Organizations are spending unprecedented amounts of money in an attempt to defend their assets...yet all too often, one click is all it takes for it all to come toppling down around them. Every day we …
Organizations are spending unprecedented amounts of money in an attempt to defend their assets...yet all too often, one click is all it takes for it all to come toppling down around them. Every day we read in the news about national secrets, intellectual property, financial records & personal details being exfiltrated from the largest organizations on Earth. How is this being done? How are they bypassing our defenses (e.g. strong passwords, non-privileged accounts, anti-virus, firewalls/proxies, IDS/IPS, logging, etc.) And most importantly, what can we do about it? A keen understanding of the true risks we face in today's threatscape is paramount to our success...
This technical presentation will walk through an example spear-phishing campaign to demonstrate:
- How attackers perform recon on key individuals in target organizations (e.g. admins, executives, engineers, help desk personnel, etc.)
- How attackers craft and deliver payloads that bypass most detection mechanisms
- How attackers elevate privileges to super-user levels - even on fully patched systems
- How attackers bypass strong passwords, smart cards, multi-factor, bio-metrics and virtually all forms of strong authentication
- How attackers move throughout the environment in search of their "prize" with minimal footprint or artifacts
- How attackers exfiltrate secrets out of the organization undetected
Many organizations are busy being busy, managing all kinds of projects and initiatives. They have all the right products. They have more logs than they know what to do with. Yet the uncomfortable question persists, "is it working?" If one click by a user is all it takes, we need to re-evaluate...