Hacking vs. Cyber




Hacking is a single battle, Cyber attack is part of warfare

Iftach Ian Amit | Director of Services, IOActive inc.
About
Hacking
Hacking
Hacking
• How it looks like in the industry:
   – Vulnerability Assessments
   – Penetration Testing
   – Code Reviews

   – Other marketing terminology (that may involve the term “cyber” by
     mistake)
Hacking
• Features:
   – Usually a single target
   – Surface of attack – shallow (opportunistic)
   – Tools/Techniques: common, or simple development effort


• Motivation:
   – Financial
   – Political
   – Challenge


• Defenses:
   – Anti-Virus, Firewalls, WAF, IDS, IPS, etc…
   – Really ???
Cyber Attack
Warfare
Cyber Attack
Warfare
• So… how does your “cyber” work out so far?
• Confused yet?

• Good.
Warfare
This isn’t about computers anymore!




Hint – it never was.
Cyber Warfare
• As the name suggests – it’s part of a bigger picture. Warfare.

• Warfare is never fought in a single domain (unless you want to lose…)



•   Physical
•   Social
•   Intelligence
•   Electronic

         These are the domains that cyberwar is engaged in
Hack into the server farm?




Or just take the server (hack into the server
room…)
Bypass the firewall?




Nope. I’ll just walk into the network…

 Or let you install my backdoor for me:
Social
Social-Electronic convergence
Intelligence
Check out
Guy’s talk
Right after this!
Final convergence – Electronic/Digital
• Here’s your “cyber”…


The new language: Campaign

• Profiling, intel gathering, reconnaissance
• Vulnerability research (not just software!)
• Exploitation
• Establishing control, opening comm channels,   In ALL domains!
  broadening foothold
• Targeting assets
• Exfiltration
Cyber Warfare
• Features:
   – Multiple strategic targets
   – Surface of attack – full
   – Tools/Techniques: all, including all domains, and often with custom built tools


• Motivation:
   – Financial
   – Political


• Defenses:
   – Strategic Defense in Depth (not vendor products)
   – Awareness and Education (the human factor)
   – Coverage of all domains at the defense strategy
Practicing “cyber” – Red Team Testing

                 Pre-
                             Intelligence     Threat
Homework     engagement
                              Gathering      Modeling
             Interactions



             Vulnerability                     Post
Hands-on       Analysis
                             Exploitation
                                            Exploitation




Writing       Reporting
Hacking vs. Cyber




                    China always had it right 
QUESTIONS?
Iftach Ian Amit
@iiamit
iamit@ioactive.com

Hacking cyber-iamit

  • 1.
    Hacking vs. Cyber Hackingis a single battle, Cyber attack is part of warfare Iftach Ian Amit | Director of Services, IOActive inc.
  • 2.
  • 3.
  • 4.
  • 5.
    Hacking • How itlooks like in the industry: – Vulnerability Assessments – Penetration Testing – Code Reviews – Other marketing terminology (that may involve the term “cyber” by mistake)
  • 6.
    Hacking • Features: – Usually a single target – Surface of attack – shallow (opportunistic) – Tools/Techniques: common, or simple development effort • Motivation: – Financial – Political – Challenge • Defenses: – Anti-Virus, Firewalls, WAF, IDS, IPS, etc… – Really ???
  • 7.
  • 8.
  • 9.
  • 11.
    Warfare • So… howdoes your “cyber” work out so far? • Confused yet? • Good.
  • 12.
  • 13.
    This isn’t aboutcomputers anymore! Hint – it never was.
  • 14.
    Cyber Warfare • Asthe name suggests – it’s part of a bigger picture. Warfare. • Warfare is never fought in a single domain (unless you want to lose…) • Physical • Social • Intelligence • Electronic These are the domains that cyberwar is engaged in
  • 15.
    Hack into theserver farm? Or just take the server (hack into the server room…)
  • 16.
    Bypass the firewall? Nope.I’ll just walk into the network… Or let you install my backdoor for me:
  • 17.
  • 19.
  • 20.
  • 21.
  • 22.
    Final convergence –Electronic/Digital • Here’s your “cyber”… The new language: Campaign • Profiling, intel gathering, reconnaissance • Vulnerability research (not just software!) • Exploitation • Establishing control, opening comm channels, In ALL domains! broadening foothold • Targeting assets • Exfiltration
  • 23.
    Cyber Warfare • Features: – Multiple strategic targets – Surface of attack – full – Tools/Techniques: all, including all domains, and often with custom built tools • Motivation: – Financial – Political • Defenses: – Strategic Defense in Depth (not vendor products) – Awareness and Education (the human factor) – Coverage of all domains at the defense strategy
  • 24.
    Practicing “cyber” –Red Team Testing Pre- Intelligence Threat Homework engagement Gathering Modeling Interactions Vulnerability Post Hands-on Analysis Exploitation Exploitation Writing Reporting
  • 25.
    Hacking vs. Cyber China always had it right 
  • 26.

Editor's Notes

  • #11 Government Communications Headquarters - UK