefetch artifacts by parsing the file&#39;s binary structure
Get-ForensicRunKey - gets the persistence mechanism stored in registry run keys
Get-ForensicRunMostRecentlyUsed - gets the commands that were issued by the user to the run dialog
Get-ForensicScheduledJob - gets Scheduled Jobs (at jobs) by parsing the file&#39;s binary structures
Get-ForensicShellLink - gets ShellLink (.lnk) artifacts by parsing the file&#39;s binary structure
Get-ForensicSid - gets the machine Security Identifier from the SAM hive
Get-ForensicTimezone - gets the system&#39;s timezone based on the registry setting
Get-ForensicTypedUrl - gets the Universal Resource Locators (URL) that have been typed into Internet Explorer
Get-ForensicUserAssist - gets the UserAssist entries from the specified volume
Get-ForensicWindowsSearchHistory - gets the terms that have been searched for using the Windows Search feature
&lt;br /&gt;&lt;br /&gt;Application Compatibility:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;CacheGet-ForensicAmcache - gets previously run commands from the Amcache.hve registry hive
Get-ForensicRecentFileCache - gets previously run commands from the RecentFileCache.bcf file
Get-ForensicShimcache - gets previously run commands from the AppCompatCache (AppCompatibility on XP) registry key
&lt;br /&gt;&lt;br /&gt;Windows Registry:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;Get-ForensicRegistryKey - gets the keys of the specified registry hive
Get-ForensicRegistryValue - gets the values of the specified registry key
&lt;br /&gt;&lt;br /&gt;Forensic Timeline:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;ConvertTo-ForensicTimeline - converts an object to a ForensicTimeline object
Get-ForensicTimeline - creates a forensic timeline
&lt;br /&gt;&lt;br /&gt;Extended File System 4 (ext4):&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;Get-ForensicSuperblock - returns the ext4 SuperBlock object
Get-ForensicBlockGroupDescriptor - returns the Block Group Descriptor Table entries
Get-ForensicInode - returns the Inode Table entries
&lt;br /&gt;&lt;br /&gt;Utilities:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;ConvertFrom-BinaryData - implements PowerForensics&#39; BinShred API to parse binary data into an object
Copy-ForensicFile - creates a copy of a file from its raw bytes on disk 
Get-ForensicChildItem - returns a directory&#39;s contents by parsing the MFT structures
Get-ForensicContent - gets the content of a file from its raw bytes on disk
Invoke-ForensicDD - provides a bit for bit copy of a specified device&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Inscreva-se no RSS Feed e receba atualizações automáticas&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/2017712851896778883/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://sseguranca.blogspot.com/2016/01/powershell-forensics-framework.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/2017712851896778883'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/2017712851896778883'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/2016/01/powershell-forensics-framework.html' title='Powershell Forensics Framework'/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1682241822228148612.post-5522774431945900924</id><published>2016-06-16T05:28:00.002-03:00</published><updated>2016-06-16T05:30:37.776-03:00</updated><title type='text'>Quem invadiu os servidores do Partido Democrata Americano?</title><content type='html'>&quot;Cozy Bear&quot;, &quot;Fancy Bear&quot; (Rússia) ou  outras criaturas invadiram servidores do DNC (Comitê do Partido Democrata Americano)?&lt;br /&gt;
&lt;br /&gt;
Governo Russo? Lone Hacker? Informação, Contra-informação.. &quot;Attribution is hard!&quot;&lt;br /&gt;
&lt;br /&gt;
Várias teorias estão surgindo.. é bom lembrar que é possível que muita gente tenha invadido ao mesmo tempo. Isto não é tão incomum..&lt;br /&gt;
&lt;br /&gt;
Dia 14/06:&lt;br /&gt;
&lt;br /&gt;
Crowstrike: &lt;a href=&quot;https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/&quot; target=&quot;_blank&quot;&gt;https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/ &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
NPR: &lt;a href=&quot;http://www.npr.org/2016/06/14/482029912/russian-hackers-penetrate-democratic-national-committee-steal-trump-research&quot; target=&quot;_blank&quot;&gt;http://www.npr.org/2016/06/14/482029912/russian-hackers-penetrate-democratic-national-committee-steal-trump-research &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Dia 15/06:&lt;br /&gt;
&lt;br /&gt;
Guccifer: https://guccifer2.wordpress.com/2016/06/15/dnc/&lt;br /&gt;
&lt;br /&gt;
Em breve, os arquivos estarão disponíveis no Wikileaks.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Inscreva-se no RSS Feed e receba atualizações automáticas&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/5522774431945900924/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://sseguranca.blogspot.com/2016/06/quem-invadiu-os-servidores-do-partido.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/5522774431945900924'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/5522774431945900924'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/2016/06/quem-invadiu-os-servidores-do-partido.html' title='Quem invadiu os servidores do Partido Democrata Americano?'/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1682241822228148612.post-4443099973854488514</id><published>2016-02-25T11:47:00.000-03:00</published><updated>2016-02-25T11:48:15.689-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="alemanha"/><category scheme="http://www.blogger.com/atom/ns#" term="bundestrojaner"/><category scheme="http://www.blogger.com/atom/ns#" term="carnivore"/><category scheme="http://www.blogger.com/atom/ns#" term="ccc"/><category scheme="http://www.blogger.com/atom/ns#" term="cipav"/><category scheme="http://www.blogger.com/atom/ns#" term="digitask"/><category scheme="http://www.blogger.com/atom/ns#" term="espionagem industrial"/><category scheme="http://www.blogger.com/atom/ns#" term="fbi"/><category scheme="http://www.blogger.com/atom/ns#" term="finfisher"/><category scheme="http://www.blogger.com/atom/ns#" term="forense de memória"/><category scheme="http://www.blogger.com/atom/ns#" term="hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="legislação"/><category scheme="http://www.blogger.com/atom/ns#" term="magic lantern"/><category scheme="http://www.blogger.com/atom/ns#" term="nit"/><category scheme="http://www.blogger.com/atom/ns#" term="privacidade"/><category scheme="http://www.blogger.com/atom/ns#" term="proxies"/><category scheme="http://www.blogger.com/atom/ns#" term="r2d2"/><category scheme="http://www.blogger.com/atom/ns#" term="volatility"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerabilidade"/><title type='text'>Trojans Governamentais para vigilância e investigações online: NIT e CIPAV (FBI) e Bundestrojaner (Alemanha), entre outros</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;b&gt;[ Update 25/02/2016 ]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Muito tempo sem update.. Aqui vai uma novidade sobre este assunto:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://news.softpedia.com/news/german-police-create-a-new-version-of-bundestrojaner-federal-trojan-500832.shtml&quot; target=&quot;_blank&quot;&gt;http://news.softpedia.com/news/german-police-create-a-new-version-of-bundestrojaner-federal-trojan-500832.shtml&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&quot;The German government has approved that a new version of the infamous Bundestrojaner (Federal Trojan) malware be used against real-life targets, after authorities have been working on an updated version for the past months.&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[ Update 21/11/2014 ]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Hoje a Anestia Internacional a Eletronic Free Frontier juntamente com outras entidades ligadas à segurança e privacidade na Internet lançaram uma ferramenta de &quot;deteção&amp;nbsp;de spywares conhecidos de vigilância governamental&quot; chamado &lt;b&gt;Detekt&lt;/b&gt; - você pode baixar a ferramenta e o código fonte no links abaixo:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Sobre a Ferramenta: &lt;/b&gt;&lt;a href=&quot;https://www.resistsurveillance.org/index.html&quot;&gt;https://www.resistsurveillance.org/&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Download do Executável e Código Fonte: &lt;/b&gt;&lt;a href=&quot;https://github.com/botherder/detekt/releases/tag/v1.4&quot;&gt;https://github.com/botherder/detekt/releases/tag/v1.4&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[ Update 19/05/2014 ]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
No dia 12&lt;b&gt;/&lt;/b&gt;05/2014, uma solicitação do FBI (código &lt;a href=&quot;https://www.fbo.gov/index?s=opportunity&amp;amp;mode=form&amp;amp;id=e2a5f00667ea243032ccc23e9522e078&amp;amp;tab=core&amp;amp;tabmode=list&amp;amp;=&quot;&gt;RFQ1307B&lt;/a&gt;) mostra o interesse da Agência americana em obter samples de malware de todo o mundo:&lt;br /&gt;
&lt;br /&gt;
Detalhes relevantes:&lt;br /&gt;
&lt;br /&gt;
&quot;2.3.1 Malware Feed&lt;br /&gt;
&lt;br /&gt;
The FBI seeks to obtain the malware via a feed.&amp;nbsp; The feed shall:&lt;br /&gt;
&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Currently exist (or system currently exists that can produce the feed)&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Contain a rollup of sharable new malware (both unique and variants)&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Include a malicious URL report (Reference Section 2.3.2)&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Be organized by SHA1 signatures&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Be updated once every 24 hours&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Be a snapshot of the prior 24 hours&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Be, on average, 30GB - 40GB per day&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Be able to retrieve feed in an automated way through machine-to-machine communication&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Initiations of accessing feed shall be pulled by FBI not pushed to FBI&lt;br /&gt;
&lt;br /&gt;
2.3.2 Malicious URL Report&lt;br /&gt;
&lt;br /&gt;
The FBI seeks a malicious URL report as a component of the malware feed.&amp;nbsp; The URL report shall contain a list of URLs that do not directly link to executable files, but instead lead to exploits that cause malware to be downloaded (e.g., links to drive-by downloads).&lt;br /&gt;
&lt;br /&gt;
2.3.3 Malware Files&lt;br /&gt;
&lt;br /&gt;
Each of the new malware files in the feed shall contain metadata, to include:&lt;br /&gt;
&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; SHA1 signature&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; MD5 signature&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&lt;br /&gt;
&lt;br /&gt;
The file types required include:&lt;br /&gt;
&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Executable file types from Unix/Linux, Windows and Macintosh&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Archives files&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Image files&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Microsoft Office documents&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; Audio and Video files&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; RTF files&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; PDF files&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; PHP files&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; JavaScript files&lt;br /&gt;
•&amp;nbsp;&amp;nbsp;&amp;nbsp; HTML files&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[ Update: 08/12/2013 ]&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
O Washington Post publicou hoje um artigo entitulado&lt;b&gt; &quot;&lt;a href=&quot;http://www.washingtonpost.com/business/technology/fbis-search-for-mo-suspect-in-bomb-threats-highlights-use-of-malware-for-surveillance/2013/12/06/352ba174-5397-11e3-9e2c-e1d01116fd98_story_3.html&quot;&gt;FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance&lt;/a&gt;&quot;&lt;/b&gt;em que divulga um &lt;a href=&quot;http://apps.washingtonpost.com/g/page/business/fbi-files-colorado-search-warrant-request/641/&quot; style=&quot;font-weight: bold;&quot;&gt;search warrant&lt;/a&gt;&lt;b&gt; (&quot;pedido de busca e apreensão&quot;) &lt;/b&gt;que detalha como a agência solicita e recebe autorização judicial para o uso de código malicioso em investigações de crimes (neste caso ameaças envolvendo bombas).&lt;br /&gt;
&lt;br /&gt;
O termo &quot;&lt;i&gt;CIPAV&lt;/i&gt;&quot; - presente nos demais updates deste post - não é utilizado, e é introduzido um acrônimo: &lt;i&gt;NIT &lt;/i&gt;- &quot;&lt;i&gt;Network Investigative Technique&lt;/i&gt;&quot;, que tem funcionalidade muito parecida com o descrito neste post.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;b&gt;[ Update: 09/02/2013 ]&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&quot;Going Bright: Wiretapping without W&lt;/b&gt;&lt;b&gt;eakening Communications Infrastructure&quot;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;a href=&quot;http://www.crypto.com/papers/GoingBright.pdf&quot;&gt;http://www.crypto.com/papers/GoingBright.pdf&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&quot;Mobile IP-based communications and changes in technologies have been a subject of concern for law&amp;nbsp;&lt;/i&gt;&lt;i&gt;enforcement, which seeks to extend current wiretap design requirements for digital voice networks.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;Such&amp;nbsp;&lt;/i&gt;&lt;i&gt;an extension would create considerable security risks as well as seriously harm innovation. Exploitation&amp;nbsp;&lt;/i&gt;&lt;i&gt;of naturally occurring bugs in the platforms being used by targets may be a better alternative.&quot;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Steven M. Bellovin | Columbia University&lt;br /&gt;
Matt Blaze and Sandy Clark | University of Pennsylvania&lt;br /&gt;
Susan Landau | Privacy Ink&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;[ Update: 10/09/2012 ]&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
O Governo alemão está abertamente&lt;a href=&quot;http://www.bka.de/nn_194250/DE/Berufsperspektive/Stellenangebote/11-2012.html&quot; target=&quot;_blank&quot;&gt; contratando programadores especializados em trojans&lt;/a&gt;, para não depender de empresas externas para desenvolver suas ferramentas de monitoração utilizadas em investigações feitas pelo governo (&lt;i&gt;BundesTrojaner).&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
Alguns pré-requisitos para os candidados ao cargo:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Excelente conhecimento de C++&lt;/li&gt;
&lt;li&gt;Muito bom conhecimento de padrões de software de modelagem de tecnologias de rede,&lt;/li&gt;
&lt;li&gt;topologias e protocolos (especialmente sobre os protocolos da Internet utilizados)&lt;/li&gt;
&lt;li&gt;Capacidade de auxílio no desenvolvimento e manutenção de software para a criação de&amp;nbsp;&amp;nbsp;técnicos e táticos&amp;nbsp;&amp;nbsp;requisitos para o acesso&amp;nbsp;
remoto&amp;nbsp;da polícia secreta&lt;/li&gt;
&lt;li&gt;Identificação de vulnerabilidades em aplicações e sistemas operacionais,
&lt;/li&gt;
&lt;li&gt;Observação das evoluções técnicas e legais no campo da tecnologias de informação e comunicação&lt;/li&gt;
&lt;li&gt;Muito bom conhecimento de programação de baixo nível e mecanismos de segurança do Windows&lt;/li&gt;
&lt;li&gt;Idealmente ter conhecimento dos mecanismos de segurança de&amp;nbsp;outros sistemas operacionais, bem como na programação de baixo nível&amp;nbsp;em outros sistemas operacionais, bem como no desenvolvimento de drivers&lt;/li&gt;
&lt;/ul&gt;
Fonte e mais informações - veja este post da F-Secure:&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;a href=&quot;http://www.f-secure.com/weblog/archives/00002423.html&quot;&gt;http://www.f-secure.com/weblog/archives/00002423.html&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
PS: Neste meio tempo foi publicado neste blog um artigo chamado &quot;&lt;i&gt;&lt;b&gt;&lt;a href=&quot;http://sseguranca.blogspot.com.br/2012/08/ciberguerra-e-ciberespionagem-o-uso-de.html&quot; target=&quot;_blank&quot;&gt;CiberGuerra e CiberEspionagem: O uso de ferramentas de invasão por Nações e Governos&lt;/a&gt;&lt;/b&gt;&lt;/i&gt;&quot; - relevante ao assunto tratado neste artigo.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;[ Update: 02/02/2012 ]&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
Uma &lt;b&gt;autorização judicial&lt;/b&gt; de instalação do &lt;b&gt;&lt;i&gt;CIPAV&lt;/i&gt;&lt;/b&gt; foi provavelmente utilizada no caso da investigação que culminou com a prisão dos responsáveis pelo &lt;b&gt;&lt;i&gt;MegaUpload&lt;/i&gt;.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&quot;&lt;i&gt;While it&#39;s still not clear how federal investigators gained access to the conversations of founder Kim DotCom and other top managers, there are hints that the FBI managed to place government-issued spyware on the defendants&#39; computers&lt;/i&gt;&quot;&lt;/blockquote&gt;
&lt;br /&gt;
Mais informações na &lt;i&gt;CNET&lt;/i&gt;:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://news.cnet.com/8301-31001_3-57368523-261/feds-we-obtained-megaupload-conversations-with-search-warrant/&quot;&gt;http://news.cnet.com/8301-31001_3-57368523-261/feds-we-obtained-megaupload-conversations-with-search-warrant/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Informações do caso no site do &lt;i&gt;FBI&lt;/i&gt;:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.fbi.gov/news/pressrel/press-releases/justice-department-charges-leaders-of-megaupload-with-widespread-online-copyright-infringement&quot;&gt;http://www.fbi.gov/news/pressrel/press-releases/justice-department-charges-leaders-of-megaupload-with-widespread-online-copyright-infringement&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;[ Update: 26/10/2011 ]&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;i&gt;A Kaspersky &lt;a href=&quot;http://www.securelist.com/en/blog/208193167/Federal_Trojan_s_got_a_Big_Brother&quot;&gt;achou outra variante&lt;/a&gt; do &lt;/i&gt;&lt;i&gt;BundesTrojaner&lt;/i&gt;, que também já foi analisada pelo CCC . Um resumo pode ser visto no &lt;a href=&quot;http://www.h-online.com/security/news/item/CCC-criticises-new-version-of-government-trojan-1367160.html&quot;&gt;site H-Online&lt;/a&gt; (inglês). Ou a análise &lt;a href=&quot;http://translate.google.com/translate?sl=de&amp;amp;tl=pt&amp;amp;js=n&amp;amp;prev=_t&amp;amp;hl=en&amp;amp;ie=UTF-8&amp;amp;layout=2&amp;amp;eotf=1&amp;amp;u=http%3A%2F%2Fwww.ccc.de%2Fde%2Fupdates%2F2011%2Fanalysiert-aktueller-staatstrojaner&quot;&gt;original/integral traduzida&lt;/a&gt; do alemão para o português (&lt;i&gt;Google Translate&lt;/i&gt;).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[ Update: 17/10/2011 ]&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
Uma interessante análise do footprint de memória do &quot;BundesTrojaner&quot; utilizando a ferramenta de &lt;a href=&quot;http://sseguranca.blogspot.com/2011/06/forense-em-windows-aquisicao-e-analise.html&quot;&gt;forense de memória&amp;nbsp;&lt;b&gt;volatility&lt;/b&gt;&lt;/a&gt; foi publicada recentemente - &lt;a href=&quot;http://www.evild3ad.com/?p=1136&quot;&gt;confira&lt;/a&gt;!&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;[ Update: 08/10/2011 ]&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
Devido às dificuldades de interceptação telemática de certos atores no cenário cibernético - devido ao crescente uso de criptografia, &lt;i&gt;proxies&lt;/i&gt;, &lt;i&gt;vpn&lt;/i&gt;, etc - &amp;nbsp;o uso de softwares para monitoração de suspeitos (autorizadas pela justiça ou não) é uma realidade crescente em todo o mundo. Alguns dos países em que isto já acontece são: EUA (veja o &lt;i&gt;post&lt;/i&gt; original sobre o&amp;nbsp;&lt;i&gt;CIPAV&lt;/i&gt; abaixo), &lt;a href=&quot;http://blog.eset.com/2010/08/18/will-france-spy-on-you&quot;&gt;França&lt;/a&gt;, &lt;a href=&quot;http://www.f-secure.com/weblog/archives/00002114.html&quot;&gt;Egito&lt;/a&gt;, e agora a Alemanha (leia logo abaixo)&lt;br /&gt;
&lt;br /&gt;
O grupo &lt;i&gt;&lt;b&gt;Chaos Computer Club&lt;/b&gt;&lt;/i&gt; (CCC) publicou hoje uma análise do &quot;&lt;b&gt;Bundestrojaner Light&lt;/b&gt;&quot; (R2D2) - que numa tradução livre seria &quot;&lt;i&gt;Light&amp;nbsp;&lt;/i&gt;&lt;i&gt;Federal&amp;nbsp;&lt;/i&gt;&lt;i&gt;Trojan&lt;/i&gt;&quot; - utilizado pelo governo alemão.&lt;br /&gt;
&lt;br /&gt;
Abaixo são listados os nomes dos arquivos analisados (uma biblioteca e um driver de kernel windows), seus&amp;nbsp;&lt;i&gt;hashes md5 &lt;/i&gt;e taxas de detecção por antivírus (&lt;i&gt;virustotal&lt;/i&gt;):&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;mfc42ul.dll&lt;/b&gt; (&lt;b&gt;md5&lt;/b&gt;:&amp;nbsp;930712416770a8d5e6951f3e38548691 &lt;b&gt;vt:&lt;/b&gt; 6/43)&lt;br /&gt;
&lt;b&gt;winsys32.sys&lt;/b&gt; (&lt;b&gt;md5&lt;/b&gt;:&amp;nbsp;d6791f5aa6239d143a22b2a15f627e72 &amp;nbsp;&lt;b&gt;vt:&lt;/b&gt; &amp;nbsp;5/43)&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Para mais informações, veja a página da CCC:&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://www.ccc.de/en/updates/2011/staatstrojaner&quot;&gt;Chaos Computer Club analyzes government malware&lt;/a&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Tradução automática do paper em PDF do&amp;nbsp;&lt;a href=&quot;http://translate.google.com/translate?hl=en&amp;amp;sl=de&amp;amp;u=http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf&quot;&gt;alemão para o inglês, aqui&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://nakedsecurity.sophos.com/2011/10/10/german-government-r2d2-trojan-faq/&quot;&gt;FAQ feito pela NakedSecurity&lt;/a&gt;:&amp;nbsp;&amp;nbsp;&lt;i&gt;German &#39;Government&#39; R2D2 Trojan FAQ&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.eset.com/2011/10/10/german-policeware-use-the-farce-er-force-luke&quot;&gt;Artigo da ESET&lt;/a&gt;&lt;i&gt;:&amp;nbsp;German Policeware: Use the Farce…er, Force…Luke&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Paper &quot;&lt;a href=&quot;http://go.eset.com/us/resources/white-papers/Please_Police_Me.pdf&quot;&gt;Please Police Me&lt;/a&gt;&quot;:&amp;nbsp;Carnivore, Magic Lantern, etc..&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://t.co/iZ52jsqu&quot;&gt;Apresentação da &lt;/a&gt;&lt;i&gt;&lt;a href=&quot;http://t.co/iZ52jsqu&quot;&gt;Digitask&lt;/a&gt; &lt;/i&gt;sobre&lt;i&gt; &quot;&lt;/i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: collapse; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 13px;&quot;&gt;Remote Forensic Software&quot;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;Mais informações sobre o assunto:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Artigo da F-Secure:&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;a href=&quot;http://www.f-secure.com/weblog/archives/00002249.html&quot;&gt;http://www.f-secure.com/weblog/archives/00002249.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Análise do VirScan:&amp;nbsp;&lt;a href=&quot;http://r.virscan.org/a2ed65a6a41e3a5e773b1bbcff14aef2&quot;&gt;http://r.virscan.org/a2ed65a6a41e3a5e773b1bbcff14aef2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;[ Update: 30/04/2011 ]&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Depois de mais de dois anos sem novidades sobre o assunto, a EFF (Eletronic Frontier Foundation) publicou ontem um &quot;dossiê&quot; sobre o CIPAV chamado &quot;&lt;a href=&quot;https://www.eff.org/deeplinks/2011/04/CIPAV_Post&quot;&gt;New FBI Documents Provide Details on Government’s Surveillance Spyware&lt;/a&gt;&quot;.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
O FBI tem utilizado a tecnologia para investigações criminais dentro dos Estados Unidos e também para investigações de suspeitos estrangeiros de acordo com os termos da FISA &lt;a href=&quot;http://www.fbi.gov/news/testimony/fisa&quot;&gt;(&lt;/a&gt;&lt;i&gt;&lt;a href=&quot;http://www.fbi.gov/news/testimony/fisa&quot;&gt;Foreign Intelligence Surveillance Act&lt;/a&gt;).&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Aos interessados em mais detalhes sobre o assunto, a EFF separou uma página de download para os 15 PDFs contendo informações sobre o CIPAV: &lt;/i&gt;&lt;i&gt;&lt;a href=&quot;https://www.eff.org/foia/foia-endpoint-surveillance-tools-cipav&quot;&gt;https://www.eff.org/foia/foia-endpoint-surveillance-tools-cipav&lt;/a&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;[ Post Original: 17/04/2009 ]&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;
Depois da divulgação de que a &lt;a href=&quot;http://sseguranca.blogspot.com/2009/03/ghostnet-possivel-espionagem.html&quot;&gt;China que se utiliza de técnicas hacker&lt;/a&gt; para espionar seus adversários, a &lt;a href=&quot;http://blog.wired.com/27bstroke6/2009/04/fbi-spyware-pro.html&quot;&gt;Wired acaba de publicar&lt;/a&gt; um artigo interessante sobre documentos que foram recentemente &quot;desclassificados&quot; pelo governo americano.&lt;br /&gt;
&lt;br /&gt;
Agora é público o conhecimento de que o FBI utiliza em suas investigações online - &lt;span style=&quot;font-weight: bold;&quot;&gt;há pelo menos 7 anos&lt;/span&gt; - um &lt;a href=&quot;http://en.wikipedia.org/wiki/Spyware&quot;&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;spyware&lt;/span&gt;&lt;/a&gt;  desenvolvido internamente por eles chamado &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;CIPAV - Computer and Internet Protocol Address Verifier&lt;/span&gt;, que faz um pouco mais do que o nome indica - ele busca as seguintes informações da máquina alvo:&lt;br /&gt;
&lt;br /&gt;
• Endereço IP&lt;br /&gt;
• Endereços MAC (placas de rede)&lt;br /&gt;
• A lista de portas TCP e UDP e conexões estabelecidas (netstat)&lt;br /&gt;
• Lista de programas em execução&lt;br /&gt;
• Sistema Operacional, Versão e Número de Série e empresa que consta no Registro.&lt;br /&gt;
• Versão do Navegador Padrão&lt;br /&gt;
• Usuários (incluindo o logado) do sistema operacional&lt;br /&gt;
• URL visitadas&lt;br /&gt;
&lt;br /&gt;
Segundo &lt;a href=&quot;http://www.wired.com/politics/law/news/2007/07/fbi_spyware?currentPage=all&quot;&gt;análise do CIPAV feita em 2007 por &lt;span style=&quot;font-style: italic;&quot;&gt;Kevin Poulsen&lt;/span&gt;&lt;/a&gt;, todas as informações coletadas são enviadas pela Internet para computadores do FBI na Virginia, possivelmente para o laboratório do FBI em na cidade de Quantico.&lt;br /&gt;
&lt;br /&gt;
O &lt;span style=&quot;font-style: italic;&quot;&gt;modus operandi&lt;/span&gt; mais comum de instalação do &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;CIPAV&lt;/span&gt; é fazer o alvo acessar uma página especialmente criada para explorar &lt;a href=&quot;http://sseguranca.blogspot.com/2009/03/chrome-e-o-unico-browser-sobreviver.html&quot;&gt;vulnerabilidades comuns em de navegadores&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
As informações confirmadas nesta semana fazem parte do material liberado ao público devido ao &quot;&lt;a href=&quot;http://www.usdoj.gov/04foia/&quot; style=&quot;font-style: italic;&quot;&gt;Freedom of Information Act&lt;/a&gt;&quot; e indicam uma boa maturidade do governo americano ao tratar de assuntos sensíveis como a autorização legal para utilização deste tipo de tecnologia e o equilíbrio entre o sigilo destas ações e a garantia da privacidade dos usuários.&lt;br /&gt;
&lt;br /&gt;
O pdf original do documento &quot;desclasificado&quot; descrevendo alguns casos em que o CIPAV foi utilizado &lt;a href=&quot;http://blog.wired.com/27bstroke6/files/fbi_cipav_wired_foia_041609.pdf&quot; style=&quot;font-style: italic; font-weight: bold;&quot;&gt;foi disponibilizado&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
A necessidade do uso - e controle da &lt;span style=&quot;font-weight: bold;&quot;&gt;autorização judicial&lt;/span&gt; (&lt;a href=&quot;http://blog.wired.com/27bstroke6/files/timberline_affidavit.pdf&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;pdf&lt;/span&gt;&lt;/a&gt; - exemplo) - deste tipo de tecnologia é claro - muitas vezes as ações de &lt;span style=&quot;font-style: italic;&quot;&gt;hackers&lt;/span&gt; e criminosos envolvem técnicas como &quot;&lt;a href=&quot;http://www.freeproxy.ru/en/free_proxy/faq/what_is_proxy_chaining.htm&quot;&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;proxy chaining&lt;/span&gt;&lt;/a&gt;&quot; e redes de anonimato como a &lt;a href=&quot;http://www.torproject.org/&quot; style=&quot;font-style: italic; font-weight: bold;&quot;&gt;Tor&lt;/a&gt; - que são muito difíceis de monitorar através da Internet, e exigiriam &lt;span style=&quot;font-weight: bold;&quot;&gt;autorizações judiciais de quebra de sigilo&lt;/span&gt; para múltiplos provedores em diferentes países - o que na maioria das vezes é impraticável.&lt;br /&gt;
&lt;br /&gt;
Entre as ações tipicamente hackers utilizadas pelo FBI, está também a &lt;a href=&quot;http://blog.wired.com/27bstroke6/2009/04/more-fbi-hackin.html&quot;&gt;exploração (&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;cracking&lt;/span&gt;) de redes Wireless&lt;/a&gt; para obtenção de evidências.&lt;br /&gt;
&lt;br /&gt;
A utilização de ferramentas como o  &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;CIPAV&lt;/span&gt;  e outras técnicas de &quot;contra-ataque&quot; sempre foi (e continuará sendo) fundamental para solução de casos de investigação como ameaças a bomba, terrorismo, sabotagem, extorsão e ataques de &lt;span style=&quot;font-style: italic;&quot;&gt;hackers&lt;/span&gt;.&lt;a href=&quot;http://translate.google.com/translate?hl=en&amp;amp;sl=de&amp;amp;u=http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf&quot;&gt;http://translate.google.com/translate?hl=en&amp;amp;sl=de&amp;amp;u=http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Inscreva-se no RSS Feed e receba atualizações automáticas&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/4443099973854488514/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://sseguranca.blogspot.com/2009/04/cipav-fbi-utiliza-spyware-em.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/4443099973854488514'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/4443099973854488514'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/2009/04/cipav-fbi-utiliza-spyware-em.html' title='Trojans Governamentais para vigilância e investigações online: NIT e CIPAV (FBI) e Bundestrojaner (Alemanha), entre outros'/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1682241822228148612.post-4973358960344204853</id><published>2016-01-03T19:05:00.001-02:00</published><updated>2020-10-17T10:31:35.035-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="APURA"/><category scheme="http://www.blogger.com/atom/ns#" term="cert.br"/><category scheme="http://www.blogger.com/atom/ns#" term="cloudfare"/><category scheme="http://www.blogger.com/atom/ns#" term="cloudflare"/><category scheme="http://www.blogger.com/atom/ns#" term="cloudshield"/><category scheme="http://www.blogger.com/atom/ns#" term="cyberbunker"/><category scheme="http://www.blogger.com/atom/ns#" term="ddos"/><category scheme="http://www.blogger.com/atom/ns#" term="dns"/><category scheme="http://www.blogger.com/atom/ns#" term="drdos"/><category scheme="http://www.blogger.com/atom/ns#" term="negação de serviço"/><category scheme="http://www.blogger.com/atom/ns#" term="ntp"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><category scheme="http://www.blogger.com/atom/ns#" term="spamhaus"/><category scheme="http://www.blogger.com/atom/ns#" term="teamcymru"/><category scheme="http://www.blogger.com/atom/ns#" term="us-cert"/><title type='text'>Os maiores ataques de negação de serviço (DDoS) da História - 600Gps, 500Gbps, 400Gbps e 300Gbps </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV4tNlf3G-tM8w8reuLD193Sv3uyClXwv3eyrS-T7gHLDx8tS0h2gy4X-Q6lyLE14zrQV6xi3MJMqicLQv4bTO1gCd3Yav1L9-bPWVvQAgnWGVbRdJDr6n34r5pa62-IvSodbIK_Hj0CY/s1600/drdos.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;164&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV4tNlf3G-tM8w8reuLD193Sv3uyClXwv3eyrS-T7gHLDx8tS0h2gy4X-Q6lyLE14zrQV6xi3MJMqicLQv4bTO1gCd3Yav1L9-bPWVvQAgnWGVbRdJDr6n34r5pa62-IvSodbIK_Hj0CY/s1600/drdos.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Update 17/10/2020:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Ataque da China ao Google de 2.54Tbps (em 2017).&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://www.zdnet.com/google-amp/article/google-says-it-mitigated-a-2-54-tbps-ddos-attack-in-2017-largest-known-to-date/&quot;&gt;https://www.zdnet.com/google-amp/article/google-says-it-mitigated-a-2-54-tbps-ddos-attack-in-2017-largest-known-to-date/&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Ataque: 600Gbps (a se confirmar):&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&amp;nbsp; [ Update - 03/01/2016 ]&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Hacktivistas do grupo &quot;New World Hacking&quot; atacaram o site de Donald Trump e o da BBC, utilizando a estrutura da AWS (cloud da Amazon) e alegam ter efetuado ataques de Negação de Serviço superiores a 600Gps:&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;http://www.zdnet.com/article/attackers-targeting-bbc-donald-trump-amazon-web-services/&quot;&gt;http://www.zdnet.com/article/attackers-targeting-bbc-donald-trump-amazon-web-services/&lt;/a&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;[ Update - 20/11/2014 ]&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Ataque: 500Gbps (a se confirmar):&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
O governo Chinês é o principal suspeito dos maiores ataques de negação de serviço já registrados na história, com a impressionante marca de 500Gpbs. Sites independentes de notícias de Hong Kong estão sendo alvo de ataques continuados durante os últimos meses, em paralelo aos protestos &quot;Hong Kong Occupy Central&quot; que ocorrem nas ruas da cidade-estado.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Os ataques estão alcançando esta força através da utilização de ataques de reflexão (DRDoS) em milhares de servidores de DNS. Para se ter uma idéia, o número de requisições forjadas de DNS que estão sendo feitas por segundo durante estes ataques chega a 250 milhões - o mesmo valor das requisições válidas feitas por segundo na Internet do mundo todo.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b&gt;Mais informações:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;http://www.forbes.com/sites/parmyolson/2014/11/20/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites/&quot;&gt;http://www.forbes.com/sites/parmyolson/2014/11/20/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Ataque: 400Gbps (confirmado):&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b&gt;[ Update - 13/02/2014 ]&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
Como sabemos, Ataques Distribuídos de Negação de Serviço (DRDoS) são um problema conhecido há anos e o DNS é o protocolo mais tradicionalmente utilizado para se perpetrar este tipo de ataque - mas o DNS não está sozinho, e nem é mais o mais perigoso.&lt;br /&gt;
&lt;br /&gt;
Há alguns anos, tive a oportunidade de ser um dos revisores das primeiras versões de um material muito interessante sobre o assunto, chamado &quot;Recomendações para Evitar o Abuso de Servidores DNS Recursivos Abertos&quot; - criado e  mantido pelo &lt;a href=&quot;http://cert.br/&quot;&gt;CERT.BR&lt;/a&gt; (Cristine Hoepers, Klaus Steding-Jessen, Nelson Murilo, Rafael R. Obelheiro):&amp;nbsp;&lt;a href=&quot;http://www.cert.br/docs/whitepapers/dns-recursivo-aberto/&quot;&gt;http://www.cert.br/docs/whitepapers/dns-recursivo-aberto/&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
Uma lista de openresolvers de DNS pode ser encontrada em: &lt;a href=&quot;http://openresolverproject.org/&quot;&gt;http://openresolverproject.org/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Hoje em dia ferramentas automatizadas como o &quot;&lt;a href=&quot;http://www.prolexic.com/knowledge-center-ddos-threat-advisory-dns-flooder.html&quot;&gt;DNS Flooder&lt;/a&gt;&quot; possibilitam que ataques deste tipo sejam efetuados com muita facilidade:&amp;nbsp;&lt;a href=&quot;http://www.prolexic.com/knowledge-center-ddos-threat-advisory-dns-flooder.html&quot;&gt;http://www.prolexic.com/knowledge-center-ddos-threat-advisory-dns-flooder.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Existem outros protocolos UDP que também são (ou podem) ser utilizados para perpetrar ataques de DRDoS. Uma listagem recente é a seguinte (fonte:  Alerta de 17/01/2014 do US-CERT: &lt;a href=&quot;http://www.us-cert.gov/ncas/alerts/TA14-017A&quot;&gt;http://www.us-cert.gov/ncas/alerts/TA14-017A&lt;/a&gt;):&amp;nbsp;DNS ,&amp;nbsp;NTP ,SNMPv2 ,NetBIOS,&amp;nbsp;SSDP,&amp;nbsp;CharGEN,&amp;nbsp;QOTD,&amp;nbsp;BitTorrent,&amp;nbsp;Kad,&amp;nbsp;Quake,&amp;nbsp;Steam  &lt;br /&gt;
&lt;br /&gt;
O número 2 da lista acima (NTP - Network Time Protocol) foi utilizado em um ataque de 400Gb/s DRDoS ocorrido esta semana, que está sendo considerado o maior do mundo.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Detalhes sobre o &quot;maior ataque de Denial of Service da história&quot; no blog da Cloudflare&lt;/b&gt; (obrigado ao Anchises pelo link):&amp;nbsp;&lt;a href=&quot;http://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack&quot;&gt;http://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Versões do server NTP do &lt;a href=&quot;http://ntp.org/&quot;&gt;ntp.org&lt;/a&gt; anteriores a 4.2.7p26 estão vulneráveis e precisam ser corrigidas com urgência: &lt;a href=&quot;http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplification_Attack_using&quot;&gt;http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplification_Attack_using&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Advisory recente do US-CERT sobre ataques DDoS utilizando NTP para reflexão: &lt;a href=&quot;http://www.us-cert.gov/ncas/alerts/TA14-013A&quot;&gt;http://www.us-cert.gov/ncas/alerts/TA14-013A&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
NTP Scanning Project - &lt;a href=&quot;http://openntpproject.org/&quot;&gt;http://openntpproject.org/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
O RIPE/NCC publicou recentemente um artigo do Jonh Christoff do Team Cymru (parceiro da Apura), chamado &quot;&quot;&lt;a href=&quot;https://labs.ripe.net/Members/mirjam/ntp-reflections&quot;&gt;https://labs.ripe.net/Members/mirjam/ntp-reflections&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Um relatório interessante sobre o assunto (e correlatos) foi publicado pela Arbor recentemente: &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.arbornetworks.com/resources/infrastructure-security-report&quot;&gt;http://www.arbornetworks.com/resources/infrastructure-security-report&lt;/a&gt; (Só o infográfico mostrando o tamanho dos ataques em uma linha do tempo pode ser visto em: &lt;a href=&quot;http://pages.arbornetworks.com/rs/arbor/images/AttackSize_final_white.pdf&quot;&gt;http://pages.arbornetworks.com/rs/arbor/images/AttackSize_final_white.pdf&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Ataque: 300Gbps (confirmado):&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[ Update - 28/04/2013 ]&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
Aproximadamente um mês depois dos ataques, &lt;a href=&quot;http://edition.cnn.com/2013/04/28/tech/spain-internet-attack-arrest/index.html?utm_source=feedly&quot;&gt;o principal suspeito de orquestar os ataques foi preso&lt;/a&gt; na Espanha, enquanto viajava em uma van que servia de &quot;escritório móvel&quot;. Trata-se de&lt;a href=&quot;http://krebsonsecurity.com/2013/04/dutchman-arrested-in-spamhaus-ddos/&quot;&gt;&amp;nbsp;Olaf Kamphuis&lt;/a&gt;, holandês de 35 anos e se auto-entitulou&amp;nbsp;&amp;nbsp;&quot;ministro das telecomunicações e relações exteriores da República de CyberBunker&quot;.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;[ Post Original - 28/03/2013 ]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;A &quot;grande mídia&quot; começou a cobrir com mais frequência incidentes relacionados à cibersegurança, e hoje várias fontes publicaram notícias sobre os efeitos de ataques que foram motivados pela briga entre duas empresas holandesas, a &lt;i&gt;&lt;a href=&quot;http://spamhaus.org/&quot;&gt;SpamHaus &lt;/a&gt;(que mantém listas para &lt;a href=&quot;http://www.spamhaus.org/statistics/networks/&quot;&gt;bloqueios de spam&lt;/a&gt;)&amp;nbsp;&lt;/i&gt;e a&lt;i&gt; &lt;a href=&quot;http://www.cyberbunker.com/&quot;&gt;CyberBunker&amp;nbsp;&lt;/a&gt;(&lt;/i&gt;&lt;/span&gt;&lt;i&gt;cb3rob)&amp;nbsp;&lt;/i&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;que hospeda vários spammers e possui como um &lt;a href=&quot;http://cyberbunker.com/web/wikileaks.php&quot;&gt;de seus clientes a WikiLeaks&lt;/a&gt;.&lt;/i&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;New York Times:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.nytimes.com/2013/03/27/technology/internet/online-dispute-becomes-internet-snarling-attack.html?pagewanted=all&amp;amp;_r=1&amp;amp;&quot;&gt;Firm Is Accused of Sending Spam, and Fight Jams Internet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;BBC:&amp;nbsp;&lt;a href=&quot;http://www.bbc.co.uk/news/technology-21954636&quot;&gt;Global internet slows after &#39;biggest attack in history&#39;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;CNN:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://edition.cnn.com/2013/03/27/tech/massive-internet-attack/index.html&quot; style=&quot;font-family: inherit;&quot;&gt;Massive cyberattack hits Internet users&lt;/a&gt;&amp;nbsp;/&amp;nbsp;&lt;a href=&quot;http://money.cnn.com/news/newsfeeds/gigaom/articles/2013_03_27_what_you_need_to_know_about_the_worlds_biggest_ddos_attack.html&quot;&gt;What you need to know about the world’s biggest DDoS attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Washington Post:&amp;nbsp;&lt;a href=&quot;http://www.washingtonpost.com/business/spam-blocking-group-spamhaus-reports-being-hit-by-massive-cyberattack-many-affected/2013/03/27/20e07758-96f0-11e2-a976-7eb906f9ed9b_story.html&quot;&gt;Ripple effects across Web as spam-blocking group Spamhaus hit by record-smashing cyberattack&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Como o assunto começou a ser também comentado aqui no Brasil, resolvi escrever este breve post sobre o caso em pauta.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Ataques Distribuídos de Negação de Serviço (&lt;i&gt;Distributed&amp;nbsp;Denial of Service - DDOS&lt;/i&gt;) são uma realidade - e um problema - na Internet&lt;a href=&quot;http://www.cert.org/reports/dsit_workshop.pdf&quot;&gt; há muito tempo&lt;/a&gt;. Eles ocorrem diariamente, mas geralmente não tem um efeito noticiável nas redes e computadores que não são alvos ou origem dos ataques distribuídos. O mais importante é antes de mais nada deixar claro que um ataque de negação de serviço não &quot;invade&quot; os computadores e redes afetados, mas impede que eles se comuniquem, tendo um efeito desastroso na disponibilidade de serviços online.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;O ataque não foi o maior ataque já ocorrido na internet (entre &lt;a href=&quot;http://www.informationweek.com/security/attacks/ddos-attack-doesnt-spell-internet-doom-7/240151921&quot;&gt;outros exageros&lt;/a&gt; que foram publicados), mas por ser o &lt;a href=&quot;http://cluepon.net/ras/gizmodo&quot;&gt;maior DDOS já ocorrido&lt;/a&gt;, tem importância única e merece destaque.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Um outro ponto importante a &amp;nbsp;se cosiderar é que existe uma dificuldade significativa na atribuição de responsabilidade em ataques de negação de distribuídos, especialmente pelo volume de origens utilizadas (usualmente &lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;botnets&lt;/i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; ou &lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;farms&lt;/i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; de servidores em nuvem) e pela possibilidade de se forjar (spoofar) os endereços de origem em certos tipos de ataque (mais informações abaixo). Infelizmente nem todas as redes &lt;/span&gt;&lt;a href=&quot;http://tools.ietf.org/html/bcp38&quot; style=&quot;font-family: inherit;&quot;&gt;configuram adequadamente seus equipamentos&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; para evitar este tipo de &quot;falsificação&quot; do endereço de origem.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Este tipo de ataque é também muito utilizado por hacktivistas para protestar contra empresas ou contra o governo (há &amp;nbsp;inclusive uma tentativa de legalizar deste tipo de ataque como protesto nos &lt;a href=&quot;http://news.cnet.com/8301-1009_3-57563188-83/anonymous-petitions-u.s-to-see-ddos-attacks-as-legal-protest/&quot;&gt;Estados Unidos&lt;/a&gt; e na &lt;a href=&quot;http://epetitions.direct.gov.uk/petitions/40156&quot;&gt;Inglaterra&lt;/a&gt;). Há também quem julgue que este tipo de ataque é&lt;a href=&quot;http://boingboing.net/2012/05/11/pirate-bay-to-anonymous-ddos.html&quot;&gt; uma forma de censura&lt;/a&gt;, por &quot;calar&quot; o inimigo à força.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;As legislações de vários países consideram este tipo de ataque um crime, incluindo a nova legislação que cobre os chamados &quot;crimes eletrônicos&quot;, que entrará em vigor na semana que vem em Brasil.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;i&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://www.planalto.gov.br/ccivil_03/_ato2011-2014/2012/lei/l12737.htm&quot;&gt;&lt;span style=&quot;color: #444444; line-height: 22.5px; text-align: justify;&quot;&gt;Lei n° 12.737&lt;/span&gt;&lt;/a&gt;&amp;nbsp;:&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Art. 3o &amp;nbsp;Os arts. 266 e 298 do Decreto-Lei no 2.848, de 7 de dezembro de 1940 - Código Penal, passam a vigorar com a seguinte redação: &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;“Interrupção ou perturbação de serviço telegráfico, telefônico, informático, telemático ou de informação de utilidade pública&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Art. 266. &amp;nbsp;........................................................................&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;§ 1o &amp;nbsp;Incorre na mesma pena quem interrompe serviço telemático ou de informação de utilidade pública, ou impede ou dificulta-lhe o restabelecimento. &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;§ 2o &amp;nbsp;Aplicam-se as penas em dobro se o crime é cometido por ocasião de calamidade pública.” (NR) &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Existem várias técnicas diferentes que podem ser utilizadas para efetuar um ataque do tipo&amp;nbsp;&lt;i&gt;DDOS&lt;/i&gt;, incluindo a utilização de Botnets (criadas ou &lt;a href=&quot;http://www.youtube.com/watch?feature=player_embedded&amp;amp;v=c9MuuW0HfSA&quot;&gt;alugadas&lt;/a&gt;), a utilização de &quot;Booters&quot;&amp;nbsp;como no caso recente &lt;a href=&quot;http://krebsonsecurity.com/2013/03/the-world-has-no-room-for-cowards/&quot;&gt;ataque ao site do BrianKrebs&lt;/a&gt;, a utilização de ferramentas com o consentimento do usuário para ataques de grupos (como o&amp;nbsp;&lt;a href=&quot;http://security.radware.com/knowledge-center/DDoSPedia/hoic-high-orbit-ion-cannon/&quot;&gt;Hoic&lt;/a&gt;/&lt;a href=&quot;http://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon&quot;&gt;Loic&lt;/a&gt;), entre outros. Entre todas elas, a mais eficiente foi a utilizada neste caso.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[ Ataques de Negação de Serviço Distribuídos utilizando Servidores DNS Recursivos Abertos ]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;No caso em pauta (a briga entre duas empresas holandesas), de um lado temos a &lt;a href=&quot;http://www.spamhaus.org/&quot;&gt;&lt;i&gt;SpamHaus&lt;/i&gt;&amp;nbsp;&lt;/a&gt;&amp;nbsp;-&amp;nbsp;responsável por lutar &lt;a href=&quot;http://www.spamhaus.org/statistics/spammers/&quot;&gt;contra os spammers&lt;/a&gt;, através de blacklists utilizadas por grande parte dos servidores de email do mundo para evitar spams de redes reconhecidamente problemáticas, e de outro o &lt;a href=&quot;http://www.cyberbunker.com/&quot;&gt;CyberBunker &lt;/a&gt;(também conhecida como&amp;nbsp;&lt;/span&gt;cb3rob)&lt;span style=&quot;font-family: inherit;&quot;&gt;- empresa de hospedagem que é um paraíso para &lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;spammers&lt;/i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; e outros cibercriminosos -&amp;nbsp;seus termos de uso só banem a pornografia infantil e o terrorismo, o resto vale!&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;A &lt;i&gt;CyberBunker &lt;/i&gt;(e outros participantes coordenados em uma operação chamada #&lt;a href=&quot;http://pastebin.com/UAgfwiyC&quot;&gt;OpStopHaus&lt;/a&gt;&amp;nbsp;/ &lt;a href=&quot;http://stophaus.com/forum.php&quot;&gt;site&lt;/a&gt;) estava se sentindo incomodado pela frequente inclusão de suas redes nas listas negras da SpamHaus, e decidiu reagir de forma bastante ruidosa. &amp;nbsp;A &lt;a href=&quot;http://rt.com/news/spamhaus-threat-cyberbunker-ddos-attack-956/&quot;&gt;CyberBunker e seus aliados alegam que a SpamHaus na verdade apenas finge lutar contra o spam, mas o que fazem é censura e que usam &quot;táticas mafiosas&quot;&lt;/a&gt;&amp;nbsp;(este link inclui vídeo da CyberBunker falando sobre os ataques).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
Um ponto importante sobre a transnacionalidade deste tipo de problema (/incidente/crime) - no ataque em pauta, o principal suspeito (CyberBunker), ao ser perguntado sobre a investigação que está sendo feita por vários países que consideram o ataque ilegal, o porta voz da empresa disse que todos que efetuaram (não necessariamente quem planejou) os ataques não estão em países onde ataques de DDoS são ilegais -&amp;nbsp;&lt;a href=&quot;http://rt.com/news/spamhaus-threat-cyberbunker-ddos-attack-956/&quot;&gt;CyberBunker entrevistada (no final deste vídeo)&lt;/a&gt;.&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;O ataque massivo de &lt;i&gt;DDOS &lt;/i&gt;teve como o alvo o site da &lt;i&gt;SpamHaus &lt;/i&gt;e&lt;i&gt; &lt;/i&gt;se&amp;nbsp;iniciou no dia 18 de março, mas nos dias subsequentes ele cresceu muito, a ponto de gerar lentidão na comunicação de algumas redes em diferentes lugares do mundo.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Os ataques que inicialmente se direcionavam à &lt;i&gt;SpamHaus &lt;/i&gt;(dia 19, &lt;/span&gt;&lt;b style=&quot;font-family: inherit;&quot;&gt;75Gbs&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;) foram progredindo para seus fornecedores de conectividade (upstream providers) e chegaram até as redes que formam a infraestrutra de conectividade da internet (&lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_exchange_point&quot;&gt;IX - internet exchange&lt;/a&gt;&lt;/i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;). Na imagem abaixo, divulgada pela &lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;CloudFlare&lt;/i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;, é visível o efeito do ataque no London Internet Exchange (também foram afetados os IX de&amp;nbsp;Amsterdam, Frankfurt e Hong Kong. No pico do ataque o&amp;nbsp;trhoughput&amp;nbsp;foi de&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;font-family: inherit;&quot;&gt;300Gbps&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; (300 Gigabytes por segundo).&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;No dia 20, a empresa chegou a comemorar a resolução do problema com o post &lt;a href=&quot;http://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho&quot;&gt;&lt;i&gt;The DDoS That Knocked Spamhaus Offline (And How We Mitigated It)&lt;/i&gt;&lt;/a&gt;&amp;nbsp;- detalhes abaixo (as ênfases foram incluídas por mim):&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;In the &lt;i&gt;Spamhaus &lt;/i&gt;case,&lt;b&gt; the attacker was sending requests for the DNS zone file for ripe.net to open DNS resolver&lt;/b&gt;s. The attacker&lt;b&gt; spoofed the CloudFlare IPs&lt;/b&gt; we&#39;d issued for Spamhaus as the source in their DNS requests. The open resolvers responded with DNS zone file, &lt;b&gt;generating collectively approximately 75Gbps of attack traffic&lt;/b&gt;. The requests were likely approximately 36 bytes long (e.g. dig ANY ripe.net @X.X.X.X +edns=0 +bufsize=4096, where X.X.X.X is replaced with the IP address of an open DNS resolver) and the response was approximately 3,000 bytes, translating to a 100x amplification factor.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;We recorded over&lt;b&gt; 30,000 unique DNS resolvers involved in the attack&lt;/b&gt;. This translates to each open DNS resolver sending an average of 2.5Mbps, which is small enough to fly under the radar of most DNS resolvers. Because the attacker used a DNS amplification,&lt;b&gt; the attacker only needed to control a botnet or cluster of servers to generate 750Mbps&lt;/b&gt; -- which is possible with a &lt;b&gt;small sized botnet or a handful of AWS instances&lt;/b&gt;. It is worth repeating: &lt;b&gt;open DNS resolvers are the scourge of the Internet and these attacks will become more common and large until service providers take serious efforts to close them&lt;/b&gt;.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Ou seja a&amp;nbsp;&lt;i&gt;&lt;b&gt;CloudFlare &lt;/b&gt;-&lt;/i&gt;&amp;nbsp;ao redirecionar os pacotes que tinham como endereço os IPs do alvo (&lt;i&gt;SpamHaus&lt;/i&gt;) para múltiplos IPs espalhados em vários continentes, aliviou o efeito do ataque e permitiu uma melhor conectividade para as redes próximas ao alvo, mas (potencialmente) afetou as demais redes para onde o tráfego foi redirecionado. Isto normalmente nem é percebido para ataques menores, mas este ataque de 300Gbps, foi diferente.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Para o ataque foram utilizados 30.000 servidores DNS &quot;open resolvers&quot;. Segundo o &lt;a href=&quot;http://openresolverproject.org/&quot;&gt;Open Resolver Project&lt;/a&gt;, já foram mapeados quase 27 milhões de servidores DNS open resolvers na Internet.&amp;nbsp;&lt;/span&gt;Curiosamente, nas últimas 12 horas, o&amp;nbsp;&lt;a href=&quot;http://www.cyberbunker.com/&quot;&gt;CyberBunker&amp;nbsp;&lt;/a&gt;está indisponível mas o&amp;nbsp;&lt;a href=&quot;http://spamhaus.org/&quot;&gt;SpamHaus&amp;nbsp;&lt;/a&gt;continua online.&lt;br /&gt;
&lt;br /&gt;
Algumas fontes de notícias tem exagerado nos efeitos deste ataque à SpamHaus, aumentando sua importância para a internet como um todo - alguns estão o chamando de &quot;bomba nuclear digital&quot;, entre outros exageros. De qualquer forma, se considerarmos que o último maior ataque DDoS foi de cerca de 10Gbps, é um ataque significativo, sim - e certamente efeitos colaterais foram sentidos.&lt;br /&gt;
&lt;br /&gt;
Vale lembrar que ataques &lt;i&gt;DDOS &lt;/i&gt;em servidores de DNS raiz já tiveram um efeito (este sim, devastador) por duas vezes na história da internet - em &lt;a href=&quot;http://www.internettrafficreport.com/event/2.htm&quot;&gt;2002&lt;/a&gt;&amp;nbsp;e&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Distributed_denial_of_service_attacks_on_root_nameservers&quot;&gt;2007&lt;/a&gt;.&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Um vídeo muito interessante sobre ataques de negação de serviço distribuídos utilizando amplificação de DNS foi feito pelo&lt;i&gt; &lt;/i&gt;&lt;a href=&quot;http://team-cymru.com/&quot;&gt;&lt;i&gt;Team Cymru&lt;/i&gt; &lt;/a&gt;(também parceiro da Apura):&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;237&quot; src=&quot;http://www.youtube.com/embed/XhSTlqYIQnI&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;

&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[ Mitigação / Defesa ]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Além dos serviços de mitigação comerciais existentes&amp;nbsp;- O que mais podemos fazer antes de um ataque de negação de serviço para se preparar para ter resiliência durante a execução dele?&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;b&gt;I - Cheat Sheet - &lt;/b&gt;Neste mês publicamos por aqui as&amp;nbsp;&lt;a href=&quot;http://sseguranca.blogspot.com.br/2013/03/metodologias-de-resposta-incidentes.html&quot;&gt;Metodologias de Resposta a Incidentes publicadas pelo CERT da Société Générale&lt;/a&gt;, incluindo o &quot;&lt;a href=&quot;http://cert.societegenerale.com/resources/files/IRM-4-DDoS.pdf&quot;&gt;IRM-4 : Distributed Denial of Service&lt;/a&gt;&quot; (PDF)&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;font-family: inherit;&quot;&gt;II&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;- O pessoal da&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;Whitehat Security&amp;nbsp;&lt;/i&gt;&lt;a href=&quot;http://blog.whitehatsec.com/checklist-to-prepare-yourself-in-advance-of-a-ddos-attack/&quot; style=&quot;font-family: inherit;&quot;&gt;publicou&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;um &quot;&lt;/span&gt;&lt;b style=&quot;font-family: inherit;&quot;&gt;&lt;i&gt;&lt;a href=&quot;http://blog.whitehatsec.com/wp-content/uploads/DDoS-RunBook.docx&quot;&gt;DDoS RunBook&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot; (formato .&lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;docx&lt;/i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;) &amp;nbsp;para auxiliar as empresas a se prepararem para este tipo de incidente de segurança, criando um plano de resposta. Se você faz parte de um time de segurança da informação ou CSIRT, recomendo.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;III&lt;/b&gt; - &lt;b&gt;RFC 5358&lt;/b&gt;-&amp;nbsp;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt; &lt;a href=&quot;http://www.ietf.org/rfc/rfc5358.txt&quot;&gt;Preventing Use of Recursive Nameservers in Reflector Attacks&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;font-family: inherit;&quot;&gt;IV - &lt;a href=&quot;http://www.us-cert.gov/ncas/alerts/TA13-088A&quot;&gt;US CERT - Alert (TA13-088A) DNS Amplification Attacks&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b style=&quot;font-family: inherit;&quot;&gt;V - &lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Em 2007 eu tive a oportunidade de fazer sugestões e revisar um excelente documento produzido pelo &lt;/span&gt;&lt;b style=&quot;font-family: inherit;&quot;&gt;CERT.BR&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;, entitulado &quot;&lt;/span&gt;&lt;a href=&quot;http://www.cert.br/docs/whitepapers/dns-recursivo-aberto/&quot; style=&quot;font-family: inherit;&quot;&gt;Recomendações para Evitar o Abuso de Servidores DNS Recursivos Abertos&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;. O documento foi atualizado esta semana devido aos ataques em pauta - vale a leitura.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;A descrição dos passos do ataque pode ser vista nos parágrafos e imagem abaixo:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;&lt;span style=&quot;font-size: x-small;&quot;&gt;Uma das técnicas de DDoS utilizadas atualmente envolve a exploração de servidores DNS recursivos abertos, para gerar grandes quantidades de tráfego de resposta DNS para uma vítima cujo endereço IP está sendo forjado.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit; font-size: x-small;&quot;&gt;Um dos problemas fundamentais explorado nesses ataques é o fato do sistema de DNS utilizar UDP (Internet User Datagram Protocol) como protocolo principal de comunicação. Como este protocolo não requer o estabelecimento de uma sessão entre o cliente e o servidor e não possui métodos de autenticação, fica facilitada a ação de forjar a origem de uma consulta DNS.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.cert.br/docs/whitepapers/dns-recursivo-aberto/dns-amp-attack.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;168&quot; src=&quot;http://www.cert.br/docs/whitepapers/dns-recursivo-aberto/dns-amp-attack.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: x-small;&quot;&gt;1 - O atacante publica um registro muito grande, em geral TXT, em um servidor DNS sob seu controle (muitas vezes esse pode ser um servidor previamente comprometido pelo atacante).&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: x-small;&quot;&gt;2 - O atacante, de posse de uma lista de servidores DNS recursivos abertos, envia a estes servidores centenas ou milhares de consultas pelo registro publicado no passo 1, forjando o endereço IP da vítima, ou seja, colocando o endereço IP da vítima como endereço de origem da consulta (2a). Deste modo, o atacante faz com que as respostas sejam enviadas para a vítima e não para a máquina que fez as consultas. Na primeira consulta recebida por um servidor recursivo este vai buscar a resposta no servidor controlado pelo atacante (2b), nas demais consultas a resposta será enviada diretamente do cache do servidor recursivo aberto.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: x-small;&quot;&gt;Em diversos casos documentados as consultas feitas à lista de servidores abertos foram realizadas por uma grande quantidade de bots, o que em geral aumenta ainda mais o volume de tráfego sendo enviado para a vítima.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: x-small;&quot;&gt;3 - A vítima recebe as respostas DNS, que costumam gerar uma amplificação de aproximadamente 10 a 80 vezes o tráfego inicial de consultas, pois, para uma consulta média de aproximadamente 50 bytes, podem ser retornados cerca de 4.000 bytes de resposta para a vítima.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
Para solucionar o problema dos &lt;a href=&quot;http://www.us-cert.gov/reading_room/DNS-recursion033006.pdf&quot;&gt;servidores DNS recursivos abertos&lt;/a&gt; é necessário separar os servidores autoritativo e recursivo e atribuir políticas de acesso diferentes a cada um. Isto pode ser feito de duas maneiras:&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
Colocando os servidores DNS em computadores diferentes, com configurações e políticas de acesso diferentes; ou Utilizando o conceito de views (visões ou vistas) do BIND 9 (Berkeley Internet Name Domain versão 9).&lt;/div&gt;
Para a lista completa de sugestões de mitigação para servidores DNS (BIND9 e Microsoft DNS), veja as instruções técnicas&amp;nbsp;&lt;a href=&quot;http://www.cert.br/docs/whitepapers/dns-recursivo-aberto/#2&quot;&gt;diretamente o site do CERT.BR&lt;/a&gt;.&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;b style=&quot;font-family: inherit;&quot;&gt;VI - &lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Uma dica valiosa para empresas/órgãos preocupados em não participar deste tipo de ataque por possuir servidores mal configurados em suas redes é fornecida no documento do CERT.BR (I) . Trata-se do serviço disponibilizado pelo &lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;&quot;DNS Factory&lt;/i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot; -&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://dns.measurement-factory.com/cgi-bin/openresolverquery.pl&quot; style=&quot;font-family: inherit;&quot;&gt;http://dns.measurement-factory.com/cgi-bin/openresolverquery.pl&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;, onde qualquer um pode solicitar que a lista dos &lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;Open Resolvers &lt;/i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;sobre sua res&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ponsabilidade sejam enviadas para os emails de contato (RFC 2142) das redes em questão. (Uma alternativa interessante ao &lt;i&gt;DNS Factory&lt;/i&gt; é o &lt;a href=&quot;http://www.dnsinspect.com/&quot;&gt;&lt;i&gt;DNSInspect&lt;/i&gt;&lt;/a&gt;).&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;VII -&amp;nbsp;&lt;/b&gt;Dicas importantes de mitigação utilizando&amp;nbsp;&lt;i&gt;DNS rate limit&lt;/i&gt;&amp;nbsp;podem ser vistas no site da&amp;nbsp;&lt;i&gt;&lt;b&gt;CloudShield&lt;/b&gt;&lt;/i&gt;: &quot;&lt;a href=&quot;http://www.cloudshield.com/applications/dns-limit-attacks.asp&quot;&gt;3 Ways to Use DNS Rate Limit Against DDoS Attacks&lt;/a&gt;&quot;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;b style=&quot;font-family: inherit;&quot;&gt;VIII&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;- A &lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;Radware&lt;/i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; publicou um &quot;&lt;/span&gt;&lt;i style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://security.radware.com/uploadedFiles/Resources_and_Content/DDoS_Handbook/DDoS_Handbook.pdf&quot;&gt;DDoS Survival Handbook&lt;/a&gt;&lt;/i&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot; - muito útil também.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;IX&lt;/b&gt;&amp;nbsp;- O &lt;b&gt;&lt;a href=&quot;http://www.team-cymru.com/&quot; style=&quot;font-style: italic;&quot;&gt;Team Cymru&lt;/a&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;possui uma página sobre &lt;a href=&quot;http://www.team-cymru.org/Services/Resolvers/instructions.html&quot;&gt;configuração segura de DNS&lt;/a&gt; e &lt;/b&gt;&amp;nbsp;publicou um interessante documento sobre o histórico dos ataques de DDOS:&amp;nbsp;&lt;a href=&quot;http://www.team-cymru.com/ReadingRoom/Whitepapers/2010/ddos-basics.pdf&quot;&gt;http://www.team-cymru.com/ReadingRoom/Whitepapers/2010/ddos-basics.pdf&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: 12px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[ Outras leituras recomendadas sobre o tópico - além das já &lt;i&gt;linkadas&lt;/i&gt; no post ]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Português:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.linhadefensiva.org/2013/03/o-maior-ataque-cibernetico-e-outro-grande-exagero-da-imprensa/&quot;&gt;O ‘maior ataque cibernético’ e outro grande exagero da imprensa&lt;/a&gt;&amp;nbsp; - excelente cobertura do assunto feita pelo &lt;a href=&quot;http://twitter.com/altieres&quot;&gt;Altieres&lt;/a&gt;, que me mandou a URL assim que publiquei o artigo - mais que recomendado)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://anchisesbr.blogspot.com.br/2013/03/seguranca-o-maior-ataque-de-todos-os.html&quot;&gt;O maior ataque de todos os tempos... da última semana&lt;/a&gt;&amp;nbsp;- ótimo &lt;i&gt;post &lt;/i&gt;do &lt;a href=&quot;http://twitter.com/anchisesbr&quot;&gt;Anchises&lt;/a&gt; sobre o assunto. (e &amp;nbsp;&lt;a href=&quot;http://anchisesbr.blogspot.com.br/2013/03/seguranca-mais-ainda-sobre-os-ataques.html&quot;&gt;update&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;b&gt;Espanhol:&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.lostinsecurity.com/blog/2013/03/27/cloudflare-batman-esta-en-la-ciudad/&quot;&gt;CloudFlare, Batman esta en la ciudad&amp;nbsp;&lt;/a&gt;&amp;nbsp;- &lt;a href=&quot;http://twitter.com/lostinsecurity&quot;&gt;Davi Barroso&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Inglês:&lt;/b&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://blogs.cisco.com/security/chronology-of-a-ddos-spamhaus/&quot;&gt;Chronology of a DDoS: SpamHaus&lt;/a&gt;&amp;nbsp;(Cisco)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://arstechnica.com/security/2013/03/when-spammers-go-to-war-behind-the-spamhaus-ddos/&quot;&gt;When spammers go to war: Behind the Spamhaus DDoS&lt;/a&gt;&amp;nbsp;(ArsTechnica)&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://lastwatchdog.com/qa-massive-denial-service-attack-hits-spamhaus/&quot;&gt;Q&amp;amp;A: Massive denial of service attack hits SpamHaus&lt;/a&gt;&amp;nbsp;(LastWatchDog)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://threatpost.com/en_us/blogs/spamhaus-ddos-attacks-triple-size-attacks-us-banks-032713&quot;&gt;Spamhaus DDoS Attacks Triple Size of Attacks on US Banks&lt;/a&gt;&amp;nbsp;(ThreatPost)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://arstechnica.com/security/2013/03/spamhaus-ddos-grows-to-internet-threatening-size/&quot;&gt;Spamhaus DDoS grows to Internet-threatening size&lt;/a&gt;&amp;nbsp;(ArsTechnica)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://staff.washington.edu/dittrich/misc/ddos/&quot;&gt;Distributed Denial of Service (DDoS) Attacks/tools&lt;/a&gt;&amp;nbsp;(Dittrich)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.informationweek.com/security/attacks/ddos-attack-doesnt-spell-internet-doom-7/240151921&quot;&gt;DDoS Attack Doesn&#39;t Spell Internet Doom: 7 Facts&lt;/a&gt;&amp;nbsp;(InformationWeek)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.bgpmon.net/looking-at-the-spamhouse-ddos-from-a-bgp-perspective/&quot;&gt;Looking at the SpamHouse DDoS from a BGP perspective&lt;/a&gt;&amp;nbsp;(BGPMon)&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Inscreva-se no RSS Feed e receba atualizações automáticas&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/4973358960344204853/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://sseguranca.blogspot.com/2013/03/o-maior-ataque-de-negacao-de-servico.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/4973358960344204853'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/4973358960344204853'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/2013/03/o-maior-ataque-de-negacao-de-servico.html' title='Os maiores ataques de negação de serviço (DDoS) da História - 600Gps, 500Gbps, 400Gbps e 300Gbps '/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV4tNlf3G-tM8w8reuLD193Sv3uyClXwv3eyrS-T7gHLDx8tS0h2gy4X-Q6lyLE14zrQV6xi3MJMqicLQv4bTO1gCd3Yav1L9-bPWVvQAgnWGVbRdJDr6n34r5pa62-IvSodbIK_Hj0CY/s72-c/drdos.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1682241822228148612.post-6563325161013230747</id><published>2015-08-18T19:34:00.003-03:00</published><updated>2015-08-18T19:37:26.958-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="privacidade"/><category scheme="http://www.blogger.com/atom/ns#" term="segurança"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows10"/><title type='text'>Configurando o Windows10 com preocupações de Segurança/Privacidade</title><content type='html'>Administradores e Usuários do novo Windows 10 perceberam que não é tão fácil impedir que o SO converse com a nave mãe: &lt;a href=&quot;http://www.extremetech.com/computing/212160-windows-10-still-phones-home-even-when-ordered-not-to-do-so&quot;&gt;&quot;Even when told not to, Windows 10 just can’t stop talking to Microsoft&quot;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Para impedir a comunicação de computadores com o Windows com os endereços utilizados nos mecanismos de
 &quot;Phone Home&quot; Microsoft, bloqueie os seguintes hosts:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
a.ads1.msn.com&lt;br /&gt;
a.ads2.msads.net&lt;br /&gt;
a.ads2.msn.com&lt;br /&gt;
a.rad.msn.com&lt;br /&gt;
a-0001.a-msedge.net&lt;br /&gt;
ac3.msn.com&lt;br /&gt;
ad.doubleclick.net&lt;br /&gt;
adnexus.net&lt;br /&gt;
adnxs.com&lt;br /&gt;
ads.msn.com&lt;br /&gt;
ads1.msads.net&lt;br /&gt;
ads1.msn.com&lt;br /&gt;
aidps.atdmt.com&lt;br /&gt;
aka-cdn-ns.adtech.de&lt;br /&gt;
apps.skype.com&lt;br /&gt;
az361816.vo.msecnd.net&lt;br /&gt;
az512334.vo.msecnd.net&lt;br /&gt;
b.ads1.msn.com&lt;br /&gt;
b.ads2.msads.net&lt;br /&gt;
b.rad.msn.com&lt;br /&gt;
bs.serving-sys.com&lt;br /&gt;
c.atdmt.com&lt;br /&gt;
c.msn.com&lt;br /&gt;
cdn.atdmt.com&lt;br /&gt;
cds26.ams9.msecn.net&lt;br /&gt;
choice.microsoft.com&lt;br /&gt;
choice.microsoft.com.nsatc.net&lt;br /&gt;
compatexchange.cloudapp.net&lt;br /&gt;
corp.sts.microsoft.com&lt;br /&gt;
corpext.msitadfs.glbdns2.microsoft.com&lt;br /&gt;
cs1.wpc.v0cdn.net&lt;br /&gt;
db3aqu.atdmt.com&lt;br /&gt;
df.telemetry.microsoft.com&lt;br /&gt;
diagnostics.support.microsoft.com&lt;br /&gt;
ec.atdmt.com&lt;br /&gt;
fe2.update.microsoft.com.akadns.net&lt;br /&gt;
feedback.microsoft-hohm.com&lt;br /&gt;
feedback.search.microsoft.com&lt;br /&gt;
feedback.windows.com&lt;br /&gt;
flex.msn.com&lt;br /&gt;
g.msn.com&lt;br /&gt;
h1.msn.com&lt;br /&gt;
h2.msn.com&lt;br /&gt;
i1.services.social.microsoft.com&lt;br /&gt;
i1.services.social.microsoft.com.nsatc.net&lt;br /&gt;
live.rads.msn.com&lt;br /&gt;
m.adnxs.com&lt;br /&gt;
m.hotmail.com&lt;br /&gt;
msftncsi.com&lt;br /&gt;
msntest.serving-sys.com&lt;br /&gt;
oca.telemetry.microsoft.com&lt;br /&gt;
oca.telemetry.microsoft.com.nsatc.net&lt;br /&gt;
pre.footprintpredict.com&lt;br /&gt;
preview.msn.com&lt;br /&gt;
preview.msn.com&lt;br /&gt;
pricelist.skype.com&lt;br /&gt;
rad.live.com&lt;br /&gt;
rad.msn.com&lt;br /&gt;
rad.msn.com&lt;br /&gt;
redir.metaservices.microsoft.com&lt;br /&gt;
reports.wes.df.telemetry.microsoft.com&lt;br /&gt;
s.gateway.messenger.live.com&lt;br /&gt;
secure.adnxs.com&lt;br /&gt;
secure.flashtalking.com&lt;br /&gt;
services.wes.df.telemetry.microsoft.com&lt;br /&gt;
settings-sandbox.data.microsoft.com&lt;br /&gt;
sls.update.microsoft.com.akadns.net&lt;br /&gt;
sO.2mdn.net&lt;br /&gt;
sqm.df.telemetry.microsoft.com&lt;br /&gt;
sqm.telemetry.microsoft.com&lt;br /&gt;
sqm.telemetry.microsoft.com.nsatc.net&lt;br /&gt;
static.2mdn.net&lt;br /&gt;
statsfe1.ws.microsoft.com&lt;br /&gt;
statsfe2.update.microsoft.com.akadns.net&lt;br /&gt;
statsfe2.ws.microsoft.com&lt;br /&gt;
survey.watson.microsoft.com&lt;br /&gt;
telecommand.telemetry.microsoft.com&lt;br /&gt;
telecommand.telemetry.microsoft.com.nsatc.net&lt;br /&gt;
telemetry.appex.bing.net&lt;br /&gt;
telemetry.appex.bing.net:443&lt;br /&gt;
telemetry.microsoft.com&lt;br /&gt;
telemetry.urs.microsoft.com&lt;br /&gt;
ui.skype.com&lt;br /&gt;
view.atdmt.com&lt;br /&gt;
vortex.data.microsoft.com&lt;br /&gt;
vortex-sandbox.data.microsoft.com&lt;br /&gt;
vortex-win.data.microsoft.com&lt;br /&gt;
watson.live.com&lt;br /&gt;
watson.microsoft.com&lt;br /&gt;
watson.ppe.telemetry.microsoft.com&lt;br /&gt;
watson.telemetry.microsoft.com&lt;br /&gt;
watson.telemetry.microsoft.com.nsatc.net&lt;br /&gt;
wes.df.telemetry.microsoft.com&lt;br /&gt;
www.msftncsi.com&lt;/blockquote&gt;
&lt;br /&gt;
PS: o bloqueio/redirecionamento pode ser feito nos endpoints em &quot;%windir%\system32\drivers\etc\hosts&quot; ou no seu roteador de borda / DNS interno - ou em todos.. &lt;br /&gt;
&lt;br /&gt;
Outras preocupações a ser encaradas por administradores e usuários do Windows 10: &lt;br /&gt;
&lt;br /&gt;
Windows Update Delivery Optimization: &lt;a href=&quot;http://windows.microsoft.com/en-us/windows-10/windows-update-delivery-optimization-faq&quot;&gt;http://windows.microsoft.com/en-us/windows-10/windows-update-delivery-optimization-faq&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WIFi Sense: &lt;a href=&quot;http://windows.microsoft.com/en-gb/windows-10/wi-fi-sense-faq&quot;&gt;http://windows.microsoft.com/en-gb/windows-10/wi-fi-sense-faq&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
PS: este post será atualizado frequentemente com novidades a respeito do assunto. &lt;br /&gt;
&lt;br /&gt;
&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Inscreva-se no RSS Feed e receba atualizações automáticas&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/6563325161013230747/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://sseguranca.blogspot.com/2015/08/configurando-o-windows10-com.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/6563325161013230747'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/6563325161013230747'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/2015/08/configurando-o-windows10-com.html' title='Configurando o Windows10 com preocupações de Segurança/Privacidade'/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1682241822228148612.post-4885778692808879863</id><published>2015-07-31T01:45:00.000-03:00</published><updated>2015-08-15T01:56:16.830-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hack"/><category scheme="http://www.blogger.com/atom/ns#" term="opm"/><title type='text'>OPM Hack - é possível aprender com a dor dos outros?</title><content type='html'>&lt;div&gt;
&lt;b&gt;Sobre o &lt;a href=&quot;https://en.wikipedia.org/wiki/Office_of_Personnel_Management_data_breach&quot;&gt;OPM HACK&lt;/a&gt;:&amp;nbsp; &lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
Se você é responsável pela segurança de sistemas que processam informações sensíveis e sua organização não possui pessoas treinadas, tecnologias modernas e processos adequados para identificar ataques, recomendo ver este vídeo, pois é melhor tentar aprender com o erro dos outros que ter que aprender tudo com o próprio.. &lt;span style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: #222222; display: inline !important; float: none; font-family: arial, sans-serif; font-size: xx-small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Office of Personnel Management 2015 Breach Testimony:&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;Versão &quot;TL;DR&quot; :Partial Clip:&lt;/b&gt; &lt;a href=&quot;https://www.youtube.com/watch?v=D-P_-YLJ4aQ&quot;&gt;https://www.youtube.com/watch?v=D-P_-YLJ4aQ&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Versão completa, com transcript:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.c-span.org/video/?326593-1/hearing-office-personnel-management-data-breach&quot;&gt;http://www.c-span.org/video/?326593-1/hearing-office-personnel-management-data-breach&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Inscreva-se no RSS Feed e receba atualizações automáticas&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/4885778692808879863/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://sseguranca.blogspot.com/2015/07/opm-hack-e-possivel-aprender-com-dor.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/4885778692808879863'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/4885778692808879863'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/2015/07/opm-hack-e-possivel-aprender-com-dor.html' title='OPM Hack - é possível aprender com a dor dos outros?'/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1682241822228148612.post-359798999747238729</id><published>2015-06-18T02:43:00.002-03:00</published><updated>2015-06-18T02:48:58.532-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="dsic"/><category scheme="http://www.blogger.com/atom/ns#" term="estratégia"/><category scheme="http://www.blogger.com/atom/ns#" term="gsi"/><category scheme="http://www.blogger.com/atom/ns#" term="segurança"/><title type='text'>Estratégia de Segurança da Informação e Comunicações e de Segurança Cibernética da Administração Pública Federal</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;A “Estratégia de Segurança da Informação e Comunicações e de Segurança Cibernética da Administração Pública Federal – 2015/2018&quot; foi recentemente publicada pelo Gabinete de Segurança Institucional da Presidência da República.&lt;br /&gt;&lt;br /&gt;&quot;...aplica-se a todos os órgãos e entidades da APF, entrará em vigor na data de sua publicação no Diário Oficial da União e terá validade no quadriênio 2015-2018, sendo revisada, periodicamente, em consonância com as contribuições das instâncias de assessoramento e apoio à decisão do Modelo de Governança Sistêmica de SIC e de SegCiber da APF, buscando atender as demandas dos órgãos e entidades que integram o Sistema, em prol do alcance da visão de futuro desta Estratégia.&quot;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizvYwIgedPLseyp0tF1En0pGXW8_Qi-_KzWh7ZcK80dWILY-ujIE6337lkMQyYM0lKMETZAGmvR4gubmdbvKgj2ddYnRsVVH9E7pUfAjEfQeGNgXqSXY2fHPj_HT5_Ic6zSzzuMYzTlD0/s1600/mapaest.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizvYwIgedPLseyp0tF1En0pGXW8_Qi-_KzWh7ZcK80dWILY-ujIE6337lkMQyYM0lKMETZAGmvR4gubmdbvKgj2ddYnRsVVH9E7pUfAjEfQeGNgXqSXY2fHPj_HT5_Ic6zSzzuMYzTlD0/s320/mapaest.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=1682241822228148612&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=1682241822228148612&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=1682241822228148612&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=1682241822228148612&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=1682241822228148612&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=1682241822228148612&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;a href=&quot;http://dsic.planalto.gov.br/documentos/publicacoes/4_Estrategia_de_SIC.pdf&quot;&gt;http://dsic.planalto.gov.br/documentos/publicacoes/4_Estrategia_de_SIC.pdf&amp;nbsp;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt;&lt;a href=&quot;http://dsic.planalto.gov.br/documentos/publicacoes/4_Estrategia_de_SIC.pdf&quot;&gt; &lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Inscreva-se no RSS Feed e receba atualizações automáticas&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/359798999747238729/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://sseguranca.blogspot.com/2015/06/estrategia-de-seguranca-da-informacao-e.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/359798999747238729'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/359798999747238729'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/2015/06/estrategia-de-seguranca-da-informacao-e.html' title='Estratégia de Segurança da Informação e Comunicações e de Segurança Cibernética da Administração Pública Federal'/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizvYwIgedPLseyp0tF1En0pGXW8_Qi-_KzWh7ZcK80dWILY-ujIE6337lkMQyYM0lKMETZAGmvR4gubmdbvKgj2ddYnRsVVH9E7pUfAjEfQeGNgXqSXY2fHPj_HT5_Ic6zSzzuMYzTlD0/s72-c/mapaest.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1682241822228148612.post-7250847823399167771</id><published>2015-04-10T11:30:00.001-03:00</published><updated>2015-04-10T18:23:13.327-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="drive-by"/><category scheme="http://www.blogger.com/atom/ns#" term="frança"/><category scheme="http://www.blogger.com/atom/ns#" term="ISIS"/><category scheme="http://www.blogger.com/atom/ns#" term="java"/><category scheme="http://www.blogger.com/atom/ns#" term="skype"/><category scheme="http://www.blogger.com/atom/ns#" term="TV5"/><category scheme="http://www.blogger.com/atom/ns#" term="TV5Monde"/><category scheme="http://www.blogger.com/atom/ns#" term="worm"/><title type='text'>Ataque Cibernético a TV Francesa TV5Monde</title><content type='html'>O Estado Islâmico (ISIS) reinvindicou a autoria de um ataque ocorrido ontem pela rede de TV &quot;TV5Monde&quot;. O resultado foi a interrupção da transmissão da TV, além da retirada do ar do site e páginas de mídias sociais (Facebook, Twitter). Os atacantes também publicaram / &quot;vazaram&quot; documentos obtidos das redes impactadas pelo ataque.&lt;br /&gt;&lt;br /&gt;
Hoje algumas informações sobre o ataque começam a surgir em sites especializados em tecnologia, na França:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.lemondeinformatique.fr/actualites/lire-les-dessous-de-la-cyberattaque-contre-tv5-monde-60798.html&quot;&gt;http://www.lemondeinformatique.fr/actualites/lire-les-dessous-de-la-cyberattaque-contre-tv5-monde-60798.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Pelo descrito neste artigo:&lt;br /&gt;&lt;br /&gt;1) Houve um contato inicial com um jornalista da rede interna da TV, através de Skype, e foram usadas as técnicas conhecidas de identificação de endereço IP interno / externo &quot;Skype resolver&quot; - exemplo: &lt;a href=&quot;http://skypegrab.net/resolver.php&quot;&gt;http://skypegrab.net/resolver.php&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
2) Após isto foram passadas URLs especialmente criadas para exploração de vulnerabilidades Java (Drive-By-Download) - não se sabe ainda se foi utilizado um &quot;Exploit-Kit&quot; ou criada uma página especial com as informações obtidas com a ação descrita no item &quot;1&quot;&lt;br /&gt;&lt;br /&gt;3)  o ataque descrito em &quot;2&quot; introduziu um worm em VBscript que tinha por objetivo encontrar os servidores responsáveis pela transmissão de programas de TV. &lt;br /&gt;&lt;br /&gt;4) Os IPs que originaram os ataques são do Iraque e Algéria.&lt;br /&gt;&lt;br /&gt;Outras fontes citam também passwords de fácil adivinhação / quebra como uma das causas que facilitaram os ataques:&lt;br /&gt;&lt;br /&gt;&quot;We learn in an interview with an official of the Russian computer that the security password of the main server hosting the websites and TV5monde’s data that  the chain was “azerty12345.”&quot; &amp;lt; lembrando que os teclados na França começam com &quot;azerty&quot; em vez de &quot;qwerty&quot;.. &lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://estpresse.com/tv5-monde-hacking-the-main-password/?lang=en&quot;&gt;http://estpresse.com/tv5-monde-hacking-the-main-password/?lang=en&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Parece realmente que eles não são muito cuidadosos com senhas: &lt;br /&gt;&lt;br /&gt; &quot;Hacked French network exposed its own passwords during TV interview&quot;&lt;br /&gt;
&lt;div&gt;
&lt;div&gt;
&lt;a href=&quot;http://arstechnica.com/security/2015/04/hacked-french-network-exposed-its-own-passwords-during-tv-interview/&quot;&gt;http://arstechnica.com/security/2015/04/hacked-french-network-exposed-its-own-passwords-during-tv-interview/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
PS: Estarei atualizando este post conforme novidades surjam novidades sobre o ataque.&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Inscreva-se no RSS Feed e receba atualizações automáticas&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/7250847823399167771/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://sseguranca.blogspot.com/2015/04/ataque-cibernetico-tv-francesa-tv5monde.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/7250847823399167771'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/7250847823399167771'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/2015/04/ataque-cibernetico-tv-francesa-tv5monde.html' title='Ataque Cibernético a TV Francesa TV5Monde'/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1682241822228148612.post-4146547364169066890</id><published>2015-03-19T01:08:00.000-03:00</published><updated>2015-04-10T11:31:07.986-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti-virus"/><category scheme="http://www.blogger.com/atom/ns#" term="bgp"/><category scheme="http://www.blogger.com/atom/ns#" term="blacklist"/><category scheme="http://www.blogger.com/atom/ns#" term="crackers"/><category scheme="http://www.blogger.com/atom/ns#" term="dnsbl"/><category scheme="http://www.blogger.com/atom/ns#" term="hash"/><category scheme="http://www.blogger.com/atom/ns#" term="lm"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="ntlm"/><category scheme="http://www.blogger.com/atom/ns#" term="online"/><category scheme="http://www.blogger.com/atom/ns#" term="pcap"/><category scheme="http://www.blogger.com/atom/ns#" term="sandbox"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="tools"/><category scheme="http://www.blogger.com/atom/ns#" term="wpa"/><category scheme="http://www.blogger.com/atom/ns#" term="wpa2"/><title type='text'>Online Security Tools (Malware, Sandboxes, Hash Checking, Cracking, DNSBL, SSL, BGP)</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://tinyurl.com/seconline&quot;&gt;http://tinyurl.com/seconline&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.angelamaiers.com/images/old/6a00e3981e8fb688330120a7f1a40f970b-pi.jpg&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;136&quot; src=&quot;https://blogger.googleusercontent.com/img/proxy/AVvXsEhcxRGQ__rADnxtJ8d3lUoGbIvpggJ_vDrI8AkLL8t-wPRwmly-WYXMAsKeayYruBjxP62TBfK5oRhRUWuqduN5IiwW1AYe4tTVOK61fdvW55FbFo3c83P5-OMRkqbJbKN0J9hKFVcN0PJ8TRgNDld2PY6Y3tFkjCYHwzTlhOWH5AZTCALULD8739WdqfDsWzo=&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Online Security Tools (Malware, Sandboxes, Hash Checking, Cracking, DNSBL, SSL, BGP)&lt;/div&gt;
&lt;br /&gt;
[ Last Update: 03/19/2015]&lt;br /&gt;
&lt;br /&gt;
Some readers and friends convinced me recently to start posting some articles in english as well - to reach a wider audience. Lets start with a quick post containing a list of very useful online security tools. The services are very useful for incident responders, forensicators and security information practitioners. Enjoy:&lt;br /&gt;
&lt;br /&gt;
Multiple AV Analysis:&lt;br /&gt;
&lt;a href=&quot;http://www.virustotal.com/&quot;&gt;http://www.virustotal.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://virusscan.jotti.org/&quot;&gt;http://virusscan.jotti.org&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://virscan.org/&quot;&gt;http://virscan.org&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://scanner.novirusthanks.org/&quot;&gt;http://scanner.novirusthanks.org&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Sandboxes:&lt;br /&gt;
&lt;a href=&quot;http://camas.comodo.com/&quot;&gt;http://camas.comodo.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.threattracksecurity.com/resources/sandbox-malware-analysis.aspx&quot;&gt;http://www.threattracksecurity.com/resources/sandbox-malware-analysis.aspx&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://urlquery.net/&quot;&gt;http://urlquery.net/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://malwr.com/&quot;&gt;http://malwr.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://anubis.iseclab.org/&quot;&gt;http://anubis.iseclab.org&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://mwanalysis.com/&quot;&gt;http://mwanalysis.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.norman.com/&quot;&gt;http://www.norman.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.sunbeltsoftware.com/&quot;&gt;http://www.sunbeltsoftware.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.threatexpert.com/&quot;&gt;http://www.threatexpert.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
PE File Analyzer:&lt;br /&gt;
&lt;a href=&quot;http://pev.sf.net/&quot;&gt;http://pev.sf.net&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Document Analysis:&lt;br /&gt;
&lt;a href=&quot;https://malwaretracker.com/doc.php&quot;&gt;https://malwaretracker.com/doc.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.joedoc.org/&quot;&gt;http://www.joedoc.org&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.vicheck.ca/&quot;&gt;https://www.vicheck.ca&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://wepawet.iseclab.org/&quot;&gt;http://wepawet.iseclab.org&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://jsunpack.jeek.org/&quot;&gt;http://jsunpack.jeek.org&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.adopstools.com/&quot;&gt;http://www.adopstools.com/&lt;/a&gt; (flash)&lt;br /&gt;
&lt;a href=&quot;https://blog.honeynet.org.my/gallus/upload/about&quot;&gt;https://blog.honeynet.org.my/gallus/upload/about&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WhiteLists/BlackLists Hash Checking:&lt;br /&gt;
&lt;a href=&quot;http://fileadvisor.bit9.com/&quot;&gt;http://fileadvisor.bit9.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://hash.cymru.com/&quot;&gt;https://hash.cymru.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://isc.sans.edu/tools/hashsearch.html&quot;&gt;http://isc.sans.edu/tools/hashsearch.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://bin-test.shadowserver.org/&quot;&gt;http://bin-test.shadowserver.org&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://isc.sans.edu/tools/hashsearch.html&quot;&gt;http://isc.sans.edu/tools/hashsearch.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.team-cymru.org/Services/MHR/&quot;&gt;http://www.team-cymru.org/Services/MHR/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.nsrl.nist.gov/&quot;&gt;http://www.nsrl.nist.gov/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.bit9.com/products/bit9-global-software-registry.php&quot;&gt;http://www.bit9.com/products/bit9-global-software-registry.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/OWASP_File_Hash_Repository&quot;&gt;https://www.owasp.org/index.php/OWASP_File_Hash_Repository&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Cracking for WPA/WPA2, LM e NTLM:&lt;br /&gt;
&lt;a href=&quot;https://www.cloudcracker.com/&quot;&gt;https://www.cloudcracker.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Other Hash Crackers Online (MD5,SHA1&amp;amp;256,LM,NTLM,MySQL):&lt;br /&gt;
&lt;a href=&quot;http://www.objectif-securite.ch/&quot;&gt;http://www.objectif-securite.ch/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://md5.thekaine.de/&quot;&gt;http://md5.thekaine.de/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://hashcrack.ath.cx/onlinehashcrackers.htm&quot;&gt;http://hashcrack.ath.cx/onlinehashcrackers.htm&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Multiple DNSBL Checking (Spam):&lt;br /&gt;
&lt;a href=&quot;http://multirbl.valli.org/&quot;&gt;http://multirbl.valli.org&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://mxtoolbox.com/&quot;&gt;http://mxtoolbox.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Network captures Analysis:&lt;br /&gt;
&lt;a href=&quot;http://cloudshark.org/&quot;&gt;http://cloudshark.org&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://pcapr.net/&quot;&gt;http://pcapr.net&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Testing:&lt;br /&gt;
&lt;a href=&quot;https://www.ssllabs.com/ssldb/&quot;&gt;https://www.ssllabs.com/ssldb/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.serversniff.net/content.php?do=ssl&quot;&gt;http://www.serversniff.net/content.php?do=ssl&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPs/URLs Analysis:&lt;br /&gt;
&lt;a href=&quot;http://trasir.com/&quot;&gt;http://trasir.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.ipvoid.com/&quot;&gt;http://www.ipvoid.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.urlvoid.com/&quot;&gt;http://www.urlvoid.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.google.com/safebrowsing/diagnostic?site=example.com&quot;&gt;http://www.google.com/safebrowsing/diagnostic?site=example.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.unmaskparasites.com/&quot;&gt;http://www.unmaskparasites.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.hackerfantastic.com/&quot;&gt;http://www.hackerfantastic.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Autonomous Systems and BGP Monitoring:&lt;br /&gt;
&lt;a href=&quot;http://bgpmon.net/&quot;&gt;http://bgpmon.net&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://cyclops.cs.ucla.edu/&quot;&gt;http://cyclops.cs.ucla.edu&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://maliciousnetworks.org/&quot;&gt;http://maliciousnetworks.org&lt;/a&gt;
&lt;!-- Blogger automated replacement: &quot;https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fwww.angelamaiers.com%2Fimages%2Fold%2F6a00e3981e8fb688330120a7f1a40f970b-pi.jpg&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*&quot; with &quot;https://blogger.googleusercontent.com/img/proxy/AVvXsEhcxRGQ__rADnxtJ8d3lUoGbIvpggJ_vDrI8AkLL8t-wPRwmly-WYXMAsKeayYruBjxP62TBfK5oRhRUWuqduN5IiwW1AYe4tTVOK61fdvW55FbFo3c83P5-OMRkqbJbKN0J9hKFVcN0PJ8TRgNDld2PY6Y3tFkjCYHwzTlhOWH5AZTCALULD8739WdqfDsWzo=&quot; --&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/Sseguranca&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Inscreva-se no RSS Feed e receba atualizações automáticas&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://sseguranca.blogspot.com/feeds/4146547364169066890/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://sseguranca.blogspot.com/2012/03/online-security-tools-malware-sandboxes.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/4146547364169066890'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1682241822228148612/posts/default/4146547364169066890'/><link rel='alternate' type='text/html' href='http://sseguranca.blogspot.com/2012/03/online-security-tools-malware-sandboxes.html' title='Online Security Tools (Malware, Sandboxes, Hash Checking, Cracking, DNSBL, SSL, BGP)'/><author><name>SS</name><uri>http://www.blogger.com/profile/16456034990657036324</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry></feed>