SlideShare a Scribd company logo
1 of 27
Hacking Android – How a BYOD
device can take down your entire network
@infosecBoddy
Matt Boddy
5
6
8
10
11
12
13
14
15
16
17
18
19
20
21
LabCorp – Pivot victim of SAMSAM ransomware
4000 devices compromised in 50 minutes
1200 of these devices were servers
23
How to stay protected
24
25
26
27
Three key takeaway points
1. Use mobile security software
2. Segregate your network BYOD zone and
Corporate zone
3. Use mobile security software
Hacking Android – How a BYOD
device can take down your entire network
@infosecBoddy
Matt Boddy

More Related Content

What's hot

Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness) Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness) Benjamin Ang
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
The Invisible Eye
The Invisible EyeThe Invisible Eye
The Invisible Eyeijtsrd
 
Event cosmoscyberoam final
Event cosmoscyberoam finalEvent cosmoscyberoam final
Event cosmoscyberoam finalNoorul Haque
 
SECURITY SYSTEM
SECURITY SYSTEMSECURITY SYSTEM
SECURITY SYSTEMK. Gourav
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
Mobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtMobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtIGN MANTRA
 
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureI.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureIndonesia Honeynet Chapter
 
Solar GPS Tracker TK101s
Solar GPS Tracker TK101sSolar GPS Tracker TK101s
Solar GPS Tracker TK101sgpspro
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Biometrics - Future of Authentication
Biometrics - Future of AuthenticationBiometrics - Future of Authentication
Biometrics - Future of AuthenticationTony Chew
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 

What's hot (20)

Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness) Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness)
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
The Invisible Eye
The Invisible EyeThe Invisible Eye
The Invisible Eye
 
Event cosmoscyberoam final
Event cosmoscyberoam finalEvent cosmoscyberoam final
Event cosmoscyberoam final
 
Mobile security
Mobile securityMobile security
Mobile security
 
SECURITY SYSTEM
SECURITY SYSTEMSECURITY SYSTEM
SECURITY SYSTEM
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Mobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtMobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirt
 
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureI.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
 
Solar GPS Tracker TK101s
Solar GPS Tracker TK101sSolar GPS Tracker TK101s
Solar GPS Tracker TK101s
 
Ppt
PptPpt
Ppt
 
Invisible Eye
Invisible EyeInvisible Eye
Invisible Eye
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Biometrics - Future of Authentication
Biometrics - Future of AuthenticationBiometrics - Future of Authentication
Biometrics - Future of Authentication
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Ppt
PptPpt
Ppt
 

Hacking Android - How a BYOD device can take down your entire network

Editor's Notes

  1. Introduction to me Show of hands, how many of you don’t have a mobile phone on you right now? How many of your colleagues and staff at your business take their phones with them WHEREVER they go? Story of my mum
  2. Proof that you can ping out of a network, but not into one when SNAT is enabled Surprisingly this has kept organisations safe for years