<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Cyber Security Southampton - Medium]]></title>
        <description><![CDATA[Cyber Security Southampton Blogs - Medium]]></description>
        <link>https://medium.com/cybersoton?source=rss----232f5e7deb47---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Cyber Security Southampton - Medium</title>
            <link>https://medium.com/cybersoton?source=rss----232f5e7deb47---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Wed, 20 May 2026 13:30:26 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/cybersoton" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Contributing to COVID-19 Research from Home: Putting your Raspberry Pi to Work.]]></title>
            <link>https://medium.com/cybersoton/contributing-to-covid-19-research-from-home-putting-your-raspberry-pi-to-work-a17d853453c4?source=rss----232f5e7deb47---4</link>
            <guid isPermaLink="false">https://medium.com/p/a17d853453c4</guid>
            <dc:creator><![CDATA[Robert Thorburn]]></dc:creator>
            <pubDate>Mon, 04 May 2020 12:02:54 GMT</pubDate>
            <atom:updated>2020-05-04T12:02:54.108Z</atom:updated>
            <content:encoded><![CDATA[<p>Low power Single Board Computers (SBCs) like the Raspberry Pi are not generally associated with real-world high-performance computing. Usually, the only link is educational use or pet projects, but one initiative aiming to change that is Rosetta at home. Like other similar projects, it allows private citizens to donate some part of their home PC’s processing power to international researchers. The home user simply installs an app, and the rest is managed automatically. One thing that sets the Rosetta project apart though is that through the correct software it allows for ARM-based SBCs to be used. Although such systems are low power, there are millions of them in circulation. Cumulatively then, they can have a significant impact.</p><p>If you have an ARM-based SBC capable of supporting a 64-bit OS, then the steps needed to get Rosetta up and running are pretty straightforward. They are presented below using a Raspberry Pi 4, with OS installation from scratch, though this may not be needed if you have a compatible OS already installed. If so, just skip down to the Software Installation section. A Raspberry Pi 3 or 4 will do the trick but for other SBC’s you will need to check. If you are unsure of your OS’s suitability or that of your SBC, simply run the following command from the command line:</p><pre>lscp</pre><p>You will be presented with a lengthy output, but we are only interested in the first two items. The first item is “Architecture” and must be “x86_64”. The second item is “CPU op-mode(s)” and should read” 32-bit, 64-bit”. If it does not include “64-bit”, then your OS will not be suitable and must be overwritten for the needed software to work. If so, please make sure that you backup any important files before installing your new OS.</p><p><strong>The Operating System</strong></p><p>Technically any 64-bit OS should do the trick, but a lightweight or terminal only distribution will be preferred here since the SBC used will be dedicated to this single task. Our choice to meet these criteria is 64-bit Ubuntu server for Raspberry Pi. Please make sure to select the 64-bit OS for your Raspberry Pi model (3 or 4) from the download link here: <a href="https://ubuntu.com/download/raspberry-pi">https://ubuntu.com/download/raspberry-pi</a></p><p>Once you have downloaded the OS to a PC or laptop, you need to write it to a micro SD card for use in the Raspberry Pi. It is common practice for micro SD cards to be sold with a full-size SD card adapter allowing for it to be read by an SD card reader such as those found on many laptops. Alternatively, you can also use a USB card reader if your PC/Laptop does not support SD cards. Next, you need to use software to write the OS to the micro SD card. Our preferred solution is Belena Etcher, and you can download it here: <a href="https://www.balena.io/etcher/">https://www.balena.io/etcher/</a></p><p>Once installed, open up Etcher, insert the micro SD card into the card reader, and use Etcher’s simple interface to select first the Ubuntu OS you downloaded and secondly the micro SD card to write it to. Etcher will do the rest and notify you when the micro SD card is ready. Please make sure you have the micro SD card selected when writing the OS to it, since Etcher will overwrite whatever is in the target drive. With that done, we are ready to get the SBC running. If you need more help on the OS setup, especially if this is your first time doing it, please have a look at the Raspberry Pi guide located here: <a href="https://projects.raspberrypi.org/en/projects/raspberry-pi-setting-up">https://projects.raspberrypi.org/en/projects/raspberry-pi-setting-up</a></p><p>Remove the micro SD card from your computer and insert it into the card slot at the bottom of the Raspberry Pi or other SBC, connect an Ethernet cable and then power it on. At this point, you can plug a screen and keyboard into your SBC, or you can ssh into it. We will describe the ssh option below, but all other steps will be identical. Please note that if you are a novice user, the screen and keyboard option will be easier, and you can now skip to the setup section below.</p><p>To ssh into the SBC, you will need to connect it to your router via Ethernet, have ssh enabled on the SBC and know the login credentials. For Ubuntu server ssh will be enabled by default, while the username and password will both be “ubuntu”. We will also need to know the IP address of the SBC to ssh into it. You can use any network scanner to find a new device and its IP address on your network. For this task, I usually use Netdiscover due to its lightweight nature. If needed, you can get Netdiscover via your package manager or else here: <a href="https://github.com/alexxy/netdiscover">https://github.com/alexxy/netdiscover</a></p><p>Once you have everything ready, go ahead and ssh into the SBC using your preferred tool. For this, I used PuTTY which you can download here: <a href="https://www.chiark.greenend.org.uk/~sgtatham/putty/">https://www.chiark.greenend.org.uk/~sgtatham/putty/</a></p><p><strong>Setup</strong></p><p>With your SBC has booted up you are either connected via ssh or have plugged in a screen and keyboard. You will be presented with a terminal window only (no graphical interface here) and asked for a username and then the password. Enter “ubuntu” for both (without the quotation marks, and assuming you are using Ubuntu server). You will now be logged in and the first order of business will be to change the system password. On Ubuntu server you will be prompted to do so as follows:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/660/1*QXE-YlBkTFz-FmyJXnrLlg.jpeg" /><figcaption>First login</figcaption></figure><p>The “(current) UNIX password” is “ubuntu” and the new password prompted for thereafter will be whatever you wish. Once this is done, you will need to ensure that your system is up to date. First run:</p><pre>sudo apt-get update</pre><p>Once this is done you need to run:</p><pre>sudo apt-get upgrade</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/821/1*1iUqbOOGSn_S4D9V1b7i9w.jpeg" /><figcaption>Update and upgrade</figcaption></figure><p>You will be prompted to install new packages and should select “Y” to proceed. Upgrading the system could take quite some time so while this is running, we need to create a Rosetta account. Head over to the Rosetta site at <a href="https://boinc.bakerlab.org/rosetta/">https://boinc.bakerlab.org/rosetta/</a> and click the “sign up” tab top right.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*DzZrjo5KdM-XWFMi2HWMtg.jpeg" /><figcaption>Sign up at top right</figcaption></figure><p>Follow the onscreen prompts to create your account. Once done look at the right top side of your account dashboard and under the “Community” heading locate the “member of team” section. Click the link to the right of it to join a team. This is not strictly necessary but since we are trying to show the utility of ARM-based SBCs, it would be good to join the “crunch-on-arm” team. Once done, your “Community” tab should look as follows:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*-2F-QcbVviPYE8HafNTuVQ.jpeg" /><figcaption>Crunch-on-arm</figcaption></figure><p><strong>Software Installation</strong></p><p>Once your account is set up and the OS upgraded, we can proceed. To install the needed software, we will use the following command and select “Y” at the install prompt:</p><pre>sudo apt-get install boinc-client boinctui</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/651/1*91Y39RCOE1_BftSS8CHWow.jpeg" /><figcaption>Install boinc</figcaption></figure><p>Once the installation is complete, we can launch the software using the following command:</p><pre>boinctui</pre><p>You will be presented with a configuration screen, simply hit enter to continue. One of the first things you will probably notice is the pretty awful interface. Hit F9 to enter the menu and from the “View” tab select “ASCII line draw” and hit “enter” as shown below:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*k4c3a8Lax2wB1x3HwYH4aw.jpeg" /><figcaption>Change the view</figcaption></figure><p>Now hit F9 again and from the “Projects” tab select “New Project” and then “Rosetta@home”. You will now be prompted to enter your email and password as you used to set up your account on the website.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*03m4illAUWbK8TdgN7syMA.jpeg" /><figcaption>Join Rosetta@home</figcaption></figure><p>That is all there is to it, from here you can just let it run and the software will take care of everything. To get a glimpse of what is going on though you can check the system display in the boinc software or else go to your profile on the Rosetta site and under “Computing and Credit” look for “Computers on This Account” and click the “view” link next to it. Please note that the display in the software shows running progress while the website is slower to update:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ZlVpiFvI_GE5aLU24rZi-g.jpeg" /><figcaption>Let the results roll in!</figcaption></figure><p>As of the time of publication the crunch-on-arm team is in the top 1% of performers, showing how big a contribution a small computer can make!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a17d853453c4" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cybersoton/contributing-to-covid-19-research-from-home-putting-your-raspberry-pi-to-work-a17d853453c4">Contributing to COVID-19 Research from Home: Putting your Raspberry Pi to Work.</a> was originally published in <a href="https://medium.com/cybersoton">Cyber Security Southampton</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[SJTU-UoS joint course of Data Protection for Chief Data Officer was launched]]></title>
            <link>https://medium.com/cybersoton/sjtu-uos-joint-course-of-data-protection-for-chief-data-officer-was-launched-3b67902e88d?source=rss----232f5e7deb47---4</link>
            <guid isPermaLink="false">https://medium.com/p/3b67902e88d</guid>
            <category><![CDATA[shangai]]></category>
            <category><![CDATA[training]]></category>
            <category><![CDATA[gdpr]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[data-protection]]></category>
            <dc:creator><![CDATA[rs]]></dc:creator>
            <pubDate>Wed, 17 Jul 2019 13:57:14 GMT</pubDate>
            <atom:updated>2019-07-17T13:57:14.730Z</atom:updated>
            <content:encoded><![CDATA[<p>A few month ago, a team of professors and researchers from the cyber security group and law school of University of Southampton (UoS) went to Shanghai Jiaotong University (SJTU) to give a one-week course. The course was organised by Shanghai Advanced Institute of Finance (SAIF), which is a world-class institution of research and advanced learning in finance and management established at SJTU in April 2009. The topic of the program, mooted and designed by organisers from both parties, was data protection with a focus on legal and cyber security perspectives for Chief Data Officers (CDOs).</p><p>On May 25, 2018, the EU’s <strong>General Data Protection Regulations</strong> (the GDPR), known as the most stringent data protection law in the history of the European Union, came into effect.</p><blockquote>Regardless of whether the data processing is carried out in the EU, the process may still be subject to the GDPR, which will inevitably require every company and individual dealing with the EU data to study the GDPR seriously.</blockquote><p>The radius of business radiation of companies spreads the jurisdiction of GDPR globally. Meanwhile, “<em>Enterprise Data Governance</em>” was introduced as a new management concept, and this is why CDO (Chief Data Officer) has entered the corporate executive team. The internal control mechanism of large enterprises is increasingly oriented towards a unified privacy protection strategy. For example, Apple and Facebook have begun to implement the global unified implementation of the GDPR. <em>How to understand the essence of GDPR and put it into practice? How to think about data security from the information security perspective?</em></p><p>Against this backdrop, <strong>this course aims for CDOs and information security officers from both government and enterprise. </strong>The content varies from shallow to deep, which has six modules including “privacy and anonymity”, “cross-border data flow”, “network security”, “competition and finance”, “financial technology and blockchain”, “data protection compliance”. Through the combination of theory and practice, this program intends to empower the senior management of the enterprise to master the principles of data protection and its supervision, thus promoting the development of the enterprise.</p><p><strong>UoS Instructors</strong></p><p><a href="https://www.southampton.ac.uk/law/about/staff/sophie_stalla.page"><em>Sophie Stalla-Bourdillon</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*HYceK1knnT0osTiAAzGnkQ.jpeg" /></figure><p><a href="https://www.southampton.ac.uk/law/about/staff/hschmidt.page"><em>Hedvig Schmidt</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*Mk4qcJdYA0eB-Z5I8--2FQ.jpeg" /></figure><p><a href="https://www.ecs.soton.ac.uk/people/vsassone"><em>Vladimiro Sassone</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*5O7tUocFYHST8aYaHSAJsg.jpeg" /></figure><p><a href="https://www.ecs.soton.ac.uk/people/am6n16"><em>Andrea Margheri</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*EiSEpf-l2MEvnSEJghMnQA.jpeg" /></figure><p><a href="https://www.southampton.ac.uk/law/postgraduate/research_students/hip1v12.page"><em>Henry Pearce</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*mgZC4ZAD6yzcyedi1jkD9g.jpeg" /></figure><p><a href="https://www.gre.ac.uk/people/rep/faculty-of-business/dr-mu-yang"><em>Mu Yang (University of Greenwich)</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*JNg4Ej7CNzLeFd3zk89K1g.jpeg" /></figure><p><em>Runshan Hu</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*bC1dpCsMtU7yXF87X9Jjjg.jpeg" /></figure><p><strong>SJTU Instructors</strong></p><p><a href="http://infosec.sjtu.edu.cn/en/DirectoryDetail.aspx?id=66"><em>Yue Wu</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*MIyqKXivbm_WoqEOiHBp4Q.jpeg" /></figure><p><a href="https://flia.org/team/duoqi-xu/"><em>Duoqi Xu</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*wslx57G0E5TWTwn9Ii1nqA.png" /></figure><p><a href="http://law.sjtu.edu.cn/TeacherDetail169.aspx"><em>Chenguo Zhang</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*onmGyNlPdk522HqZ5UQJkQ.jpeg" /></figure><p><em>Matias Aranguiz</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/554/1*pzvyyPHuIm1IMjSrwIAPcw.jpeg" /></figure><p><strong>The Classes</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/594/1*pSDTlw8VJ8wC-VQsiOTXyA.jpeg" /></figure><p>The classes were a mix of computer science, law, and finance. People from various backgrounds sat together and discussed about the future of data privacy, cyber security, and FinTech etc. It is illuminating to witness some cyber security principles being evaluated divergently based on different values from legal and financial values, and also to see similar problems being described in disparate terms when starting from distinct perspectives.</p><p>For the first time over, the partnership between UoS and SJTU spanned multiple departments including UoS’s law school and the cyber security group (ECS school) and SJTU’s school of finance and cybersecurity.</p><blockquote>We believe a multi-disciplinary approach via international lens is crucial to derive credible informed views, productive and fruitful collaborations.</blockquote><p>Also, this is consistent with cyber security group’s focus on the multi-disciplinary approach when doing research in UoS.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*4UkNyd4P8CKhOJG2_4Kqkg.png" /></figure><p><strong>Night Views in Shanghai</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kQLI2Y8s7X22vxHXBGO_aA.jpeg" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_MvDDbCRv4JOieiMZQNMfw.jpeg" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3b67902e88d" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cybersoton/sjtu-uos-joint-course-of-data-protection-for-chief-data-officer-was-launched-3b67902e88d">SJTU-UoS joint course of Data Protection for Chief Data Officer was launched</a> was originally published in <a href="https://medium.com/cybersoton">Cyber Security Southampton</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Attending BSides London.]]></title>
            <link>https://medium.com/cybersoton/attending-bsides-london-e36f8db77fa0?source=rss----232f5e7deb47---4</link>
            <guid isPermaLink="false">https://medium.com/p/e36f8db77fa0</guid>
            <category><![CDATA[london]]></category>
            <category><![CDATA[conference]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Robert Thorburn]]></dc:creator>
            <pubDate>Fri, 14 Jun 2019 09:43:15 GMT</pubDate>
            <atom:updated>2019-06-14T09:43:15.605Z</atom:updated>
            <content:encoded><![CDATA[<p>Travelling to London is always a treat, but that is doubly the case if it’s for a security conference! Of course, Security BSides isn’t just any security conference.</p><p><em>Starting life as an alternate event to Black Hat Briefings in the US, BSides has grown to a global series of conferences and related events, numbering over 30 for 2019.</em></p><p>To a large part this success can be attributed to BSides being community driven, free to attend and geared towards giving new speakers a platform.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/900/1*FPM4iD8nsquo4pcYpiJq1Q.png" /></figure><p>BSides London fit this bill perfectly, with one of its four tracks being totally given over to rookie speakers. The pre-conference workshops also followed this approach with two extended sessions aimed at those new to the field.</p><p>The main event kicked off with a heartfelt and largely informal welcome address, followed by two main talks covering cyber systems of the power grid and user profiling and tracking on smartphone apps. Following these two talks the rookie track and track three also opened up. The tree main tracks all presented talks of 30 minute to one hour, while talks on the rookie track were limited to 15 minutes. This short form worked particularly well and attending the rookie track was particularly enjoyable.</p><p>Although BSides London presented a great range of security talks and the requisite side events such as a CTF and lock picking, one of the most notable talks was a full hour on track one devoted to mental health and wellbeing. Olga Zilberberg, who specialises in Cognitive Behavioural Therapy and Neuro Linguistic Programming, lead the session. Focussing on the symptoms and mechanics of stress, anxiety and depression, the inclusion of such a talk on the main stage exemplifies the different approach taken by BSides and is one of the many reasons that we will be back next year!</p><p>Videos from the event can be found <a href="https://www.youtube.com/channel/UCXXNOelGiY_N96a2nfhcaDA/playlists">here</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e36f8db77fa0" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cybersoton/attending-bsides-london-e36f8db77fa0">Attending BSides London.</a> was originally published in <a href="https://medium.com/cybersoton">Cyber Security Southampton</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Attending PETRAS Living in the IoT]]></title>
            <link>https://medium.com/cybersoton/attending-petras-living-in-the-iot-8f6399265813?source=rss----232f5e7deb47---4</link>
            <guid isPermaLink="false">https://medium.com/p/8f6399265813</guid>
            <category><![CDATA[internet-of-things]]></category>
            <category><![CDATA[posters]]></category>
            <dc:creator><![CDATA[Robert Thorburn]]></dc:creator>
            <pubDate>Wed, 22 May 2019 11:52:08 GMT</pubDate>
            <atom:updated>2019-05-22T11:52:08.629Z</atom:updated>
            <content:encoded><![CDATA[<p>On the 1st and 2nd of May this year we attended <strong>PETRAS’s ‘Living in the IoT</strong>’ conference, hosted at the ever impressive Savoy Place in London.</p><blockquote>PETRAS is an IoT research hub jointly operated by 11 research universities, with funding provide by both the Engineering and Physical Sciences Research Council and private companies.</blockquote><p>This not only explains <strong>the breath of academic interest and participation in the conference but also the presence of a large private sector contingent</strong>. The conference programme also reflected this, with the opening keynote presented by <em>Dr Kevin Jones, Head of Cyber Security Architecture, Innovation and Scouting at Airbus</em>. Predictably, this keynote set a very high bar for the conference, not only in terms of interesting content but also in engaging delivery.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/862/1*KQ6mWxqnrQG-CB_i_bVrjQ.jpeg" /></figure><p>Following the keynote, the conference split into three tracks with joint sessions reserved for further keynotes and main panels. This formula was followed over both days, with breaks for lunch, poster sessions and networking sessions. One notable deviation in this programme was the ministerial launch of the UK’s consultation on, and guidelines for, consumer IoT.</p><blockquote>Margot James, minister for Digital and Culture personally made the announcement and took questions afterwards. Key elements of which included the ongoing consultation process and also the Code of Practice for Consumer IoT Security.</blockquote><p>The code can be downloaded <a href="https://www.gov.uk/government/publications/code-of-practice-for-consumer-iot-security">here</a>. In brief though, <strong>the code introduces 13 guidelines of which the first three are prioritised</strong>. These are:</p><ul><li>No default passwords.</li><li>Implementation of a vulnerability disclosure policy.</li><li>Software updates.</li></ul><p>The papers and posters presented all fell into the general grouping of IoT security, privacy and ongoing development.</p><p>The Southampton Cybersecurity contingent also covered these topics with a paper and a poster presented. The paper presented a new approach to analysing cyber-physical threats for IOT using provenance modelling. The threat analysis case study focused on <a href="https://www.petrashub.org/portfolio-item/blockchain-empowered-infrastructure-for-iot-blockit/">BlockIT</a>, <em>a blend of IOT and Blockchain technologies which provides electricity trading in small communities</em>. Our results included new attack vectors not previously exploited.</p><p>The poster we presented focused on the need for an integrated approach to engineering privacy by design in IoT. <strong><em>By integrated in this context, we mean both industry best practice (a moving target) and regulatory compliance (a mostly fixed point)</em></strong>. Since work in both these fields tend to take a risk based approach, we see ample common ground for the building of an integrated framework.</p><p>Notable in the discussions around the work we presented, was not just the high level of synergy with the work of other presenters, but also the degree to which these academic presentations resonated with attendees from the private sector. Although the former can be expected from a highly focused conference, the latter is indicative of the IoT’s ever increasing economic prominence. As such, we can only assume that future conferences will garner even more attention from academia and the private sector alike.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8f6399265813" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cybersoton/attending-petras-living-in-the-iot-8f6399265813">Attending PETRAS Living in the IoT</a> was originally published in <a href="https://medium.com/cybersoton">Cyber Security Southampton</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[UKEF Trade Finance Blockchain Project]]></title>
            <link>https://medium.com/cybersoton/ukef-trade-finance-blockchain-project-72ab306d14fa?source=rss----232f5e7deb47---4</link>
            <guid isPermaLink="false">https://medium.com/p/72ab306d14fa</guid>
            <category><![CDATA[corda]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[trade-finance]]></category>
            <dc:creator><![CDATA[Andrea Margheri]]></dc:creator>
            <pubDate>Mon, 13 May 2019 09:07:30 GMT</pubDate>
            <atom:updated>2019-05-13T09:07:30.326Z</atom:updated>
            <content:encoded><![CDATA[<h3>About my recent blockchain Corda application of Trade Finance for the UK Export Finance, part of the Department of International Trade.</h3><p><em>UKEF is investing in the digitalisation of Trade Finance processes, trying to automating procedures and minimising process latencies</em>. All this, it is required for strengthening the financial support to UK Exporters while controlling the actual financial risks.</p><blockquote>The need of establishing an <strong>interoperable, accountable layer for multi-stakeholder interaction paves the way for blockchain </strong>empowered Trade Finance.</blockquote><p>Together with the <a href="https://openinnovation.blog.gov.uk/"><strong>Open Innovation Team at the Cabinet Office</strong></a><strong> </strong>and the <a href="https://www.southampton.ac.uk/publicpolicy/index.page"><strong>Public Policy team at the University of Southampton</strong></a>, I have approached this UKEF challenge to design and prototype a blockchain solution for UK Trade Finance</p><p><strong>The challenge</strong></p><p>UKEF aims at supporting the Department of International Trade in their innovation strategy by creating new digital solution supporting UK Trade Finance.</p><p>Creating a decentralised solution to underpin the distributed process of Trade Finance by establishing a new, accountable and transparent medium of interaction upon which exporters, banking players and UKEF can conduct in a timely manner their negotiations</p><p>Given the sensitivity and the commercial nature, it is necessary to ensure high level of trust and confidentiality throughout all the processes of the distributed actors.</p><p>Establishing an interoperable framework across trade finance stakeholders would allow UKEF to achieve a threefold objective:</p><ol><li><strong>Early access to current exporter trade finance application </strong>by providing direct support to exporters and streamlining negotiations with banks.</li><li><strong>Facilitating multi-actor processes </strong>by ensuring accountable and up-to-date data exchanges.</li><li><strong>Increasing knowledge on current UK export activities </strong>by creating new knowledge-bases for defining more effective trade support solutions and better risk assessment.</li></ol><p>While the last objective would require long-term plan, <strong>we can start today to prototype blockchain based solution for trade finance.</strong></p><p><strong>The blockchain prototype</strong></p><p>The prototype system must offer storage and processing capability for carrying out the management of exporter trade applications (for simplicity’s sake, just Bond application) among: <em>Exporter, Bank </em>and <em>UKEF IT </em>systems.</p><p><strong>The blockchain platform acts as distributed, accountable application data storage and computational framework for the assessment of bond applications.</strong></p><p>For realising this prototype, I have used the <a href="https://www.corda.net/">R3 Corda framework</a> and integrated with Spring web-apps for showcasing purpose.</p><p><em>Blockchain Technology. </em>In a nutshell, <em>blockchain is a decentralised computational infrastructure offering reliable storage and program execution</em>(aka <em>smart contract</em>). Among others, the key advantage of using blockchain is the <strong>lack of any centralised trusted-third-party </strong>that can singularly control the system. Interaction among multi actors can then be carried out ensuring that any of the actor is in control nor misbehaving (e.g. tampering with managed information or neglecting the submission of an application).</p><p><em>The Prototype. </em>The Corda blockchain framework is a state-of-the-art solution for decentralised financial processes. <em>It relies on Java-based technology for offering transactional multi-actor distributed flows. Most of all, it provides on top of classical blockchain data storage (i) user authentication; (ii) pluggable consensus; (iii) smart contract based interactions; (iv) selective data visibility. </em>(Many more features are available, as well as the integration with relational databases and long-term transaction support)</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ZS7-oDPqHcN4qoEmdChUOQ.png" /><figcaption>Enabling distributed trade finance transactions with Corda</figcaption></figure><p>The prototype is then formed by four (logical) nodes, each of them running a Corda instance and authenticated via an X.509 standard certificate. The Notary logically represents a set of additional nodes that are part of the network and ensure replication and fault tolerance factors. <em>Notice that those nodes may be prevented from accessing any information of the bond application, even though the will store copy of the corresponding transaction.</em>Thus, <strong>controls on flow execution and visibility ensure to both Exporters and Banks that data is only shared to authorised actors</strong><em>.</em></p><p>The flows implemented in the systems to support exporter trade finance are</p><ol><li><em>CreateBond: Creation of an Exporter Bond application — </em>this operation is issued by an Exporter user and is signed by both Bank and UKEF which enforces acceptability controls on bond values and impact.</li><li><em>BankAssess: Bank assessment of the Bond application — a </em>user part of the bank (to which Exporter submitted the application) can provide the needed financial data on the Exporter and report on the bank support to the bond.</li><li><em>UKEFAssess: UKEF guarantee on the Bond application — </em>a user part of UKEF can control the bank approved decision and report on the UKEF support to the bond.</li></ol><p>These flows, together with the needed contract state and transaction signing controls, have been implemented in Java. The code is available online and can be easily re-deployed following the available instructions.</p><p><a href="https://github.com/cybersoton/corda-trade-finance">cybersoton/corda-trade-finance</a></p><p><strong>Showcasing the prototype</strong></p><p>The prototype has been tailored to UKEF needs and a mock-up Spring web-app has been developed to visualise actual integration of the solution. Below a screen recording of the web-apps, one for each Exporter, Bank and UKEF distinguished node of the prototype.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FOz0xltPl9O4%3Fstart%3D5%26feature%3Doembed%26start%3D5&amp;url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DOz0xltPl9O4&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FOz0xltPl9O4%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="640" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/e3cf5fcf2f0cc5093139ba41c0e15910/href">https://medium.com/media/e3cf5fcf2f0cc5093139ba41c0e15910/href</a></iframe><p>It appears that despite the intricacies of implementing and using blockchain technology, <strong>the Corda blockchain solution can be used likewise classical web-app based on REST APIs.</strong></p><p>Behind the scenes, the deployment of an distributed blockchain framework ensures that any B2B interoperability issues are overcome by-design: <strong>all multi-actor interactions are programmed, controls and enforced via smart contracts</strong></p><p>To shed light on the stages needed to create, validate and store a flow (aka a transaction) in the system, watch the video below.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F4BFG5TtaUhU%3Fstart%3D5%26feature%3Doembed%26start%3D5&amp;url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D4BFG5TtaUhU&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F4BFG5TtaUhU%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="640" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/3df5c91872ac0725412851e6d917f9f7/href">https://medium.com/media/3df5c91872ac0725412851e6d917f9f7/href</a></iframe><p>I presented the technical challenges and Corda prototype at the last DIT Innovation Conference on Blockchain. Here while introducing the fundamentals on blockchain.</p><p>The audience was significantly engaged in the discussion on the potential role of blockchain in Public Services. <em>Looking forward to see the development plan in UKEF and DIT for a possible adoption of blockchain!</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=72ab306d14fa" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cybersoton/ukef-trade-finance-blockchain-project-72ab306d14fa">UKEF Trade Finance Blockchain Project</a> was originally published in <a href="https://medium.com/cybersoton">Cyber Security Southampton</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Higher Eduction Cyber Challenge]]></title>
            <link>https://medium.com/cybersoton/higher-eduction-cyber-challenge-5b10c1dda09?source=rss----232f5e7deb47---4</link>
            <guid isPermaLink="false">https://medium.com/p/5b10c1dda09</guid>
            <category><![CDATA[hecc]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[university-of-southampton]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[cyber-challenge]]></category>
            <dc:creator><![CDATA[Sarah Martin]]></dc:creator>
            <pubDate>Tue, 30 Apr 2019 10:56:54 GMT</pubDate>
            <atom:updated>2019-05-02T14:55:46.693Z</atom:updated>
            <content:encoded><![CDATA[<h3>Higher Education Cyber Challenge</h3><p>Back in March over 100 students organised in 26 teams from the top cyber universities in the country, descended to B16 on the Highfield Campus to take part in ‘HECC 2019’, the Higher Education Cyber Challenge.</p><p>The event was a resounding success with both participants and media. Here is a write up by Charles Elder, Head of the University of Southampton’s media relations department.</p><p><strong><em>Southampton set to host the one of country’s largest inter-university cyber security challenge</em></strong></p><p><em>The University of Southampton is set to host one of the UK’s largest inter-university cyber security competition exclusive to students.</em></p><p><em>Over 100 students will descend on Southampton’s Highfield Campus on Saturday, 9th March, to compete in the 2019 Higher Education Cyber Challenge.</em></p><p><em>During the intense one-day competition, the students from 14 ACE (Academic Centre of Excellence for Cyber Security Research) universities, including eight participants from Southampton, will face a range of challenges created by experts from a team of international experts, including industry sponsors as well as current Southampton PhD researchers, Josh Curry and Laurie Kirkcaldy, and graduate Jamie Scott.</em></p><p><em>Both Josh and Laurie themselves were part of the Southampton team to place second in last year’s Inter-ACE Challenge hosted by Cambridge University.</em></p><p><em>Inter-ACE was established to help resolve the vast and growing cyber security skills gap, with an estimated shortfall of 1.8M workers worldwide by 2022. The competition aimed to inspire young tech enthusiasts into the cyber security sector, while also honing the skills of those who already have a strong aptitude for ethical hacking and helping them meet like-minded individuals and potential employers.</em></p><p><em>“Southampton have really enjoyed attending the Inter-ACE cyber challenge over the last few years,” said Josh Curry. “With that competition not running in 2019, we wanted to continue the tradition of bringing together students in cyber security and so created HECC, the Higher Education Cyber Challenge.We hope that everyone enjoys the challenges we have put together, and are happy to once again provide an opportunity for students to meet and network with their peers from across the UK.”</em></p><p><em>This year’s competitors will face 50 challenges in total, involving everything from hacking websites to reverse engineering. Working in teams of three or four, the students will be looking to find ‘flags’, worth a varying amount of points, during each activity to determine the winners.</em></p><p><em>Professor Vladimiro Sassone, Director of the Southampton’s Cyber Security Academy, said: “We’re very pleased to bring the Higher Education Cybersecurity Challenge to Southampton for the first time. The Challenge provides an excellent platform for students to perform as teams, under pressure, and is proving to be an important training ground as the future of the world’s cyber security capabilities rests on the shoulders of these students.”</em></p><p><em>Southampton is well-placed to host the HECC Challenge as the University plays a leading role in cyber security research and education through its Cyber Security Research Group where expertise and excellence in these fields are brought together.</em></p><p><em>The Group undertakes basic and applied cyber security research, providing core capabilities and leadership in support of the University’s broader security activities. The Group constitutes the core of the Academic Centre of Excellence for Cyber Security Research (recognised by National Cyber Security Centre and the Engineering and Physical Sciences Research Council) as well as the Cyber Security Academy, a partnership between University, Industry and Government, whose objectives span from research and consultancy to outreach, training and knowledge transfer.</em></p><p>It was an outstanding success with 1st, 2nd and 3rd prizes going to Cardiff, Cambridge and Imperial. There was even coverage on BBC South Today and BBC Radio Solent. It was great the University supported this event.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*K4MH5_aOdEmRtyEYP01VsQ.jpeg" /><figcaption>The ‘HECC’ team organisers</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wfhvaecVyIkKAugSBYTAhg.jpeg" /><figcaption>The day in full swing</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*XZlI9fZDodrBaSGmF5nPgA.jpeg" /><figcaption>Live leaderboard information</figcaption></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=5b10c1dda09" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cybersoton/higher-eduction-cyber-challenge-5b10c1dda09">Higher Eduction Cyber Challenge</a> was originally published in <a href="https://medium.com/cybersoton">Cyber Security Southampton</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[IoT Research of the Cyber Security group]]></title>
            <link>https://medium.com/cybersoton/iot-research-of-cybersecurity-group-15101b9927ec?source=rss----232f5e7deb47---4</link>
            <guid isPermaLink="false">https://medium.com/p/15101b9927ec</guid>
            <category><![CDATA[internet-of-things]]></category>
            <category><![CDATA[risk-assessment]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[iot]]></category>
            <category><![CDATA[smart-energy]]></category>
            <dc:creator><![CDATA[Federico Lombardi]]></dc:creator>
            <pubDate>Wed, 10 Apr 2019 11:33:55 GMT</pubDate>
            <atom:updated>2019-04-10T11:34:30.136Z</atom:updated>
            <content:encoded><![CDATA[<p>Last Friday 5th April, the <em>University of Southampton Research Week </em>finished with a poster event showcasing the research activities of different groups related Internet of Thing.</p><blockquote>The cybersecurity group brought seven posters related to different projects, where researchers and PhD students showed some of the IoT activity of the group.</blockquote><p>Two posters were for the <strong>PETRAS BlockIT</strong> project: Dr. Nawfal Fadhel (Research Fellow) and Dr. Federico Lombardi (Lecturer) presented <em>ETSE, an architecture which integrates blockchain and smart meter devices to enable energy trading in a smart energy neighbourhood</em>. As a second poster on the BlockIT project, they presented a threat analysis based on semantic modelling for a paper that will be presented at the IET <em>Living in the Internet of Things Conference</em> next May.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wtKm1C94oXtlrXZwYdf8iA.jpeg" /><figcaption>Posters of the cyber research group on IoT</figcaption></figure><p>The prototype of the BlockIT project has been developed and we are now simulating results with a smart meter data generator. Soon, we will integrate the prototype with real smart meter devices.</p><p><a href="https://github.com/cybersoton/blockchain-empowered-smart-energy">cybersoton/blockchain-empowered-smart-energy</a></p><blockquote>A new IoT testbed of the Cyber Security group is now ready to be used for other IoT activities and it will be beneficial for a real evaluation of security and vulnerabilities of IoT devices.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Zt8LUSUfg4RZsj_WdiW58A.png" /><figcaption>Smart home devices from the IoT testbed of the cyber group used for simulating real-world attacks</figcaption></figure><p>Among others, Stefano De Angelis (PhD student) presented a risk assessment methodology for IoT-based systems through the OWASP database, while Ryan Gregory (cyber intern) showed a project to <em>create a realistic smart home dataset by injecting attacks against a network composed by IoT devices </em>and collecting metrics related to their traffic in response to the attacks.</p><p>Max Hayman (PhD student) presented his PhD work related to <em>IoT vulnerabilities and he showed a case studied on the Yale Smart Lock (YSL)</em>, showing how it can be easy to clone an NFC card to unlock the YSL due to a lack of encryption.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/989/0*qSG5fkvp0ND16lIp.jpg" /><figcaption>Yale Smart Lock tested by Max</figcaption></figure><p>Finally, Rob Thorburn (PhD student) presented a study on privacy of IoT devices. Specifically, he showed some common architectural patterns, assessing the traffic flow and the involved parties to check which kind of data should be (or should not be) sent as a plaintext or cipher-text also to be compliant with GDPR.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/756/0*gLOPOLGJZyg4hY3P" /><figcaption>Architectural Pattern Flow of some IoT devices involved in the study of Rob</figcaption></figure><blockquote>The Cybersecurity group of the University of Southampton is carrying on many other projects on IoT, such firmware analysis, network fingerprinting, penetration testing, privacy and security of voice assistants and many other.</blockquote><p>The “smart” sector is growing and the cyber group is spending a big effort in IoT research. Indeed, we are involved in PETRAS Internet of Things Research Hub, a consortium of eleven leading UK universities, which are working together since three years to explore critical issues in privacy, ethics, trust, reliability, acceptability, and security of IoT. Currently, we have BlockIT as a main IoT project for PETRAS and our goal is to propose to PETRAS other innovative solutions that we are carrying on thanks to the work of our PhD students and researchers.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=15101b9927ec" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cybersoton/iot-research-of-cybersecurity-group-15101b9927ec">IoT Research of the Cyber Security group</a> was originally published in <a href="https://medium.com/cybersoton">Cyber Security Southampton</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[“Hacking with Metasploit” Tutorial]]></title>
            <link>https://medium.com/cybersoton/hacking-with-metasploit-tutorial-7635b9d19e5?source=rss----232f5e7deb47---4</link>
            <guid isPermaLink="false">https://medium.com/p/7635b9d19e5</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[kali-linux]]></category>
            <category><![CDATA[metasploit]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <dc:creator><![CDATA[Federico Lombardi]]></dc:creator>
            <pubDate>Thu, 04 Apr 2019 17:49:54 GMT</pubDate>
            <atom:updated>2019-04-05T10:43:31.851Z</atom:updated>
            <content:encoded><![CDATA[<p>Last 12th February (2019) I was invited to ITASEC, the annual <a href="https://www.itasec.it/">Conference of Cybersecurity held in Italy</a>. The event has been held at the CNR of Pisa with an incredible heterogeneous audience composed by a number of public administrations, researchers and industry from all over Europe.</p><p>The event lasted 4 days, with a preliminary session for tutorials. The session was based on different technical solutions for cybersecurity both from a defender and attacker perspective.</p><p>I proposed a tutorial on penetration testing and ethical hacking with the <strong>Metasploit</strong> framework. I set up a simple virtual lab based on <strong>Virtual Box</strong> with a <strong>Kali Linux</strong> Virtual Machine (VM) acting as attacker, and a <strong>Metasploitable Linux</strong> VM, a <strong>Windows XP SP3</strong> and a <strong>Windows 10</strong> VM as victims to target. The picture below shows the environment.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/676/1*vsdS9H7T-5QKloplLRYH8w.png" /><figcaption>Virtual Lab set up for the “Hacking with Metasploit” tutorial</figcaption></figure><p>Then I started by describing the steps that an attacker needs to follow to perform an attack against a target machine, as follow:</p><ol><li><strong>Passive Reconnaissance</strong></li><li><strong>Active Reconnaissance</strong></li><li><strong>Gaining Access</strong></li><li><strong>Privilege Escalation and Password Cracking</strong></li><li><strong>Maintaining Access</strong></li><li><strong>Covering Traces</strong></li></ol><p>For each step I described and used some useful tools. The session was a mix between theoretical concept and practical demos.</p><p>During the first step (<em>Passive Reconnaissance</em>) I showed tools for <em>Open Source Intelligence</em> (OSINT). A first tool was the <strong>Google Hacking Database</strong> <strong>(GHDB)</strong> <a href="https://www.exploit-db.com/google-hacking-database">https://www.exploit-db.com/google-hacking-database</a>. This tool is a collaborative database of <em>dorks</em>, i.e. a collection of advanced syntax of the Google search engine to find useful open information. In the picture below, there is an example of a dork created by Kevin Randall to find txt file with information related to login and password.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*FRDMK9X4flS5H3P1fHC5dw.png" /></figure><p>Then I presented a more advanced tool for gathering information on the web, namely <strong>Discover</strong>. It is a script developed by Lee Baird to collect information about file, domains and IP addresses of a desired target. This tool can be combined with other tools like <strong>Shodan</strong> and <strong>TheHarvester</strong> to obtain a number of information and successfully perform the passive reconnaissance step.</p><p>In the second phase I introduced two tools for active reconnaissance, i.e. to perform port scanning and enumeration, namely <strong>NMap </strong>and <strong>ZenMap</strong>. I showed a practical example of these tools to scan the network of the virtual lab and to find ports and services opened in the three victims VMs. Then, I showed how to find vulnerabilities by using the CVE database and the collected information. In our lab, the first example shown is the <strong>MS08–067</strong> vulnerability of Windows XP (<a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067</a>). This is a vulnerability of the <em>Microsoft Server Service</em> for remote sharing of files and printer.</p><p>To exploit such a vulnerability I moved to the step of the attack, i.e. <em>Gaining Access</em>. Here, I introduced the <strong>Metasploit</strong> framework, one of the most common framework for penetration testing.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yS4BO7OjT1H6cbwiTl51vw.png" /><figcaption>Reverse Shell explained</figcaption></figure><p>I described how to perform an attack with Metasploit towards a vulnerable machine through the <strong>Reverse Shell</strong> and I introduced the Meterpreter payload. I showed a practical example where the Kali machine through Metasploit was able to exploit the vulnerability of the Windows XP machine to create a Meterpreter shell as a payload. Thus, we had an open admin shell, having so the total control of the victim, indeed we were able to access to its file system, desktop, webcam, etc.</p><p>We repeated this attack against the Metasploitable Linux machine, by exploiting the <em>vsftpd_234</em> backdoor. Again, we had the total control of the machine with admin privileges.</p><p>Then I showed as repeating the attack against the Windows 10 machine was challenging since there was not known vulnerability. Thus, I introduced <em>client-side attack,</em> which exploit social engineering for cheating an user to click on something malicious. Specifically, I showed how to create a backdoor with <strong>Veil-Evasion</strong> and hide it inside a pdf file by spoofing the pdf extension and a pdf icon.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*6ZqpLqQIBicil9cyCk0Ptw.png" /><figcaption>Resource Hacker tool used to spoof a pdf icon</figcaption></figure><p>We sent the fake pdf attachment to the victim with the Windows 10 machine and prepared Metasploit to listen for incoming connection to a specific port that we specified when we created the backdoor. Once the user opened the pdf, on the Kali machine we had an open shell on the target Windows 10 machine.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*pPAap2g9d7lR_RIFttFgEw.png" /><figcaption>Meterpreter session opened after the Windows 10 user opened the malicious pdf</figcaption></figure><p>However, conversely to Windows XP and Metasploitable Linux examples, the shell we opened was not with admin privileges. So I showed another module of Metasploit to simulate a Windows update to the user.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1014/1*z8gtarXvG9wZPUweUDtdtw.png" /></figure><p>An expert user should notice this fake popup since this file to execute does not provide any signature… but how many people look at this detail?</p><p>If the user does not pay attention to this and click <em>yes</em>, is giving access to the software that launched it the privilege of administrator. In our case this software is the Meterpreter shell, thus we can escalate the privilege of the Meterpreter shell to <em>admin </em>permanently.</p><p>We also introduced different approaches for <em>Privilege Escalation</em>, for example by using a keylogger (Meterpreter Keyscan) and steal password, or using the Metasploit Hashdump to dump the password database.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1014/1*9LEPHoGS88jAheDmuWeJ1g.png" /><figcaption>Hashdump module to dump the password database of a Windows machine</figcaption></figure><p>The figure above shows how Hashdump can save the password database. The problem is that those are not the passwords, but the hashes of the passwords. We have to revert the hash to obtain the real password. For that scope, I showed <strong>John The Ripper </strong>and an online free tool, i.e., <a href="htto://crackstation.net">crackstation.net</a>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*IOUAnb-yN8uvIDBaXpuZbQ.png" /><figcaption>CrackStation tool to revert the hash dumped with hashdump</figcaption></figure><p>In the last part of the tutorial, I first described how to maintain a permanent access by placing a backdoor in the target machine. Figure below shows Meterpreter installing and executing the backdoor.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*muaRyVr-qe7qKRBrZBqIcg.png" /><figcaption>Metasploit installing a backdoor for permanent access</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*RKgM0_U4HHO5Ab4ic7hIsg.png" /><figcaption>vbs script placed on the target</figcaption></figure><p>The backdoor is placed as a vbs script stored on the victim. This script launches an exe file.</p><p>Furthermore, it writes in the Windows registry the key in the autorun command. In that way every time the computer startup the backdoor is executed again to open again a new meterpreter session on the attacker side.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*CTg96ewqaoK3SMoKf0K9mQ.png" /><figcaption>Registry key to run the backdoor at system boot</figcaption></figure><p>In the last section, we detailed some techniques an attacker can use to cover his trace with solutions for clearing logs, timestomping the accessed resources and use rootkit to avoid to be detected.</p><p>Finally, we had a 10 minutes session of question and answer to interact in which we discussed about some best practice that everybody must follow to minimise the cyber risk.</p><blockquote>The goal of the tutorial was to give a practical overview to technical and non- technical users how simple can be to be hacked if not well protected.</blockquote><p>The tutorial has been highly voted on the Whova app by attendants and few companies asked for collaborations on this direction. This topic is modern and of interest of companies and public entities. I strongly believe that is a good starting point to increase the awareness of users and employees, and I also believe that with practical examples of what can happen people can effectively learn.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7635b9d19e5" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cybersoton/hacking-with-metasploit-tutorial-7635b9d19e5">“Hacking with Metasploit” Tutorial</a> was originally published in <a href="https://medium.com/cybersoton">Cyber Security Southampton</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[NATO Internship outcome: Security assessment of IoT-based applications for NATO Enterprise.]]></title>
            <link>https://medium.com/cybersoton/nato-internship-outcome-security-assessment-of-iot-based-applications-for-nato-enterprice-f75fe7f358f?source=rss----232f5e7deb47---4</link>
            <guid isPermaLink="false">https://medium.com/p/f75fe7f358f</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[internships]]></category>
            <category><![CDATA[internet-of-things]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[nato]]></category>
            <dc:creator><![CDATA[Stefano De Angelis]]></dc:creator>
            <pubDate>Thu, 04 Apr 2019 17:49:37 GMT</pubDate>
            <atom:updated>2019-04-05T10:57:35.922Z</atom:updated>
            <content:encoded><![CDATA[<p>In my last <a href="https://medium.com/cybersoton/cybersoton-internship-at-the-nato-2685d4ecb813">blogpost</a> I introduced you my internship experience at NATO Headquarter (HQ). Now I am back, and I am happy to share with you the outcomes of my six-months abroad, my thoughts and results.</p><p>My internship experience at NATO has been incredibly positive. <strong>NATO, as a security organisation, was for me one of the perfect places to ameliorate my knowledge in the field of security, from a most practical point of view.</strong> I worked for the<strong> <em>NATO Office of Security (NOS)</em></strong>. The NOS division is responsible for security and administrative support of NATO. It is divided in three main branches:<em>(i) Protective Security Branch (PRB)</em>, <em>(ii) Security Intelligence Branch (SIB)</em> and <em>(iii) Policy Oversight Branch (POB)</em>.</p><p>The first two branches care about the <strong>physical security</strong>, <strong>safety</strong> and the <strong>counterintelligence</strong> at NATO HQ and NATO civil and military bodies. On the other hand, the <em>POB</em> coordinates <strong>security inspections</strong> in NATO-member nations, NATO civil and military bodies and other partners. The main purpose of such inspections is to certify that all those NATO-related organisations are properly protected.</p><p><em>POB</em> is in turn divided in two sub branches, one dedicated to <strong><em>Security Policies</em></strong> and one specialised in <strong><em>Communication and Information Systems</em></strong>. The first branch develops and revises security policies, guidance and supporting documents for NATO enterprise. The second, CIS Security cares about security accreditation of technologies employed in NATO bodies.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/341/1*k7rZlhUrlQ9QGcW9GRAIDw.png" /><figcaption>NATO Office of Security logo</figcaption></figure><p>The CIS Security branch works closely with the <strong><em>NATO Communication and Information Agency</em></strong> which is the technology and cyber leader for NATO. CIS engineers evaluate and develop risk assessment and management methodologies of the cutting-edge technologies and projects proposed by the Agency.</p><p>On my arrival I have been assigned to the CIS division. Because of my technical background and my expertise on security aspects of technologies, CIS asked me to investigate and evaluate the Internet of Things (IoT) technology for NATO purposes.</p><h4>A security methodology for IoT-based applications</h4><p>My first contribution at <em>CIS </em>was the security assessment of <strong><em>IoT-based applications</em></strong>, outlining the technology and its security risks. I defined a general model for the evaluation of IoT applications illustrating its components, the possible application fields and the security risks. For this purpose I defined a <em>multi-layer architecture </em>describing a general purpose use case.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/743/1*OX4sxUgPPZ2sTYI-mJ8m6g.png" /><figcaption>IoT architectural model</figcaption></figure><p>This architecture is characterised by three main layers: (i) <strong>Objects layer</strong>, (ii) <strong>Middleware layer</strong> and (iii) <strong>Visualisation layer</strong>. The first layer specifies all the connected physical <em>IoT devices</em>, the Middleware Layer has a <em>Service Oriented Architecture</em> which offers <strong><em>connectivity</em></strong>, <strong><em>data storage</em></strong>, <strong><em>abstraction</em></strong> and <strong><em>computing features</em></strong> (supported by cloud and fog computing technologies). The third layer is characterised by user-friendly applications exploiting data provided by the middleware.</p><p>Based on this architecture I described the security issues and threats which affect such systems. Specifically I highlighted the security <strong>vulnerabilities</strong> of IoT systems caused by the devices of the Object layer, the technologies of the Middleware layer and the applications in the Visualisation layer. Vulnerabilities, affects mainly data <strong>confidentiality</strong>, <strong>privacy</strong> an <strong>trust</strong> of IoT-based systems and are mainly related to:</p><ol><li><strong>Poor computational and storage power</strong> of devices;</li><li><strong>Physical vulnerability</strong> of devices;</li><li><strong>Weak communication protocols</strong> which prefer <em>performance</em> to <em>security</em>;</li><li><strong>Application vulnerabilities</strong> caused by cloud services employed for computation and storage capabilities;</li><li>Front end applications vulnerabilities.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/522/1*rg-zI2wCceCwUYSam2R6mA.png" /><figcaption>An overview of security in IoT</figcaption></figure><p><strong>Due to the complexity of such systems, is usually difficult to evaluate security and mitigate vulnerabilities.</strong> Even if this issues cannot be ignored, particularly in a military and political context like NATO, most of the time is hard to determine which particular layer of the application architecture needs more attention and investment of resources rather than others. For this reason I proposed a <strong><em>methodology</em></strong> to evaluate vulnerable IoT-based systems and mitigate the most dangerous vulnerabilities identified by a risks and benefits analysis.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*iE3JItLIq1e3IUPSQWpN_w.png" /><figcaption>IoT Attack surface areas classification</figcaption></figure><p>By referring the <a href="https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project"><strong>OWASP IoT Project</strong></a>, I proposed a easy-to-follow schema to</p><ol><li><strong>classify the most common IoT </strong><a href="https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Attack_Surface_Areas"><strong>Attack Surface Areas</strong></a>;</li><li><strong>identify the most dangerous vulnerabilities</strong>;</li><li><strong>propose a security approach for the risk assessment and vulnerability mitigation</strong>.</li></ol><p>The table above illustrates a <em>classification</em> of the most common attack surface areas. I divided such attacks based on their <strong>impact</strong> (s.t. how much the attack is dangerous once exploited) and <strong>exploitability</strong> (s.t. how much easy is the attack to be exploited). Thus with a red line I highlighted the most dangerous vulnerabilities that should always be mitigated.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/933/1*ERtvRGzmxg5-aCwQoJyNgw.png" /></figure><p>For the evaluation of risks and benefits of IoT vulnerabilities, I proposed a <em>three-phase methodology</em> according to the classification above. The methodology relies on the <strong>OWASP</strong> best practices for attack mitigation. It offers some basic roles to <strong>identify</strong>, <strong>evaluate</strong> and <strong>mitigate</strong> the most dangerous vulnerabilities of IoT systems.</p><p>In conclusion, I really enjoyed my stay at NATO. I worked on interesting topics with a friendly team of people always ready to help me. I learned how to approach a working environment such that of a military organisation and I experienced from a practical point of view security topics, for me matter of research.</p><p>The <em>NATO Internship Programme</em> is a <strong>great</strong> opportunity for students and young professionals to having a work experience in <strong>one of the most important and relevant organisations of the North Atlantic Alliance</strong>. Apart from the chance to be introduced in the world of European Institutions, interns will have the opportunity to meet a number of professionals inside the fascinating <em>NATO Headquarter (HQ)</em> in Brussels and participate to several working activities. <strong>The NATO Internship is the best solution for young workers to create a network of contacts and improve their cv with a highly recognized experience</strong>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f75fe7f358f" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cybersoton/nato-internship-outcome-security-assessment-of-iot-based-applications-for-nato-enterprice-f75fe7f358f">NATO Internship outcome: Security assessment of IoT-based applications for NATO Enterprise.</a> was originally published in <a href="https://medium.com/cybersoton">Cyber Security Southampton</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Launch of Partnership between SEROCU and The Cyber Security Academy]]></title>
            <link>https://medium.com/cybersoton/launch-of-partnership-between-seroco-and-the-cyber-security-academy-7c73d01706b6?source=rss----232f5e7deb47---4</link>
            <guid isPermaLink="false">https://medium.com/p/7c73d01706b6</guid>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Sarah Martin]]></dc:creator>
            <pubDate>Sat, 16 Mar 2019 13:17:49 GMT</pubDate>
            <atom:updated>2019-03-16T16:29:29.461Z</atom:updated>
            <content:encoded><![CDATA[<p>One sunny Thursday, over 200 delegates from Police forces across the country, NPCC, ROCU’s, British Transport Police and The National Crime Agency descended at the AXIS conference centre on the Science Park to attend a ‘Cryptocurrency Masterclass’. I was thrilled to be part of the planning process for this launch a new partnership between the Cyber Security Academy and SEROCU (South east Regional Crime Unit).</p><p>It was an honour and privilege to have Professor Mark Spearing, President and Vice-Chancellor here at the University of Southampton opening the event. He spoke of the importance of industry and academia coming together to look at research and innovation and the importance of hosting events to make that possible. Next to take to the stage was DSI Jess Wadsworth, Head of SEROCU, who spoke of the importance of working with academia to focus on problems the police face in day to day criminal investigations. She went on to say how exciting it will be to work with us and strengthen our relationship even more.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*iHMjYalfcPtPW698BDOYuw.jpeg" /><figcaption>DCS Jess Wadsworth, Prof Mark Spearing and Sarah Martin</figcaption></figure><p>The theme for the day was Cryptocurrency, the morning was spent looking at challenges the police face on a daily basis, with the increasing number of cyber-crime offences being related to crypto-currencies and the length criminals are going to commit such crimes. It was raised issues, which can be viewed from a technical aspect. I am pleased to say, our very own Dr Federico Lombardi, Lecturer in Cyber Security at University of Southampton, gave a presentation on a Cyber Range for Blockchain Platforms, building on a Group Design Project (GDP) recently carried out by ECS students under his supervision. Judging by the discussions within the audience, it was a brilliant and very informative GDP.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ui4pOeGMd9R3jSJRkrC8BA.jpeg" /><figcaption>Audience in full flow</figcaption></figure><p>After lunch, we heard presentations from officers who have been involved with some pretty meaty cryptocurrency investigations. I have to say I was astonished at the level these criminals go to and impressed with the work that goes on behind the scenes for the Police to bring these perpetrators to justice. They are steady, methodical and show commitment to the job, we are lucky to have these people protecting us.</p><p>At 16:15 I was able to breathe a sigh of relief as all had gone very well, and feedback had been very positive. Watch this space for more events in the future.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7c73d01706b6" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cybersoton/launch-of-partnership-between-seroco-and-the-cyber-security-academy-7c73d01706b6">Launch of Partnership between SEROCU and The Cyber Security Academy</a> was originally published in <a href="https://medium.com/cybersoton">Cyber Security Southampton</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>