<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom"><title>Radically Open Security Blog</title><link href="https://blog.radicallyopensecurity.com/" rel="alternate"></link><link href="https://blog.radicallyopensecurity.com/feeds/all.atom.xml" rel="self"></link><id>https://blog.radicallyopensecurity.com/</id><updated>2017-07-14T00:00:00+02:00</updated><entry><title>Featured in the Volkskrant</title><link href="https://blog.radicallyopensecurity.com/CEO%20Melanie%20Rieback%20featured%20in%20Volkskrant.html" rel="alternate"></link><published>2017-07-14T00:00:00+02:00</published><updated>2017-07-14T00:00:00+02:00</updated><author><name>team</name></author><id>tag:blog.radicallyopensecurity.com,2017-07-14:/CEO Melanie Rieback featured in Volkskrant.html</id><summary type="html">&lt;p&gt;Radically Open Security's CEO Melanie Rieback was featured in the Dutch newspaper &amp;quot;Volkskrant&amp;quot; in an article &amp;quot;The Honest Hacker&amp;quot; by journalist Gerard Janssen. In the article she talks about cybersecurity, collaboration and transparency about the methods used.&lt;/p&gt;
&lt;p&gt;Read the article on the Volkskrant website: &lt;a class="reference external" href="http://www.volkskrant.nl/tech/deze-wonder-woman-van-de-computerbeveiligingswereld-hackt-zo-je-bedrijf~a4505208/"&gt;http://www.volkskrant.nl/tech/deze-wonder-woman-van-de-computerbeveiligingswereld-hackt-zo-je-bedrijf …&lt;/a&gt;&lt;/p&gt;</summary><content type="html">&lt;p&gt;Radically Open Security's CEO Melanie Rieback was featured in the Dutch newspaper &amp;quot;Volkskrant&amp;quot; in an article &amp;quot;The Honest Hacker&amp;quot; by journalist Gerard Janssen. In the article she talks about cybersecurity, collaboration and transparency about the methods used.&lt;/p&gt;
&lt;p&gt;Read the article on the Volkskrant website: &lt;a class="reference external" href="http://www.volkskrant.nl/tech/deze-wonder-woman-van-de-computerbeveiligingswereld-hackt-zo-je-bedrijf~a4505208/"&gt;http://www.volkskrant.nl/tech/deze-wonder-woman-van-de-computerbeveiligingswereld-hackt-zo-je-bedrijf~a4505208/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In the article she talks about cybersecurity, collaboration and ROS's transparent way of working.&lt;/p&gt;
&lt;p&gt;Special thanks to Robert van de Griend from the Volkskrant, Gerard Janssen and Aisha Zeijpveld for the permission to repost the article and photos.&lt;/p&gt;
&lt;p&gt;Click on the picture to read the article:&lt;/p&gt;
&lt;a class="reference external image-reference" href="../f/ros-volkskrant.pdf"&gt;&lt;img alt="Article about Melanie Rieback In Volkskrant" class="align-center" src="../f/20170713-Volkskrant-HonestHacker.jpg" style="width: 100%;" /&gt;&lt;/a&gt;
</content><category term="press"></category><category term="rieback"></category><category term="'The Honest Hacker'"></category></entry><entry><title>Remote exploit in crashplan backup server</title><link href="https://blog.radicallyopensecurity.com/CVE-2017-9830.html" rel="alternate"></link><published>2017-06-22T09:36:00+02:00</published><updated>2017-06-22T09:36:00+02:00</updated><author><name>John</name></author><id>tag:blog.radicallyopensecurity.com,2017-06-22:/CVE-2017-9830.html</id><summary type="html">&lt;p&gt;We're about to get another CVE to our name.&lt;/p&gt;
&lt;p&gt;Let's talk a bit on how we found it. One of our customers commissioned a
test of their infrastructure. On of their systems was running the
&lt;a class="reference external" href="https://www.crashplan.com/en-us/"&gt;Crashplan&lt;/a&gt; backup server from Code42,
and we found a remote code execution possibility. As luck …&lt;/p&gt;</summary><content type="html">&lt;p&gt;We're about to get another CVE to our name.&lt;/p&gt;
&lt;p&gt;Let's talk a bit on how we found it. One of our customers commissioned a
test of their infrastructure. On of their systems was running the
&lt;a class="reference external" href="https://www.crashplan.com/en-us/"&gt;Crashplan&lt;/a&gt; backup server from Code42,
and we found a remote code execution possibility. As luck would have it
(for our customer that is) a setting in their firewalls made it
impossible to exploit it in their environment, but naturally we reported
it to Code42. Their response was... well, not what we hoped...&lt;/p&gt;
&lt;p&gt;Anyway, here's a short write-up of how we found it (and we usually
shorthand Radically Open Security into 'ROS' when doing these writeups,
so I'll continue that). And when I say &amp;quot;we&amp;quot; I really mean &amp;quot;Erik Bosman&amp;quot;
since he's the pentester who did all the work on this one, and he
deserves all the credit here.&lt;/p&gt;
&lt;p&gt;During a port scan on crashplan.REDACTED.com, ROS found an open port
with a service communicating using an unknown binary protocol. The
service on TCP port 4282 seemed to be sending Java class names over the
wire.&lt;/p&gt;
&lt;pre class="literal-block"&gt;
00000000 80 63 00 00 00 41 2d 31 38 37 38 32 7c 63 6f 6d |.c...A-18782|com|
00000010 2e 63 6f 64 65 34 32 2e 6d 65 73 73 61 67 69 6e |.code42.messagin|
00000020 67 2e 73 65 63 75 72 69 74 79 2e 53 65 63 75 72 |g.security.Secur|
00000030 69 74 79 50 72 6f 76 69 64 65 72 52 65 61 64 79 |ityProviderReady|
00000040 4d 65 73 73 61 67 65 b6 a2 00 00 00 22 01 00 bf |Message.....&amp;quot;...|
00000050 a9 03 69 25 02 11 8e 7f aa f9 e9 88 14 98 a4 9c |..i%............|
00000060 0e 1c 30 61 73 fa e2 77 9d 10 88 a4 21 6c bb |..0as..w....!l.|
0000006f
&lt;/pre&gt;
&lt;p&gt;Finding class names in a messaging protocol can be indicative of the use
of (de)serialization. (De)serialization is the process of translating an
object (or a group of objects) in memory to a stream of bytes and back.
These objects can then be sent over network or stored on disk.
Deserializing arbitrary objects from untrusted data is tricky and can
often lead to remote code execution. The main problem is that allowing
an untrusted party to create arbitrary objects on a system exposes a lot
of normally unreachable code, greatly increasing the attack surface. As
an example, the standard way of deserializing objects in Java, using
ObjectInputStream can be exploited to gain code execution using publicly
available code (Ysoserial: &lt;a class="reference external" href="https://github.com/frohoff/ysoserial"&gt;https://github.com/frohoff/ysoserial&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;The software running on the host in question turned out to be the code42
backup server. Unfortunately, we failed to obtain a test license from
code42, so the source code (for versions 5.3.4 and 5.4.0) was obtained
using a &lt;a class="reference external" href="http://download2.code42.com/installs/proserver/5.4.0/Code42server_5.4.0_Linux.tgz"&gt;download
url&lt;/a&gt;
from a presentation on Youtube&amp;nbsp; and decompiled using
&lt;a class="reference external" href="http://www.benf.org/other/cfr/"&gt;CFR&lt;/a&gt;. This, however meant that we
could not truly test the system locally (and reverse engineering the
licence enforcement was way beyond the scope of the pentest.)&lt;/p&gt;
&lt;p&gt;Our analysis revealed that code42 uses a number of different ways to
serialize and deserialize objects. Objects implementing the IMessage
interface, sent over port 4282 are deserialized using one of two
methods:&lt;/p&gt;
&lt;dl class="docutils"&gt;
&lt;dt&gt;Legacy Messages&lt;/dt&gt;
&lt;dd&gt;A home-brew deserialization method for data objects implementing the
IMessage interface&lt;/dd&gt;
&lt;dt&gt;Google Protocol Buffers&lt;/dt&gt;
&lt;dd&gt;A newer method, also employed to (de)serialize IMessage objects.
It is up to the sender to decide which method is used.&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;However, some of these messages have custom deserialization
implementations or they contain references to other objects which are
not IMessages themselves. ROS found a number of (de)serialization
implementations being used:&lt;/p&gt;
&lt;dl class="docutils"&gt;
&lt;dt&gt;com.code42.io.TinySerializer&lt;/dt&gt;
&lt;dd&gt;recursively deserializes objects with only primitive types. ROS did
not find a way to exploit this deserializer.&lt;/dd&gt;
&lt;dt&gt;com.code42.io.C42WhitelistObjectInputStream&lt;/dt&gt;
&lt;dd&gt;A subclass of the vulnerable java.io.ObjectInputStream, however,
this class overloads the resolveClass method to only allow
deserialization of a select subset of objects, thwarting exploits
generated using Ysoserial.&lt;/dd&gt;
&lt;dt&gt;com.code42.io.CompressUtilityWhitelist&lt;/dt&gt;
&lt;dd&gt;A decompression wrapper around C42WhitelistObjectInputStream&lt;/dd&gt;
&lt;dt&gt;java.io.ObjectInputStream&lt;/dt&gt;
&lt;dd&gt;Some code is still using the directly vulnerable
java.io.ObjectInputStream, however, this code did not seem related
to network communication and we did not find a way to
ObjectInputStream directly on our own data.&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;While com.code42.io.C42WhitelistObjectInputStream limits the types of
objects that can be loaded, it is not immediately clear that it can
prevent exploitation alltogether.&lt;/p&gt;
&lt;p&gt;First, while it is not possible to create instances of classes outside
of the whitelist, due to a loophole, by creating a 'Proxy' class, which
partially bypasses the overloaded resolveClass method, it is still
possible to load &lt;em&gt;any&lt;/em&gt; class, even non-serializable classes, but not to
create an instance of it. The act of loading a class alone can result in
the execution of code defined in &lt;tt class="docutils literal"&gt;static { ... }&lt;/tt&gt; sections of classes.
We created a program which tried to load all classes in the classpath
used by Crashplan. This did yield some interesting results, such as
(non-functional) Java GUI windows popping up, and a logger being
started. But it did not give us any results which would allow us to
exploit the program.&lt;/p&gt;
&lt;p&gt;More importantly, the number of classes still allowed is quite large,
the whitelist allows objects which match any of the following rules:&lt;/p&gt;
&lt;ul class="simple"&gt;
&lt;li&gt;Object is an array&lt;/li&gt;
&lt;li&gt;Object is serialiable and part of the &lt;tt class="docutils literal"&gt;com.code42&lt;/tt&gt; package or any
of its sub-packages&lt;/li&gt;
&lt;li&gt;Object is serialiable and part of the &lt;tt class="docutils literal"&gt;com.backup42&lt;/tt&gt; package or any
of its sub-packages&lt;/li&gt;
&lt;li&gt;Object is serialiable and part of the &lt;tt class="docutils literal"&gt;java.lang&lt;/tt&gt; package or any of
its sub-packages&lt;/li&gt;
&lt;li&gt;Object is serialiable and part of the &lt;tt class="docutils literal"&gt;java.util&lt;/tt&gt; package or any of
its sub-packages&lt;/li&gt;
&lt;li&gt;Object is serialiable and part of the &lt;tt class="docutils literal"&gt;com.google.common&lt;/tt&gt; package
or any of its sub-packages&lt;/li&gt;
&lt;li&gt;Object is serialiable and part of the &lt;tt class="docutils literal"&gt;com.google.inject.internal&lt;/tt&gt;;
package or any of its sub-packages&lt;/li&gt;
&lt;li&gt;Object is of the &lt;tt class="docutils literal"&gt;java.io.File&lt;/tt&gt; class&lt;/li&gt;
&lt;li&gt;Object is of the &lt;tt class="docutils literal"&gt;sun.util.calendar.ZoneInfo&lt;/tt&gt; class&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Since all publicly available exploit code uses classes outside of this
whitelist, we needed to look for new ways of creating an exploit payload
in this still sizeable list of allowed classes. Given that this would
potentially lead to remote code execution on the backup server, a system
which presumably gets sent sensitive organization data from lots of
different sources, we put a considerable amount of time in trying to
find an exploit payload which would work. In the end, we were unable to
come up with a useful exploit chain. This is not to say that there might
not be one in the future. The whitelist allows for entire subtrees of
packages to be deserialized, new classes may added to packages, for
example when a new version of Java comes out, or when google updates
their java library.&lt;/p&gt;
&lt;p&gt;Another avenue that looked interesting, but which we were unable to make
work was using the &lt;tt class="docutils literal"&gt;java.lang.invoke.SerializedLambda&lt;/tt&gt; class. This
class implements the recently added lambda expression support in Java.
What is special about this is that any lambda expression in the codebase
gets serialized as this class and since this class is whitelisted, this
means we may be able to deserialize any lambda expression. However, we
did not find a suitable expression in the codebase to further our goal.&lt;/p&gt;
&lt;p&gt;== Pwned in an instance(?) ==&lt;/p&gt;
&lt;p&gt;Being unable to find a suitable exploit for the
&lt;tt class="docutils literal"&gt;com.code42.io.C42WhitelistObjectInputStream&lt;/tt&gt; red herring, we turned
our attention to the custom serialization that is at the heart of the
message parser that is listening on port 4282.&lt;/p&gt;
&lt;p&gt;To save network traffic sending class names, new classes are registered
with &lt;tt class="docutils literal"&gt;com.code42.messaging.MessageFactory&lt;/tt&gt; once, and referred to with
a numeric identifier after. The &lt;tt class="docutils literal"&gt;ClassMessage&lt;/tt&gt; message, when
deserialized, uses the classloader to load the class specified in the
message, without checking whether this class actually is a valid
message, and it isn't bound by any whitelist like
&lt;tt class="docutils literal"&gt;C42WhitelistObjectInputStream&lt;/tt&gt;. Then, when the class is loaded, we
can send a message, which is of this class.&lt;/p&gt;
&lt;p&gt;com.code42.messaging.MessageFactory will then try to instantiate this
message with the following code:&lt;/p&gt;
&lt;pre class="literal-block"&gt;
try {
    message = (IMessage)type.newInstance();
}
catch (Exception e) {
    log.error(&amp;quot;Unable to instantiate new instance! Missing default constructor? - msgUid={}, type={}&amp;quot;, shortUid, type);
}
&lt;/pre&gt;
&lt;p&gt;If type does not implement the IMessage interface, this will ofcourse
fail, but not before creating an instance of an arbitrary object with a
default constructor. To investigate if this would be a problem, ROS
tried to instantiate all objects in the classpath (including the jars
that are shipped with crashplan), monitoring network connections, to see
if any of them resulted in useful behaviour. In an overnight run of this
test, we found that &lt;tt class="docutils literal"&gt;org.apache.commons.ssl.rmi.DateRMI&lt;/tt&gt; creates a
listener socket (on an arbitrary TCP port) upon instantiation. Some
further research yields that this listener socket in fact is a Java
Remote Method Invocation server. This server in turn is vulnerable to
the same deserialization attack we tried to attack before, but without a
whitelist. Testing locally, we were able to gain remote code execution
using a slightly modified version of Ysoserial on the newly created
socket, but due to the unused ports on crashplan.REDACTED.com being
filtered, we were unable to exploit this on the REDACTED infrastructure.&lt;/p&gt;
&lt;p&gt;However, we still deemed this to be a security risk. If the firewall is
ever misconfigured or temporarily turned off, or if an attacker can get
behind it, this would lead to arbitrary code execution. It may not be
the easiest one to fix, since it requires some serious rethinking of the
serialization methods used, but that should not be a reason to shift the
responsibility to the customer. Besides, the whitelist is so wide
(perhaps call it a widelist instead?) that it's an accident waiting to
happen.&lt;/p&gt;
</content></entry><entry><title>Prizes!</title><link href="https://blog.radicallyopensecurity.com/prizes.html" rel="alternate"></link><published>2016-08-16T00:00:00+02:00</published><updated>2016-08-16T00:00:00+02:00</updated><author><name>Melanie Rieback</name></author><id>tag:blog.radicallyopensecurity.com,2016-08-16:/prizes.html</id><summary type="html">&lt;p class="first last"&gt;Radically Open Security has been &lt;em&gt;rolling&lt;/em&gt; in prizes, during the last period of time.&lt;/p&gt;
</summary><content type="html">&lt;p&gt;Radically Open Security has been &lt;strong&gt;rolling&lt;/strong&gt; in prizes, during the last
period of time!&lt;/p&gt;
&lt;p&gt;Here they are:&lt;/p&gt;
&lt;div class="section" id="chamber-of-commerce-sme-innovation-top-100"&gt;
&lt;h2&gt;Chamber of Commerce - SME Innovation Top 100&lt;/h2&gt;
&lt;p&gt;Radically Open Security was recognized by the Dutch Chamber of Commerce
(KvK) as one of the Top 100 Most Innovative SMEs of 2016!&lt;/p&gt;
&lt;a class="reference external image-reference" href="http://www.mkbinnovatietop100.nl/site/top-100-2016"&gt;&lt;img alt="Logo Most Innovative SMEs 2016" src="../images/20160816-MKB-Innovatie-Top-100-klein.jpg" style="width: 249px;" /&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;div class="section" id="inspiring-fifty"&gt;
&lt;h2&gt;Inspiring Fifty&lt;/h2&gt;
&lt;p&gt;Radically Open Security CEO/Co-founder Melanie Rieback was selected for
the 'Inspiring Fifty' Netherlands, as one of the 50 most inspiring women
in the Dutch technology sector!&lt;/p&gt;
&lt;a class="reference external image-reference" href="http://www.inspiringfifty.com/nl2016/"&gt;&lt;img alt="Logo Inspiring Fifty Netherlands 2016" src="../images/20160816-local_stars_heade_NL-1-1024x345.jpg" style="width: 512px;" /&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;div class="section" id="pwnie-award-blackhat-usa-for-most-innovative-research-for-erik-bosman"&gt;
&lt;h2&gt;Pwnie Award (Blackhat USA) for 'Most Innovative Research' for Erik Bosman&lt;/h2&gt;
&lt;p&gt;ROS hacker Erik Bosman just won a Pwnie Award for 'Most Innovative
Research' at Blackhat USA in Las Vegas last week!&lt;/p&gt;
&lt;a class="reference external image-reference" href="http://pwnies.com/winners/"&gt;&lt;img alt="Logo The Pwnie Awards" src="../images/20160816-header_graphic.jpg" style="width: 490px;" /&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;div class="section" id="internet-freedom-festival-tool-showcase-for-netaidkit"&gt;
&lt;h2&gt;Internet Freedom Festival Tool Showcase (for NetAidKit)&lt;/h2&gt;
&lt;p&gt;The NetAidKit won several awards at the Internet Freedom Festival Tool
Showcase!&lt;/p&gt;
&lt;a class="reference external image-reference" href="https://equalit.ie/iff-tool-showcase-the-winners"&gt;&lt;img alt="Logo Internet Freedom Festival" src="../images/20160816-Internet-Freedom-Festival-2017-R.png" style="width: 242px;" /&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;div class="section" id="isoc-nl-internet-innovation-award-for-netaidkit"&gt;
&lt;h2&gt;ISOC.nl Internet Innovation Award (for NetAidKit)&lt;/h2&gt;
&lt;p&gt;The NetAidKit won the Internet Innovation Award from ISOC.nl for 2015.&lt;/p&gt;
&lt;a class="reference external image-reference" href="https://isoc.nl/isoc-nl-internet-innovatie-award-2015/"&gt;&lt;img alt="Logo NetAidKit" src="../images/20160816-thumbnail-netaidkit.png" style="width: 600px;" /&gt;&lt;/a&gt;
&lt;p&gt;We are &lt;strong&gt;super&lt;/strong&gt; proud of all of this success that we've been having since
the very beginning!  Thanks again to all of the awesome staff members,
customers, and friends in the security/hacker/IT communities who have
made all of this possible! :)&lt;/p&gt;
&lt;/div&gt;
</content><category term="NetAidKit"></category></entry><entry><title>Radically Open Security - 2nd Anniversary!</title><link href="https://blog.radicallyopensecurity.com/radically-open-security-2nd-anniversary.html" rel="alternate"></link><published>2016-04-28T00:00:00+02:00</published><updated>2016-04-28T00:00:00+02:00</updated><author><name>Melanie Rieback</name></author><id>tag:blog.radicallyopensecurity.com,2016-04-28:/radically-open-security-2nd-anniversary.html</id><summary type="html">&lt;p class="first last"&gt;Radically Open Security is now officially 2 years old… it's hard to believe what a whirlwind this past year has been!&lt;/p&gt;
</summary><content type="html">&lt;p&gt;Radically Open Security is now officially 2 years old… it's hard to
believe what a whirlwind this past year has been!&lt;/p&gt;
&lt;div class="section" id="about-our-company"&gt;
&lt;h2&gt;About our company&lt;/h2&gt;
&lt;ul class="simple"&gt;
&lt;li&gt;The size of our freelancer network has remained fairly stable at ~40 staff members. (3 management, ~10 core staff, ~25 extended network). There is still only 1 internal employee (the Director). Freelancers compose &lt;strong&gt;every&lt;/strong&gt; other part of our organization, including pentesters / project management / R&amp;amp;D folks / tech writers / finance. And it works!&lt;/li&gt;
&lt;li&gt;We have made &lt;strong&gt;loads&lt;/strong&gt; of investment in our infrastructure, tooling, automation, and processes. A standard pentest quotation (offerte) used to take us 1-2 weeks to write… now it takes us ~30 minutes!&lt;/li&gt;
&lt;li&gt;We have fully embraced Pentesting ChatOps (RocketChat, Gitlab, Hubot) and Kanban (Kanboard). The two integrated methodologies have been a revolution for the way that we work!&lt;/li&gt;
&lt;li&gt;We've spent the &lt;strong&gt;least&lt;/strong&gt; time on marketing / sales / PR. (As you can tell from this outdated blog.) This is primarily because word-of-mouth (and occasional conference talks) already brings us almost more new customers than we can handle. And we're growing carefully/organically, so we haven't felt the need to push it! ;-)&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="section" id="about-our-customers"&gt;
&lt;h2&gt;About our customers&lt;/h2&gt;
&lt;p&gt;We have already had ~30 different customers across a wide variety of
sectors:&lt;/p&gt;
&lt;ul class="simple"&gt;
&lt;li&gt;SW development / IT (6)&lt;/li&gt;
&lt;li&gt;Government (4)&lt;/li&gt;
&lt;li&gt;Non-profit / civil society (4)&lt;/li&gt;
&lt;li&gt;Energy + Water (3)&lt;/li&gt;
&lt;li&gt;Higher education (3)&lt;/li&gt;
&lt;li&gt;Hosting providers/NRENs (3)&lt;/li&gt;
&lt;li&gt;Core Internet backbone (2)&lt;/li&gt;
&lt;li&gt;Insurance (1)&lt;/li&gt;
&lt;li&gt;Law enforcement (1)&lt;/li&gt;
&lt;li&gt;Computer security (1)&lt;/li&gt;
&lt;li&gt;Media - television (1)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Approx. 30% of these customers are now (quite regular) repeat
customers. The customer loyalty is partly rooted in our pentester
quality, and is partly due to the 'Peek Over Our Shoulder' option that
we offer by default.&lt;/p&gt;
&lt;p&gt;And this isn't even accounting for the new customers in the pipeline.
Customer demand is currently &lt;strong&gt;exploding&lt;/strong&gt; for us!&lt;/p&gt;
&lt;/div&gt;
&lt;div class="section" id="other-facts"&gt;
&lt;h2&gt;Other facts&lt;/h2&gt;
&lt;ul class="simple"&gt;
&lt;li&gt;We made ~1500 commits to our ROS Github repository: &lt;a class="reference external" href="https://github.com/radicallyopensecurity"&gt;https://github.com/radicallyopensecurity&lt;/a&gt; This is where we publish our tooling and frameworks… it is our commitment to release as much as possible into the open-source!&lt;/li&gt;
&lt;li&gt;Our NetAidKit (w/ Free Press Unlimited) has now won multiple awards: ISOC.nl Internet Innovation Award 2015 + Internet Freedom Festival Tool Showcase. We are busy selling the first 1000 units (with V1.0 firmware) by email request - the webshop (for the general public) should be appearing in 1-2 months from now.&lt;/li&gt;
&lt;li&gt;We just won our first large(!) international RFP in the United States (Washington DC).&lt;/li&gt;
&lt;li&gt;If current levels of business remain consistent, we anticipate a half million Euros of turnover for 2016. OMG!!!&lt;/li&gt;
&lt;li&gt;Due to our unusual non-profit business model and freelancer-only construction (think: Uber/AirBNB model for computer security consultancy), the Stanford Graduate School of Business is halfway through writing a case study on Radically Open Security for their MBA entrepreneurship program!!! That is &lt;strong&gt;my&lt;/strong&gt; personal highlight of the year! I couldn't imagine a better validation of what we're currently doing.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="section" id="conclusion"&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;So yeah… it's been a HECK of a year! I think that Year 2 wildly
succeeded with turning ROS from a startup into a business. My hopes and
ambitions for Year 3 are further maturation of our tooling / process /
workflow. And maybe… just maybe… we might be able to generate the
first Euros of profit for Stichting NLnet! I dream that this will be
the year that we can start fulfilling that promise!&lt;/p&gt;
&lt;p&gt;Thanks to everybody (staff, customers, partners) for enabling us to have
this amazing journey,&lt;/p&gt;
&lt;p&gt;Melanie Rieback&lt;/p&gt;
&lt;/div&gt;
</content><category term="GitHub"></category><category term="NLnet"></category><category term="NetAidKit"></category><category term="Free Press Unlimited"></category></entry><entry><title>NetAidKit: protect yourself!</title><link href="https://blog.radicallyopensecurity.com/netaidkit-protect-yourself.html" rel="alternate"></link><published>2015-10-07T00:00:00+02:00</published><updated>2015-10-07T00:00:00+02:00</updated><author><name>Melanie Rieback</name></author><id>tag:blog.radicallyopensecurity.com,2015-10-07:/netaidkit-protect-yourself.html</id><summary type="html">&lt;p class="first"&gt;Many people are aware of it by now: protect yourself when you go online! This is especially important for journalists and activists, who are regularly targeted by parties who hope to keep the public in the dark. Protecting your sources, colleagues and yourself from prying eyes is of vital importance. But for many people it is not that easy to set up the tools and take the required measures. This is where NetaidKit comes into play.&lt;/p&gt;
&lt;a class="last reference external image-reference" href="/"&gt;&lt;img alt="Cartoon of the NetAidKit from the ISOC.nl Innovation Award created by Michiel van de Pol/ComicHouse.nl" class="align-center" src="../images/cartoon-ISOC.nl-award-netaidkit.png" style="width: 100%;" /&gt;&lt;/a&gt;
</summary><content type="html">&lt;p&gt;Many people are aware of it by now: protect yourself when you go online!&lt;/p&gt;
&lt;p&gt;This is especially important for journalists and activists, who are regularly targeted by parties who hope to keep the public in the dark. Protecting your sources, colleagues and yourself from prying eyes is of vital importance. But for many people it is not that easy to set up the tools and take the required measures.&lt;/p&gt;
&lt;p&gt;That's why &lt;a class="reference external" href="https://freepressunlimited.org/en"&gt;Free Press Unlimited&lt;/a&gt; and Radically Open Security have teamed up to create the &lt;a class="reference external" href="https://netaidkit.net"&gt;NetAidKit&lt;/a&gt;. The NetAidKit is a pocket-sized, USB-powered router that connects everything to everything, designed &lt;strong&gt;specifically for non-technical users&lt;/strong&gt;. The easy-to-use web interface allows you to connect the NetAidKit to a wireless or cabled network and share that connection with your other devices, such as a phone, laptop or tablet.
Once the NetAidKit has been hooked up to a wireless or cabled network, you can make it connect to a Virtual Private Network or the anonymising Tor network at the click of a button. Any devices connected to the NetAidKit will automatically use these extra security features, without needing to configure each of the devices separately.&lt;/p&gt;
&lt;a class="reference external image-reference" href="https://isoc.nl/isoc-nl-internet-innovatie-award-2015/"&gt;&lt;img alt="Cartoon of the NetAidKit from the ISOC.nl Innovation Award created by Michiel van de Pol/ComicHouse.nl" class="align-center" src="../images/cartoon-ISOC.nl-award-netaidkit.png" style="width: 100%;" /&gt;&lt;/a&gt;
&lt;p&gt;Besides for journalists and activists, this box is also very useful for other non-technical users. Free Press Unlimited is currently &lt;a class="reference external" href="https://www.sidnfonds.nl/nieuws/uitslag-eerste-call-bekend"&gt;developing and marketing&lt;/a&gt; the NetAidKit for a wider audience.
In 2015, the Netherlands chapter of Internet Society (ISOC.nl) awarded NetAidKit the &lt;a class="reference external" href="https://isoc.nl/isoc-nl-internet-innovatie-award-2015/"&gt;Internet Innovation Award 2015&lt;/a&gt;. We are very proud that ISOC has acknowledged the importance of creating a user-friendly way to secure your internet connection.&lt;/p&gt;
&lt;p&gt;To check out the specifics of NetAidKit on Github, go to:&lt;/p&gt;
&lt;blockquote&gt;
&lt;ul class="simple"&gt;
&lt;li&gt;&lt;a class="reference external" href="https://github.com/radicallyopensecurity"&gt;https://github.com/radicallyopensecurity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="reference external" href="https://netaidkit.net/"&gt;https://netaidkit.net/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
</content><category term="NetAidKit"></category><category term="Free Press Unlimited"></category><category term="ISOC.nl"></category><category term="SIDN Fonds"></category><category term="development"></category></entry><entry><title>A busy year</title><link href="https://blog.radicallyopensecurity.com/a-busy-year.html" rel="alternate"></link><published>2015-10-02T00:00:00+02:00</published><updated>2015-10-02T00:00:00+02:00</updated><author><name>Melanie Rieback</name></author><id>tag:blog.radicallyopensecurity.com,2015-10-02:/a-busy-year.html</id><summary type="html">&lt;p class="first"&gt;Our first year was turbulent and very successful. Our client base has grown to include critical infrastructure providers, academia, civil rights organisations, financial institutions and more.&lt;/p&gt;
&lt;a class="last reference external image-reference" href="/a-busy-year.html"&gt;&lt;img alt="Menso Heus and Melanie Rieback accept the ISOC.nl Innovation Award on behalf of Free Press Unlimited and Radically Open Security" class="align-center" src="../images/2015-ISOC.nl-award-MandM.jpg" style="width: 100%;" /&gt;&lt;/a&gt;
</summary><content type="html">&lt;p&gt;So it has been a year since our last update. Inexcusable, but we have a
great excuse: we were busy! Which is not bad for an ambitious startup
like Radically Open Security.&lt;/p&gt;
&lt;p&gt;Great new projects, presentations and meetings have kept us off the
streets. More and more organizations and companies acknowledge that they
are responsible for providing their customer with secures services and
communications, and have asked us to test the security of their systems
online. By now our client base has grown to include companies like
Surfnet, Free Press Unlimited and Amsio.&lt;/p&gt;
&lt;p&gt;We are presently collecting case studies of some of our projects. You
will be able to find them online soon! And of course, you can find
examples of our work on
&lt;a class="reference external" href="https://github.com/radicallyopensecurity"&gt;Github&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Melanie Rieback was particularly busy, raising awareness of the &lt;a class="reference external" href="https://youtu.be/xdE_GyklHq8"&gt;need
for transparency in the online security
sector&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We also developed the &lt;a class="reference external" href="https://netaidkit.net/"&gt;NetAidKit&lt;/a&gt; in
partnership with the Dutch NGO Free Press Unlimited. This &lt;a class="reference external" href="https://isoc.nl/isoc-nl-internet-innovatie-award-2015/"&gt;award
winning&lt;/a&gt;
easy-to-use tool allows journalists and activists around the globe to
use the internet securely and anonymously.&lt;/p&gt;
&lt;a class="reference external image-reference" href="https://isoc.nl/isoc-nl-internet-innovatie-award-2015/"&gt;&lt;img alt="Menso Heus and Melanie Rieback accept the ISOC.nl Innovation Award on behalf of Free Press Unlimited and Radically Open Security" class="align-center" src="../images/2015-ISOC.nl-award-MandM.jpg" style="width: 100%;" /&gt;&lt;/a&gt;
&lt;p&gt;Another exciting project in the pipeline is our &lt;em&gt;Open Source Anti-DDos
Solution Project&lt;/em&gt;. By developing open source analysis and mitigation
software, we want to make the – often expensive and complicated –
protection against DDoS attacks affordable and obtainable for smaller
companies and non-profit organizations. We have received support from
two organisations, first from &lt;a class="reference external" href="https://nlnet.nl"&gt;NLnet Foundation&lt;/a&gt; and
now recently from &lt;a class="reference external" href="https://www.sidnfonds.nl/nieuws/uitslag-eerste-call-bekend"&gt;SIDN
Fonds&lt;/a&gt;
for this project, for which we are very grateful.&lt;/p&gt;
&lt;p&gt;So we spent this year working, not blogging. Radically Open Security has
presently grown to 38 staff members. Thirteen of our staff are women -
one of whom has been assigned the task of keeping our blog up to date,
starting today!&lt;/p&gt;
</content><category term="SBox"></category><category term="NetAidKit"></category><category term="Free Press Unlimited"></category><category term="Anti-DDoS"></category><category term="Surfnet"></category><category term="SIDN Fonds"></category><category term="NLnet"></category></entry><entry><title>Overview of talks in October 2014</title><link href="https://blog.radicallyopensecurity.com/overview-of-talks-in-october-2014.html" rel="alternate"></link><published>2014-11-01T00:00:00+01:00</published><updated>2014-11-01T00:00:00+01:00</updated><author><name>Melanie Rieback</name></author><id>tag:blog.radicallyopensecurity.com,2014-11-01:/overview-of-talks-in-october-2014.html</id><summary type="html">&lt;p class="first last"&gt;Radically Open Security has been busy this past month, presenting at conferences and teaching courses/workshops throughout the Netherlands, and Europe!  Here is an overview of &lt;a class="reference external" href="/overview-of-talks-in-october-2014.html"&gt;our activities in October&lt;/a&gt;.&lt;/p&gt;
</summary><content type="html">&lt;img alt="Holland Strikes Back" class="align-right" src="../images/20141028-HSB-logo.png" style="width: 45%;" /&gt;
&lt;p&gt;Radically Open Security has been busy this past month, presenting at conferences and teaching courses/workshops throughout the Netherlands, and Europe!  Here is an overview of our activities in October:&lt;/p&gt;
&lt;ul class="simple"&gt;
&lt;li&gt;On October 2, ROS CEO Melanie Rieback discussed Radically Open Security at the &lt;a class="reference external" href="https://www.surf.nl/agenda/2014/10/surfnet-relatiedagen-2014"&gt;SURFnet Relatiedagen&lt;/a&gt;. &lt;a class="reference external" href="https://www.surfnet.nl"&gt;SURFnet&lt;/a&gt; is a collaborative organization for information and communications technology in Dutch higher education and research.&lt;/li&gt;
&lt;li&gt;On October 7, ROS co-founders Jurriaan Bremer and Mark Schloesser gave a Cuckoo Workshop at Security Academy, where they taught how to setup and use Cuckoo Sandbox to analyze suspicious files and interpret any found malicious behavior.&lt;/li&gt;
&lt;li&gt;On October 14, ROS CEO Melanie Rieback gave an 'Adventures in DDoS Analysis' presentation at the &lt;a class="reference external" href="http://www.first.org/events/symposium/tbilisi2014"&gt;FIRST Symposium in Tbilisi&lt;/a&gt;, Georgia followed by co-teaching a two-day FIRST/TERENA TRANSITS 1 course.  TRANSITS is affordable, high-quality training for both new and experienced Computer Security Incident Response Team (CSIRT) personnel.&lt;/li&gt;
&lt;li&gt;On October 25, ROS volunteer Harm Boertien gave a presentation at &lt;a class="reference external" href="http://www.t-dose.org"&gt;T-Dose&lt;/a&gt;, which is a free annual event held in The Netherlands to promote use and development of Open Source Software.  He described what Radical Open Security is all about and how volunteers can participate in project &lt;a class="reference external" href="/sbox-usable-privacy-and-anonymity-for-journalists.html"&gt;S-BOX&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;On October 28, ROS co-founder Peter Geissler gave a Cloud Security talk at &lt;a class="reference external" href="http://www.hollandstrikesback.nl"&gt;Holland Strikes Back&lt;/a&gt;, a conference highlighting Dutch initiatives against cyber attacks and abuse, organized by &lt;a class="reference external" href="https://nlnet.nl"&gt;NLnet&lt;/a&gt;, &lt;a class="reference external" href="http://www.ispconnect.nl"&gt;ISPConnect&lt;/a&gt;, &lt;a class="reference external" href="http://dhpa.nl"&gt;Dutch Hosting Provider Association&lt;/a&gt; and &lt;a class="reference external" href="http://www.alertonline.nl"&gt;AlertOnline&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;img alt="Harm Boertien presenting at T-Dose 2014" class="align-right" src="../images/20141025-T-Dose-Harm-S-Box.jpg" style="width: 45%;" /&gt;
&lt;img alt="Peter Geissler presenting at T-Dose 2014" class="align-right" src="../images/20141028-HollandStrikesBack-Peter.jpg" style="width: 45%;" /&gt;
&lt;p&gt;If you would like one of our security experts to talk or teach at your
conference or activity, please contact us!&lt;/p&gt;
</content><category term="S-BOX"></category><category term="SURFnet"></category><category term="T-DOSE"></category><category term="FIRST"></category><category term="TRANSITS"></category><category term="Holland Strikes Back"></category><category term="Cuckoo"></category><category term="DDoS"></category><category term="Cloud Security"></category></entry><entry><title>SBox: Usable Privacy and Anonymity for Journalists</title><link href="https://blog.radicallyopensecurity.com/sbox-usable-privacy-and-anonymity-for-journalists.html" rel="alternate"></link><published>2014-10-02T00:00:00+02:00</published><updated>2014-10-02T00:00:00+02:00</updated><author><name>Melanie Rieback</name></author><id>tag:blog.radicallyopensecurity.com,2014-10-02:/sbox-usable-privacy-and-anonymity-for-journalists.html</id><summary type="html">&lt;p class="first last"&gt;Today I’m excited to let everyone know about a new project to create useful open-source things for the whole community. We’ve been engaged by the &lt;a class="reference external" href="http://internetprotectionlab.net"&gt;Internet Protection Lab&lt;/a&gt; - a collaboration between &lt;a class="reference external" href="https://freepressunlimited.org"&gt;Free Press Unlimited&lt;/a&gt;, &lt;a class="reference external" href="https://hivos.nl"&gt;Hivos&lt;/a&gt; and &lt;a class="reference external" href="https://www.greenhost.nl"&gt;Greenhost&lt;/a&gt; - dedicated to preserving press freedom and access to information worldwide. The Internet Protection Lab has asked Radically Open Security to help create technology that allows journalists and activists to connect to the internet safely in an easy way, and we need your help!&lt;/p&gt;
</summary><content type="html">&lt;p&gt;Radically Open Security is off to a great start!  Within months of registering our new company with the Chamber of Commerce, we have 4 client engagements, and even more gigs rolling in!  But what we’re happiest about is that those projects mean the start of our organization’s ability to begin giving back to the community via our open source ethos and non-profit business model.&lt;/p&gt;
&lt;p&gt;Today I’m excited to let everyone know about a new project to create useful open-source things for the whole community. We’ve been engaged by the &lt;a class="reference external" href="http://internetprotectionlab.net"&gt;Internet Protection Lab&lt;/a&gt; - a collaboration between &lt;a class="reference external" href="https://freepressunlimited.org"&gt;Free Press Unlimited&lt;/a&gt;, &lt;a class="reference external" href="https://hivos.nl"&gt;Hivos&lt;/a&gt; and &lt;a class="reference external" href="https://www.greenhost.nl"&gt;Greenhost&lt;/a&gt; - dedicated to preserving press freedom and access to information worldwide. The Internet Protection Lab has asked Radically Open Security to help create technology that allows journalists and activists to connect to the internet safely in an easy way, and we need your help!&lt;/p&gt;
&lt;p&gt;What’s this thing we’re working on? We’re still in the specification stages, but let me introduce you to the &lt;strong&gt;SBox&lt;/strong&gt;. We plan to build a low-cost physical device that acts like a wifi hotspot that transparently creates a VPN tunnel or connection to the Tor network for standard end-point devices.  As the user, you just connect your device to the hotspot’s Wifi, log in, and begin browsing, sending email, etc. Under the hood, the SBox will then transparently create a VPN tunnel and/or a connection to the Tor network, thus preventing the end user’s communications from being watched, and protecting the users’ identity from observers.&lt;/p&gt;
&lt;p&gt;This is a community project..  we’re going to need help to make this happen!  Here’s what you can do to help us and Free Press Unlimited protect journalists and other activists:&lt;/p&gt;
&lt;ul class="simple"&gt;
&lt;li&gt;&lt;em&gt;Security professionals&lt;/em&gt;: the security architecture and protocols, and security analysis of the device’s operations and user modes will be a challenge.   As usual, key and certificate management will be difficult to get right.   We’ll need to ensure that physical compromise of the device doesn’t mean total loss of the journalists’ data, location, and identity.  We’ll need to carefully scope what the device can do and CAN’T do.  And platform/application security of the SBox itself will need to be audited.   We’ll need many many sets of eyes to get these things right...&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Devops/Programming experts&lt;/em&gt;:  we need to create the requirements and specs, and then hunt for an appropriate low-cost (preferably &amp;lt;$50) HW platform on which to build.   We’ll have to consider existing open-source SW projects that solve similar problems (i.e. OnionPi, Grugq’s Portal, Safeplug), and see if we can build upon them.  And we’ll need to make our platform usable and easy to configure.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Community organizers&lt;/em&gt;: We need help spreading the word about this project, recruiting more volunteers to work on it and folks to help us make our in real life events flow smoothly.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Users&lt;/em&gt;: As we start to have our first prototypes, we’ll want live feedback from the field about usability and security of the system. We’re looking for feedback from expert technologists and every day users, alike. Bonus points if you have experience as a journalist or activist!&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;So how can you help?&lt;/p&gt;
&lt;p&gt;Come to our first volunteer meetup and hackathon this Friday, October 3rd. We’ll convene from 6-10 PM at the &lt;a class="reference external" href="http://www.techinc.nl"&gt;Tech Inc&lt;/a&gt; hackerspace in Amsterdam to work on requirements gathering and exploring what technical resources already exist that we can use. If you’re not a coder, no worries! Turn up anyway, as we’ll want a chance to get to know you and figure out where you can best lend your skills in marketing, testing or any other way you’d like to contribute.&lt;/p&gt;
&lt;p&gt;Looking forward to seeing you on Friday! If you can’t make it, we’ll have even more hackathons and volunteer meetups coming soon. Stay tuned to this space.&lt;/p&gt;
</content><category term="S-BOX"></category><category term="SBox"></category><category term="Internet Protection Lab"></category><category term="Free Press Unlimited"></category><category term="Greenhost"></category><category term="Hivos"></category><category term="Tech Inc"></category><category term="open hardware"></category></entry><entry><title>Featured in NRC Handelsblad</title><link href="https://blog.radicallyopensecurity.com/featured-in-nrc-handelsblad.html" rel="alternate"></link><published>2014-05-27T00:00:00+02:00</published><updated>2014-05-27T00:00:00+02:00</updated><author><name>team</name></author><id>tag:blog.radicallyopensecurity.com,2014-05-27:/featured-in-nrc-handelsblad.html</id><summary type="html">&lt;p class="first"&gt;CEO Melanie Rieback featured in NRC Handelsblad&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Radically Open Security's CEO Melanie Rieback was featured in Dutch newspaper &amp;quot;NRC Handelsblad&amp;quot; in an article &amp;quot;Leave the hacking to the women&amp;quot; by journalist &lt;a class="reference external" href="http://www.laurawismans.nl/"&gt;Laura Wismans&lt;/a&gt;, talking about the need for female role models in cyber defense.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;a class="last reference external image-reference" href="../f/20140527-HackInTheBox-CTF-vrouwen.pdf"&gt;&lt;img alt="Article in NRC with interview of Melanie Rieback" class="align-center" src="../images/20140527-HackInTheBox-CTF-vrouwen.png" style="width: 100%;" /&gt;&lt;/a&gt;
</summary><content type="html">&lt;p&gt;Radically Open Security's CEO Melanie Rieback was featured
in Dutch newspaper &amp;quot;NRC Handelsblad&amp;quot; in an article &amp;quot;Leave the hacking
to the women&amp;quot;, talking about the need for female role models in
cyber defense. The article was written by journalist &lt;a class="reference external" href="http://www.laurawismans.nl/"&gt;Laura Wismans&lt;/a&gt;&lt;/p&gt;
&lt;a class="reference external image-reference" href="../f/20140527-HackInTheBox-CTF-vrouwen.pdf"&gt;&lt;img alt="Article in NRC with interview of Melanie Rieback" class="align-center" src="../images/20140527-HackInTheBox-CTF-vrouwen.png" style="width: 100%;" /&gt;&lt;/a&gt;
&lt;p&gt;&lt;a class="reference external" href="http://www.nrcq.nl/2014/05/28/laat-het-hacken-maar-aan-de-vrouwen-over"&gt;Read the article on the website of NRC&lt;/a&gt;&lt;/p&gt;
&lt;div class="section" id="laat-het-hacken-maar-aan-de-vrouwen-over"&gt;
&lt;h2&gt;Laat het hacken maar aan de vrouwen over&lt;/h2&gt;
&lt;p&gt;Typisch vrouwen: niet mee willen doen aan een hackwedstrijd omdat ze denken dat de teams met mannen toch veel beter zijn. Er was wat overredingskracht voor nodig, maar vanaf morgenochtend 10.00 uur gaan twee teams van drie vrouwen er helemaal voor.&lt;/p&gt;
&lt;p&gt;Dan begint de &lt;a class="reference external" href="http://haxpo.nl/hitb2014ams-capture-the-flag/"&gt;Capture the Flag-hackcompetitie&lt;/a&gt; op cyber-securityconferentie &lt;a class="reference external" href="http://haxpo.nl/"&gt;Hack in the Box&lt;/a&gt; in de Amsterdamse Beurs van Berlage. Twee dagen lang gaan ze inlogcodes kraken, documenten decoderen en inbreken op speciaal voor de wedstrijd opgezette websites. Nog nooit eerder deed een vrouwenteam mee aan deze hackcompetitie.&lt;/p&gt;
&lt;p&gt;Vorig jaar op Hack in the Box: &lt;a class="reference external" href="http://www.youtube.com/embed/jjRzqGUFECI"&gt;Zo hack je een vliegtuig&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Technologie is een mannenwereld en cyber security al helemaal. In Europa is zo’n 7 procent van de mensen in de cyber security vrouw – die in marketingposities meegerekend. Dat viel Anouk Vos en Iowa Carels ook op. Daarom richtten ze begin 2013 hun netwerkgroep &lt;a class="reference external" href="https://www.linkedin.com/groups/Women-in-Cyber-Security-4783454/about"&gt;Women in Cyber Security&lt;/a&gt; op.&lt;/p&gt;
&lt;p&gt;Voor de gezelligheid, maar ook om anderen duidelijk te maken dat ze bestaan. En dat ze niet onderdoen voor de mannen in hun sector. Hun netwerk bestaat nu uit bijna driehonderd vrouwen, uit Nederland en daarbuiten.&lt;/p&gt;
&lt;div class="section" id="alle-keynotes-door-vrouwen"&gt;
&lt;h3&gt;Alle keynotes door vrouwen&lt;/h3&gt;
&lt;p&gt;Het is niet toevallig dat de vrouwen juist deze conferentie hebben uitgekozen om mee te doen aan Capture the Flag. De organisatoren van Hack in the Box hebben er dit jaar werk van gemaakt om alle keynote speeches door vrouwen te laten doen. Ongekend! De Women in Cyber Security wilden niet achterblijven en dus kregen alle leden een e-mail: wie wil meedoen aan de hackwedstrijd?&lt;/p&gt;
&lt;p&gt;&lt;a class="reference external" href="https://radicallyopensecurity.com/team"&gt;Melanie Rieback&lt;/a&gt; zei direct ja. Ze ontdekte Capture the Flag (CTF) afgelopen november als nieuwe hobby. Ze heeft haar eigen beveiligingsbedrijf en werkte eerder onder meer op de beveiligingsafdeling van ING. De hackwedstrijden ziet ze als goede aanvulling op haar werk.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="section" id="rolmodellen-voor-meisjeshackers"&gt;
&lt;h3&gt;Rolmodellen voor meisjeshackers&lt;/h3&gt;
&lt;p&gt;Pakken vrouwen de opgaven anders aan dan mannen? Nee, denkt Rieback. “Maar vrouwen geven wel sneller op”, zegt een van de vrouwen tijdens een oefensessie. “Ja, die denken eerder dat het toch niet gaat lukken”, zegt hacker Esther (die haar achternaam niet wil geven).&lt;/p&gt;
&lt;p&gt;Rieback wil niet van opgeven horen. Ze vindt dat gepraat over vrouwen en mannen eigenlijk ook maar onzin. Vrouwen kunnen hetzelfde als mannen. Het netwerk, en ook de deelname van dit team, vindt ze vooral belangrijk om dat te laten zien. Meisjeshackers moeten vaker rolmodel zijn.&lt;/p&gt;
&lt;p&gt;Afgelopen zondag kwamen de vrouwen voor het laatst bij elkaar. De laatste tactieken zijn doorgesproken. Rieback is realistisch en acht de kans op de hoofdprijs niet groot. “Maar dat betekent niet meteen dat we laatste worden hoor”, zegt ze. Deze CTF zien de vrouwen vooral als een startpunt; ze gaan vanaf nu aan meer competities meedoen. Op de trainingsavond mijmeren ze: “zou een internationaal vrouwenteam niet gaaf zijn?”&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><category term="press"></category><category term="rieback"></category><category term="'Women in Cyber Security'"></category></entry></feed>