SlideShare a Scribd company logo
The Anatomy of an Attack:
Think Like a Criminal
About Your Presenters
Ken Smith
• Employment
• Senior Consultant, SecureState, LLC.
• Professor of Network Security, University of Mount Union
• Cyber Security, Curriculum Development, Notre Dame College
• Formerly of 5th Special Forces Group (Airborne)
• Education
• BS, Computer Info Systems, University of Dayton
• AA, Arabic Language and Culture, Defense Language Institute
• MA, Security Policy Studies, Notre Dame College
• Areas of Specialization
• Physical Security, Wireless Encryption, and Mobile Devices
Benjamin Brooks, CISSP
• Employment
• Consultant, SecureState, LLC.
• Equipment Architecture and Configuration Validator, US
Special Operations Command
• Leading Chief Petty Officer, US Navy Special Warfare, Tactical
Information Operations, SEAL Team-5
• Education
• BA, Political Science, University of Illinois
• Areas of Specialization
• Policy, IT Partnering, Wireless Technologies and Mobile
Devices
Agenda
• Basics Booster
• State of Affairs
• Oh, the Places They’ve
Breached!
• Threat Actors
• The Attacker’s Mind
• A Paradigm Shift
• Operation OatmealGhost
• Q&A
Basics Booster
Confidential Information
Information
Security
Confidentiality
AccessibilityIntegrity
State of Affairs
• Breaches continue in spite of budget increases
• Industry and size agnostic
• Attacks are increasing in frequency
• Variety of threat actors
• Not much in common at first glance
• Deeper analysis reveals shared mindsets
• Need for fundamental change in our approach to security
Regulations and Frameworks
Breached 2014
Breached 2014
0% 10% 20% 30% 40% 50% 60%
Other
Data Classification
Sensitive Data Management
Anti-Virus/Anti-Malware
Data Loss Prevention (DLP)
Virtual Private Network
Data Discovery
Firewalls
Forensic Tools
Security Governance
Identity & Access Management
Mobile Device Management
Web Application Firewalls
Encryption, Tokenization
Intrusion Detection & Prevention
Endpoint Security
Security Incident & Event Management (SIEM)
Technology Investments After The 2014 Breaches
34%
Breached 2015
Threat Actors
The Attacker’s Mind : Always Assume a Breach
The Attacker’s Mind
• Attack methods are unpredictable
• Tools and exploits released continuously
• New indicators of compromise
• Attack methodology is not!
• Independent of background
• Recognizable behavior
The Attacker’s Mind
Enumeration
• Users
• Services
• Port Scans
• Operating
Systems
• Vulnerabilities
Exploitation
• SQL Injection
• Leverage
Vulnerabilities
• Establish
Foothold
• Evasion
Techniques
• Human
Element
Privilege
Escalation
• Configuration
Files
• User Pivoting
• Backups
• Scripts
• GPO
Preferences
• Mimikatz
Post
Exploitation
• System
Pivoting
• Network
Pivoting
• Persistence
• Pillaging
• Destruction
• Exfiltration
Discovery
• OSINT
• DNS
• Whois
• Network
• Metadata
• Social Media
The Hacker’s Mind
A Paradigm Shift
A Paradigm Shift
• Compliance-driven security testing
• No social engineering
• Notify IT/Security teams of testing
• Small time windows
• Single lane assessments
• We’re on the same side
• Attackers don’t limit themselves
• Why should you?
A Paradigm Shift – One Phish, Two Phish
• Spam is not phishing
• Gone are the days of the Nigerian Prince
• Modern attacks
• Targeted
• Well-developed and researched
• Timely
• Can be a touchy subject
• People feel tricked and distrustful
• This is something to embrace (to an extent)
A Paradigm Shift – Red Phish, Blue Phish
• Verizon’s 2015 Annual Attack Vector Report
• 23% of recipients open phishing messages
• 11% open malicious attachments
• Median time to first click
• 22 seconds
• All it takes is one
A Paradigm Shift – Time and Scope
• Verizon report
• 37% breaches contained within hours
• 30% contained within several days
• Numbers are post-discovery
• Fireye 2012 report
• Average cyberespionage attack continued unchecked for 458 days before discovery
• Detection-deficit
• 8-16 hour penetration tests aren’t good enough
Operation OatmealGhost
Scenario
• Target Profile
• Multinational
• Decentralized
• Trophies
• Intellectual Property
• Merger/Acquisition Info
Send in the Team!
Attack Vectors
Attack Vectors
Attack Vectors
Timeline of Events
26
N - 14
•Recon Begins
•Targets Identified
•Hardware Ordered
•Sites Collected
•Metadata Collection
N
•Brute Force Lotus Notes
N + 2
•Shipped Payloads
N + 4
•Lotus Notes Recon
TROPHY
•USB Payload
Connects Back To C2
N + 4
(+ 5HR)
•Multiple Domain Administrators
TROPHY
*** Unrestricted ***
Pivoting
Highlight Reel
Access To Lotus Notes
Permitted Monitoring &
Countermeasures
Global Penetration
Regained Access After Blocking
Gained Access To Chat Server – Began Chatting As Admins
Listened to & Recorded
Conference Calls
After Action Review (AAR)
• What went right?
• Extended time period
• Inclusion of social engineering as a vector
• Reactions were legitimate
• What went wrong?
• Defenses had been focused on traditional
barriers
• Reacting to events over email
• Admin staff act hastily without understanding
the situation
After Action Review (AAR)
What Should Have Been Done Differently?
• Think Like an Attacker Before/During/After
• Where are our weaknesses?
• What is an attacker likely to do next?
• Social Media – Don’t be specific!
• War gaming
• Attack Your Own Organization
• Seek Out Weakness Throughout The Organization
• Remove Limitations on assessments
• A penetration test can be more
• Think beyond compliance
• Include Social Engineering
Become Proactive NOT Reactive!
After Action Review (AAR)
Top Three Things You Can Do
• Educate
• Educate
• Educate!
War Room Technical Blog
Confidential Information
https://warroom.securestate.com
@SS_WarRoom
Confidential Information
Q&A
@p4tchw0rk
@technlogian
A Paradigm Shift - Phishing
https://github.com/securestate/king-phisher

More Related Content

What's hot

DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
Kevin Fisher
 
Using fault injection attacks for digital forensics
Using fault injection attacks for digital forensics Using fault injection attacks for digital forensics
Using fault injection attacks for digital forensics
Justin Black
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
Sam Bowne
 
Enterprise Forensics 101
Enterprise Forensics 101Enterprise Forensics 101
Enterprise Forensics 101
Mona Arkhipova
 
Ch1 cse
Ch1 cseCh1 cse
Ch1 cse
bhaskard8
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
Sam Bowne
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare Infrastructure
Positive Hack Days
 
Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities
Joel Aleburu
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Sam Bowne
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
Hykeos
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
Aravind R
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4
FRSecure
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
Sam Bowne
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Sam Bowne
 
Application of threat intelligence in security operation
Application of threat intelligence in security operationApplication of threat intelligence in security operation
Application of threat intelligence in security operation
Jeremy Li
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Carolyn Slade, MS-HIM
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
Anpumathews
 

What's hot (20)

DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
 
Using fault injection attacks for digital forensics
Using fault injection attacks for digital forensics Using fault injection attacks for digital forensics
Using fault injection attacks for digital forensics
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
 
Enterprise Forensics 101
Enterprise Forensics 101Enterprise Forensics 101
Enterprise Forensics 101
 
Ch1 cse
Ch1 cseCh1 cse
Ch1 cse
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare Infrastructure
 
Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
 
Application of threat intelligence in security operation
Application of threat intelligence in security operationApplication of threat intelligence in security operation
Application of threat intelligence in security operation
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 

Viewers also liked

Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 10 ΠΡΩΤΕΣ ΠΡΟΣΠΑΘΕΙΕΣ ΤΩΝ ΕΠΑΝΑΣΤΑΤΗΜΕΝΩΝ ΕΛΛΗΝΩΝ ΓΙΑ ΣΥΓΚ...
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 10 ΠΡΩΤΕΣ ΠΡΟΣΠΑΘΕΙΕΣ ΤΩΝ ΕΠΑΝΑΣΤΑΤΗΜΕΝΩΝ ΕΛΛΗΝΩΝ ΓΙΑ ΣΥΓΚ...Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 10 ΠΡΩΤΕΣ ΠΡΟΣΠΑΘΕΙΕΣ ΤΩΝ ΕΠΑΝΑΣΤΑΤΗΜΕΝΩΝ ΕΛΛΗΝΩΝ ΓΙΑ ΣΥΓΚ...
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 10 ΠΡΩΤΕΣ ΠΡΟΣΠΑΘΕΙΕΣ ΤΩΝ ΕΠΑΝΑΣΤΑΤΗΜΕΝΩΝ ΕΛΛΗΝΩΝ ΓΙΑ ΣΥΓΚ...
Manolis Savorianakis
 
Mattino su bagnoli_ombre_sulla_vendita_dei_suoli_-lebro-
Mattino su bagnoli_ombre_sulla_vendita_dei_suoli_-lebro-Mattino su bagnoli_ombre_sulla_vendita_dei_suoli_-lebro-
Mattino su bagnoli_ombre_sulla_vendita_dei_suoli_-lebro-davidlebro
 
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 3 ΑΜΕΡΙΚΑΝΙΚΗ ΕΠΑΝΑΣΤΑΣΗ
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 3 ΑΜΕΡΙΚΑΝΙΚΗ ΕΠΑΝΑΣΤΑΣΗΓ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 3 ΑΜΕΡΙΚΑΝΙΚΗ ΕΠΑΝΑΣΤΑΣΗ
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 3 ΑΜΕΡΙΚΑΝΙΚΗ ΕΠΑΝΑΣΤΑΣΗ
Manolis Savorianakis
 
Nombre1
Nombre1Nombre1
Mercer Capital's Value Focus: Energy Industry | 3Q 2015 | Segment: Explorati...
Mercer Capital's Value Focus: Energy Industry | 3Q 2015 | Segment:  Explorati...Mercer Capital's Value Focus: Energy Industry | 3Q 2015 | Segment:  Explorati...
Mercer Capital's Value Focus: Energy Industry | 3Q 2015 | Segment: Explorati...
Mercer Capital
 
Ficha Técnica - Volcan Compañía Minera.
Ficha Técnica - Volcan Compañía Minera.Ficha Técnica - Volcan Compañía Minera.
Ficha Técnica - Volcan Compañía Minera.
Grupo Coril
 
Kris Van Doren, EMEA Sustainability Manager at Alcatel-Lucent - Carbon Reduct...
Kris Van Doren, EMEA Sustainability Manager at Alcatel-Lucent - Carbon Reduct...Kris Van Doren, EMEA Sustainability Manager at Alcatel-Lucent - Carbon Reduct...
Kris Van Doren, EMEA Sustainability Manager at Alcatel-Lucent - Carbon Reduct...
Global Business Events
 
Geometria Analitica con GeoGebra(2)
Geometria Analitica con GeoGebra(2)Geometria Analitica con GeoGebra(2)
Geometria Analitica con GeoGebra(2)
Jose Oronte Perez
 
Diatrofi12
Diatrofi12Diatrofi12
Diatrofi12
tasspek
 
Material de laboratorio 26-10
Material de laboratorio  26-10Material de laboratorio  26-10
Material de laboratorio 26-10
Pamela LLerena
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attack
spoofyroot
 
Ddos dos
Ddos dosDdos dos
Ddos dos
arichoana
 
Top 10 Web Hacks 2012
Top 10 Web Hacks 2012Top 10 Web Hacks 2012
Top 10 Web Hacks 2012
Matt Johansen
 
OWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP HackathonOWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP Hackathon
Simon Bennetts
 
Alert logic anatomy owasp infographic
Alert logic anatomy owasp infographicAlert logic anatomy owasp infographic
Alert logic anatomy owasp infographic
CMR WORLD TECH
 
Web Application Vulnerabilities
Web Application VulnerabilitiesWeb Application Vulnerabilities
Web Application Vulnerabilities
Preetish Panda
 
Web attacks
Web attacksWeb attacks
Web attacks
husnara mohammad
 

Viewers also liked (20)

Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 10 ΠΡΩΤΕΣ ΠΡΟΣΠΑΘΕΙΕΣ ΤΩΝ ΕΠΑΝΑΣΤΑΤΗΜΕΝΩΝ ΕΛΛΗΝΩΝ ΓΙΑ ΣΥΓΚ...
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 10 ΠΡΩΤΕΣ ΠΡΟΣΠΑΘΕΙΕΣ ΤΩΝ ΕΠΑΝΑΣΤΑΤΗΜΕΝΩΝ ΕΛΛΗΝΩΝ ΓΙΑ ΣΥΓΚ...Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 10 ΠΡΩΤΕΣ ΠΡΟΣΠΑΘΕΙΕΣ ΤΩΝ ΕΠΑΝΑΣΤΑΤΗΜΕΝΩΝ ΕΛΛΗΝΩΝ ΓΙΑ ΣΥΓΚ...
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 10 ΠΡΩΤΕΣ ΠΡΟΣΠΑΘΕΙΕΣ ΤΩΝ ΕΠΑΝΑΣΤΑΤΗΜΕΝΩΝ ΕΛΛΗΝΩΝ ΓΙΑ ΣΥΓΚ...
 
Mattino su bagnoli_ombre_sulla_vendita_dei_suoli_-lebro-
Mattino su bagnoli_ombre_sulla_vendita_dei_suoli_-lebro-Mattino su bagnoli_ombre_sulla_vendita_dei_suoli_-lebro-
Mattino su bagnoli_ombre_sulla_vendita_dei_suoli_-lebro-
 
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 3 ΑΜΕΡΙΚΑΝΙΚΗ ΕΠΑΝΑΣΤΑΣΗ
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 3 ΑΜΕΡΙΚΑΝΙΚΗ ΕΠΑΝΑΣΤΑΣΗΓ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 3 ΑΜΕΡΙΚΑΝΙΚΗ ΕΠΑΝΑΣΤΑΣΗ
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 3 ΑΜΕΡΙΚΑΝΙΚΗ ΕΠΑΝΑΣΤΑΣΗ
 
Nombre1
Nombre1Nombre1
Nombre1
 
Recommendation letter Tech Surpt
Recommendation letter Tech SurptRecommendation letter Tech Surpt
Recommendation letter Tech Surpt
 
Mercer Capital's Value Focus: Energy Industry | 3Q 2015 | Segment: Explorati...
Mercer Capital's Value Focus: Energy Industry | 3Q 2015 | Segment:  Explorati...Mercer Capital's Value Focus: Energy Industry | 3Q 2015 | Segment:  Explorati...
Mercer Capital's Value Focus: Energy Industry | 3Q 2015 | Segment: Explorati...
 
WH.SETUP
WH.SETUPWH.SETUP
WH.SETUP
 
Ficha Técnica - Volcan Compañía Minera.
Ficha Técnica - Volcan Compañía Minera.Ficha Técnica - Volcan Compañía Minera.
Ficha Técnica - Volcan Compañía Minera.
 
Kris Van Doren, EMEA Sustainability Manager at Alcatel-Lucent - Carbon Reduct...
Kris Van Doren, EMEA Sustainability Manager at Alcatel-Lucent - Carbon Reduct...Kris Van Doren, EMEA Sustainability Manager at Alcatel-Lucent - Carbon Reduct...
Kris Van Doren, EMEA Sustainability Manager at Alcatel-Lucent - Carbon Reduct...
 
Geometria Analitica con GeoGebra(2)
Geometria Analitica con GeoGebra(2)Geometria Analitica con GeoGebra(2)
Geometria Analitica con GeoGebra(2)
 
2 1
2 12 1
2 1
 
Diatrofi12
Diatrofi12Diatrofi12
Diatrofi12
 
Material de laboratorio 26-10
Material de laboratorio  26-10Material de laboratorio  26-10
Material de laboratorio 26-10
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attack
 
Ddos dos
Ddos dosDdos dos
Ddos dos
 
Top 10 Web Hacks 2012
Top 10 Web Hacks 2012Top 10 Web Hacks 2012
Top 10 Web Hacks 2012
 
OWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP HackathonOWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP Hackathon
 
Alert logic anatomy owasp infographic
Alert logic anatomy owasp infographicAlert logic anatomy owasp infographic
Alert logic anatomy owasp infographic
 
Web Application Vulnerabilities
Web Application VulnerabilitiesWeb Application Vulnerabilities
Web Application Vulnerabilities
 
Web attacks
Web attacksWeb attacks
Web attacks
 

Similar to IMA - Anatomy of an Attack - Presentation- 28Aug15

CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
Sam Bowne
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
Sam Bowne
 
Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...
Jason Broz, CIPP/US
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
Precisely
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptx
FarzanMansoor1
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
newbie2019
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
IGN MANTRA
 
What is Ethical Hacking?
What is Ethical Hacking? What is Ethical Hacking?
What is Ethical Hacking?
Dignitas Digital Pvt. Ltd.
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
Sam Bowne
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Falgun Rathod
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
IGN MANTRA
 
Protecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetProtecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and Interset
Perforce
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
JoAnna Cheshire
 
TTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil RefineriesTTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil Refineries
Dragos, Inc.
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
Sam Bowne
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
ShivamSharma909
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration TestingNetSPI
 

Similar to IMA - Anatomy of an Attack - Presentation- 28Aug15 (20)

CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptx
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
What is Ethical Hacking?
What is Ethical Hacking? What is Ethical Hacking?
What is Ethical Hacking?
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Protecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetProtecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and Interset
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
TTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil RefineriesTTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil Refineries
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration Testing
 

IMA - Anatomy of an Attack - Presentation- 28Aug15

  • 1. The Anatomy of an Attack: Think Like a Criminal
  • 2. About Your Presenters Ken Smith • Employment • Senior Consultant, SecureState, LLC. • Professor of Network Security, University of Mount Union • Cyber Security, Curriculum Development, Notre Dame College • Formerly of 5th Special Forces Group (Airborne) • Education • BS, Computer Info Systems, University of Dayton • AA, Arabic Language and Culture, Defense Language Institute • MA, Security Policy Studies, Notre Dame College • Areas of Specialization • Physical Security, Wireless Encryption, and Mobile Devices Benjamin Brooks, CISSP • Employment • Consultant, SecureState, LLC. • Equipment Architecture and Configuration Validator, US Special Operations Command • Leading Chief Petty Officer, US Navy Special Warfare, Tactical Information Operations, SEAL Team-5 • Education • BA, Political Science, University of Illinois • Areas of Specialization • Policy, IT Partnering, Wireless Technologies and Mobile Devices
  • 3. Agenda • Basics Booster • State of Affairs • Oh, the Places They’ve Breached! • Threat Actors • The Attacker’s Mind • A Paradigm Shift • Operation OatmealGhost • Q&A
  • 5. State of Affairs • Breaches continue in spite of budget increases • Industry and size agnostic • Attacks are increasing in frequency • Variety of threat actors • Not much in common at first glance • Deeper analysis reveals shared mindsets • Need for fundamental change in our approach to security
  • 8. Breached 2014 0% 10% 20% 30% 40% 50% 60% Other Data Classification Sensitive Data Management Anti-Virus/Anti-Malware Data Loss Prevention (DLP) Virtual Private Network Data Discovery Firewalls Forensic Tools Security Governance Identity & Access Management Mobile Device Management Web Application Firewalls Encryption, Tokenization Intrusion Detection & Prevention Endpoint Security Security Incident & Event Management (SIEM) Technology Investments After The 2014 Breaches 34%
  • 11. The Attacker’s Mind : Always Assume a Breach
  • 12. The Attacker’s Mind • Attack methods are unpredictable • Tools and exploits released continuously • New indicators of compromise • Attack methodology is not! • Independent of background • Recognizable behavior
  • 13. The Attacker’s Mind Enumeration • Users • Services • Port Scans • Operating Systems • Vulnerabilities Exploitation • SQL Injection • Leverage Vulnerabilities • Establish Foothold • Evasion Techniques • Human Element Privilege Escalation • Configuration Files • User Pivoting • Backups • Scripts • GPO Preferences • Mimikatz Post Exploitation • System Pivoting • Network Pivoting • Persistence • Pillaging • Destruction • Exfiltration Discovery • OSINT • DNS • Whois • Network • Metadata • Social Media
  • 16. A Paradigm Shift • Compliance-driven security testing • No social engineering • Notify IT/Security teams of testing • Small time windows • Single lane assessments • We’re on the same side • Attackers don’t limit themselves • Why should you?
  • 17. A Paradigm Shift – One Phish, Two Phish • Spam is not phishing • Gone are the days of the Nigerian Prince • Modern attacks • Targeted • Well-developed and researched • Timely • Can be a touchy subject • People feel tricked and distrustful • This is something to embrace (to an extent)
  • 18. A Paradigm Shift – Red Phish, Blue Phish • Verizon’s 2015 Annual Attack Vector Report • 23% of recipients open phishing messages • 11% open malicious attachments • Median time to first click • 22 seconds • All it takes is one
  • 19. A Paradigm Shift – Time and Scope • Verizon report • 37% breaches contained within hours • 30% contained within several days • Numbers are post-discovery • Fireye 2012 report • Average cyberespionage attack continued unchecked for 458 days before discovery • Detection-deficit • 8-16 hour penetration tests aren’t good enough
  • 21. Scenario • Target Profile • Multinational • Decentralized • Trophies • Intellectual Property • Merger/Acquisition Info
  • 22. Send in the Team!
  • 26. Timeline of Events 26 N - 14 •Recon Begins •Targets Identified •Hardware Ordered •Sites Collected •Metadata Collection N •Brute Force Lotus Notes N + 2 •Shipped Payloads N + 4 •Lotus Notes Recon TROPHY •USB Payload Connects Back To C2 N + 4 (+ 5HR) •Multiple Domain Administrators TROPHY *** Unrestricted *** Pivoting
  • 27. Highlight Reel Access To Lotus Notes Permitted Monitoring & Countermeasures Global Penetration Regained Access After Blocking Gained Access To Chat Server – Began Chatting As Admins Listened to & Recorded Conference Calls
  • 28. After Action Review (AAR) • What went right? • Extended time period • Inclusion of social engineering as a vector • Reactions were legitimate • What went wrong? • Defenses had been focused on traditional barriers • Reacting to events over email • Admin staff act hastily without understanding the situation
  • 29. After Action Review (AAR) What Should Have Been Done Differently? • Think Like an Attacker Before/During/After • Where are our weaknesses? • What is an attacker likely to do next? • Social Media – Don’t be specific! • War gaming • Attack Your Own Organization • Seek Out Weakness Throughout The Organization • Remove Limitations on assessments • A penetration test can be more • Think beyond compliance • Include Social Engineering Become Proactive NOT Reactive!
  • 30. After Action Review (AAR) Top Three Things You Can Do • Educate • Educate • Educate!
  • 31. War Room Technical Blog Confidential Information https://warroom.securestate.com @SS_WarRoom
  • 33. A Paradigm Shift - Phishing https://github.com/securestate/king-phisher

Editor's Notes

  1. These are the topics that we will be covering, trying to keep it at a high level.
  2. Basics Booster Why can’t we have a 100% secure system? Because we deal with people, and people make mistakes CIA Triad: a balancing act
  3. Breaches Continue Not a matter of money, though budgets do need to be effective More and more people are attacking Variety of Actors Who’s who in zoo What’s their point? One of two goals Get your information Deny your information The need to change focus It takes a thief….
  4. Frameworks Anyone familiar with any of these? Pick a flavor, they are very similar Emphasize different aspects of the CIA Triad, but all pretty well balanced
  5. Despite best efforts… Last year there were some very notable breaches in security But lets talk numbers… Approximately $440 BILLION in 2014 lost to attackers… according to the Center for Strategic and International Studies (CSIS)
  6. 34% increase in security technology investments It’s a lot of money but doesn’t seem like a bad investment, right?
  7. And yet here we are… What do all of these organizations have in common? They all use the internet, but seriously… The weakest link in most information systems, are the people using THE POINT big or small, no company (or government organization) is immune Attacks estimated to cost businesses nearly $1 trillion this year
  8. Let’s get back to who’s who… Governments: China, Russia Hacktivists: annonymous , ISIS Patriot Hackers: The Jester Jokers: LULZ Sec Curious Kids: just crazy kids Attackers…
  9. No matter what, assume the breach, because no system can be 100% safe. So if we keep spending all this money on technology, is it worth it? What can we do? We everyone, from CEO to Mailroom intern, to think more like an attacker! And now my esteemed colleague, Ken Smith.
  10. Traits worth emulating!