SlideShare a Scribd company logo
1 of 70
Download to read offline
Social Engineering
Technical ControlsTAKING EMOTIONS OUT OF DEFENSE
July 16, 2015
INTRODUCTION
FROM US TO YOU
33
Candis Orr
corr@bishopfox.com
@candysaur
Senior Security Analyst at
Bishop Fox (Enterprise Security
Team)
Alex DeFreese
adefreese@bishopfox.com
@lunarca_
Security Analyst at Bishop Fox
(Application Penetration Testing
Team)
WHY DO YOU CARE WHAT WE THINK?
Who are we?
44
•  Security Awareness Training
•  Email Protections
•  Domain Protections
•  Deterring & Preventing Outbound Proxy
•  Browser Protections
•  Two-Factor Authentication
•  Detecting Attacks
•  Eradicating Attacks
•  Further Information
•  Q&A
WHAT WE ARE GOING TO COVER
Agenda
SECURITY
AWARENESS
TRAINING
EASIER SAID THAN DONE
66
Security
Awareness
Training
Documented
Policies and
Procedures
Technical
Controls
SUPPORTING INFRASTRUCTURE SHOULD BE IN PLACE
What is required to properly train?
•  Technical controls need to
be implemented to reduce
the attack surface and
chance of attacks
•  Documented policies and
procedures need to be
created for repeatable and
consistent processes for the
user to follow
•  Security awareness training
must cover the document
policies and procedures and
the security controls so that
users can understand their
responsibilities within the
company
77
IT CAN GO WELL SOMETIMES…
Best Case for Awareness Training
User awareness
training can help
identify and prevent
attacks when properly
administered.
88
SINCE IT IS POORLY DONE MOST OF THE TIME
Best Case for Awareness Training
Most awareness
training programs try
to be the only line of
defense and suffer as
a result.
99
•  Real attacks are sophisticated.
•  Email spoofing
•  Website cloning
•  Targeted for the victim
•  Attackers prey on strong drives (politeness,
curiosity, confusion) to get compliance.
THE HACKERS ARE LEARNING FASTER THAN THE USERS
Failings of Awareness Training
1010
EMAIL SPOOFING IN ACTION
Example Spoofed Email
1111
EMAIL CLONING IN ACTION
Example Phishing Email
1212
WEBSITE CLONING IN ACTION
Example Phishing Website
1313
Once an attacker compromises
one computer on the network, it
becomes an internal attack.
Tools like Mimikatz, WCE, and
Pass the Hash Toolkit help
attackers compromise full
domains from one compromised
computer.
ONE MATCH IS ENOUGH TO START A FIRE
It Only Takes One
1414
“[…] users are neither stupid nor lazy. They are
musicians, parents, journalists, firefighters – it
isn’t fair to also expect them to become security
experts too. And they have other, important
things to do besides read our lovingly crafted
explanations of SSL. But they still deserve to
use the web safely, and it’s on us to figure out
that riddle.”
- Adrienne Porter Felt
Google Chrome Security Team
@__apf__ | adrienneporterfelt.com
IT’S NOT THEIR JOB, IT’S OURS.
Don’t Make Users Be the Judge
TECHNICAL
CONTROLS
RELIABLE, REPEATABLE, CONSISTENT
1616
•  Prepare, Detect, Analyze, Contain, Eradicate, Recover,
and Learn.
•  Deter attackers and make it more difficult for them to
produce a convincing attack. Limit their options.
•  Detect successful attacks immediately.
•  Eradicate attackers’ network presence and respond to the
damage they caused.
BROAD STROKES
Technical Controls
EMAIL
PROTECTIONS
DETER AND PREVENT
1818
•  Email servers allow email spoofing by default.
•  Spoofing gives social engineering emails
automatic credibility.
•  Defenses exist to prevent spoofing but very few
domains actually use them.
GAPING WOUND IN INTERNET SECURITY
Email Spoofing
1919
•  Which servers can send from this domain?
•  DNS TXT record
• dig txt $DOMAIN
•  List of IP addresses, domains, and references
•  ?all, ~all, and -all
EMAIL PROTECTIONS
Sender Policy Framework (SPF)
2020
EMAIL PROTECTIONS
SPF Summary
2121
2222
•  Automatic digital signatures
•  Public keys stored as DNS TXT records
• dig txt $SELECTOR._domainkey.$DOMAIN
•  Selector and signature transmitted with email
EMAIL PROTECTIONS
DomainKeys Identified Mail (DKIM)
2323
EMAIL PROTECTIONS
DKIM Summary
2424
2525
•  Domain-based Message Authentication, Reporting,
and Conformance
•  Defines what to do if mail fails SPF or DKIM
checks
•  Send an email with details
•  Make an HTTP request with details
•  Mark the email as spam
•  DNS TXT record
•  dig txt _dmarc.$DOMAIN
EMAIL PROTECTIONS
DMARC
2626
EMAIL PROTECTIONS
DMARC Summary
2727
•  Scanned top 1,000,000 domains for SPF and
DMARC
•  Domains with SPF records: 40%
•  Domains with DMARC records: 0.74%
BY THE NUMBERS
Analysis
2828
THE SKY IS ON FIRE
The Core Problem
Mail Servers don’t
respect SPF or DKIM
alone.
2929
THE SKY IS ON FIRE
DOMAINS THAT ARE
VULNERABLE TO EMAIL
SPOOFING
99.87%
The Core Problem
•  DMARC policy of reject
or quarantine needed to
block emails
•  Only 1,731 out of
1,000,000 domains are
protected.
3030
HOW DO THE TOP DOMAINS COMPARE?
Analysis Results
3131
HOW DO THE TOP DOMAINS COMPARE?
Analysis Results
3232
Email Providers
FROM WHOM CAN I SPOOF?
What’s Vulnerable?
3333
Financial Institutions
FROM WHOM CAN I SPOOF?
What’s Vulnerable?
3434
Insurance
FROM WHOM CAN I SPOOF?
What’s Vulnerable?
3535
Government
FROM WHOM CAN I SPOOF?
What’s Vulnerable?
3636
Government
FROM WHOM CAN I SPOOF?
What’s Vulnerable?
3737
Government
FROM WHOM CAN I SPOOF?
What’s Vulnerable?
3838
Government
FROM WHOM CAN I SPOOF?
What’s Vulnerable?
3939
TOP SPOOFED DOMAINS
What’s Vulnerable
4040
IT’S NOT ALL TERRIBLE
What’s Vulnerable
Of the 84 organizations
with the most phishing
sites, 40% are protected
from email spoofing.
4141
•  Implement SPF, DKIM, and DMARC for your
domain if possible.
•  Configure your email server to respect SPF
despite DMARC if possible.
•  http://www.openspf.org/Implementations
•  Exchange:
http://www.gfi.com/products-and-solutions/email-and-
messaging-solutions/gfi-mailessentials/specifications
HOW TO PROTECT YOURSELF
Solutions
4242
HELP PROTECT EVERYONE
Solutions
Spread the word.
DOMAIN
PROTECTIONS
DETER AND PREVENT
4444
•  Attackers will register domains similar to your
company’s domain to host phishing websites.
•  Typosquatting
•  TLD squatting
•  Register primary TLDs for your domain to protect
customers.
•  Add all typos to internal DNS server to protect
employees.
•  URLCrazy: tool to generate a list of domain typos
•  Consider blocking mail from these domains as well
BY THE NUMBERS
Similar Domains
4545
SIMILAR DOMAIN NAMES
URLCrazy Report
4646
Client Transfer Prohibited
•  Prevents attackers from transferring domain in same
registrar
•  Usually default
Server Transfer Prohibited
•  REGISTRAR LOCK status
•  Prevents attackers from transferring domain to a
different registrar
•  Sometimes not default
MALICIOUS DOMAIN TRANSFER
Domain Stealing
4747
THIS ACTUALLY HAPPENS
Real World Example
OUTBOUND
PROXY
DETER AND PREVENT
4949
Java Applet Attack
•  Still in use because it doesn’t need an exploit
Block the Java User Agent
•  Very few legitimate applications use Java Applets.
•  Block the Java User Agent outbound to prevent Java
Applet Attacks.
•  Whitelist specific endpoints if absolutely necessary.
WHY EVEN ALLOW THIS?
Java User Agent
5050
Regularly block all domains with an
authenticated splash page.
•  First person can unblock it if it’s legitimate.
•  Potentially whitelist company domains.
Block automated Command and Control.
Block watering hole attacks.
CROWDSOURCED AUTOMATED DEFENSE
Authenticated Splash Page
BROWSER
PROTECTIONS
DETER AND PREVENT
5252
•  Protects the computer if the browser gets
compromised
•  Limits the amount of damage a browser-based
attack can do
•  Effectively removes the browser from attack
surface
PROTECT YOURSELF FROM EVENTUALITY
Sandboxing
5353
Reduce the browser’s attack surface.
•  NoScript – prevent JS injection
•  AdBlock – prevent malicious advertisements
•  FlashBlock – prevent malicious flash documents
•  Web of Trust – make it easier to spot phishing sites
•  HTTPS Everywhere – force HTTPS when possible
SOME OF OUR FAVORITES
Browser Extensions
MULTI-FACTOR
AUTHENTICATION
DETER AND PREVENT
5555
Implement 2FA for the VPN.
•  Credentials are easier to compromise than computers.
•  Don’t let credentials give access to your internal
network.
Duo Security’s system is easier for users than
traditional 2FA.
BECAUSE CREDENTIALS ARE EASY TO STEAL
Multi Factor Authentication
DETECTION
KNOW WHAT’S GOING ON IN YOUR NETWORK
5757
Know what’s going
on in your network.
IN A NUTSHELL
Detection
5858
Even with all the previously mentioned controls, an
employee may still get compromised.
Learn that an attack is going on quickly, and act
immediately to contain and eradicate it.
IN A NUTSHELL
Detection
5959
Alert system, not a prevention system
•  Train users to report suspicious communications to
security officers.
•  Track reported emails instead of clicked links to
measure campaign effectiveness.
Make reporting a positive experience.
•  Reward users that report awareness training emails.
•  Ensure the reporting system is clearly defined, simple,
and easy to use.
WHAT IT’S ACTUALLY GOOD FOR
User Awareness Training
6060
Purposefully attractive targets
•  Purposefully vulnerable high-value servers with dummy
data
•  Purposefully insecure domain admin accounts with no
real power
Alert if someone starts using them
•  Immediately start forensics and eradication.
IT’S A TRAP
Canaries and Honeypots
6161
Monitoring Systems
•  Absolutely necessary for tracking an attack path
•  Need to know an attack is happening first
•  Start with anything outbound
Intrusion Detection Systems
•  Helpful for detecting obvious attackers or ones that
correspond to known attack patterns
•  May not necessarily detect covert or subtle attackers
LEARN WHAT THEY DID AND WHAT THEY’RE DOING
Monitoring and IDS
6262
What happened during the attack?
•  Identify the phishing site.
•  Identify C2 servers and channels.
•  Identify campaign’s targets.
•  Identify the campaign’s purpose.
Outbound Proxy Logs
LEARN WHAT THEY DID AND WHAT THEY’RE DOING
Forensics
ERADICATION
DELAY, RESPOND, RECOVER
6464
•  Block the IP and domain of phishing sites and C2 servers.
•  Drop emails coming from attacker’s domains, email
addresses, and mail servers.
•  Alert users about the social engineering campaign.
•  This won’t stop the attack, but it’ll buy some time while the
attacker pivots to different infrastructure.
BUY SOME TIME TO BREATHE
Burn the Current Campaign
6565
Force password resets.
•  Users that gave up credentials
•  Users with compromised computers
•  Anyone with access to compromised computers
•  Domain Admins
Reimage compromised machines.
•  Don’t try to outsmart the malware.
•  Reimage and restore from backup.
SCORCHED EARTH POLICY
Respond to the Attack
FURTHER
INFORMATION
WANT TO KNOW MORE?
6767
Sites
•  social-engineer.org
•  openspf.net/Tools
•  dkim.org
•  dmarc.org
•  sandboxie.com
•  duosecurity.com
Presentations
•  Attacker Ghost Stories
Rob Fuller
PLACES TO GO TO KNOW MORE
Further Information
6868
PLACES TO GO TO KNOW MORE
Further Information
Documents
•  SANS: Incident Handler’s Handbook: http://www.sans.org/reading-room/
whitepapers/incident/incident-handlers-handbook-33901
Books
•  Social Engineering: The Art of Human Hacking
Christopher Hadnagy
•  Social Engineering Penetration Testing
Gavin Watson, Andrew Mason, Richard Ackroyd
•  Influence: The Psychology of Persuasion
Robert B. Cialdini
Q&A
ANY QUESTIONS YOU WANT TO ASK?
Thank You

More Related Content

What's hot

Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised InsiderImperva
 
Security precognition chaos engineering in incident response
Security precognition  chaos engineering in incident responseSecurity precognition  chaos engineering in incident response
Security precognition chaos engineering in incident responsePriyanka Aash
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentMarketingArrowECS_CZ
 
Phishing Intelligence Engine - BlueHat v17
Phishing Intelligence Engine - BlueHat v17Phishing Intelligence Engine - BlueHat v17
Phishing Intelligence Engine - BlueHat v17Greg Foss
 
Reality Check: Security in the Cloud
Reality Check: Security in the CloudReality Check: Security in the Cloud
Reality Check: Security in the CloudAlert Logic
 
The Non-Advanced Persistent Threat
The Non-Advanced Persistent ThreatThe Non-Advanced Persistent Threat
The Non-Advanced Persistent ThreatImperva
 
How i'm going to own your organization v2
How i'm going to own your organization v2How i'm going to own your organization v2
How i'm going to own your organization v2RazorEQX
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh
 
OSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ InfosectrainOSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ InfosectrainInfosecTrain
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionAlert Logic
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionAlert Logic
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6FRSecure
 
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiContinuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiAllanGray11
 
Platform Security IRL: Busting Buzzwords & Building Better
Platform Security IRL:  Busting Buzzwords & Building BetterPlatform Security IRL:  Busting Buzzwords & Building Better
Platform Security IRL: Busting Buzzwords & Building BetterEqual Experts
 
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity MonitoringSophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity MonitoringImperva
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018Greg Foss
 
Beyond the mcse red teaming active directory
Beyond the mcse  red teaming active directoryBeyond the mcse  red teaming active directory
Beyond the mcse red teaming active directoryPriyanka Aash
 
Incident response-in-the-cloud
Incident response-in-the-cloudIncident response-in-the-cloud
Incident response-in-the-cloudPriyanka Aash
 

What's hot (20)

Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
Security precognition chaos engineering in incident response
Security precognition  chaos engineering in incident responseSecurity precognition  chaos engineering in incident response
Security precognition chaos engineering in incident response
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
 
Phishing Intelligence Engine - BlueHat v17
Phishing Intelligence Engine - BlueHat v17Phishing Intelligence Engine - BlueHat v17
Phishing Intelligence Engine - BlueHat v17
 
Reality Check: Security in the Cloud
Reality Check: Security in the CloudReality Check: Security in the Cloud
Reality Check: Security in the Cloud
 
The Non-Advanced Persistent Threat
The Non-Advanced Persistent ThreatThe Non-Advanced Persistent Threat
The Non-Advanced Persistent Threat
 
How i'm going to own your organization v2
How i'm going to own your organization v2How i'm going to own your organization v2
How i'm going to own your organization v2
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
OSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ InfosectrainOSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ Infosectrain
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6
 
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiContinuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
 
Platform Security IRL: Busting Buzzwords & Building Better
Platform Security IRL:  Busting Buzzwords & Building BetterPlatform Security IRL:  Busting Buzzwords & Building Better
Platform Security IRL: Busting Buzzwords & Building Better
 
OWASP TOP 10
OWASP TOP 10OWASP TOP 10
OWASP TOP 10
 
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity MonitoringSophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
 
Beyond the mcse red teaming active directory
Beyond the mcse  red teaming active directoryBeyond the mcse  red teaming active directory
Beyond the mcse red teaming active directory
 
Incident response-in-the-cloud
Incident response-in-the-cloudIncident response-in-the-cloud
Incident response-in-the-cloud
 

Similar to OWASP ATL - Social Engineering Technical Controls Presentation

Practical Defense
Practical DefensePractical Defense
Practical DefenseSean Whalen
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Amazon Web Services
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitAmazon Web Services
 
Top Azure security fails and how to avoid them
Top Azure security fails and how to avoid themTop Azure security fails and how to avoid them
Top Azure security fails and how to avoid themKarl Ots
 
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedWhere To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedAmanda Berlin
 
Security-Top-10-Penetration-Findings.pptx
Security-Top-10-Penetration-Findings.pptxSecurity-Top-10-Penetration-Findings.pptx
Security-Top-10-Penetration-Findings.pptxssuser5a0ad11
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerDigital Shadows
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
Secure Your WordPress Site - And Your Business
Secure Your WordPress Site - And Your BusinessSecure Your WordPress Site - And Your Business
Secure Your WordPress Site - And Your BusinessStacy Clements
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top TenSecurity Innovation
 
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
UpdateConf 2018: Top 18 Azure security fails and how to avoid themUpdateConf 2018: Top 18 Azure security fails and how to avoid them
UpdateConf 2018: Top 18 Azure security fails and how to avoid themKarl Ots
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Teemu Tiainen
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...PaloAltoNetworks
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive PresentationNormShield, Inc.
 

Similar to OWASP ATL - Social Engineering Technical Controls Presentation (20)

Practical Defense
Practical DefensePractical Defense
Practical Defense
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 
Top Azure security fails and how to avoid them
Top Azure security fails and how to avoid themTop Azure security fails and how to avoid them
Top Azure security fails and how to avoid them
 
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedWhere To Start When Your Environment is Fucked
Where To Start When Your Environment is Fucked
 
Security-Top-10-Penetration-Findings.pptx
Security-Top-10-Penetration-Findings.pptxSecurity-Top-10-Penetration-Findings.pptx
Security-Top-10-Penetration-Findings.pptx
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
Secure Your WordPress Site - And Your Business
Secure Your WordPress Site - And Your BusinessSecure Your WordPress Site - And Your Business
Secure Your WordPress Site - And Your Business
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top Ten
 
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
UpdateConf 2018: Top 18 Azure security fails and how to avoid themUpdateConf 2018: Top 18 Azure security fails and how to avoid them
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 

Recently uploaded

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

OWASP ATL - Social Engineering Technical Controls Presentation

  • 1. Social Engineering Technical ControlsTAKING EMOTIONS OUT OF DEFENSE July 16, 2015
  • 3. 33 Candis Orr corr@bishopfox.com @candysaur Senior Security Analyst at Bishop Fox (Enterprise Security Team) Alex DeFreese adefreese@bishopfox.com @lunarca_ Security Analyst at Bishop Fox (Application Penetration Testing Team) WHY DO YOU CARE WHAT WE THINK? Who are we?
  • 4. 44 •  Security Awareness Training •  Email Protections •  Domain Protections •  Deterring & Preventing Outbound Proxy •  Browser Protections •  Two-Factor Authentication •  Detecting Attacks •  Eradicating Attacks •  Further Information •  Q&A WHAT WE ARE GOING TO COVER Agenda
  • 6. 66 Security Awareness Training Documented Policies and Procedures Technical Controls SUPPORTING INFRASTRUCTURE SHOULD BE IN PLACE What is required to properly train? •  Technical controls need to be implemented to reduce the attack surface and chance of attacks •  Documented policies and procedures need to be created for repeatable and consistent processes for the user to follow •  Security awareness training must cover the document policies and procedures and the security controls so that users can understand their responsibilities within the company
  • 7. 77 IT CAN GO WELL SOMETIMES… Best Case for Awareness Training User awareness training can help identify and prevent attacks when properly administered.
  • 8. 88 SINCE IT IS POORLY DONE MOST OF THE TIME Best Case for Awareness Training Most awareness training programs try to be the only line of defense and suffer as a result.
  • 9. 99 •  Real attacks are sophisticated. •  Email spoofing •  Website cloning •  Targeted for the victim •  Attackers prey on strong drives (politeness, curiosity, confusion) to get compliance. THE HACKERS ARE LEARNING FASTER THAN THE USERS Failings of Awareness Training
  • 10. 1010 EMAIL SPOOFING IN ACTION Example Spoofed Email
  • 11. 1111 EMAIL CLONING IN ACTION Example Phishing Email
  • 12. 1212 WEBSITE CLONING IN ACTION Example Phishing Website
  • 13. 1313 Once an attacker compromises one computer on the network, it becomes an internal attack. Tools like Mimikatz, WCE, and Pass the Hash Toolkit help attackers compromise full domains from one compromised computer. ONE MATCH IS ENOUGH TO START A FIRE It Only Takes One
  • 14. 1414 “[…] users are neither stupid nor lazy. They are musicians, parents, journalists, firefighters – it isn’t fair to also expect them to become security experts too. And they have other, important things to do besides read our lovingly crafted explanations of SSL. But they still deserve to use the web safely, and it’s on us to figure out that riddle.” - Adrienne Porter Felt Google Chrome Security Team @__apf__ | adrienneporterfelt.com IT’S NOT THEIR JOB, IT’S OURS. Don’t Make Users Be the Judge
  • 16. 1616 •  Prepare, Detect, Analyze, Contain, Eradicate, Recover, and Learn. •  Deter attackers and make it more difficult for them to produce a convincing attack. Limit their options. •  Detect successful attacks immediately. •  Eradicate attackers’ network presence and respond to the damage they caused. BROAD STROKES Technical Controls
  • 18. 1818 •  Email servers allow email spoofing by default. •  Spoofing gives social engineering emails automatic credibility. •  Defenses exist to prevent spoofing but very few domains actually use them. GAPING WOUND IN INTERNET SECURITY Email Spoofing
  • 19. 1919 •  Which servers can send from this domain? •  DNS TXT record • dig txt $DOMAIN •  List of IP addresses, domains, and references •  ?all, ~all, and -all EMAIL PROTECTIONS Sender Policy Framework (SPF)
  • 21. 2121
  • 22. 2222 •  Automatic digital signatures •  Public keys stored as DNS TXT records • dig txt $SELECTOR._domainkey.$DOMAIN •  Selector and signature transmitted with email EMAIL PROTECTIONS DomainKeys Identified Mail (DKIM)
  • 24. 2424
  • 25. 2525 •  Domain-based Message Authentication, Reporting, and Conformance •  Defines what to do if mail fails SPF or DKIM checks •  Send an email with details •  Make an HTTP request with details •  Mark the email as spam •  DNS TXT record •  dig txt _dmarc.$DOMAIN EMAIL PROTECTIONS DMARC
  • 27. 2727 •  Scanned top 1,000,000 domains for SPF and DMARC •  Domains with SPF records: 40% •  Domains with DMARC records: 0.74% BY THE NUMBERS Analysis
  • 28. 2828 THE SKY IS ON FIRE The Core Problem Mail Servers don’t respect SPF or DKIM alone.
  • 29. 2929 THE SKY IS ON FIRE DOMAINS THAT ARE VULNERABLE TO EMAIL SPOOFING 99.87% The Core Problem •  DMARC policy of reject or quarantine needed to block emails •  Only 1,731 out of 1,000,000 domains are protected.
  • 30. 3030 HOW DO THE TOP DOMAINS COMPARE? Analysis Results
  • 31. 3131 HOW DO THE TOP DOMAINS COMPARE? Analysis Results
  • 32. 3232 Email Providers FROM WHOM CAN I SPOOF? What’s Vulnerable?
  • 33. 3333 Financial Institutions FROM WHOM CAN I SPOOF? What’s Vulnerable?
  • 34. 3434 Insurance FROM WHOM CAN I SPOOF? What’s Vulnerable?
  • 35. 3535 Government FROM WHOM CAN I SPOOF? What’s Vulnerable?
  • 36. 3636 Government FROM WHOM CAN I SPOOF? What’s Vulnerable?
  • 37. 3737 Government FROM WHOM CAN I SPOOF? What’s Vulnerable?
  • 38. 3838 Government FROM WHOM CAN I SPOOF? What’s Vulnerable?
  • 40. 4040 IT’S NOT ALL TERRIBLE What’s Vulnerable Of the 84 organizations with the most phishing sites, 40% are protected from email spoofing.
  • 41. 4141 •  Implement SPF, DKIM, and DMARC for your domain if possible. •  Configure your email server to respect SPF despite DMARC if possible. •  http://www.openspf.org/Implementations •  Exchange: http://www.gfi.com/products-and-solutions/email-and- messaging-solutions/gfi-mailessentials/specifications HOW TO PROTECT YOURSELF Solutions
  • 44. 4444 •  Attackers will register domains similar to your company’s domain to host phishing websites. •  Typosquatting •  TLD squatting •  Register primary TLDs for your domain to protect customers. •  Add all typos to internal DNS server to protect employees. •  URLCrazy: tool to generate a list of domain typos •  Consider blocking mail from these domains as well BY THE NUMBERS Similar Domains
  • 46. 4646 Client Transfer Prohibited •  Prevents attackers from transferring domain in same registrar •  Usually default Server Transfer Prohibited •  REGISTRAR LOCK status •  Prevents attackers from transferring domain to a different registrar •  Sometimes not default MALICIOUS DOMAIN TRANSFER Domain Stealing
  • 49. 4949 Java Applet Attack •  Still in use because it doesn’t need an exploit Block the Java User Agent •  Very few legitimate applications use Java Applets. •  Block the Java User Agent outbound to prevent Java Applet Attacks. •  Whitelist specific endpoints if absolutely necessary. WHY EVEN ALLOW THIS? Java User Agent
  • 50. 5050 Regularly block all domains with an authenticated splash page. •  First person can unblock it if it’s legitimate. •  Potentially whitelist company domains. Block automated Command and Control. Block watering hole attacks. CROWDSOURCED AUTOMATED DEFENSE Authenticated Splash Page
  • 52. 5252 •  Protects the computer if the browser gets compromised •  Limits the amount of damage a browser-based attack can do •  Effectively removes the browser from attack surface PROTECT YOURSELF FROM EVENTUALITY Sandboxing
  • 53. 5353 Reduce the browser’s attack surface. •  NoScript – prevent JS injection •  AdBlock – prevent malicious advertisements •  FlashBlock – prevent malicious flash documents •  Web of Trust – make it easier to spot phishing sites •  HTTPS Everywhere – force HTTPS when possible SOME OF OUR FAVORITES Browser Extensions
  • 55. 5555 Implement 2FA for the VPN. •  Credentials are easier to compromise than computers. •  Don’t let credentials give access to your internal network. Duo Security’s system is easier for users than traditional 2FA. BECAUSE CREDENTIALS ARE EASY TO STEAL Multi Factor Authentication
  • 56. DETECTION KNOW WHAT’S GOING ON IN YOUR NETWORK
  • 57. 5757 Know what’s going on in your network. IN A NUTSHELL Detection
  • 58. 5858 Even with all the previously mentioned controls, an employee may still get compromised. Learn that an attack is going on quickly, and act immediately to contain and eradicate it. IN A NUTSHELL Detection
  • 59. 5959 Alert system, not a prevention system •  Train users to report suspicious communications to security officers. •  Track reported emails instead of clicked links to measure campaign effectiveness. Make reporting a positive experience. •  Reward users that report awareness training emails. •  Ensure the reporting system is clearly defined, simple, and easy to use. WHAT IT’S ACTUALLY GOOD FOR User Awareness Training
  • 60. 6060 Purposefully attractive targets •  Purposefully vulnerable high-value servers with dummy data •  Purposefully insecure domain admin accounts with no real power Alert if someone starts using them •  Immediately start forensics and eradication. IT’S A TRAP Canaries and Honeypots
  • 61. 6161 Monitoring Systems •  Absolutely necessary for tracking an attack path •  Need to know an attack is happening first •  Start with anything outbound Intrusion Detection Systems •  Helpful for detecting obvious attackers or ones that correspond to known attack patterns •  May not necessarily detect covert or subtle attackers LEARN WHAT THEY DID AND WHAT THEY’RE DOING Monitoring and IDS
  • 62. 6262 What happened during the attack? •  Identify the phishing site. •  Identify C2 servers and channels. •  Identify campaign’s targets. •  Identify the campaign’s purpose. Outbound Proxy Logs LEARN WHAT THEY DID AND WHAT THEY’RE DOING Forensics
  • 64. 6464 •  Block the IP and domain of phishing sites and C2 servers. •  Drop emails coming from attacker’s domains, email addresses, and mail servers. •  Alert users about the social engineering campaign. •  This won’t stop the attack, but it’ll buy some time while the attacker pivots to different infrastructure. BUY SOME TIME TO BREATHE Burn the Current Campaign
  • 65. 6565 Force password resets. •  Users that gave up credentials •  Users with compromised computers •  Anyone with access to compromised computers •  Domain Admins Reimage compromised machines. •  Don’t try to outsmart the malware. •  Reimage and restore from backup. SCORCHED EARTH POLICY Respond to the Attack
  • 67. 6767 Sites •  social-engineer.org •  openspf.net/Tools •  dkim.org •  dmarc.org •  sandboxie.com •  duosecurity.com Presentations •  Attacker Ghost Stories Rob Fuller PLACES TO GO TO KNOW MORE Further Information
  • 68. 6868 PLACES TO GO TO KNOW MORE Further Information Documents •  SANS: Incident Handler’s Handbook: http://www.sans.org/reading-room/ whitepapers/incident/incident-handlers-handbook-33901 Books •  Social Engineering: The Art of Human Hacking Christopher Hadnagy •  Social Engineering Penetration Testing Gavin Watson, Andrew Mason, Richard Ackroyd •  Influence: The Psychology of Persuasion Robert B. Cialdini
  • 69. Q&A ANY QUESTIONS YOU WANT TO ASK?