Ecoer Logo

@cryptosec

25

BlockChain & Cyber Security

steemit.com/@cryptosec
VOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS100.00%
REPUTATION PROGRESS0.00%
Net Worth
0.058USD
STEEM
0.000STEEM
SBD
0.048SBD
Effective Power
5.001SP
├── Own SP
0.631SP
└── Incoming Deleg
+4.370SP

Detailed Balance

STEEM
balance
0.000STEEM
market_balance
0.000STEEM
savings_balance
0.000STEEM
reward_steem_balance
0.000STEEM
STEEM POWER
Own SP
0.631SP
Delegated Out
0.000SP
Delegation In
4.370SP
Effective Power
5.001SP
Reward SP (pending)
0.054SP
SBD
sbd_balance
0.000SBD
sbd_conversions
0.000SBD
sbd_market_balance
0.000SBD
savings_sbd_balance
0.000SBD
reward_sbd_balance
0.048SBD
{
  "balance": "0.000 STEEM",
  "savings_balance": "0.000 STEEM",
  "reward_steem_balance": "0.000 STEEM",
  "vesting_shares": "1027.998372 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "7115.661434 VESTS",
  "sbd_balance": "0.000 SBD",
  "savings_sbd_balance": "0.000 SBD",
  "reward_sbd_balance": "0.048 SBD",
  "conversions": []
}

Account Info

namecryptosec
id427091
rank1,426,140
reputation945698293
created2017-10-27T12:22:33
recovery_accountsteem
proxyNone
post_count8
comment_count0
lifetime_vote_count0
witnesses_voted_for0
last_post2017-11-01T13:29:12
last_root_post2017-11-01T13:29:12
last_vote_time1970-01-01T00:00:00
proxied_vsf_votes0, 0, 0, 0
can_vote1
voting_power0
delayed_votes0
balance0.000 STEEM
savings_balance0.000 STEEM
sbd_balance0.000 SBD
savings_sbd_balance0.000 SBD
vesting_shares1027.998372 VESTS
delegated_vesting_shares0.000000 VESTS
received_vesting_shares7115.661434 VESTS
reward_vesting_balance110.982134 VESTS
vesting_balance0.000 STEEM
vesting_withdraw_rate0.000000 VESTS
next_vesting_withdrawal1969-12-31T23:59:59
withdrawn0
to_withdraw0
withdraw_routes0
savings_withdraw_requests0
last_account_recovery1970-01-01T00:00:00
reset_accountnull
last_owner_update1970-01-01T00:00:00
last_account_update2017-10-28T13:52:57
minedNo
sbd_seconds0
sbd_last_interest_payment1970-01-01T00:00:00
savings_sbd_last_interest_payment1970-01-01T00:00:00
{
  "id": 427091,
  "name": "cryptosec",
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM8UNuEoBNkhSq8my3wubSB4KS31dPf9D9bu98UjdbADkBPkDT4S",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7YpsXCrxy6zDnWBQQj4hj8J1Ap1AVzgcehffgtRSGJwpzUbiRJ",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM8cftYZ7p32cgRCsyYTjebXxhY1rdmsjaAtV94oQyTm1v5nBdJh",
        1
      ]
    ]
  },
  "memo_key": "STM8LCbWo4Fkg7xYDHyKAyfuAnADBZBfDFKLxMYWJonY5oxJ4bsUe",
  "json_metadata": "{\"profile\":{\"name\":\"CryptoSec\",\"about\":\"BlockChain & Cyber Security\",\"location\":\"Sarajevo\",\"website\":\"https://www.cryptosec.cc\"}}",
  "posting_json_metadata": "{\"profile\":{\"name\":\"CryptoSec\",\"about\":\"BlockChain & Cyber Security\",\"location\":\"Sarajevo\",\"website\":\"https://www.cryptosec.cc\"}}",
  "proxy": "",
  "last_owner_update": "1970-01-01T00:00:00",
  "last_account_update": "2017-10-28T13:52:57",
  "created": "2017-10-27T12:22:33",
  "mined": false,
  "recovery_account": "steem",
  "last_account_recovery": "1970-01-01T00:00:00",
  "reset_account": "null",
  "comment_count": 0,
  "lifetime_vote_count": 0,
  "post_count": 8,
  "can_vote": true,
  "voting_manabar": {
    "current_mana": "8143659806",
    "last_update_time": 1779058965
  },
  "downvote_manabar": {
    "current_mana": 2035914951,
    "last_update_time": 1779058965
  },
  "voting_power": 0,
  "balance": "0.000 STEEM",
  "savings_balance": "0.000 STEEM",
  "sbd_balance": "0.000 SBD",
  "sbd_seconds": "0",
  "sbd_seconds_last_update": "1970-01-01T00:00:00",
  "sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_sbd_balance": "0.000 SBD",
  "savings_sbd_seconds": "0",
  "savings_sbd_seconds_last_update": "1970-01-01T00:00:00",
  "savings_sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_withdraw_requests": 0,
  "reward_sbd_balance": "0.048 SBD",
  "reward_steem_balance": "0.000 STEEM",
  "reward_vesting_balance": "110.982134 VESTS",
  "reward_vesting_steem": "0.054 STEEM",
  "vesting_shares": "1027.998372 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "7115.661434 VESTS",
  "vesting_withdraw_rate": "0.000000 VESTS",
  "next_vesting_withdrawal": "1969-12-31T23:59:59",
  "withdrawn": 0,
  "to_withdraw": 0,
  "withdraw_routes": 0,
  "curation_rewards": 0,
  "posting_rewards": 108,
  "proxied_vsf_votes": [
    0,
    0,
    0,
    0
  ],
  "witnesses_voted_for": 0,
  "last_post": "2017-11-01T13:29:12",
  "last_root_post": "2017-11-01T13:29:12",
  "last_vote_time": "1970-01-01T00:00:00",
  "post_bandwidth": 0,
  "pending_claimed_accounts": 0,
  "vesting_balance": "0.000 STEEM",
  "reputation": 945698293,
  "transfer_history": [],
  "market_history": [],
  "post_history": [],
  "vote_history": [],
  "other_history": [],
  "witness_votes": [],
  "tags_usage": [],
  "guest_bloggers": [],
  "rank": 1426140
}

Withdraw Routes

IncomingOutgoing
Empty
Empty
{
  "incoming": [],
  "outgoing": []
}
From Date
To Date
steemdelegated 4.370 SP to @cryptosec
2026/05/17 23:02:45
delegatorsteem
delegateecryptosec
vesting shares7115.661434 VESTS
Transaction InfoBlock #106142007/Trx 85e27bb4d202dbf30d40d010228c7f3dfdc6ac84
View Raw JSON Data
{
  "trx_id": "85e27bb4d202dbf30d40d010228c7f3dfdc6ac84",
  "block": 106142007,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-17T23:02:45",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "7115.661434 VESTS"
    }
  ]
}
steemdelegated 2.704 SP to @cryptosec
2026/05/11 23:00:30
delegatorsteem
delegateecryptosec
vesting shares4403.451029 VESTS
Transaction InfoBlock #105969925/Trx 96602204fc82bda18a8ec3946190b0802f94b09e
View Raw JSON Data
{
  "trx_id": "96602204fc82bda18a8ec3946190b0802f94b09e",
  "block": 105969925,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-11T23:00:30",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "4403.451029 VESTS"
    }
  ]
}
steemdelegated 4.378 SP to @cryptosec
2026/04/25 22:25:42
delegatorsteem
delegateecryptosec
vesting shares7128.177190 VESTS
Transaction InfoBlock #105509694/Trx ed05d9d172607faf71cf474517abf1f0d6ea95b3
View Raw JSON Data
{
  "trx_id": "ed05d9d172607faf71cf474517abf1f0d6ea95b3",
  "block": 105509694,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-25T22:25:42",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "7128.177190 VESTS"
    }
  ]
}
steemdelegated 2.730 SP to @cryptosec
2026/01/23 04:35:27
delegatorsteem
delegateecryptosec
vesting shares4444.997848 VESTS
Transaction InfoBlock #102847965/Trx cb25f3b6d8155fdb29c0507b9008f1dd1760c7b4
View Raw JSON Data
{
  "trx_id": "cb25f3b6d8155fdb29c0507b9008f1dd1760c7b4",
  "block": 102847965,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-23T04:35:27",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "4444.997848 VESTS"
    }
  ]
}
steemdelegated 2.831 SP to @cryptosec
2024/12/16 23:54:36
delegatorsteem
delegateecryptosec
vesting shares4609.217045 VESTS
Transaction InfoBlock #91294372/Trx 1997195cf7309ed76843fa4070d395241e727be4
View Raw JSON Data
{
  "trx_id": "1997195cf7309ed76843fa4070d395241e727be4",
  "block": 91294372,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2024-12-16T23:54:36",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "4609.217045 VESTS"
    }
  ]
}
steemdelegated 2.934 SP to @cryptosec
2023/11/13 15:38:57
delegatorsteem
delegateecryptosec
vesting shares4778.350577 VESTS
Transaction InfoBlock #79848615/Trx d8d871efe26b79c3e2be6964633f306c3bd5248b
View Raw JSON Data
{
  "trx_id": "d8d871efe26b79c3e2be6964633f306c3bd5248b",
  "block": 79848615,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2023-11-13T15:38:57",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "4778.350577 VESTS"
    }
  ]
}
steemdelegated 4.738 SP to @cryptosec
2023/09/21 20:25:12
delegatorsteem
delegateecryptosec
vesting shares7715.629363 VESTS
Transaction InfoBlock #78346144/Trx 6ac31f53016cae19fec2b0f8b436ba8e256fa193
View Raw JSON Data
{
  "trx_id": "6ac31f53016cae19fec2b0f8b436ba8e256fa193",
  "block": 78346144,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2023-09-21T20:25:12",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "7715.629363 VESTS"
    }
  ]
}
steemdelegated 4.874 SP to @cryptosec
2022/11/03 10:23:15
delegatorsteem
delegateecryptosec
vesting shares7937.310801 VESTS
Transaction InfoBlock #69111690/Trx c8d39438a9b45d181df764be2ca6938c3e434401
View Raw JSON Data
{
  "trx_id": "c8d39438a9b45d181df764be2ca6938c3e434401",
  "block": 69111690,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2022-11-03T10:23:15",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "7937.310801 VESTS"
    }
  ]
}
steemdelegated 5.010 SP to @cryptosec
2022/01/17 09:45:39
delegatorsteem
delegateecryptosec
vesting shares8157.844032 VESTS
Transaction InfoBlock #60807987/Trx 1eb7c1ff3392ff7396e07c9756cd5de6a507e79e
View Raw JSON Data
{
  "trx_id": "1eb7c1ff3392ff7396e07c9756cd5de6a507e79e",
  "block": 60807987,
  "trx_in_block": 26,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2022-01-17T09:45:39",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "8157.844032 VESTS"
    }
  ]
}
steemdelegated 5.123 SP to @cryptosec
2021/06/13 23:43:42
delegatorsteem
delegateecryptosec
vesting shares8341.612690 VESTS
Transaction InfoBlock #54606435/Trx 02776bef4b2032603c1448a78704faf5f61c8d31
View Raw JSON Data
{
  "trx_id": "02776bef4b2032603c1448a78704faf5f61c8d31",
  "block": 54606435,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2021-06-13T23:43:42",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "8341.612690 VESTS"
    }
  ]
}
steemdelegated 5.238 SP to @cryptosec
2020/12/11 10:04:18
delegatorsteem
delegateecryptosec
vesting shares8529.034664 VESTS
Transaction InfoBlock #49353939/Trx f7224d0d6498a5dd469369ac84a260493e2e4a0b
View Raw JSON Data
{
  "trx_id": "f7224d0d6498a5dd469369ac84a260493e2e4a0b",
  "block": 49353939,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-12-11T10:04:18",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "8529.034664 VESTS"
    }
  ]
}
steemdelegated 1.175 SP to @cryptosec
2020/12/06 03:41:27
delegatorsteem
delegateecryptosec
vesting shares1912.543513 VESTS
Transaction InfoBlock #49205503/Trx 6e4cca8fedb95a544a7d3409d492737325d5004a
View Raw JSON Data
{
  "trx_id": "6e4cca8fedb95a544a7d3409d492737325d5004a",
  "block": 49205503,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-12-06T03:41:27",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "1912.543513 VESTS"
    }
  ]
}
steemdelegated 5.242 SP to @cryptosec
2020/12/05 11:38:39
delegatorsteem
delegateecryptosec
vesting shares8535.401303 VESTS
Transaction InfoBlock #49186610/Trx c7fe474dc680357ca8fa11a57a7de4bce92aa631
View Raw JSON Data
{
  "trx_id": "c7fe474dc680357ca8fa11a57a7de4bce92aa631",
  "block": 49186610,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-12-05T11:38:39",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "8535.401303 VESTS"
    }
  ]
}
steemdelegated 1.179 SP to @cryptosec
2020/11/02 13:17:21
delegatorsteem
delegateecryptosec
vesting shares1920.017158 VESTS
Transaction InfoBlock #48255038/Trx c7334a66fb89d225d551b7a5285c1d9edb1f9b08
View Raw JSON Data
{
  "trx_id": "c7334a66fb89d225d551b7a5285c1d9edb1f9b08",
  "block": 48255038,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-11-02T13:17:21",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "1920.017158 VESTS"
    }
  ]
}
steemdelegated 5.366 SP to @cryptosec
2020/05/09 04:37:42
delegatorsteem
delegateecryptosec
vesting shares8738.047877 VESTS
Transaction InfoBlock #43215735/Trx 45734d4587350dee72513f286a30899f7a097b46
View Raw JSON Data
{
  "trx_id": "45734d4587350dee72513f286a30899f7a097b46",
  "block": 43215735,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-05-09T04:37:42",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "8738.047877 VESTS"
    }
  ]
}
steemdelegated 1.200 SP to @cryptosec
2020/05/08 08:04:03
delegatorsteem
delegateecryptosec
vesting shares1953.311140 VESTS
Transaction InfoBlock #43191639/Trx 1daa6a921b202f9269779110f8eabde064ce051d
View Raw JSON Data
{
  "trx_id": "1daa6a921b202f9269779110f8eabde064ce051d",
  "block": 43191639,
  "trx_in_block": 10,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-05-08T08:04:03",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "1953.311140 VESTS"
    }
  ]
}
steemdelegated 5.374 SP to @cryptosec
2020/04/15 20:55:09
delegatorsteem
delegateecryptosec
vesting shares8751.025296 VESTS
Transaction InfoBlock #42561751/Trx 29742befa00f261e651f263187bce13678f723b2
View Raw JSON Data
{
  "trx_id": "29742befa00f261e651f263187bce13678f723b2",
  "block": 42561751,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-15T20:55:09",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "8751.025296 VESTS"
    }
  ]
}
2019/10/27 13:37:42
parent authorcryptosec
parent permlinkthe-blockchain-next-generation-alternative-to-paypal-has-arrived
authorsteemitboard
permlinksteemitboard-notify-cryptosec-20191027t133741000z
title
bodyCongratulations @cryptosec! You received a personal award! <table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@cryptosec/birthday2.png</td><td>Happy Birthday! - You are on the Steem blockchain for 2 years!</td></tr></table> <sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@cryptosec) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=cryptosec)_</sub> ###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes!
json metadata{"image":["https://steemitboard.com/img/notify.png"]}
Transaction InfoBlock #37651407/Trx ac963f4816b0f756b2ebce715a7e2fbd35b3b70a
View Raw JSON Data
{
  "trx_id": "ac963f4816b0f756b2ebce715a7e2fbd35b3b70a",
  "block": 37651407,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-10-27T13:37:42",
  "op": [
    "comment",
    {
      "parent_author": "cryptosec",
      "parent_permlink": "the-blockchain-next-generation-alternative-to-paypal-has-arrived",
      "author": "steemitboard",
      "permlink": "steemitboard-notify-cryptosec-20191027t133741000z",
      "title": "",
      "body": "Congratulations @cryptosec! You received a personal award!\n\n<table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@cryptosec/birthday2.png</td><td>Happy Birthday! - You are on the Steem blockchain for 2 years!</td></tr></table>\n\n<sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@cryptosec) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=cryptosec)_</sub>\n\n\n###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes!",
      "json_metadata": "{\"image\":[\"https://steemitboard.com/img/notify.png\"]}"
    }
  ]
}
steemdelegated 5.494 SP to @cryptosec
2019/05/12 14:09:48
delegatorsteem
delegateecryptosec
vesting shares8946.648101 VESTS
Transaction InfoBlock #32844599/Trx 283158d0cc924ac8ce48016f7cd5b203024ef210
View Raw JSON Data
{
  "trx_id": "283158d0cc924ac8ce48016f7cd5b203024ef210",
  "block": 32844599,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-05-12T14:09:48",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "8946.648101 VESTS"
    }
  ]
}
2018/10/27 15:19:24
parent authorcryptosec
parent permlinkthe-blockchain-next-generation-alternative-to-paypal-has-arrived
authorsteemitboard
permlinksteemitboard-notify-cryptosec-20181027t151924000z
title
bodyCongratulations @cryptosec! You have received a personal award! [![](https://steemitimages.com/70x70/http://steemitboard.com/@cryptosec/birthday1.png)](http://steemitboard.com/@cryptosec) 1 Year on Steemit <sub>_Click on the badge to view your Board of Honor._</sub> **Do not miss the last post from @steemitboard:** <table><tr><td><a href="https://steemit.com/halloween/@steemitboard/trick-or-treat-publish-your-scariest-halloweeen-story-and-win-a-new-badge"><img src="https://steemitimages.com/64x128/http://i.cubeupload.com/RUyB3u.png"></a></td><td><a href="https://steemit.com/halloween/@steemitboard/trick-or-treat-publish-your-scariest-halloweeen-story-and-win-a-new-badge">Trick or Treat - Publish your scariest halloweeen story and win a new badge</a></td></tr><tr><td><a href="https://steemit.com/steemitboard/@steemitboard/steemitboard-notifications-improved"><img src="https://steemitimages.com/64x128/http://i.cubeupload.com/NgygYH.png"></a></td><td><a href="https://steemit.com/steemitboard/@steemitboard/steemitboard-notifications-improved">SteemitBoard notifications improved</a></td></tr></table> > Support [SteemitBoard's project](https://steemit.com/@steemitboard)! **[Vote for its witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1)** and **get one more award**!
json metadata{"image":["https://steemitboard.com/img/notify.png"]}
Transaction InfoBlock #27177906/Trx 72f1a9af6ea99cb9734e1370df06f64a46f155a8
View Raw JSON Data
{
  "trx_id": "72f1a9af6ea99cb9734e1370df06f64a46f155a8",
  "block": 27177906,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-10-27T15:19:24",
  "op": [
    "comment",
    {
      "parent_author": "cryptosec",
      "parent_permlink": "the-blockchain-next-generation-alternative-to-paypal-has-arrived",
      "author": "steemitboard",
      "permlink": "steemitboard-notify-cryptosec-20181027t151924000z",
      "title": "",
      "body": "Congratulations @cryptosec! You have received a personal award!\n\n[![](https://steemitimages.com/70x70/http://steemitboard.com/@cryptosec/birthday1.png)](http://steemitboard.com/@cryptosec)  1 Year on Steemit\n<sub>_Click on the badge to view your Board of Honor._</sub>\n\n\n**Do not miss the last post from @steemitboard:**\n<table><tr><td><a href=\"https://steemit.com/halloween/@steemitboard/trick-or-treat-publish-your-scariest-halloweeen-story-and-win-a-new-badge\"><img src=\"https://steemitimages.com/64x128/http://i.cubeupload.com/RUyB3u.png\"></a></td><td><a href=\"https://steemit.com/halloween/@steemitboard/trick-or-treat-publish-your-scariest-halloweeen-story-and-win-a-new-badge\">Trick or Treat - Publish your scariest halloweeen story and win a new badge</a></td></tr><tr><td><a href=\"https://steemit.com/steemitboard/@steemitboard/steemitboard-notifications-improved\"><img src=\"https://steemitimages.com/64x128/http://i.cubeupload.com/NgygYH.png\"></a></td><td><a href=\"https://steemit.com/steemitboard/@steemitboard/steemitboard-notifications-improved\">SteemitBoard notifications improved</a></td></tr></table>\n\n> Support [SteemitBoard's project](https://steemit.com/@steemitboard)! **[Vote for its witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1)** and **get one more award**!",
      "json_metadata": "{\"image\":[\"https://steemitboard.com/img/notify.png\"]}"
    }
  ]
}
steemdelegated 5.617 SP to @cryptosec
2018/05/16 20:12:18
delegatorsteem
delegateecryptosec
vesting shares9146.200536 VESTS
Transaction InfoBlock #22489747/Trx 9884e6272df1097d6a80c52ed0e4376da7f34f90
View Raw JSON Data
{
  "trx_id": "9884e6272df1097d6a80c52ed0e4376da7f34f90",
  "block": 22489747,
  "trx_in_block": 28,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-05-16T20:12:18",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "9146.200536 VESTS"
    }
  ]
}
steemdelegated 18.137 SP to @cryptosec
2018/04/21 20:41:00
delegatorsteem
delegateecryptosec
vesting shares29534.169576 VESTS
Transaction InfoBlock #21771108/Trx dfca13e90a674d7ed33058db3026ba49b2fba71b
View Raw JSON Data
{
  "trx_id": "dfca13e90a674d7ed33058db3026ba49b2fba71b",
  "block": 21771108,
  "trx_in_block": 14,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-04-21T20:41:00",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "29534.169576 VESTS"
    }
  ]
}
steemdelegated 18.263 SP to @cryptosec
2017/12/12 22:22:51
delegatorsteem
delegateecryptosec
vesting shares29738.001628 VESTS
Transaction InfoBlock #18032640/Trx ac9d6aa501c71369725d279b25d6a56269760687
View Raw JSON Data
{
  "trx_id": "ac9d6aa501c71369725d279b25d6a56269760687",
  "block": 18032640,
  "trx_in_block": 28,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-12-12T22:22:51",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "cryptosec",
      "vesting_shares": "29738.001628 VESTS"
    }
  ]
}
cryptosecreceived 0.026 SBD, 0.037 SP author reward for @cryptosec / a-path-to-effective-network-penetration-testing
2017/11/03 21:31:24
authorcryptosec
permlinka-path-to-effective-network-penetration-testing
sbd payout0.026 SBD
steem payout0.000 STEEM
vesting payout59.601503 VESTS
Transaction InfoBlock #16908968/Virtual Operation #7
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 16908968,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 7,
  "timestamp": "2017-11-03T21:31:24",
  "op": [
    "author_reward",
    {
      "author": "cryptosec",
      "permlink": "a-path-to-effective-network-penetration-testing",
      "sbd_payout": "0.026 SBD",
      "steem_payout": "0.000 STEEM",
      "vesting_payout": "59.601503 VESTS"
    }
  ]
}
2017/11/03 21:18:03
authorcryptosec
permlinkduhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions
sbd payout0.022 SBD
steem payout0.000 STEEM
vesting payout51.380631 VESTS
Transaction InfoBlock #16908701/Virtual Operation #4
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 16908701,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 4,
  "timestamp": "2017-11-03T21:18:03",
  "op": [
    "author_reward",
    {
      "author": "cryptosec",
      "permlink": "duhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions",
      "sbd_payout": "0.022 SBD",
      "steem_payout": "0.000 STEEM",
      "vesting_payout": "51.380631 VESTS"
    }
  ]
}
2017/11/01 13:29:30
parent authorcryptosec
parent permlinkthe-blockchain-next-generation-alternative-to-paypal-has-arrived
authorcheetah
permlinkcheetah-re-cryptosecthe-blockchain-next-generation-alternative-to-paypal-has-arrived
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://cointelegraph.com/news/the-blockchain-next-generation-alternative-to-paypal-has-arrived
json metadata
Transaction InfoBlock #16841743/Trx 78021d8cebf47c1c3d2f8283eec68ebfe76a5130
View Raw JSON Data
{
  "trx_id": "78021d8cebf47c1c3d2f8283eec68ebfe76a5130",
  "block": 16841743,
  "trx_in_block": 31,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-11-01T13:29:30",
  "op": [
    "comment",
    {
      "parent_author": "cryptosec",
      "parent_permlink": "the-blockchain-next-generation-alternative-to-paypal-has-arrived",
      "author": "cheetah",
      "permlink": "cheetah-re-cryptosecthe-blockchain-next-generation-alternative-to-paypal-has-arrived",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://cointelegraph.com/news/the-blockchain-next-generation-alternative-to-paypal-has-arrived",
      "json_metadata": ""
    }
  ]
}
2017/11/01 13:29:27
votercheetah
authorcryptosec
permlinkthe-blockchain-next-generation-alternative-to-paypal-has-arrived
weight50 (0.50%)
Transaction InfoBlock #16841742/Trx 3d4738710a92c7f0135cc4cc8c96f7ba081172aa
View Raw JSON Data
{
  "trx_id": "3d4738710a92c7f0135cc4cc8c96f7ba081172aa",
  "block": 16841742,
  "trx_in_block": 18,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-11-01T13:29:27",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "cryptosec",
      "permlink": "the-blockchain-next-generation-alternative-to-paypal-has-arrived",
      "weight": 50
    }
  ]
}
2017/11/01 13:29:12
parent author
parent permlinkcrypto
authorcryptosec
permlinkthe-blockchain-next-generation-alternative-to-paypal-has-arrived
titleThe Blockchain Next Generation Alternative to PayPal Has Arrived
bodyMost online users have been burnt by PayPal or another digital payment system at one time or another. Perhaps you’ve tried to withdraw money someone has sent to you, only to find that you’ve been blocked from that service. Or maybe you’ve tried to receive money, only to discover that the fees can be pretty steep once you start using other services. And, the greatest sin of all – PayPal doesn’t accept cryptocurrencies. UTRUST, the first-of-its-kind Blockchain based payment platform, intends to bring the best parts of PayPal-type services and the best parts of the cryptocurrency world together into a single, seamless platform. Blockchain solutions limited The cryptocurrency world has virtually exploded in the past six months. Just ask someone who purchased Bitcoin in January at $800, only to find their investment worth a stunning $6,000 just last month. And yet the growth of the industry has outstripped the functionality. For example, payments between individuals are still quite simple, but the reality of making real-time business to consumer (B2C) transactions has been extremely difficult. A number of problems lie at the root of the dysfunctionality. First, the daily price for the majority of cryptocurrencies is extremely volatile. The volatility frightens would-be merchant users who find themselves unable to cope with the potential for a huge and sudden loss right after a transaction completes. What’s more, the sheer number of cryptocurrencies available for use has left most merchants scratching their heads at the level of tech needed to really enter the market. And to top it all off, transactions are irreversible, making all sales final and returns hugely risky for both parties. Buyer protection is moot, and seller protection is as well. Crypto + PayPal = Awesome Of course, these two opposite systems (crypto and traditional) refuse to work together, and so only serve to highlight the inherent weaknesses in both. However, UTRUST, a Blockchain-based startup, has conceived of a system that would unite these two systems into a single protective platform. On the buyer side, UTRUST is offering complete buyer protection, not unlike the PayPal marketplace. By providing protection, buyers can purchase without the customary crypto-risk, bringing more buyers into the crypto world. And by accepting a wide swath of various cryptocurrencies, UTRUST has taken the guesswork out of wallet and coin swaps letting buyers focus on what they do best – buying. Likewise for sellers, UTRUST has created a platform that eliminates volatility issues by moving the crypto payment into fiat currency at the moment of the transaction. Merchants can be completely shielded from volatility and because UTRUST is truly peer-to-peer, fees are substantially reduced. Per Nuno Correia, the company CEO: ‘’UTRUST is the first cryptocurrency payment solution in the world that provides buyers with a purchase protection. The next-gen version of PayPal is Blockchain-based and designed to make online payments safer, faster and cheaper.’’ Hoist by their own petard As Hamlet made clear so many times, the very thing that makes you successful becomes your undoing. This will likely be the case with PayPal. While their functionality was unique in the early days the changing economic world has moved toward new and better platforms. By thoroughly eliminating risk factors for both buyer and seller while still opening the door for cryptocurrency payment structures, UTRUST aims to solve the issues that plague both platforms. A comprehensive explanation of their platform can be found here. The UTRUST token ICO starts Nov. 2 at 2 p.m. (UTC). The ingenious platform has brought investors to the table already and UTRUST has completely sold out the private investor and pre-ICO sales, raising $3.5 mln. The coming public sale represents 70 percent of the token supply.![bitcoin10.jpg](https://steemitimages.com/DQmP2HCNkdihFR9RqyZkCZAxspEynt2nY917yc5aaKrmeLa/bitcoin10.jpg)
json metadata{"tags":["crypto"],"image":["https://steemitimages.com/DQmP2HCNkdihFR9RqyZkCZAxspEynt2nY917yc5aaKrmeLa/bitcoin10.jpg"],"app":"steemit/0.1","format":"markdown"}
Transaction InfoBlock #16841737/Trx 1eb67343f8f2d8d26978ddc1966900401b02ce58
View Raw JSON Data
{
  "trx_id": "1eb67343f8f2d8d26978ddc1966900401b02ce58",
  "block": 16841737,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-11-01T13:29:12",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "crypto",
      "author": "cryptosec",
      "permlink": "the-blockchain-next-generation-alternative-to-paypal-has-arrived",
      "title": "The Blockchain Next Generation Alternative to PayPal Has Arrived",
      "body": "Most online users have been burnt by PayPal or another digital payment system at one time or another. Perhaps you’ve tried to withdraw money someone has sent to you, only to find that you’ve been blocked from that service. Or maybe you’ve tried to receive money, only to discover that the fees can be pretty steep once you start using other services. And, the greatest sin of all – PayPal doesn’t accept cryptocurrencies.\n\nUTRUST, the first-of-its-kind Blockchain based payment platform, intends to bring the best parts of PayPal-type services and the best parts of the cryptocurrency world together into a single, seamless platform.\nBlockchain solutions limited\n\nThe cryptocurrency world has virtually exploded in the past six months. Just ask someone who purchased Bitcoin in January at $800, only to find their investment worth a stunning $6,000 just last month. And yet the growth of the industry has outstripped the functionality.\n\nFor example, payments between individuals are still quite simple, but the reality of making real-time business to consumer (B2C) transactions has been extremely difficult.\n\nA number of problems lie at the root of the dysfunctionality. First, the daily price for the majority of cryptocurrencies is extremely volatile. The volatility frightens would-be merchant users who find themselves unable to cope with the potential for a huge and sudden loss right after a transaction completes.\n\nWhat’s more, the sheer number of cryptocurrencies available for use has left most merchants scratching their heads at the level of tech needed to really enter the market. And to top it all off, transactions are irreversible, making all sales final and returns hugely risky for both parties. Buyer protection is moot, and seller protection is as well.\nCrypto + PayPal = Awesome\n\nOf course, these two opposite systems (crypto and traditional) refuse to work together, and so only serve to highlight the inherent weaknesses in both. However, UTRUST, a Blockchain-based startup, has conceived of a system that would unite these two systems into a single protective platform.\n\nOn the buyer side, UTRUST is offering complete buyer protection, not unlike the PayPal marketplace. By providing protection, buyers can purchase without the customary crypto-risk, bringing more buyers into the crypto world. And by accepting a wide swath of various cryptocurrencies, UTRUST has taken the guesswork out of wallet and coin swaps letting buyers focus on what they do best – buying.\n\nLikewise for sellers, UTRUST has created a platform that eliminates volatility issues by moving the crypto payment into fiat currency at the moment of the transaction. Merchants can be completely shielded from volatility and because UTRUST is truly peer-to-peer, fees are substantially reduced. Per Nuno Correia, the company CEO:\n\n‘’UTRUST is the first cryptocurrency payment solution in the world that provides buyers with a purchase protection. The next-gen version of PayPal is Blockchain-based and designed to make online payments safer, faster and cheaper.’’\n\nHoist by their own petard\n\nAs Hamlet made clear so many times, the very thing that makes you successful becomes your undoing. This will likely be the case with PayPal. While their functionality was unique in the early days the changing economic world has moved toward new and better platforms.\n\nBy thoroughly eliminating risk factors for both buyer and seller while still opening the door for cryptocurrency payment structures, UTRUST aims to solve the issues that plague both platforms. A comprehensive explanation of their platform can be found here.\n\nThe UTRUST token ICO starts Nov. 2 at 2 p.m. (UTC). The ingenious platform has brought investors to the table already and UTRUST has completely sold out the private investor and pre-ICO sales, raising $3.5 mln. The coming public sale represents 70 percent of the token supply.![bitcoin10.jpg](https://steemitimages.com/DQmP2HCNkdihFR9RqyZkCZAxspEynt2nY917yc5aaKrmeLa/bitcoin10.jpg)",
      "json_metadata": "{\"tags\":[\"crypto\"],\"image\":[\"https://steemitimages.com/DQmP2HCNkdihFR9RqyZkCZAxspEynt2nY917yc5aaKrmeLa/bitcoin10.jpg\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
    }
  ]
}
2017/10/29 18:01:18
parent authorcryptosec
parent permlinkcyber-security-etf-backer-says-nasdaq-axed-over-index-management
authorcheetah
permlinkcheetah-re-cryptoseccyber-security-etf-backer-says-nasdaq-axed-over-index-management
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: http://news.lycos.com/technology/cyber-security-etf-backer-says-nasdaq-axed-over-index-management-24b493514bbab5bb31a2a45339fb23e4/
json metadata
Transaction InfoBlock #16760786/Trx 98063fe468290555542b5d8217cf594f950bf96d
View Raw JSON Data
{
  "trx_id": "98063fe468290555542b5d8217cf594f950bf96d",
  "block": 16760786,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-29T18:01:18",
  "op": [
    "comment",
    {
      "parent_author": "cryptosec",
      "parent_permlink": "cyber-security-etf-backer-says-nasdaq-axed-over-index-management",
      "author": "cheetah",
      "permlink": "cheetah-re-cryptoseccyber-security-etf-backer-says-nasdaq-axed-over-index-management",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttp://news.lycos.com/technology/cyber-security-etf-backer-says-nasdaq-axed-over-index-management-24b493514bbab5bb31a2a45339fb23e4/",
      "json_metadata": ""
    }
  ]
}
2017/10/29 18:01:12
votercheetah
authorcryptosec
permlinkcyber-security-etf-backer-says-nasdaq-axed-over-index-management
weight50 (0.50%)
Transaction InfoBlock #16760784/Trx 6a784e5cb611e6dac6df45b8b884a3c762a5de94
View Raw JSON Data
{
  "trx_id": "6a784e5cb611e6dac6df45b8b884a3c762a5de94",
  "block": 16760784,
  "trx_in_block": 13,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-29T18:01:12",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "cryptosec",
      "permlink": "cyber-security-etf-backer-says-nasdaq-axed-over-index-management",
      "weight": 50
    }
  ]
}
2017/10/29 18:00:21
parent author
parent permlinkcyber
authorcryptosec
permlinkcyber-security-etf-backer-says-nasdaq-axed-over-index-management
titleCyber security ETF backer says Nasdaq axed over index management
body[nasdaq.jpg](https://steemitimages.com/DQmapo3qWEhiTv9CMiAojyxCdNfWfWmvYUUQ4KCg19kLpcd/nasdaq.jpg)NEW YORK (Reuters) - Nasdaq Inc (NDAQ.O) was removed earlier this year from its role supporting a $1.1 billion cyber security exchange-traded fund (ETF), partly over concerns about their management of the fund’s index, the ETF’s management company told Reuters. The comments presage a fight over what Nasdaq described as $300,000 profit generated each month by the ETFMG Prime Cyber Security ETF (HACK.P), a one-time collaboration between a group now owned by Nasdaq, PureShares LLC and ETF Managers Group LLC (ETFMG). Nasdaq on Thursday sued ETFMG, run by Samuel Masucci, saying it stole the ETF and several others. PureShares also sued ETFMG in May. ETFMG has called both lawsuits frivolous. Launched in 2014, HACK was among a relatively small group of ETFs that found success despite lacking the support of asset managers like BlackRock Inc (BLK.N) and Vanguard Group, a handful of which attract the majority of ETF assets. Smaller companies with ideas for new ETFs can take them to “white-label” providers like Summit, New Jersey-based ETFMG, who help get those products up and running. The dispute over HACK is revealing the intensity of the steeplechase for a rare blockbuster ETF idea as more investors have flocked to lower-cost index funds. PureShares has said verdicts on the lawsuits could change the way ETF managers do business. In an interview, Masucci said Nasdaq was failing to actively research and update the index of mostly technology stocks the fund tracked before being removed as index provider this summer. He said that may have caused the fund to lag a rival product, First Trust NASDAQ Cybersecurity ETF (CIBR.O), that tracks a different Nasdaq index. “They were not managing the index as the methodology said they would,” said Masucci. “I don’t think they were doing research on it.” Nasdaq declined to comment, but said in its complaint that Masucci and ETFMG concocted frivolous reasons to take control of HACK and other ETFs. Nasdaq also said it spent “millions” of dollars between 2012 and 2017 to support the fund and honored its obligations. HACK delivered a 14.5 percent total return for the year ended July 31, when the Nasdaq index was replaced, short of the 16.9 percent return of CIBR. HACK has continued to lag CIBR in the nearly three months since Nasdaq was removed, though Masucci said it holds stocks that are more “liquid,” easier to buy and sell. Masucci said Nasdaq also pushed back against plans to cut the fund’s fees, a move that could help the fund perform better. The fund’s management fees were lowered to $60 for every $10,000 under management, from $75, on May 1.!
json metadata{"tags":["cyber","security"],"links":["https://steemitimages.com/DQmapo3qWEhiTv9CMiAojyxCdNfWfWmvYUUQ4KCg19kLpcd/nasdaq.jpg"],"app":"steemit/0.1","format":"markdown"}
Transaction InfoBlock #16760767/Trx 1e9afcb7220afa49bd3fe198a7f28728dfae870e
View Raw JSON Data
{
  "trx_id": "1e9afcb7220afa49bd3fe198a7f28728dfae870e",
  "block": 16760767,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-29T18:00:21",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cyber",
      "author": "cryptosec",
      "permlink": "cyber-security-etf-backer-says-nasdaq-axed-over-index-management",
      "title": "Cyber security ETF backer says Nasdaq axed over index management",
      "body": "[nasdaq.jpg](https://steemitimages.com/DQmapo3qWEhiTv9CMiAojyxCdNfWfWmvYUUQ4KCg19kLpcd/nasdaq.jpg)NEW YORK (Reuters) - Nasdaq Inc (NDAQ.O) was removed earlier this year from its role supporting a $1.1 billion cyber security exchange-traded fund (ETF), partly over concerns about their management of the fund’s index, the ETF’s management company told Reuters.\n\nThe comments presage a fight over what Nasdaq described as $300,000 profit generated each month by the ETFMG Prime Cyber Security ETF (HACK.P), a one-time collaboration between a group now owned by Nasdaq, PureShares LLC and ETF Managers Group LLC (ETFMG).\n\nNasdaq on Thursday sued ETFMG, run by Samuel Masucci, saying it stole the ETF and several others. PureShares also sued ETFMG in May. ETFMG has called both lawsuits frivolous.\n\nLaunched in 2014, HACK was among a relatively small group of ETFs that found success despite lacking the support of asset managers like BlackRock Inc (BLK.N) and Vanguard Group, a handful of which attract the majority of ETF assets.\n\nSmaller companies with ideas for new ETFs can take them to “white-label” providers like Summit, New Jersey-based ETFMG, who help get those products up and running.\n\nThe dispute over HACK is revealing the intensity of the steeplechase for a rare blockbuster ETF idea as more investors have flocked to lower-cost index funds. PureShares has said verdicts on the lawsuits could change the way ETF managers do business.\n\nIn an interview, Masucci said Nasdaq was failing to actively research and update the index of mostly technology stocks the fund tracked before being removed as index provider this summer. He said that may have caused the fund to lag a rival product, First Trust NASDAQ Cybersecurity ETF (CIBR.O), that tracks a different Nasdaq index.\n\n“They were not managing the index as the methodology said they would,” said Masucci. “I don’t think they were doing research on it.”\n\nNasdaq declined to comment, but said in its complaint that Masucci and ETFMG concocted frivolous reasons to take control of HACK and other ETFs. Nasdaq also said it spent “millions” of dollars between 2012 and 2017 to support the fund and honored its obligations.\n\nHACK delivered a 14.5 percent total return for the year ended July 31, when the Nasdaq index was replaced, short of the 16.9 percent return of CIBR. HACK has continued to lag CIBR in the nearly three months since Nasdaq was removed, though Masucci said it holds stocks that are more “liquid,” easier to buy and sell.\n\nMasucci said Nasdaq also pushed back against plans to cut the fund’s fees, a move that could help the fund perform better. The fund’s management fees were lowered to $60 for every $10,000 under management, from $75, on May 1.!",
      "json_metadata": "{\"tags\":[\"cyber\",\"security\"],\"links\":[\"https://steemitimages.com/DQmapo3qWEhiTv9CMiAojyxCdNfWfWmvYUUQ4KCg19kLpcd/nasdaq.jpg\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
    }
  ]
}
cryptosecupdated their account properties
2017/10/28 13:52:57
accountcryptosec
memo keySTM8LCbWo4Fkg7xYDHyKAyfuAnADBZBfDFKLxMYWJonY5oxJ4bsUe
json metadata{"profile":{"name":"CryptoSec","about":"BlockChain & Cyber Security","location":"Sarajevo","website":"https://www.cryptosec.cc"}}
Transaction InfoBlock #16727028/Trx b398a367c38d18d3038c60c2603cea390da849d6
View Raw JSON Data
{
  "trx_id": "b398a367c38d18d3038c60c2603cea390da849d6",
  "block": 16727028,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-28T13:52:57",
  "op": [
    "account_update",
    {
      "account": "cryptosec",
      "memo_key": "STM8LCbWo4Fkg7xYDHyKAyfuAnADBZBfDFKLxMYWJonY5oxJ4bsUe",
      "json_metadata": "{\"profile\":{\"name\":\"CryptoSec\",\"about\":\"BlockChain & Cyber Security\",\"location\":\"Sarajevo\",\"website\":\"https://www.cryptosec.cc\"}}"
    }
  ]
}
2017/10/28 09:01:18
voterusedproductz
authorcryptosec
permlinkiso-27001-part-1
weight10000 (100.00%)
Transaction InfoBlock #16721198/Trx 2f19e67d796b7ab33c90a4a1f8d7e22e06eed197
View Raw JSON Data
{
  "trx_id": "2f19e67d796b7ab33c90a4a1f8d7e22e06eed197",
  "block": 16721198,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-28T09:01:18",
  "op": [
    "vote",
    {
      "voter": "usedproductz",
      "author": "cryptosec",
      "permlink": "iso-27001-part-1",
      "weight": 10000
    }
  ]
}
2017/10/28 08:39:03
parent authorcryptosec
parent permlinkdark-web-criminals-respond-to-crackdown-by-going-mobile
authorcheetah
permlinkcheetah-re-cryptosecdark-web-criminals-respond-to-crackdown-by-going-mobile
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://latesthackingnews.com/2017/10/27/dark-web-criminals-respond-crackdown-going-mobile/
json metadata
Transaction InfoBlock #16720754/Trx 383e8c58936b1e371da708f979ada76d85ef55e5
View Raw JSON Data
{
  "trx_id": "383e8c58936b1e371da708f979ada76d85ef55e5",
  "block": 16720754,
  "trx_in_block": 14,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-28T08:39:03",
  "op": [
    "comment",
    {
      "parent_author": "cryptosec",
      "parent_permlink": "dark-web-criminals-respond-to-crackdown-by-going-mobile",
      "author": "cheetah",
      "permlink": "cheetah-re-cryptosecdark-web-criminals-respond-to-crackdown-by-going-mobile",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://latesthackingnews.com/2017/10/27/dark-web-criminals-respond-crackdown-going-mobile/",
      "json_metadata": ""
    }
  ]
}
2017/10/28 08:39:00
votercheetah
authorcryptosec
permlinkdark-web-criminals-respond-to-crackdown-by-going-mobile
weight50 (0.50%)
Transaction InfoBlock #16720753/Trx 07448a363caea65fb63dcf2712774881ae9c7c99
View Raw JSON Data
{
  "trx_id": "07448a363caea65fb63dcf2712774881ae9c7c99",
  "block": 16720753,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-28T08:39:00",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "cryptosec",
      "permlink": "dark-web-criminals-respond-to-crackdown-by-going-mobile",
      "weight": 50
    }
  ]
}
2017/10/28 08:38:39
parent author
parent permlinkcyber
authorcryptosec
permlinkdark-web-criminals-respond-to-crackdown-by-going-mobile
titleDark Web Criminals Respond to Crackdown by Going Mobile
bodyIn response to law enforcement’s increased involvement with targeting the illegal activities taking place on the Dark Web, criminals have began to use messaging apps to conduct their illicit operations. According to a threat report from IntSights Cyber Intelligence, a slew of messaging apps are being used by these Dark Web criminals including Skype, Discord, Whatsapp, ICQ and Telegram because of the apps’ ability to offer group chat. Since these apps are readily available to anyone with a smart device, it is now even easier and a very convenient way to connect to others and their Dark Web activities. They have been posting on forums and other similar websites in order to invite like-minded criminals to the app they’re using and the subsequent group chat. They’re continuing to exchange drugs, deceptive software, stolen personal information, credit card numbers and ways to hack electronics of various natures. Some have even taken it as far as to create apps that essentially connect to the Tor network, thus allowing the user to connect to the Dark Web easier and faster than ever before. The anonymity factor has also been restored to the user. Since the Dark Web has seen an increase of involvement by law enforcement, anonymity availability had taken a major hit until this latest development. Being anonymous was the key characteristic of Tor and the Dark Web that attracted criminals to it in the first place. It seems that if one wants to navigate sites and services available on the Dark Web, they will no longer need “insider info” or special software to access it. While it is fact that these Dark Web criminals have essentially risen to the surface web that we all know, their level of anonymity has came back as well. Law enforcement will waste no time investigating all of these “New Dark Web” methods so don’t expect the criminals to remain anonymous for long.!![Darknet-vs-Dark-Web-vs-Deep-Web-vs-Surface-Web.jpg](https://steemitimages.com/DQmXo6dk7df9xazqfQ7uJL7YFSqygDcPHRYbCHS6Bo1JmDu/Darknet-vs-Dark-Web-vs-Deep-Web-vs-Surface-Web.jpg)
json metadata{"tags":["cyber","security"],"image":["https://steemitimages.com/DQmXo6dk7df9xazqfQ7uJL7YFSqygDcPHRYbCHS6Bo1JmDu/Darknet-vs-Dark-Web-vs-Deep-Web-vs-Surface-Web.jpg"],"app":"steemit/0.1","format":"markdown"}
Transaction InfoBlock #16720746/Trx 7990dfe94ce7e19c91dbaadd7587b73e5253a8e9
View Raw JSON Data
{
  "trx_id": "7990dfe94ce7e19c91dbaadd7587b73e5253a8e9",
  "block": 16720746,
  "trx_in_block": 24,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-28T08:38:39",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cyber",
      "author": "cryptosec",
      "permlink": "dark-web-criminals-respond-to-crackdown-by-going-mobile",
      "title": "Dark Web Criminals Respond to Crackdown by Going Mobile",
      "body": "In response to law enforcement’s increased involvement with targeting the illegal activities taking place on the Dark Web, criminals have began to use messaging apps to conduct their illicit operations.\n\nAccording to a threat report from IntSights Cyber Intelligence, a slew of messaging apps are being used by these Dark Web criminals including Skype, Discord, Whatsapp, ICQ and Telegram because of the apps’ ability to offer group chat.\n\nSince these apps are readily available to anyone with a smart device, it is now even easier and a very convenient way to connect to others and their Dark Web activities.\n\nThey have been posting on forums and other similar websites in order to invite like-minded criminals to the app they’re using and the subsequent group chat. They’re continuing to exchange drugs, deceptive software, stolen personal information, credit card numbers and ways to hack electronics of various natures.\n\nSome have even taken it as far as to create apps that essentially connect to the Tor network, thus allowing the user to connect to the Dark Web easier and faster than ever before.\n\nThe anonymity factor has also been restored to the user. Since the Dark Web has seen an increase of involvement by law enforcement, anonymity availability had taken a major hit until this latest development. Being anonymous was the key characteristic of Tor and the Dark Web that attracted criminals to it in the first place.\n\nIt seems that if one wants to navigate sites and services available on the Dark Web, they will no longer need “insider info” or special software to access it. While it is fact that these Dark Web criminals have essentially risen to the surface web that we all know, their level of anonymity has came back as well. Law enforcement will waste no time investigating all of these “New Dark Web” methods so don’t expect the criminals to remain anonymous for long.!![Darknet-vs-Dark-Web-vs-Deep-Web-vs-Surface-Web.jpg](https://steemitimages.com/DQmXo6dk7df9xazqfQ7uJL7YFSqygDcPHRYbCHS6Bo1JmDu/Darknet-vs-Dark-Web-vs-Deep-Web-vs-Surface-Web.jpg)",
      "json_metadata": "{\"tags\":[\"cyber\",\"security\"],\"image\":[\"https://steemitimages.com/DQmXo6dk7df9xazqfQ7uJL7YFSqygDcPHRYbCHS6Bo1JmDu/Darknet-vs-Dark-Web-vs-Deep-Web-vs-Surface-Web.jpg\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
    }
  ]
}
cryptosecpublished a new post: iso-27001-part-1
2017/10/28 08:30:21
parent author
parent permlinkcyber
authorcryptosec
permlinkiso-27001-part-1
titleISO 27001 - Part 1
bodyISO 27001 is an international recognized standard that specified requirement for establishing, implementing, maintaining and information security management system (ISMS) in a company. Complete name, information security - Security techiques - Informations security management systems - Requirements. ISO 27001 consists of 2 parts: Main part of standard and Annex A 114 controls The requirements clauses 0-10 + Annex A 114 controls = ISO 27001.![iso20071-1.jpg](https://steemitimages.com/DQmS8pdJrfGbGyEL6QXg99k3q7opPE48Hxa5d2muyyjj75T/iso20071-1.jpg)
json metadata{"tags":["cyber","security"],"image":["https://steemitimages.com/DQmS8pdJrfGbGyEL6QXg99k3q7opPE48Hxa5d2muyyjj75T/iso20071-1.jpg"],"app":"steemit/0.1","format":"markdown"}
Transaction InfoBlock #16720580/Trx e085dc808459c01162964c2b3a2759dcc3219f55
View Raw JSON Data
{
  "trx_id": "e085dc808459c01162964c2b3a2759dcc3219f55",
  "block": 16720580,
  "trx_in_block": 19,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-28T08:30:21",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cyber",
      "author": "cryptosec",
      "permlink": "iso-27001-part-1",
      "title": "ISO 27001 - Part 1",
      "body": "ISO 27001 is an international recognized standard that specified requirement for establishing, implementing, maintaining and information security management system (ISMS) in a company.\nComplete name, information security - Security techiques - Informations security management systems - Requirements.\n\nISO 27001 consists of 2 parts: Main part of standard and Annex A 114 controls\nThe requirements clauses 0-10 + Annex A 114 controls = ISO 27001.![iso20071-1.jpg](https://steemitimages.com/DQmS8pdJrfGbGyEL6QXg99k3q7opPE48Hxa5d2muyyjj75T/iso20071-1.jpg)",
      "json_metadata": "{\"tags\":[\"cyber\",\"security\"],\"image\":[\"https://steemitimages.com/DQmS8pdJrfGbGyEL6QXg99k3q7opPE48Hxa5d2muyyjj75T/iso20071-1.jpg\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
    }
  ]
}
2017/10/27 22:04:51
voterskenan
authorcryptosec
permlinkduhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions
weight2000 (20.00%)
Transaction InfoBlock #16708128/Trx 018e6eb8893468b77470df108ff654e783a2ec9e
View Raw JSON Data
{
  "trx_id": "018e6eb8893468b77470df108ff654e783a2ec9e",
  "block": 16708128,
  "trx_in_block": 17,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T22:04:51",
  "op": [
    "vote",
    {
      "voter": "skenan",
      "author": "cryptosec",
      "permlink": "duhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions",
      "weight": 2000
    }
  ]
}
2017/10/27 22:01:57
voterprimetimesports
authorcryptosec
permlinkcoinbase-offers-usd50-000-hack-the-world-bug-bounty
weight2 (0.02%)
Transaction InfoBlock #16708070/Trx 963ce23fb35492f88725a7dff3396078ce0d4942
View Raw JSON Data
{
  "trx_id": "963ce23fb35492f88725a7dff3396078ce0d4942",
  "block": 16708070,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T22:01:57",
  "op": [
    "vote",
    {
      "voter": "primetimesports",
      "author": "cryptosec",
      "permlink": "coinbase-offers-usd50-000-hack-the-world-bug-bounty",
      "weight": 2
    }
  ]
}
2017/10/27 22:01:12
voterskenan
authorcryptosec
permlinka-path-to-effective-network-penetration-testing
weight2000 (20.00%)
Transaction InfoBlock #16708055/Trx ab93f672b01ae778fb40f3a8384182c05ab60a85
View Raw JSON Data
{
  "trx_id": "ab93f672b01ae778fb40f3a8384182c05ab60a85",
  "block": 16708055,
  "trx_in_block": 13,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T22:01:12",
  "op": [
    "vote",
    {
      "voter": "skenan",
      "author": "cryptosec",
      "permlink": "a-path-to-effective-network-penetration-testing",
      "weight": 2000
    }
  ]
}
2017/10/27 21:37:54
parent author
parent permlinkblockchain
authorcryptosec
permlinkcoinbase-offers-usd50-000-hack-the-world-bug-bounty
titleCoinbase Offers $50,000 Hack the World Bug Bounty
bodyCoinbase, one of the world’s largest cryptocurrency exchanges, announced it will actively participate in Hackerone’s “Hack the World” project, offering 50,000 USD for a first-place remote code execution. It’s the company’s effort to extend its bug bounty program in hopes of remaining “top-of-[the]-market” with regard to security.
json metadata{"tags":["blockchain"],"app":"steemit/0.1","format":"markdown"}
Transaction InfoBlock #16707590/Trx f41ec1cfff48b6a6a6b1176537b2538f7ed4fbbd
View Raw JSON Data
{
  "trx_id": "f41ec1cfff48b6a6a6b1176537b2538f7ed4fbbd",
  "block": 16707590,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T21:37:54",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "blockchain",
      "author": "cryptosec",
      "permlink": "coinbase-offers-usd50-000-hack-the-world-bug-bounty",
      "title": "Coinbase Offers $50,000 Hack the World Bug Bounty",
      "body": "Coinbase, one of the world’s largest cryptocurrency exchanges, announced it will actively participate in Hackerone’s “Hack the World” project, offering 50,000 USD for a first-place remote code execution. It’s the company’s effort to extend its bug bounty program in hopes of remaining “top-of-[the]-market” with regard to security.",
      "json_metadata": "{\"tags\":[\"blockchain\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
    }
  ]
}
2017/10/27 21:31:42
parent authorcryptosec
parent permlinka-path-to-effective-network-penetration-testing
authorcheetah
permlinkcheetah-re-cryptoseca-path-to-effective-network-penetration-testing
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://dzone.com/articles/customers-guide-to-effective-network-penetration-t
json metadata
Transaction InfoBlock #16707466/Trx 012c1b5783b2d4062f5c2ead6afe94d0160af0a6
View Raw JSON Data
{
  "trx_id": "012c1b5783b2d4062f5c2ead6afe94d0160af0a6",
  "block": 16707466,
  "trx_in_block": 24,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T21:31:42",
  "op": [
    "comment",
    {
      "parent_author": "cryptosec",
      "parent_permlink": "a-path-to-effective-network-penetration-testing",
      "author": "cheetah",
      "permlink": "cheetah-re-cryptoseca-path-to-effective-network-penetration-testing",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://dzone.com/articles/customers-guide-to-effective-network-penetration-t",
      "json_metadata": ""
    }
  ]
}
2017/10/27 21:31:39
votercheetah
authorcryptosec
permlinka-path-to-effective-network-penetration-testing
weight50 (0.50%)
Transaction InfoBlock #16707465/Trx 8a8738f6378cf159ca0855ebf8373be6bb6e0a62
View Raw JSON Data
{
  "trx_id": "8a8738f6378cf159ca0855ebf8373be6bb6e0a62",
  "block": 16707465,
  "trx_in_block": 10,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T21:31:39",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "cryptosec",
      "permlink": "a-path-to-effective-network-penetration-testing",
      "weight": 50
    }
  ]
}
2017/10/27 21:31:24
parent author
parent permlinkpenetration
authorcryptosec
permlinka-path-to-effective-network-penetration-testing
titleA Path to Effective Network Penetration Testing
bodyDo you want to discover vulnerabilities before a hacker exploits them? Are you already aware of network vulnerabilities, but need an authority to testify that your network security needs additional investments? Or does your company need penetration testing services to comply with a certain security regulation? It is useful to become pentest-savvy to assess the vendor before and after the penetration testing. Here is guide that encompasses best practices to be implemented before, during and after network penetration testing. Pre-Test Stage This section lists the activities to pay attention to before a penetration testing. Define the scope. Regardless of the penetration testing type, state the number of networks, the range of IP addresses within one network, subnets and computers to avoid any misunderstanding. Otherwise, pentesters might leave some network systems unattended or, what’s worse, hack some third party. Define the time frame. Penetration testing should not disrupt your company’s everyday business operations. Imagine if a pentester used a technique involving heavy network traffic. If used at high-peak times, it will overload the network and lead to its crash. Decide if you want your information security and technical stuff to be in the know. There’s no bright line rule here. Unannounced penetration testing is good to assess the response of your security team. Yet, they may slow down the process or even block it, for example, by cutting access from internet for pentesters. Expect a “get out of jail free” statement from the vendor. This document protects providers of penetration testing services, so don’t be suspicious about signing one. What penetration testers do is breaking into someone else’s network, which, per se, is illegal. The “get out of jail free” statement specifies that all pentester’s operations are permitted and you are authorized to give permission. Test Stage This section covers best practices followed by pentesters while conducting network penetration testing. This knowledge helps you to understand whether a certain penetration testing vendor provides the service of a decent quality. Gather as much customer information as possible. Pentesters use the customer’s website, WHOIS databases, web search engines. Netcraft offers an online data mining service that monitors the web and provides datasets of visible hosts. Conduct a network survey. This process provides pentesters with domain and server names, the range of IP addresses owned by the organization, information about closed and open network ports, running OS and services. There is an array of open source, as well as commercial tools available for network survey, most popular being Nmap, Zmap, DirBuster, Burp Suite and Metasploit. Determine existing vulnerabilities. At this stage, pentesters scan the network looking for vulnerabilities to use for penetration attempt. Vulnerability scanning can be automated and manual. A combo of the two methods boosts the effectiveness of the process considerably. Automated scanning tools, such as Nessus, quickly cover a lot of ground, but produce a high degree of false positives and false negatives (vulnerabilities are falsely identified or unidentified at all). So, automation should be followed by manual checking. Identify suitable targets. Penetration testing is always conducted within the timeframe set by you. So, out of the pool of vulnerable network targets, it’s essential to choose the proper ones not to waste time and effort doing unnecessary job. For example, a network consists of 1,000 machines, and pentesters have already determined that most of the machines are staff PCs with only 20 servers. It’s sensible to choose the servers, as the primary targets for penetration testing. Very often the task of finding proper targets is simplified, as the names of machines reflect their purpose (for example, Int_Surf for a computer performing Internet surfing). Attempt penetration. To exploit vulnerabilities, pentesters use standard tools, such as Metasploit, Burp Suit or Wireshark. These tools categorize vulnerabilities based on the severity. This helps to provide a customer with the report that accentuates the vulnerabilities to be fixed immediately. However, to test the network at realistic threat levels, pentesters need to customize standard tools and to employ custom built exploits. A common practice at this stage is to use password cracking methods and. Password cracking methods are a dictionary attack (use of a dictionary file), a brute-force attack (trying all possible password combinations) and a hybrid attack (a combination of both). Additionally, pentesters may resort to social engineering. This technique involves interaction with your staff to fish out for critical information, for example, credentials. Post-Test Stage Network penetration, as such, is over. But the penetration testing procedure isn’t. Two important stages are left: report generation and cleaning up. Report generation. A well-structured report is a helping hand in risk management. You should expect it to start with an overview of the penetration testing process followed by the most critical network vulnerabilities that need to be addressed in the first place. Afterwards, fewer critical vulnerabilities should be highlighted. Cleaning up. Pentesters’ code of practice doesn’t allow to leave any surprises (backdoors) in your network. To keep it clean, pentesters should maintain a detailed record of all actions performed throughout the stages of penetration testing. Still, double checking by your security staff won’t go amiss. There is no one-size-fits-all penetration testing scenario. Choose a vendor who will customize the best practices for your network. Uladzislau Murashka is a Certified Ethical Hacker at ScienceSoft with 5+ years of experience in penetration testing. ![nasa_hack-800x445.jpg](https://steemitimages.com/DQmY2EXRdiv6KtXRtnVKNRo4jXEXyfndJAnmubRosJmjmQk/nasa_hack-800x445.jpg)
json metadata{"tags":["penetration","testing"],"image":["https://steemitimages.com/DQmY2EXRdiv6KtXRtnVKNRo4jXEXyfndJAnmubRosJmjmQk/nasa_hack-800x445.jpg"],"app":"steemit/0.1","format":"markdown"}
Transaction InfoBlock #16707460/Trx d3237766e88c451ce9a0a9691aa69be31a35bc5f
View Raw JSON Data
{
  "trx_id": "d3237766e88c451ce9a0a9691aa69be31a35bc5f",
  "block": 16707460,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T21:31:24",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "penetration",
      "author": "cryptosec",
      "permlink": "a-path-to-effective-network-penetration-testing",
      "title": "A Path to Effective Network Penetration Testing",
      "body": "Do you want to discover vulnerabilities before a hacker exploits them? Are you already aware of network vulnerabilities, but need an authority to testify that your network security needs additional investments? Or does your company need penetration testing services to comply with a certain security regulation?\n\nIt is useful to become pentest-savvy to assess the vendor before and after the penetration testing. Here is guide that encompasses best practices to be implemented before, during and after network penetration testing.\n\nPre-Test Stage\n\nThis section lists the activities to pay attention to before a penetration testing.\n\n    Define the scope. Regardless of the penetration testing type, state the number of networks, the range of IP addresses within one network, subnets and computers to avoid any misunderstanding. Otherwise, pentesters might leave some network systems unattended or, what’s worse, hack some third party.\n    Define the time frame. Penetration testing should not disrupt your company’s everyday business operations. Imagine if a pentester used a technique involving heavy network traffic. If used at high-peak times, it will overload the network and lead to its crash.\n    Decide if you want your information security and technical stuff to be in the know. There’s no bright line rule here. Unannounced penetration testing is good to assess the response of your security team. Yet, they may slow down the process or even block it, for example, by cutting access from internet for pentesters.\n    Expect a “get out of jail free” statement from the vendor. This document protects providers of penetration testing services, so don’t be suspicious about signing one. What penetration testers do is breaking into someone else’s network, which, per se, is illegal. The “get out of jail free” statement specifies that all pentester’s operations are permitted and you are authorized to give permission.\n\nTest Stage\n\nThis section covers best practices followed by pentesters while conducting network penetration testing. This knowledge helps you to understand whether a certain penetration testing vendor provides the service of a decent quality.\n\n    Gather as much customer information as possible. Pentesters use the customer’s website, WHOIS databases, web search engines. Netcraft offers an online data mining service that monitors the web and provides datasets of visible hosts.\n    Conduct a network survey. This process provides pentesters with domain and server names, the range of IP addresses owned by the organization, information about closed and open network ports, running OS and services. There is an array of open source, as well as commercial tools available for network survey, most popular being Nmap, Zmap, DirBuster, Burp Suite and Metasploit.\n    Determine existing vulnerabilities. At this stage, pentesters scan the network looking for vulnerabilities to use for penetration attempt. Vulnerability scanning can be automated and manual. A combo of the two methods boosts the effectiveness of the process considerably. Automated scanning tools, such as Nessus, quickly cover a lot of ground, but produce a high degree of false positives and false negatives (vulnerabilities are falsely identified or unidentified at all). So, automation should be followed by manual checking.\n    Identify suitable targets. Penetration testing is always conducted within the timeframe set by you. So, out of the pool of vulnerable network targets, it’s essential to choose the proper ones not to waste time and effort doing unnecessary job. For example, a network consists of 1,000 machines, and pentesters have already determined that most of the machines are staff PCs with only 20 servers. It’s sensible to choose the servers, as the primary targets for penetration testing. Very often the task of finding proper targets is simplified, as the names of machines reflect their purpose (for example, Int_Surf for a computer performing Internet surfing).\n    Attempt penetration. To exploit vulnerabilities, pentesters use standard tools, such as Metasploit, Burp Suit or Wireshark. These tools categorize vulnerabilities based on the severity. This helps to provide a customer with the report that accentuates the vulnerabilities to be fixed immediately. However, to test the network at realistic threat levels, pentesters need to customize standard tools and to employ custom built exploits.\n\nA common practice at this stage is to use password cracking methods and. Password cracking methods are a dictionary attack (use of a dictionary file), a brute-force attack (trying all possible password combinations) and a hybrid attack (a combination of both).\n\nAdditionally, pentesters may resort to social engineering. This technique involves interaction with your staff to fish out for critical information, for example, credentials.\n\nPost-Test Stage\n\nNetwork penetration, as such, is over. But the penetration testing procedure isn’t. Two important stages are left: report generation and cleaning up.\n\n    Report generation. A well-structured report is a helping hand in risk management. You should expect it to start with an overview of the penetration testing process followed by the most critical network vulnerabilities that need to be addressed in the first place. Afterwards, fewer critical vulnerabilities should be highlighted.\n    Cleaning up. Pentesters’ code of practice doesn’t allow to leave any surprises (backdoors) in your network. To keep it clean, pentesters should maintain a detailed record of all actions performed throughout the stages of penetration testing. Still, double checking by your security staff won’t go amiss.\n\nThere is no one-size-fits-all penetration testing scenario. Choose a vendor who will customize the best practices for your network.\n\nUladzislau Murashka is a Certified Ethical Hacker at ScienceSoft with 5+ years of experience in penetration testing.  ![nasa_hack-800x445.jpg](https://steemitimages.com/DQmY2EXRdiv6KtXRtnVKNRo4jXEXyfndJAnmubRosJmjmQk/nasa_hack-800x445.jpg)",
      "json_metadata": "{\"tags\":[\"penetration\",\"testing\"],\"image\":[\"https://steemitimages.com/DQmY2EXRdiv6KtXRtnVKNRo4jXEXyfndJAnmubRosJmjmQk/nasa_hack-800x445.jpg\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
    }
  ]
}
2017/10/27 21:18:30
parent authorcryptosec
parent permlinkduhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions
authorcheetah
permlinkcheetah-re-cryptosecduhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://thehackernews.com/2017/10/crack-prng-encryption-keys.html
json metadata
Transaction InfoBlock #16707202/Trx c3158aa36eef01f7f413d09101aca05e4fd4b907
View Raw JSON Data
{
  "trx_id": "c3158aa36eef01f7f413d09101aca05e4fd4b907",
  "block": 16707202,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T21:18:30",
  "op": [
    "comment",
    {
      "parent_author": "cryptosec",
      "parent_permlink": "duhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions",
      "author": "cheetah",
      "permlink": "cheetah-re-cryptosecduhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://thehackernews.com/2017/10/crack-prng-encryption-keys.html",
      "json_metadata": ""
    }
  ]
}
2017/10/27 21:18:24
votercheetah
authorcryptosec
permlinkduhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions
weight50 (0.50%)
Transaction InfoBlock #16707200/Trx 200b9095d46f93fc448ca8353633e312e68e719e
View Raw JSON Data
{
  "trx_id": "200b9095d46f93fc448ca8353633e312e68e719e",
  "block": 16707200,
  "trx_in_block": 17,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T21:18:24",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "cryptosec",
      "permlink": "duhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions",
      "weight": 50
    }
  ]
}
2017/10/27 21:18:03
parent author
parent permlinkcyber
authorcryptosec
permlinkduhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions
titleDUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions
bodyDUHK — Don't Use Hard-coded Keys — is a new 'non-trivial' cryptographic implementation vulnerability that could allow attackers to recover encryption keys that secure VPN connections and web browsing sessions. DUHK is the third crypto-related vulnerability reported this month after KRACK Wi-Fi attack and ROCA factorization attack. The vulnerability affects products from dozens of vendors, including Fortinet, Cisco, TechGuard, whose devices rely on ANSI X9.31 RNG — an outdated pseudorandom number generation algorithm — 'in conjunction with a hard-coded seed key.' Before getting removed from the list of FIPS-approved pseudorandom number generation algorithms in January 2016, ANSI X9.31 RNG was included into various cryptographic standards over the last three decades. Pseudorandom number generators (PRNGs) don’t generate random numbers at all. Instead, it is a deterministic algorithm that produces a sequence of bits based on initial secret values called a seed and the current state. It always generates the same sequence of bits for when used with same initial values.Some vendors store this 'secret' seed value hard-coded into the source code of their products, leaving it vulnerable to firmware reverse-engineering. Discovered by cryptography researchers — Shaanan Cohney, Nadia Heninger, and Matthew Green — DUHK, a 'state recovery attack,' allows man-in-the-middle attackers, who already know the seed value, to recover the current state value after observing some outputs.Using both values in hand, attackers can then use them to re-calculate the encryption keys, allowing them to recover encrypted data that could 'include sensitive business data, login credentials, credit card data and other confidential content.' "In order to demonstrate the practicality of this attack, we develop a full passive decryption attack against FortiGate VPN gateway products using FortiOS version 4." researchers said. "Our scans found at least 23,000 devices with a publicly visible IPv4 address running a vulnerable version of FortiOS."
json metadata{"tags":["cyber","security"],"app":"steemit/0.1","format":"markdown"}
Transaction InfoBlock #16707193/Trx a6f83ece6c4b92ca7056e485287034c79eb6d83c
View Raw JSON Data
{
  "trx_id": "a6f83ece6c4b92ca7056e485287034c79eb6d83c",
  "block": 16707193,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T21:18:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cyber",
      "author": "cryptosec",
      "permlink": "duhk-attack-lets-hackers-recover-encryption-key-used-in-vpns-and-web-sessions",
      "title": "DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions",
      "body": "DUHK — Don't Use Hard-coded Keys — is a new 'non-trivial' cryptographic implementation vulnerability that could allow attackers to recover encryption keys that secure VPN connections and web browsing sessions.\nDUHK is the third crypto-related vulnerability reported this month after KRACK Wi-Fi attack and ROCA factorization attack.\nThe vulnerability affects products from dozens of vendors, including Fortinet, Cisco, TechGuard, whose devices rely on ANSI X9.31 RNG — an outdated pseudorandom number generation algorithm — 'in conjunction with a hard-coded seed key.'\n \nBefore getting removed from the list of FIPS-approved pseudorandom number generation algorithms in January 2016, ANSI X9.31 RNG was included into various cryptographic standards over the last three decades.\nPseudorandom number generators (PRNGs) don’t generate random numbers at all. Instead, it is a deterministic algorithm that produces a sequence of bits based on initial secret values called a seed and the current state. It always generates the same sequence of bits for when used with same initial values.Some vendors store this 'secret' seed value hard-coded into the source code of their products, leaving it vulnerable to firmware reverse-engineering.\nDiscovered by cryptography researchers — Shaanan Cohney, Nadia Heninger, and Matthew Green — DUHK, a 'state recovery attack,' allows man-in-the-middle attackers, who already know the seed value, to recover the current state value after observing some outputs.Using both values in hand, attackers can then use them to re-calculate the encryption keys, allowing them to recover encrypted data that could 'include sensitive business data, login credentials, credit card data and other confidential content.'\n\n    \"In order to demonstrate the practicality of this attack, we develop a full passive decryption attack against FortiGate VPN gateway products using FortiOS version 4.\" researchers said.\n\n    \"Our scans found at least 23,000 devices with a publicly visible IPv4 address running a vulnerable version of FortiOS.\"",
      "json_metadata": "{\"tags\":[\"cyber\",\"security\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
    }
  ]
}
2017/10/27 21:11:54
parent author
parent permlinkcyber
authorcryptosec
permlinkbad-rabbit-ransomware-uses-leaked-eternalromance-nsa-exploit-to-spread
titleBad Rabbit Ransomware Uses Leaked ‘EternalRomance’ NSA Exploit to Spread
bodyA new widespread ransomware worm, known as “Bad Rabbit,” that hit over 200 major organisations, primarily in Russia and Ukraine this week leverages a stolen NSA exploit released by the Shadow Brokers this April to spread across victims’ networks. Earlier it was reported that this week’s crypto-ransomware outbreak did not use any National Security Agency-developed exploits, neither EternalRomance nor EternalBlue, but a recent report from Cisco’s Talos Security Intelligence revealed that the Bad Rabbit ransomware did use EternalRomance exploit. NotPetya ransomware (also known as ExPetr and Nyetya) that infected tens of thousands of systems back in June also leveraged the EternalRomance exploit, along with another NSA’s leaked Windows hacking exploit EternalBlue, which was used in the WannaCry ransomware outbreak.
json metadata{"tags":["cyber","security"],"app":"steemit/0.1","format":"markdown"}
Transaction InfoBlock #16707070/Trx 858d5637c7d9e2a513fa5985c60c166a4c4eefdd
View Raw JSON Data
{
  "trx_id": "858d5637c7d9e2a513fa5985c60c166a4c4eefdd",
  "block": 16707070,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T21:11:54",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cyber",
      "author": "cryptosec",
      "permlink": "bad-rabbit-ransomware-uses-leaked-eternalromance-nsa-exploit-to-spread",
      "title": "Bad Rabbit Ransomware Uses Leaked ‘EternalRomance’ NSA Exploit to Spread",
      "body": "A new widespread ransomware worm, known as “Bad Rabbit,” that hit over 200 major organisations, primarily in Russia and Ukraine this week leverages a stolen NSA exploit released by the Shadow Brokers this April to spread across victims’ networks.\n\nEarlier it was reported that this week’s crypto-ransomware outbreak did not use any National Security Agency-developed exploits, neither EternalRomance nor EternalBlue, but a recent report from Cisco’s Talos Security Intelligence revealed that the Bad Rabbit ransomware did use EternalRomance exploit.\n\nNotPetya ransomware (also known as ExPetr and Nyetya) that infected tens of thousands of systems back in June also leveraged the EternalRomance exploit, along with another NSA’s leaked Windows hacking exploit EternalBlue, which was used in the WannaCry ransomware outbreak.",
      "json_metadata": "{\"tags\":[\"cyber\",\"security\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
    }
  ]
}
cryptosecupdated their account properties
2017/10/27 21:08:00
accountcryptosec
memo keySTM8LCbWo4Fkg7xYDHyKAyfuAnADBZBfDFKLxMYWJonY5oxJ4bsUe
json metadata{"profile":{"name":"CryptoSec","about":"BlockChain & Cyber Security","location":"Sarajevo","website":"https://cryptosec.cc"}}
Transaction InfoBlock #16706992/Trx bafe8933b1f61039642a37d3f3ac248e26542a1a
View Raw JSON Data
{
  "trx_id": "bafe8933b1f61039642a37d3f3ac248e26542a1a",
  "block": 16706992,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T21:08:00",
  "op": [
    "account_update",
    {
      "account": "cryptosec",
      "memo_key": "STM8LCbWo4Fkg7xYDHyKAyfuAnADBZBfDFKLxMYWJonY5oxJ4bsUe",
      "json_metadata": "{\"profile\":{\"name\":\"CryptoSec\",\"about\":\"BlockChain & Cyber Security\",\"location\":\"Sarajevo\",\"website\":\"https://cryptosec.cc\"}}"
    }
  ]
}
steemcreated a new account: @cryptosec
2017/10/27 12:22:33
fee0.500 STEEM
delegation57000.000000 VESTS
creatorsteem
new account namecryptosec
owner{"weight_threshold":1,"account_auths":[],"key_auths":[["STM8UNuEoBNkhSq8my3wubSB4KS31dPf9D9bu98UjdbADkBPkDT4S",1]]}
active{"weight_threshold":1,"account_auths":[],"key_auths":[["STM7YpsXCrxy6zDnWBQQj4hj8J1Ap1AVzgcehffgtRSGJwpzUbiRJ",1]]}
posting{"weight_threshold":1,"account_auths":[],"key_auths":[["STM8cftYZ7p32cgRCsyYTjebXxhY1rdmsjaAtV94oQyTm1v5nBdJh",1]]}
memo keySTM8LCbWo4Fkg7xYDHyKAyfuAnADBZBfDFKLxMYWJonY5oxJ4bsUe
json metadata
extensions[]
Transaction InfoBlock #16696483/Trx a7c60850eadc4d4aa486298b5c2e6dab93ed141a
View Raw JSON Data
{
  "trx_id": "a7c60850eadc4d4aa486298b5c2e6dab93ed141a",
  "block": 16696483,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-10-27T12:22:33",
  "op": [
    "account_create_with_delegation",
    {
      "fee": "0.500 STEEM",
      "delegation": "57000.000000 VESTS",
      "creator": "steem",
      "new_account_name": "cryptosec",
      "owner": {
        "weight_threshold": 1,
        "account_auths": [],
        "key_auths": [
          [
            "STM8UNuEoBNkhSq8my3wubSB4KS31dPf9D9bu98UjdbADkBPkDT4S",
            1
          ]
        ]
      },
      "active": {
        "weight_threshold": 1,
        "account_auths": [],
        "key_auths": [
          [
            "STM7YpsXCrxy6zDnWBQQj4hj8J1Ap1AVzgcehffgtRSGJwpzUbiRJ",
            1
          ]
        ]
      },
      "posting": {
        "weight_threshold": 1,
        "account_auths": [],
        "key_auths": [
          [
            "STM8cftYZ7p32cgRCsyYTjebXxhY1rdmsjaAtV94oQyTm1v5nBdJh",
            1
          ]
        ]
      },
      "memo_key": "STM8LCbWo4Fkg7xYDHyKAyfuAnADBZBfDFKLxMYWJonY5oxJ4bsUe",
      "json_metadata": "",
      "extensions": []
    }
  ]
}

Account Metadata

POSTING JSON METADATA
profile{"name":"CryptoSec","about":"BlockChain & Cyber Security","location":"Sarajevo","website":"https://www.cryptosec.cc"}
JSON METADATA
profile{"name":"CryptoSec","about":"BlockChain & Cyber Security","location":"Sarajevo","website":"https://www.cryptosec.cc"}
{
  "posting_json_metadata": {
    "profile": {
      "name": "CryptoSec",
      "about": "BlockChain & Cyber Security",
      "location": "Sarajevo",
      "website": "https://www.cryptosec.cc"
    }
  },
  "json_metadata": {
    "profile": {
      "name": "CryptoSec",
      "about": "BlockChain & Cyber Security",
      "location": "Sarajevo",
      "website": "https://www.cryptosec.cc"
    }
  }
}

Auth Keys

Owner
Single Signature
Public Keys
STM8UNuEoBNkhSq8my3wubSB4KS31dPf9D9bu98UjdbADkBPkDT4S1/1
Active
Single Signature
Public Keys
STM7YpsXCrxy6zDnWBQQj4hj8J1Ap1AVzgcehffgtRSGJwpzUbiRJ1/1
Posting
Single Signature
Public Keys
STM8cftYZ7p32cgRCsyYTjebXxhY1rdmsjaAtV94oQyTm1v5nBdJh1/1
Memo
STM8LCbWo4Fkg7xYDHyKAyfuAnADBZBfDFKLxMYWJonY5oxJ4bsUe
{
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM8UNuEoBNkhSq8my3wubSB4KS31dPf9D9bu98UjdbADkBPkDT4S",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7YpsXCrxy6zDnWBQQj4hj8J1Ap1AVzgcehffgtRSGJwpzUbiRJ",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM8cftYZ7p32cgRCsyYTjebXxhY1rdmsjaAtV94oQyTm1v5nBdJh",
        1
      ]
    ]
  },
  "memo": "STM8LCbWo4Fkg7xYDHyKAyfuAnADBZBfDFKLxMYWJonY5oxJ4bsUe"
}

Witness Votes

0 / 30
No active witness votes.
[]