Tuesday, October 27, 2015

Experts tested the vulnerability of wireless networks with an … – Telam

“We put ourselves in the place of the attacker, it is what we do in any assessment using drones and use the offensive security to prove how efficient are the defense mechanisms of an organization” expressed computer experts in an interview with Telam, before to provide exposure at the international conference on cybersecurity Ekoparty, which culminates today in the city of Buenos Aires.

Crozono is the name of the program six months ago Sheila a self-taught 20 years dedicated to programming from the 12 and

Paul, an electrical engineer, began thinking after having known teaching at the Da Vinci Multimedia School.

“We started with this idea because we both work in security, have drones and we like the technology, and we complement each other very well because I work more on the part of the hardware and electronics, and Sheila as offensive specialist programming and security, “said Paul.

As a example and for purposes of research, “if one wants to make an attack on a 20th floor office in what is usually thought to be putting a car outside the building with a giant satellite dish, but the issue is that very little goes unnoticed. So we came to try the drones, “said Sheila, who at age 15 was hired by a publisher to write a book about” web hacking “.

So, they put on drones and a robot made recyclable material with the software, which has two main features: incorporates the tools used by security specialists and has the

 “Intelligence” to solve problems

“In the framework (the software) tried to make the decisions that I would then solve the problem do not need (human) interaction. Can fly up up through drone and run alone, “remarked the young programmer.

Experts use a Phantom 3 quadricopter and a tablet can set the points where the drone should go, and so make the team go stopping and capturing information

“The mission is purely academic, it did to investigate But in the hands, perhaps, of an attacker seriously the truth is dangerous.. in fact aim and objective public -that say , who could use the good- basically the police side, since when does a raid and have to physically go to a truck to study the area and attack the wireless network to see whether data is pedophilia, does not go unnoticed ” , told the engineer.

For that reason, they stressed that the program developed may be more advantageous for the police which now has drones just to create images, and now have the ability to “place a Raspberry ( a small low-cost computer) and send Crozono townhouse from the office. “

Romans and Berta explained that what they do” not break the information “but an assessment to determine safe levels computer, and distinguished themselves in that “hacking is knowledge that anyone can use it right and someone wrong, and that’s the concept that sometimes is not understood because it is usually associated to the hacker as a criminal.”

“There are hackers who use the knowledge to steal and make money, and others who use it to protect; and we will associate him as a person with much curiosity, interest and time to investigate, which is the way in which one is interested in finding out how things work, “he stressed.

” In fact before the hacking was not even associated with the computer, for example we say that René Favaloro was a hacker, because he did something different and managed to make an improvement, “the expert stressed.

LikeTweet

No comments:

Post a Comment