The Anatomy of A Hacktivist Attack presented at Central Ohio InfoSec Summit 2012

by Rob Rachwald,

Tags: Security

Summary : In 2011, Imperva managed to witness an assault by a hacktivist group, including the use of social media for communications and, most importantly, their attack methods. Since hacktivists targets are highly variable, anyone can fall victim and security professionals need to know how to prepare.
This talk will walk through the key stages of an hacktivist campaign, including:
1.Recruitment and communication: We show how hacktivists leverage social networks to recruit its members and pick a target.
2.Application attack: We detail and sequence the steps hacktivists deploy to take data and bring down websites.
3. DDoS: In this final stage, we shed light on the DDoS techniques deployed to take down websites.