In March 2015, Binary Confidence prepared a special presentation for journalists and customers. The presentation consisted of live demonstrations of various attacks. How did we do it? Firstly, the participants viewed 3 screens. The first showed a victim and his behavior during an attack, followed by the results of the attack. On the second screen we showed the attacker’s workstation desktop. The participants had a unique opportunity to see how the attacker prepared for the attack, how he gained access privileges and how it looks when someone steals information or breaches the system. Last but not least, the third screen showed the Binary Confidence monitoring center. Journalists and customers could see here how we detected the anomalies and attacks in real time.
First of all, the participants received a theoretical overview. In the second part of the workshop, the participants got involved in direct attacks. They had a chance to see what is actually happening on attacker’s side during the phishing attack and what his capabilities were. Furthermore, we simulated how a Wi-Fi password could be cracked and how personal data could be sniffed from a badly secured Internet store. We also showed a more sophisticated attack gaining admin access to a victim’s server through BASH shell shock vulnerability. During the 3rd part of the presentation, Binary Confidence gave some advice on how individuals could be protected from these threats.
We are proud to contribute to raising knowledge of the importance of privacy security. Based on very positive feedback from users we will prepare another workshop this autumn. Connect with us and stay informed about the exact date.
Binary Confidence team