Kako Izrael prati karantin i moguce zarazene

Trenutno je u Izraelu vanredno stanje zbog korona virusa i svi resursi te države se koriste da se suzbije. Unutrasnja obavjestajna služba koristi monitoring kretanja gradjana putem signala mobilne telefonije kako bi saznali koliko ljudi se kreće, putanju kretanja i zone u koje idu. Sa jedne strane se nalaze predajnici i uredjaji tj mobilni telefoni. Predajnik može svakih N sekundi da pošalje sistemsku poruku telefonu da mu dostavi informacije o kvalitetu signala, jačini i drugo. Sa tim informacijama i lokaciji predajnika mogu da kreiraju kretanje osoba i da li se drže karantina. Sa tim takodje mogu da izoluju ljude koji krše karantin il čak ljude u zoni infekcije.

Računarski i biološki virusi

Često se ljudi zapitaju kakva je sličnost izmedju računarskih i bioloških virusa. Ali i koja stvar ih čini "smrtonosnim".

Prvo da vidimo opšte karakteristike jednih i drugih: - Infekcija (način prenošenja, brzina zaraze) - Samoodrživost ( otpor i održivost u različitim uslovima ) - Nevidljivost / Stealth / Sakrivanje

Infekcija

Biološki virusi imaju nekoliko načina a to su dodirom, vazduhom, preko materijala i drugo. Računarski virusi mogu koristiti internet (email, ostale protokole TCP/IP, USB, fajlove (generalno fajlove), aplikacije poput IM skype viber whatsapp) Ovdje se gleda opet kolika je brzina replikacije, brzina prenošenja kao i procenat efektivnosti (npr da li ce većina ljudi kliknuti na link il fajl u email-u)

Samoodrživost

U oba slučaja zavisi od virusa i na način koji kada dodje do novog hosta / žrtve spoljni faktori ne utiču na dalje širenje. Npr Windows XP ali ne i Windows 98 ili osoba koja nema faktore da se virus zadrži (npr pere ruke, ne dira lice)

Nevidljivost / Stealth / Sakrivanje

Svaki virus (iz oba segmenta) uspijeva da se prosiri prije nego se počne otkrivati, spriječavati upravo zbog svoje nevidljivosti il da kažem sto je duži period neprimjetnosti kod hosta / žrtve to je širenje veće.

Uglavnom ovo su tri zajedničke karakteristike računarskih virusa i bioloških virusa. Imenovanje i kako se opisuju u imenu ću da preskočim.

Things could not fit into my CV

There are many things I did not put into my CV. It is hard to explain, to present to others. Sometimes I can not find words. And also by night, I become a different person (Dr Jekyll and Mr Hyde). Not sure how to organize topics - by area or year. I think the year would be fine.

1998-2003

Most ISP (Bosnia and Herzegovina) have been hacked(from my side) and reported to them (it was a weird thing to explain ppl that they have a bug, issue, security issue, to update things, etc). From my bag of tools goes:

  • Mysql without a password but root/toor and qwerty or 123456789 for SSH/Admin page
  • RPC that has format bug (RH 6.0)
  • default password, default users
  • not having blocked NetBIOS (but even they put password there was a way to crack that because of flaw)
  • Huh and others
  • RE my fav app: System Mechanic. I learned about approx 30 days how to crack this app. Later same skills I used to crack the app and find how they work. Connect with other security people.
  • cracked several encrypted textss (ceasar, viegner) with statistics and logic
  • Build the first game in Visual Basic with minimum information(one book for VB) and reverse engineering (mind experiment, thinking)

2004

My first bank job. I got a position as an IT technician. I got hacked ATM - and reported to the bank (security officer was my good friend from high school). The same situation is still present in most Bosnia and Herz Banks. SMS banking - they start to apply new SMS banking also to pay trough SMS. I demonstrate an issue with local telecoms - spoofing SMS, sending money on other people's accounts. They stop to plan SMS banking in this direction. First war game server. It was fun. I did play later more 2 times: at BalCcon, at Ericsson.

2006

The web application at government, police, and telecoms - I did send email but they or did not read or they promise me to get jailed. SQL injection, non-authorization, bad permission for accounts, etc.
I did not care what they think - I told them they can do that - but in that time Bosnia and Herz did not have the law on that - so it was funny. They did not get the idea of how this information was good for them. They saw me as a danger and risk to them.

2007

A lot of hacking, a lot of playing with networks, systems. The found issue in PPPoE and how to crack any wifi in that time in Bosnia and Herzegovina. It was funny - I send a report to one big WIFI ISP. Found that people massive use admin/admin on some ISP - I automate the gathering of this info and send a report to ISP. Later I hack several times their servers and report to them. Last my hack was SQL injection and report to them. They respond with "does not matter, no one beside you would hack us" - this was a failure. Later in 2008, happen several hacks of this ISP and 10k users DB was "shared" over the net. We found bad guys but police did not have the law on this and how to handle the situation. So they left them out.

2008

Busted first spam king in Bosnia and Herzegovina. He was using several ISP and dump my email from some DB to send me spam. He did it wrong. I found him - reported and give info to ISP. They did the next steps. Also half of my friends and non-friends have free internet. I found a way to get a free net each time I hack some ISP to give me 1 year or more free net. So I share it with people. Main domain name register for domain .ba - SQL inje. Reported - they switch to using rewriting to URL. The code is still there with bugs.

2009

Start to examine a global threat - people, tools, operations. From organized crime groups, state-level hackers to small scripts kids. It was fun to watch criminals, police, FBI agents how they play games. In the end, I gather a good base on how things go underground. From OSINT skills to satellite hacking. Develop the first symmetric algorithm that I would cryptoanalysis in 2012 and find an issue. Cracked Cyber Command hash as part of the challenge. I was a 9th person who did that.

2010

Hacked 2 banks in Saudia Arabia as part of the pent-testing contract that I did have with one company. My NDA was finished so in short: bypass some security(not sure to say but it was Gmail security at one side - where is RAT sent to the bank), plant RAT, gather info, print screen, write a document(they did have more SQL inje, non-auth URL access, and others) and get money from the client. I did get an offer but I refuse. Simple for me this was fun. For them, it was a job (and not fun at all) + with the money I got - I did not want to travel anywhere. Local CyberCrime unit refuses my CV. Later in front of them(this Cyber Crime unit), I would be offered a job from the FBI but I refuse. (later in 2012, I would give some tips on this)

2011

First, a remote job. Later I got one more. The second one was Ipercast - I found lot of security issue (ex PHP shell execution and gathering info about clients, files, etc )

2012

I start to work for the best company in the world. Ipercast. They are the first CDN and from them was made Akamai. Bussines unit that was in Bosnia and Herz. was planned to be closed because of financial issues. By my own skills and directing by my CTO Alexander - we bring one solution that saves 25 jobs position. The solution would be used by Vodaphone Germany, it would bring a lot of cash and a similar approach would be used for RAI Italia, Sony Germany, others. Manipulating on the low level with streaming for different protocols (RTMP, HTP, RTPS, others). I started a project(for one NGO): Streaming. It was included a special type of streaming and security. It was a combination of many things. My NDA was ended now. Later by this year, I was approached by people from the Cyber unit and FBI to work for them. I demonstrate skills that at that time was advance for these units and organization. I refuse because: I did not want to do what other people want me to do + I was working for the best company in the world with the best position in the world. My job offers me freedom, travels, and to combine all my skills. I was paranoid and at some point, they start to follow me, read my email, read my chats - this was exposed when we have meeting - I told to FBI that it was wrong to read my emails, chats, send black van, agents, etc and local police follow my IMEI and position as a local secret agency follow my traffic (I found how things goes from the law, technical specification, how they manage - complete picture). Also, I did show a picture of FBI van to people who organize BalCcon (Balkan Security conference) 9 months before this happens(only proof for now). They laff. Everyone laff at that time. But not me. I am still paranoid. News and some insider got wrong information. I spend the next 4 years removing this title and text trough cyberspace. It was wrong and not ethical at all. Bosnia and Herz does not have any law to prevent similar situation. https://web.archive.org/web/20170926234049/https://www.nezavisne.com/novosti/hronika/U-akciji-FBI-ja-uhapsen-haker-Vladimir-Cicovic/171278

2013

My company tries to get a server with a domain in China. I found the issue after my sysadmin team tries to resolve it with no success: It was a china firewall that works on the domain level. It was fun. I put all my effort to help a group of people to fight against first information warfare - anti-vaxer propaganda. I gather information as part of a group, find weakness inside of false news distribution - but the government in Bosnia and Herz did not want to know this. As also the cyber unit as also the ministry of health and CERT RS. The first victim, a baby, who did not get the vaccine to stop some nasty thing was to die 2 years later because parents got influenced by this false news. This continues in 2020 - and the government does not have a proper reaction - instead, it getting more worst especially because people are not able to take critical thinking on the topic.

2014

Flood. Bosnia and Herzegovina. I help the local Red Cross to use automatic sending text on all numbers for volunteers with one button. I found a way how to organize communication in parts there was no electricity. Also, use the normal distribution to find how many there are baby and diabetic patients in the flooded area. My CTO did have an issue with Gmail. I troubleshoot and found that Gmail has issue 4 days before they put into board. I try to contact them. Also later I would find a security issue with there emails that still exist. If you see a green icon (for TLS secure email sending) it was me. Still - they can not handle how email arrives at them or goes to other SMTP - in other words, all emails you send are not secure they are open to reading whoever intercepts them.
Hunted Islamic State trough the internet. Find them all that makes propaganda war against Bosnia and Herz government. Found names, locations, profiles - and report them. After one month of spreading fear to citizens - I got a little bit angry about this. The only reason why this happens is they get me angry as also the government that spends millions of euros on software and weapons and no chance to find people over the internet. One of the largest DDOS attacks on local TV stations and finding a person who did this also find solution to stop the current one. In this case, local CERT RS as also Cyber Unit - they did not find a way to help local TV stations. I did ask them to involve me in this kind of case - they never did. Discovered that MTEL telecom ISO27001 - before they apply to the public. I was using a private URL when they accessed. In other words, they can follow what and when someone visits trough this ISP.

2015

Told the Bosnia and Herz. Ministry of Security for "top security software for encryption messages" - not to use because it has a flaw. They did not respond to this. They don't know what to do. Offered help to local Cyber Unit for solving the case of encrypted hard disk - simple, unofficial channels I send them query to allow me to crack password for encrypted hard disk. They refuse. Why? You need to ask them. For me, it brings fun and intellectual challenges.

2017

I got an interview with Facebook and Google(Ireland - not California). Reject interview for Google after failing the Facebook interview(Got 2 programming task, simplest one - fall both). In the end - I did not saw my self inside that kind of company. I love algorithms, programming, math, and puzzles - but simple I don't see my self it that kind of company. Only I promise to my self - if any day in the future I want to go - it would be booking dot com. I forget to mention I fall interview with booking dot com in 2015. Face to face interview. Simple I did not prepare myself and the persons who interview me - did not get my idea correctly. It happens (I did not present small detail and complete troubleshooting question goes in the wrong direction)

2018

Someone send anonymous mail to one of the judges as a threat - I asked again some politician to help this Cyber Unit to identify the person who did this. From my perspective - it was possible even person use proxy and hide very well (from information that I read from the news).

2019

Start working for ZenDev and Ericsson as a consultant.

2020

0wned some tweeter bot from local Bosnia and Herz. CERT (they mess up with keys) - reported to them as part of ethical hacking.