SlideShare a Scribd company logo
Hacking vs. Cyber




Hacking is a single battle, Cyber attack is part of warfare

Iftach Ian Amit | Director of Services, IOActive inc.
About
Hacking
Hacking
Hacking
• How it looks like in the industry:
   – Vulnerability Assessments
   – Penetration Testing
   – Code Reviews

   – Other marketing terminology (that may involve the term “cyber” by
     mistake)
Hacking
• Features:
   – Usually a single target
   – Surface of attack – shallow (opportunistic)
   – Tools/Techniques: common, or simple development effort


• Motivation:
   – Financial
   – Political
   – Challenge


• Defenses:
   – Anti-Virus, Firewalls, WAF, IDS, IPS, etc…
   – Really ???
Cyber Attack
Warfare
Cyber Attack
Warfare
• So… how does your “cyber” work out so far?
• Confused yet?

• Good.
Warfare
This isn’t about computers anymore!




Hint – it never was.
Cyber Warfare
• As the name suggests – it’s part of a bigger picture. Warfare.

• Warfare is never fought in a single domain (unless you want to lose…)



•   Physical
•   Social
•   Intelligence
•   Electronic

         These are the domains that cyberwar is engaged in
Hack into the server farm?




Or just take the server (hack into the server
room…)
Bypass the firewall?




Nope. I’ll just walk into the network…

 Or let you install my backdoor for me:
Social
Social-Electronic convergence
Intelligence
Check out
Guy’s talk
Right after this!
Final convergence – Electronic/Digital
• Here’s your “cyber”…


The new language: Campaign

• Profiling, intel gathering, reconnaissance
• Vulnerability research (not just software!)
• Exploitation
• Establishing control, opening comm channels,   In ALL domains!
  broadening foothold
• Targeting assets
• Exfiltration
Cyber Warfare
• Features:
   – Multiple strategic targets
   – Surface of attack – full
   – Tools/Techniques: all, including all domains, and often with custom built tools


• Motivation:
   – Financial
   – Political


• Defenses:
   – Strategic Defense in Depth (not vendor products)
   – Awareness and Education (the human factor)
   – Coverage of all domains at the defense strategy
Practicing “cyber” – Red Team Testing

                 Pre-
                             Intelligence     Threat
Homework     engagement
                              Gathering      Modeling
             Interactions



             Vulnerability                     Post
Hands-on       Analysis
                             Exploitation
                                            Exploitation




Writing       Reporting
Hacking vs. Cyber




                    China always had it right 
QUESTIONS?
Iftach Ian Amit
@iiamit
iamit@ioactive.com

More Related Content

What's hot

The difference between a duck
The difference between a duckThe difference between a duck
The difference between a duck
SensePost
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Tyler Shields
 
Digital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsDigital Lifestyle Trends and Threats
Digital Lifestyle Trends and Threats
Andrew Wong
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
Richard Stiennon
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
anandraje
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
Lexume1
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
NCC Group
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
William Gregorian
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
Raghunath G
 
Assessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlAssessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan Riehl
Precisely
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
Marin Ivezic
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Cyber Agency
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
arun alfie
 
Big Data Analytics & Cybersecurity - How Industry and Government are Using Te...
Big Data Analytics & Cybersecurity - How Industry and Government are Using Te...Big Data Analytics & Cybersecurity - How Industry and Government are Using Te...
Big Data Analytics & Cybersecurity - How Industry and Government are Using Te...
Career Communications Group
 
Fabio Ghioni
Fabio GhioniFabio Ghioni
Fabio Ghioni
Fabio Ghioni
 

What's hot (16)

The difference between a duck
The difference between a duckThe difference between a duck
The difference between a duck
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
 
Digital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsDigital Lifestyle Trends and Threats
Digital Lifestyle Trends and Threats
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Assessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlAssessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan Riehl
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Big Data Analytics & Cybersecurity - How Industry and Government are Using Te...
Big Data Analytics & Cybersecurity - How Industry and Government are Using Te...Big Data Analytics & Cybersecurity - How Industry and Government are Using Te...
Big Data Analytics & Cybersecurity - How Industry and Government are Using Te...
 
Fabio Ghioni
Fabio GhioniFabio Ghioni
Fabio Ghioni
 

Similar to Hacking cyber-iamit

Sexy defense
Sexy defenseSexy defense
Sexy defense
Iftach Ian Amit
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
Antonio Fontes
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
Indranil Banerjee
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
Christiaan Beek
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
 
Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit
Barcamp  2009-Ninjitsu Attack Hack For Fun and ProfitBarcamp  2009-Ninjitsu Attack Hack For Fun and Profit
Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit
Prathan Phongthiproek
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Tasnim Alasali
 
APT Webinar
APT WebinarAPT Webinar
APT Webinar
Joseph Schorr
 
Ethical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaEthical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth Vasavada
Krutarth Vasavada
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
Invincea, Inc.
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
ssuserfb92ae
 
Doten apt presentaiton (2)
Doten apt presentaiton (2)Doten apt presentaiton (2)
Doten apt presentaiton (2)
Jeff Green
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
Shane Rice
 
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
Tech ThrowDown:Invincea FreeSpace vs EMET 5.0Tech ThrowDown:Invincea FreeSpace vs EMET 5.0
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
Invincea, Inc.
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
DefconRussia
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
Core Security
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
sathiyamaha
 
Collaborated cyber defense in pandemic times
Collaborated cyber defense in pandemic times Collaborated cyber defense in pandemic times
Collaborated cyber defense in pandemic times
Denise Bailey
 

Similar to Hacking cyber-iamit (20)

Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit
Barcamp  2009-Ninjitsu Attack Hack For Fun and ProfitBarcamp  2009-Ninjitsu Attack Hack For Fun and Profit
Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
APT Webinar
APT WebinarAPT Webinar
APT Webinar
 
Ethical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaEthical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth Vasavada
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
 
Doten apt presentaiton (2)
Doten apt presentaiton (2)Doten apt presentaiton (2)
Doten apt presentaiton (2)
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
Tech ThrowDown:Invincea FreeSpace vs EMET 5.0Tech ThrowDown:Invincea FreeSpace vs EMET 5.0
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Collaborated cyber defense in pandemic times
Collaborated cyber defense in pandemic times Collaborated cyber defense in pandemic times
Collaborated cyber defense in pandemic times
 

More from Iftach Ian Amit

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
Iftach Ian Amit
 
Devsecops at Cimpress
Devsecops at CimpressDevsecops at Cimpress
Devsecops at Cimpress
Iftach Ian Amit
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing Keynote
Iftach Ian Amit
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
Iftach Ian Amit
 
ISTS12 Keynote
ISTS12 KeynoteISTS12 Keynote
ISTS12 Keynote
Iftach Ian Amit
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
Iftach Ian Amit
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and Blue
Iftach Ian Amit
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?
Iftach Ian Amit
 
Armorizing applications
Armorizing applicationsArmorizing applications
Armorizing applications
Iftach Ian Amit
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?
Iftach Ian Amit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
Iftach Ian Amit
 
Bitcoin
BitcoinBitcoin
Cyber state
Cyber stateCyber state
Cyber state
Iftach Ian Amit
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done it
Iftach Ian Amit
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python Bytecode
Iftach Ian Amit
 
Exploiting Second life
Exploiting Second lifeExploiting Second life
Exploiting Second life
Iftach Ian Amit
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer Games
Iftach Ian Amit
 
Telecommunication basics dc9723
Telecommunication basics dc9723Telecommunication basics dc9723
Telecommunication basics dc9723Iftach Ian Amit
 
Stuxnet - the worm and you
Stuxnet - the worm and youStuxnet - the worm and you
Stuxnet - the worm and youIftach Ian Amit
 

More from Iftach Ian Amit (20)

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
 
Devsecops at Cimpress
Devsecops at CimpressDevsecops at Cimpress
Devsecops at Cimpress
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing Keynote
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
 
ISTS12 Keynote
ISTS12 KeynoteISTS12 Keynote
ISTS12 Keynote
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and Blue
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?
 
Armorizing applications
Armorizing applicationsArmorizing applications
Armorizing applications
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Cyber state
Cyber stateCyber state
Cyber state
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done it
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python Bytecode
 
Exploiting Second life
Exploiting Second lifeExploiting Second life
Exploiting Second life
 
Dtmf phreaking
Dtmf phreakingDtmf phreaking
Dtmf phreaking
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer Games
 
Telecommunication basics dc9723
Telecommunication basics dc9723Telecommunication basics dc9723
Telecommunication basics dc9723
 
Stuxnet - the worm and you
Stuxnet - the worm and youStuxnet - the worm and you
Stuxnet - the worm and you
 

Hacking cyber-iamit

  • 1. Hacking vs. Cyber Hacking is a single battle, Cyber attack is part of warfare Iftach Ian Amit | Director of Services, IOActive inc.
  • 5. Hacking • How it looks like in the industry: – Vulnerability Assessments – Penetration Testing – Code Reviews – Other marketing terminology (that may involve the term “cyber” by mistake)
  • 6. Hacking • Features: – Usually a single target – Surface of attack – shallow (opportunistic) – Tools/Techniques: common, or simple development effort • Motivation: – Financial – Political – Challenge • Defenses: – Anti-Virus, Firewalls, WAF, IDS, IPS, etc… – Really ???
  • 10.
  • 11. Warfare • So… how does your “cyber” work out so far? • Confused yet? • Good.
  • 13. This isn’t about computers anymore! Hint – it never was.
  • 14. Cyber Warfare • As the name suggests – it’s part of a bigger picture. Warfare. • Warfare is never fought in a single domain (unless you want to lose…) • Physical • Social • Intelligence • Electronic These are the domains that cyberwar is engaged in
  • 15. Hack into the server farm? Or just take the server (hack into the server room…)
  • 16. Bypass the firewall? Nope. I’ll just walk into the network… Or let you install my backdoor for me:
  • 18.
  • 22. Final convergence – Electronic/Digital • Here’s your “cyber”… The new language: Campaign • Profiling, intel gathering, reconnaissance • Vulnerability research (not just software!) • Exploitation • Establishing control, opening comm channels, In ALL domains! broadening foothold • Targeting assets • Exfiltration
  • 23. Cyber Warfare • Features: – Multiple strategic targets – Surface of attack – full – Tools/Techniques: all, including all domains, and often with custom built tools • Motivation: – Financial – Political • Defenses: – Strategic Defense in Depth (not vendor products) – Awareness and Education (the human factor) – Coverage of all domains at the defense strategy
  • 24. Practicing “cyber” – Red Team Testing Pre- Intelligence Threat Homework engagement Gathering Modeling Interactions Vulnerability Post Hands-on Analysis Exploitation Exploitation Writing Reporting
  • 25. Hacking vs. Cyber China always had it right 

Editor's Notes

  1. Government Communications Headquarters - UK