About
Articles by Tarcísio
-
How can a malware encrypt a company existence ?
How can a malware encrypt a company existence ?
By Tarcísio Marinho
Activity
-
Boa tarde e bom domingo a todos, rede! Meio sumido, mas venho aqui relatar uma das minhas experiências mais interessantes na minha carreira de…
Boa tarde e bom domingo a todos, rede! Meio sumido, mas venho aqui relatar uma das minhas experiências mais interessantes na minha carreira de…
Liked by Tarcísio Marinho
-
Ontem tive uma reunião com um rapaz que fatura R$ 226k por mês com um Micro-SaaS e ele nem sabe como. Ele gasta R$ 400 em Meta Ads e R$ 600 em…
Ontem tive uma reunião com um rapaz que fatura R$ 226k por mês com um Micro-SaaS e ele nem sabe como. Ele gasta R$ 400 em Meta Ads e R$ 600 em…
Liked by Tarcísio Marinho
-
We are kicking off the search for someone to help us scale up our customer support function as we rapidly grow. The ideal candidate has helped build…
We are kicking off the search for someone to help us scale up our customer support function as we rapidly grow. The ideal candidate has helped build…
Liked by Tarcísio Marinho
Experience & Education
Volunteer Experience
-
Teacher
Universidade Católica de Pernambuco
- 1 year 8 months
Science and Technology
Taught Introduction to Python Course and done several speeches about
Data Science, Machine Learning, Security and hacking. Also actively helping organize and give several lectures and courses throughout Comp week years: 2016, 2017, 2018, 2019 and 2020
Courses:
- Introduction to data science
- Introduction to Python
Lectures:
- Malware development
- Data Science and Machine Learning
- Using ML to detect API attacks -
Speaker
Python User Group - PE
- 1 year
Science and Technology
PUG-PE is a local python group.
I've gave lectures about:
- Secure web development,
- Ransomware internals
- Malware development
- Machine learning applied to application security
Publications
-
A Deep Learning Approach to Web Application Firewall
Medium
- Abstract -
Web applications receive a variety of input parameters from users and attackers which generally inject malicious payloads trying to whether steal data or manipulate the application in their favor.
An approach widely used to protect the application is the WAF (web application firewall), which generally is rule-based. In the present work, deep learning and Transformer, which is a state-of-the-art model in natural language processing, are applied in the scenario of hard-coded…- Abstract -
Web applications receive a variety of input parameters from users and attackers which generally inject malicious payloads trying to whether steal data or manipulate the application in their favor.
An approach widely used to protect the application is the WAF (web application firewall), which generally is rule-based. In the present work, deep learning and Transformer, which is a state-of-the-art model in natural language processing, are applied in the scenario of hard-coded rules, successfully evading anti-WAF techniques. The proposed method achieves 96.5% accuracy in the proposed dataset. -
How can a malware encrypt a company existence
Medium
More than 4,000 ransomware attacks occur daily, according to the FBI.
In May 2019, the Baltimore City government system was hit with a ransomware attack that estimates put the cost to recovery over $18 million dollars, even with the ransom price being only $75,000 worth of Bitcoin. This attack impacted vaccine production, airports, hospitals, and ATMs.
2017 was the year of ransomware attacks with the massive global attack of WannaCry that infected 200,000 computers across 150…More than 4,000 ransomware attacks occur daily, according to the FBI.
In May 2019, the Baltimore City government system was hit with a ransomware attack that estimates put the cost to recovery over $18 million dollars, even with the ransom price being only $75,000 worth of Bitcoin. This attack impacted vaccine production, airports, hospitals, and ATMs.
2017 was the year of ransomware attacks with the massive global attack of WannaCry that infected 200,000 computers across 150 countries, with damages ranging from hundreds of millions to billions of dollars. -
Ransomware encryption techniques
Medium
Modern ransomware that affected several countries in 2017 such as WannaCry, Petya, NotPetya, and Locky, uses a hybrid encryption scheme, with a combination of AES and RSA encryption to secure their malware against the researchers getting encrypted files back.
What’s necessary from the ransomware point of view to get its job done properly and securely? starting from the premise that the ransomware wants to encrypt and decrypt the files. -
RSA encryption algorithm
With the growth of the internet and the need to transfer data safely, cryptographic algorithms began to be developed to ensure data integrity, thus ensuring secure communication between the two parties, usually the client/server structure. The RSA algorithm was described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.
Projects
-
GonnaCry Ransomware
- Present
Code behind these Medium blog posts:
- How can malware encrypt a company's existence
- Ransomware encryption techniques
- https://medium.com/@tarcisioma/how-can-a-malware-encrypt-a-company-existence-c7ed584f66b3
- https://medium.com/@tarcisioma/ransomware-encryption-techniques-696531d07bb9
GonnaCry is an academic Linux ransomware made for awareness about security/cryptography.
It encrypts all the user files with a strong encryption scheme (RSA 2048 bits, AES 256…Code behind these Medium blog posts:
- How can malware encrypt a company's existence
- Ransomware encryption techniques
- https://medium.com/@tarcisioma/how-can-a-malware-encrypt-a-company-existence-c7ed584f66b3
- https://medium.com/@tarcisioma/ransomware-encryption-techniques-696531d07bb9
GonnaCry is an academic Linux ransomware made for awareness about security/cryptography.
It encrypts all the user files with a strong encryption scheme (RSA 2048 bits, AES 256 bits, SHA256).
This project is OpenSource, feel free to use, study, and/or send a pull request -
A Deep Learning Approach to Web Application Firewall - implementation
-
Code behind the paper: A Deep Learning Approach to Web Application Firewall
- https://medium.com/@tarcisioma/a-deep-learning-approach-to-web-application-firewall-c6190a9bd31a
Web applications receive a variety of input parameters from users and attackers which generally inject malicious payloads trying to whether steal data or manipulate the application in their favor.
An approach widely used to protect the application is the WAF (web application firewall), which generally is…Code behind the paper: A Deep Learning Approach to Web Application Firewall
- https://medium.com/@tarcisioma/a-deep-learning-approach-to-web-application-firewall-c6190a9bd31a
Web applications receive a variety of input parameters from users and attackers which generally inject malicious payloads trying to whether steal data or manipulate the application in their favor.
An approach widely used to protect the application is the WAF (web application firewall), which generally is rule-based. In the present work, deep learning and Transformer, which is a state-of-the-art model in natural language processing, are applied in the scenario of hard-coded rules, successfully evading anti-WAF techniques. The proposed method achieves 96.5% accuracy in the proposed dataset. -
RSA encryption algorithm implementation
-
Code behind the Medium: RSA encryption algorithm
- https://medium.com/@tarcisioma/algoritmo-de-criptografia-assim%C3%A9trica-rsa-c6254a3c7042
Simple implementation of the RSA Asymmetric Encryption Algorithm -
Backdoor
-
Reverse Shell Backdoor is a framework to control infected machines with some cool interactions. It's capable of sending files, running programs in the background, take screenshots.
There are two versions of the code, C and Python. If you want to learn about sockets and reverse connections, you should check it out.
Languages
-
Inglês
Native or bilingual proficiency
-
Português
Native or bilingual proficiency
Recommendations received
3 people have recommended Tarcísio
Join now to viewMore activity by Tarcísio
-
Quando eu decidi sair da XP. Estava há 5 anos na empresa, 100% absorvida no projeto que levava meu nome e que tinha o objetivo de ajudar o…
Quando eu decidi sair da XP. Estava há 5 anos na empresa, 100% absorvida no projeto que levava meu nome e que tinha o objetivo de ajudar o…
Liked by Tarcísio Marinho
-
Olá, comunidade! Estou buscando um Tech Lead (profissional sênior) fulltime. Requisitos: - Dominar Vue e Ruby (nenhuma outra tech semelhante…
Olá, comunidade! Estou buscando um Tech Lead (profissional sênior) fulltime. Requisitos: - Dominar Vue e Ruby (nenhuma outra tech semelhante…
Liked by Tarcísio Marinho
-
𝗪𝗵𝗲𝗻 𝘁𝗼 𝘀𝗲𝗹𝗲𝗰𝘁 𝗗𝗲𝘀𝗶𝗴𝗻 𝗣𝗮𝘁𝘁𝗲𝗿𝗻𝐬? Choosing the correct design pattern in software engineering is critical to practical…
𝗪𝗵𝗲𝗻 𝘁𝗼 𝘀𝗲𝗹𝗲𝗰𝘁 𝗗𝗲𝘀𝗶𝗴𝗻 𝗣𝗮𝘁𝘁𝗲𝗿𝗻𝐬? Choosing the correct design pattern in software engineering is critical to practical…
Liked by Tarcísio Marinho
-
Pessoal, Um pouco tarde, mas estou aqui! Hoje está rolando um baita evento de tech com profissionais de alta qualificação! Um evento gratuito, e com…
Pessoal, Um pouco tarde, mas estou aqui! Hoje está rolando um baita evento de tech com profissionais de alta qualificação! Um evento gratuito, e com…
Liked by Tarcísio Marinho
-
Vamos ao primeiro dia de muito conhecimento! Web Summit Rio ! unico IDtech obrigado pelo convite! banco BV Rodrigo Colossi e Arethusa Pontes muito…
Vamos ao primeiro dia de muito conhecimento! Web Summit Rio ! unico IDtech obrigado pelo convite! banco BV Rodrigo Colossi e Arethusa Pontes muito…
Liked by Tarcísio Marinho
-
Ever wanted to lead marketing strategy at the early innings of a hyper-growth consumer product? If yes - dub is hiring our first Growth Marketing…
Ever wanted to lead marketing strategy at the early innings of a hyper-growth consumer product? If yes - dub is hiring our first Growth Marketing…
Liked by Tarcísio Marinho
-
It's the earliest innings of copy trading as a phenomena - it goes way beyond "copying Nancy Pelosi". It is fundamentally a new way to deploy…
It's the earliest innings of copy trading as a phenomena - it goes way beyond "copying Nancy Pelosi". It is fundamentally a new way to deploy…
Liked by Tarcísio Marinho
-
Hoje um ciclo se encerra, 8 anos de conquistas e realizações na XP Inc. Cresci muito, me dediquei muito e o principal resultado são as pessoas que…
Hoje um ciclo se encerra, 8 anos de conquistas e realizações na XP Inc. Cresci muito, me dediquei muito e o principal resultado são as pessoas que…
Liked by Tarcísio Marinho
People also viewed
-
Kevin Schott
Connect -
Heeyun Lee
Connect -
✨ Jhai Navarro
Connect -
Osvaldo Barros
Connect -
Adriano Binhara
Connect -
Justin Reich
Connect -
Lucas Rafael
Senior Software Engineer | Backend | Microservices | C# | .NET | GCP | AWS
Connect -
Felix Ruan
Engenheiro de Software | FullStack & Backend | .NET | Java | JavaScript | Nest Js | Python | SQL | React | Node.js | Docker | Auth0 | Twilio | Azure | AWS | Scrum | Kanban
Connect -
Bruno Henrique
Connect -
Victor Ribeiro da Silva Eloy
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Tarcísio Marinho
-
Tarcísio Marinho
Diretor na Eletrotec Soluções em Eletroeletrônica
-
Tarcísio Marinho
Engenheiro civil na Asphaltech Soluções em Pavimento
-
Tarcísio Marinho
Gerente de TI
-
Tarcisio Marinho
professor na Unidade Escolar Manoel Ferreira Barbosa de Macedo
24 others named Tarcísio Marinho are on LinkedIn
See others named Tarcísio Marinho