[cs615asa] Red Team Mission Week 9

Elliot Wasem ewasem at stevens.edu
Mon Mar 23 11:05:52 EDT 2020


Then I'd like to present these two articles, both on the same subject of
zoombombing. The problem primarily stems (for the time being) from a
misuse of software, and an oversight in software design, and less so
from an actual "hack". Users who either are unaware of the controls that
the host of a Zoom call has, or should perhaps be using a different tool
altogether, are finding that Zoom has become a breeding ground for
Internet trolls who are interested in whiling away their time and
boredom by interrupting people's lives.

As mentioned before, this is not a bug in software, but rather an
oversight in the design in software which was never intended to be used
in the way it is today.

https://techcrunch.com/2020/03/17/zoombombing/
https://www.nytimes.com/2020/03/20/style/zoombombing-zoom-trolling.html

On Mar 23 2020, at 10:44 am, Jan Schaumann <jschauma at stevens.edu> wrote:

> Elliot Wasem <ewasem at stevens.edu> wrote:
>> So, social exploits related to fraud and manipulation around
>> computing technology?
> 
> That might work.  There are already a lot of phishing
> campaigns exploiting people's fear of COVID-19.
> 
> Or look at e.g. "Zoombombing" and consider what other
> avenues of attack unprotected video conferences open
> up.
> 
> Or perhaps how to exploit a split-VPN set up to move
> laterally from a compromised personal endpoint to an
> internal resource.
> 
> _______________________________________________
> cs615asa mailing list
> cs615asa at lists.stevens.edu
> https://lists.stevens.edu/mailman/listinfo/cs615asa
> 


More information about the cs615asa mailing list