SlideShare a Scribd company logo
FIND ALL THE BAD THINGS 
PV Setup Documentation 
1) Hotel Internet comes into the WAN port of the Router. It should receive a 
dynamic address. 
2) Eth3 on the Router runs to Eth0 (Management Port) on the Packet Viper. 
3) Eth4 on the Router runs to Eth2 (Bridge Port) on the Packet Viper. 
4) Eth3 (Bridge Port) on the Packet Viper runs to the Access Point. 
5) Users can connect to the WAP and the PV should report their traffic. 
SSID: VIPER_DEMO 
Password: There is none 
PV Management Address: 10.0.0.5 
http://10.0.0.5:47880 
OR 
https://10.0.0.5:47881 
Username: Octopi 
Password: Vampire9731! 
Router Management Address: 10.0.0.1 
Username: Octopi 
Password: Vampire9731! 
AP Management Address: 10.0.0.20 
Username: Octopi 
Password: Vampire9731! 
Countries that are blocked by the PV: 
Russia, China, Mongolia, Ukraine, Antarctica, and Kazakhstan. 
Examples of websites that are blocked: 
news.cn mail.ru
GFI MAX TAKES ON SECURITY & WINS! 
Presented By: Ian Trump 
9 September 2014 
SSID: VIPER_DEMO Orlando, Florida
INTRODUCTION 
A Little Bit About Us
Introduction: 
Consultant with 17 years of experience in IT security and information technology 
Project work for global companies has helped them secure their enterprise networks from current and 
future cyber attacks. Security blogger, cyber security educator for the Canadian Armed Forces 
Board member of (IC)2 and editorial review board member for The EDP Audit, Control, and Security 
Newsletter 
1989 to 1992, Canadian Forces (CF), Military Intelligence Branch 
2002 to 2007, CF Military Police Reserves 
2007 to 2013, Retired from CF Public Affairs 
Lead Architect for Canadian Cyber Defence Challenge 
Pen Test Team Leader, COBIT Auditor, Drinking Buddy 
SELF IMPORTANT BLOW HARD, WHERE IS YOUR BOOK? 
“I have a dysfunctional relationship 
with many things, including the 
Internet. The Internet appears to 
be both the source of criminal and 
foreign intelligence service attacks 
and the repository of information 
on how to detect and mitigate 
those attacks.” – Ian Trump, 2014
AGENDA 
1. Intro Stuff 
2. CMHR Stuff 
3. DEFCON 2014 Stuff 
4. FUN FACT Stuff 
5. SECURITY MARKET Stuff 
6. THROAT PUNCH Stuff 
7. EPIC PAWNAGE Stuff 
8. HACKED PC Stuff 
9. CANADIAN THREAT LANDSCAPE Stuff 
10. CASE STUDY 1 Stuff 
11. GFI MAX PEN TEST W/NMAP Stuff 
12. WHO DAT? WHO DAT? G-F-F-I 
13. CASE STUDY 2 Stuff 
14. GFI MAX IDS Stuff 
15. PACKET VIPER & TOOL Stuff 
16. TAYLOR SWIFT & FUTURE Stuff 
17. FIX THE Stuff 
18. TIP YOUR WAITRES & TRY THE VEAL Stuff 
THE ONLY COOL THING SO FAR WAS THE LAST SLIDE
"In Pennsylvania if 
the Chinese or 
Russians hack 
you, you try to put 
them in Jail. 
In Canada, if the 
Chinese hack you, 
you apologize for 
having poor 
security.” – Ian 
Trump, 2014 
SOME PEOPLE DON’T LIKE US CANADIANS VERY MUCH
DEFCON 2014. 
- America Reboots! 
- Digital Pearl Harbour Cyber Apocalypse Mythology 
- Do Research that Matters 
- Were Going to Hack both the System and the Technology 
- Learn to speak “Cyber” 
- Economic Loss in IT = Jobs 
- Customers are demanding privacy! 
- American Companies have noticed 
- Words are Important. 
DRINK ALL THE THINGS HACK ALL THE THINGS #Liverdamage
Fun Facts 
- Cost of Cyber Crime and Cyber Espionage in US $100 Billion per year. 
- Cost of Cyber Crime and Cyber Espionage world wide is $425 Billion per 
year. 
Advanced Persistent Threat (APT): 
- Coordinated cyber activities of criminals and state level entities 
- Objective of stealing information, compromising information systems 
- Criminal organizations monetise all aspects of illicit access 
- Foreign Intelligence Services gather Intellectual Property 
- APT tries to stay embedded for as long as possible 
- APT generally only resorts to destruction upon detection 
SOMETIMES YOUR USERS ARE THE APT
Your Customer Pain is My Security Business Gain 
Managed Security Services Market (CPE, Cloud/Hosted and Hybrid) – Global 
Industry Analysis, Size, Share, Growth, Trends, and Forecast, 2013–2019 
Managed security services market could be worth more than $24 billion by 
2019, up from roughly $9 billion in 2012. 
Researchers also predicted the managed security services market will expand 
at a compound annual growth rate (CAGR) of 15.4 percent between 2013 and 
2019. 
DO NOT ASK ABOUT SQL INJECTION ATTACKS
Gartner Report 2014: 
- Security spending gets boost from mobile, social and cloud 
- Worldwide spending will increase by almost 8 percent this year 
- Worldwide spending on information security will top US$71 billion this year, an 
increase of 7. % over 2013 
- Data loss prevention segment recording the fastest growth at 18.9 percent 
- In 2015, roughly 10 percent of overall IT security enterprise capabilities will be 
delivered as a cloud service 
- Small and medium sized companies will rely on hosted security services to an 
even greater extent 
- Unfortunately, many organizations continue to lack staff with the appropriate 
security skills. To keep up with hackers, more than half of organizations will by 
2018 rely on security services firms that specialize in data protection, risk and 
infrastructure management 
GET DRUNK @ BLACKHAT WITH CUTE GARTNER ANALYST
Disposing of Counterarguments 
It’s all hype and scaremongering! 
• 15 Aug 2012, “Cutting Sword of Justice” launches cyber attack on Saudi Aramco estimated 30,000 
workstations are infected 
• The virus erased data on three-quarters of Aramco’s corporate PCs — documents, spreadsheets, e-mails, 
files — replacing all of it with an image of a burning American flag 
• $630 Million estimated loss 
Hacking has been around for years, IT did not collapse! 
• Acts of vandalism have evolved 
• The intent now is to steal, demolish or in some other way monetize a specific organizations’ data 
We are not important enough to attract an attack! 
• True - for an organization that has no employees, no customers, no trade secrets and no money 
• Everyone else is a target 
Nothing can be done! 
• Make the attack difficult 
• Use risk analysis to protect the most important assets 
• Accept the fact IT security is a enterprise wide responsibility 
SAND + HEAD = HEAD IN SAND
2014 Year of Epic Carnage due to Pwnage 
EBay this year’s biggest hack so far. 
In May, eBay revealed that hackers 
had managed to steal personal 
records of 233 million users. 
Montana State Health Department 
revealed that a data breach may have 
affected more than 1 million people. 
The hack actually happened in July 
last year, but it wasn’t discovered until 
May this year, with the identity of the 
intruders, and the extent of the 
damage done, still unclear. 
I WANT ALL THE DATA 
P. F Chang, The chain restaurant 
suffered a huge data breach last 
month that compromised 
customer payment information. 
Thousands of newly stolen credit 
and debit cards went up for sale 
online on June 9th. 
Evernote was taken down 
with a Distributed Denial of 
Service (DDoS) 
Domino’s Pizza 
Hacking group Rex Mundi held 
Domino’s Pizza to ransom over 
600,000 Belgian and French 
customer records. 
Being firmly in the 
cross-hairs of a 
computer hacker 
helped put a bullet 
into Target's fourth 
quarter net earnings 
which fell almost 46 
percent due to an 
estimated $450 million 
lost when hackers 
stole data from 
millions of Target 
customers. 
CodeSpaces.com closed its doors 19 
Jun 2014, following a security breach 
that began with a distributed denial-of-service 
(DDoS) attack, and ended 12 
hours later after an attempt to extort 
money from the company.
MY OTHER COMPUTER IS YOUR WORK COMPUTER
Canadian Cyber Crime Threat Landscape 
The number of C&C servers on Canadian soil increased 83% and moved Canada to the 
number eight spot on the current 2013 global cybercrime list. 
Canada is currently fourth on the global cybercrime list for hosted phishing sites. 
Foreign cybercriminals are setting up virtual bases in Canada to command espionage attacks. 
Canada hosted the third largest volume of servers communicating with the type of highly 
sophisticated malware responsible for stealing valuable corporate data. 
OVH Canada – DEFCON IP, DNS, ASN (BGP) & Sub Domains 512K Old Router Limit 
A NEW LOW BAR IN BUSINESS ETHICS = HOSTING COMPANIES 
Dedicated Infrastructure for your 
Cyber Crime Business
Case Study: Rolling Into Broken 
470 End Points, 40 Servers, 80 POS in US and Canada, 300+ Employees, 
1000’s of Customers 
Targeted Phishing Email from similar domain “arctiicglacier.ca” <- Threat Track FTW 
Managed Anti-Virus(MAV) 
- Remotely uninstall the current Anti-Virus, old Team Viewer and install our GFI agent. MAV 
started finding multiple infections across their network. 
- Symantec Enterprise End Point Sucks. <- US CERT Says so too! 
Monitoring Installation Templates 
- Using the install template settings , we created a custom template to install specific checks 
and services. 
- Performance issues identified, expired user id’s for services “Blame GFI” 
THEY MAKE ICE FROM A SECRET RECIPE
Case Study: Rolling Into Broken 
One-Click installer 
- Manual – sucks for large #, Good for punishing staff/interns/new guy 
- Group policy MSI – AD seems broken most of the time 
- One-click installer – Scheduled task Using a batch script and admin 
cred’s 
Team Viewer Licensing 
- Old Team Viewer Installs - DIAF 
MAV Dies 
- Occasionally malware nuked MAV. 
- Developed a script to manually update the MAV definitions. 
- Downloaded Malware Bytes - just like everyone else does. 
SO, INTELLECTUAL PROPERTY THEFT IS UNLIKELY
Case Study: Rolling Into Broken 
@echo ON 
IF exist c:windowsMAX.txt exit ELSE ( 
rem cd ~ 
rem cd C:Program Files (x86)Advanced Monitoring Agent 
rem call unins000.exe /SILENT 
rem cd .. 
rem RD /S /Q "C:Program Files (x86)Advanced Monitoring Agent” 
rem pause 
rem wmic product where name="Advanced Monitoring Agent GP" call uninstall /NOINTERACTIVE 
rem pause 
wmic product where name="Symantec Endpoint Protection" call uninstall /NOINTERACTIVE 
rem pause 
wmic product where name="TeamViewer 7 Host (MSI Wrapper)" call uninstall /NOINTERACTIVE 
rem pause 
rem call agi-corp-dc-s-1NETLOGONauto.exe 
wmic product call install true, "" , "agi-corp-dc-s- 
1NETLOGONAGENT_AG_WPG_SCRIPT_INST_V9_4_0_GPagent.msi" /NOINTERACTIVE 
cd ~ 
cd C: 
echo SEP uninstall, TV7 uninstall, Max install > c:windowsMAX.txt 
rem pause 
rem shutdown /r /f 
)
Security At Law Firms 
Two Octo - Customers 
- Obsessed with confidentiality 
- Law firms have security requirements (Law Society, State Bar, etc.) 
- GFI Managed Online backup (MOB) 
- Try to remove Internet facing unencrypted services! 
Proprietary Software (Java applet) #justsaynotojava 
One piece of software that the business regularly uses ex. “Land Titles” 
GFI Patch Management has to ignore java updates through patch manager 
Desktop & Server Security 
MAV 
Web Content Filtering not just for workstations 
Regular Pen Test and IDS Customization with Dash Board Alerts 
Q: HOW DO YOU SAVE A DROWING INFO SEC PROFESSIONAL? A: TAKE YOUR FOOT OFF HIS HEAD
Use Case: Web Content Filtering 
Lawyers do a lot of research 
- Research on the web is dangerous 
- Downloading Torrents is dangerous 
- PDF’s and pictures of Cats are the heralds of the apocalypse & they ride upon the 
world wide web. 
DATE TOTAL REQUESTS MALICIOUS SITE REQUESTS BLOCKED REQUESTS 
12-Aug-2014 44 0 0 
11-Aug-2014 320 0 0 
07-Aug-2014 27 0 0 
06-Aug-2014 1557 35 38 
05-Aug-2014 38 0 0 
04-Aug-2014 32 0 0 
03-Aug-2014 33 0 0 
02-Aug-2014 32 0 0 
01-Aug-2014 31 0 0 
31-Jul-2014 232 0 0 
30-Jul-2014 3257 1518 1518 
29-Jul-2014 1144 1 7 
28-Jul-2014 98 0 0 
27-Jul-2014 101 0 0 
26-Jul-2014 92 0 0 
TOTAL 7038 1554 1563 
FILTER ALL THE THINGS
Auto Nmap Pen Test 
Used to flag changes in ports on your customers IPs 
- The Windows Task Scheduler set to run 
- An NMAP script to check for differences in the ports and to create 
- Windows Event Log entries. By throwing up flags in your application 
- GFI to do a DSC of your Event Logs and notify you when the suspect IDs 
How is the NMAP Script setup? 
- When the scan runs it has two different outputs old scan and the new 
scan. 
- After the scan is completed, the script will compare the two files and look 
for new ports. 
- If any changes have been found, an Event will be created (Different 
Event ID for each client), and GFI MAX will notify you of this change. 
VNC & RDP OPEN TO THE INTERNET = PWNAGE
Code Stuff 
Automating a Pen Test with Nmap (Nmap_scan.bat) 
cd c:program files (x86)nmapoctopitech_scans 
call "c:program files (x86)nmapoctopitech_scansportscan.bat” 
call "c:program files (x86)nmapoctopitech_scanscomparescan.bat” 
set /p var=< scan_log.txt 
if defined var (eventcreate /l application /t warning /id 501 /d "nmap port scanning 
found new open ports") else (echo no new open ports found) 
Port_scan.bat 
d c:program files (x86)nmapoctopitech_scans 
del old_nmap_scan.xml 
rename new_nmap_scan.xml old_nmap_scan.xml 
nmap -p- -oX new_nmap_scan.xml -iL Target_IP.txt 
NMAP MAY TELL YOU YOUR STUPID
Comparescan.bat 
cd c:program files (x86)nmapoctopitech_scans 
ndiff old_nmap_scan.xml new_nmap_scan.xml > compare_scan.txt 
find /v "+" compare_scan.txt | find "open" > scan_log.txt 
Notes: 
Target_IP.txt <-Put in all your external Customer IP Addresses 
Ron’s Violent Nmap for Pen Testers 
Nmap TCP & UDP (this is slow - up to 24 hours) 
./nmap -PN -oA output/companyname --open --log-errors -p- -d2 
--min-parallelism=16 --min-hostgroup=16 -T4 -sT -iL hosts.txt 
--script=reverse-index 
./nmap -PN -oA output/companyname --log-errors --open -p- -d2 
--min-parallelism=16 --min-hostgroup=16 -T4 -sU -iL hosts.txt 
Nmap Detailed scan, fairly safe: 
./nmap -sTU -PN -oA output/companyname --open --log-errors -p[list 
open ports here] -d2 --min-parallelism=16 --min-hostgroup=16 -T4 -sT 
-iL ipaddresses.txt --script="safe or default" 
BREAK ALL THE THINGS 
Nmap Detailed scan, this can break 
stuff 
./nmap -sTU -PN -oA output/companyname --open -- 
log-errors -p[list 
open ports here] -d2 --min-parallelism=16 --min-hostgroup= 
16 -T4 -sT 
-iL hosts.txt --script="all and not broadcast and not 
*fuzz* and not 
*slow* and not *brute* and not *qscan* and not 
http-unsafe-output-escaping and not http-stored-xss"
Scan All The Things = Security Win! 
- Scan AG 80+ addresses and find out what 
ports and associated services were open 
- Relayed that information back to the client 
and made them aware of the situation 
- Remediated and provided guidance on ACL’s 
for Firewall configuration 
- Automated monitoring of clients Internet 
facing IPs for newly closed or opened ports 
Note: Be sure to use the Daily Safety Check as 
opposed the 24x7 check. This way you will have 
more time to see the errors on the dashboard. 
FIREWALLS ARE LIKE 6 YEAR OLDS THEY NEED RULES
Epic War Ferrets in Battle Wagon! 
BREAK TIME 
"Who Dat? Who Dat? G-F-F-I” 
https://www.youtube.com/watch?v=bHr7itw 
VsMc
Case Study 2: Center for Christian Studies 
- IT Jenga, pulling one block can cause the whole thing to collapse. 
- Reconnaissance is key 
- Deploy GFI agent, you can see exactly what is going on (shit show) 
- Nmap the Internal and external network 
- Use your Brain! (Layer 0 and Layer 1 Problems) 
- Use Wifi Explorer to manage channels! 
Deploy GFI MAX 
- Server was completely bogged down 
- 2008 SBS is the Devil! 
- XP Workstations were missing hundreds of patches 
- Open ports on the Internet! 
Architect Solutions 
- Office 365 (Remove SharePoint & Exchange from Server) 
- Server AD, DNS, DHCP (Remove WSUS & SQL from Server) 
- QNAP NAS (Integrate AD File Shares) 
- UPS All the things! 
- Get authorised! (ISP, Printer Lease Company, Etc.) 
- MOB (Off Site Backup), Web Content Filter (Especially on the Server) 
THERE IS BROKEN & THEN THERE IS SUPER BROKEN
Case Study 2: Securing The Network 
- No open unencrypted ports 
- Keep Patched and Updated 
- No Local Admin Permissions 
- Monitor all the things! (SNMP, Ping, Services (Internal and External)) 
- Event Log Checks & Count all the things! 
@echo on 
del old_dll_count.txt 
del old_exe_count.txt 
rem pause 
rename dll_count.txt old_dll_count.txt 
rename exe_count.txt old_exe_count.txt 
rem pause 
dir c: /s /b | find /c /i ".dll" > dll_count.txt 
dir c: /s /b | find /c /i ".exe" > exe_count.txt 
rem pause 
set /p OldDllCount= < old_dll_count.txt 
set /p NewDllCount= < dll_count.txt 
set /p OldExeCount= < old_exe_count.txt 
set /p NewExeCount= < exe_count.txt 
rem pause 
if %NewDllCount% NEQ %OldDllCount% (eventcreate /l APPLICATION /t WARNING /id 510 /d "New Dynamic Link Library 
found!”) 
if %NewExeCount% NEQ %OldExeCount% (eventcreate /l APPLICATION /t WARNING /id 511 /d "New Executible found!”) 
rem pause 
EXTRA DLL’s & EXE’s ARE NOT COOL
Count All The Things! 
[Redacted] as the example. 
- Summary file shows where the change happened in the old file; in this case 
there where new executable was added between “Rental Unit Condition 
Report.exe.doc” and “Autorun.exe”. 
"28/08/2014 0:00:57.16" 
Comparing files old_exe_total.txt and EXE_TOTAL.TXT 
***** old_exe_total.txt 
52: c:DataSharedNancy- Blank DocumentsRE DeptRental UnitsRental 
Unit Conditon Report.exe.doc 
53: c:maximizerSvrShareUtilitiesMax12_EntreAutorun.exe 
***** EXE_TOTAL.TXT 
52: c:DataSharedNancy- Blank DocumentsRE DeptRental UnitsRental 
Unit Conditon Report.exe.doc 
53: c:DataUsersjenniferjre-7u40-windows-i586.exe 
54: c:maximizerSvrShareUtilitiesMax12_EntreAutorun.exe 
***** 
EASY THING TO CHECK BRAH
Building an IDS out of GFI MAX 
- It takes some effort to build all the event log checks 
- 2003 OS, 2008 OS and 2008 R2 OS generate different event code codes 
AUDIT ALL THE THINGS! 
<- Setup Account Lockout 
Pro Tip: Make sure your Logs 
Are set to Overwrite as 
Required. 
<- Setup Audit Policy
Building an IDS out of GFI MAX for Windows Server 2003 
2003 Server Security Event Reference Guide: 
http://technet.microsoft.com/library/cc163121.aspx#EKH 
517 The audit log was cleared. 
520 The system time was changed. 
529 Logon failure. A logon attempt was made with an unknown user name or a known user name with a bad password. 
530 Logon failure. A logon attempt was made outside the allowed time. 
531 Logon failure. A logon attempt was made using a disabled account. 
532 Logon failure. A logon attempt was made using an expired account. 
533 Logon failure. A logon attempt was made by a user who is not allowed to log on at the specified computer. 
534 Logon failure. The user attempted to log on with a password type that is not allowed. 
535 Logon failure. The password for the specified account has expired. 
536 Logon failure. The Net Logon service is not active. 
537 Logon failure. The logon attempt failed for other reasons. 
539 Logon failure. The account was locked out at the time the logon attempt was made. 
550 Notification message that could indicate a possible denial-of-service (DoS) attack. 
552 A user successfully logged on to a computer with explicit credentials while already logged on as a different user. 
630 A user account was deleted. 
634 A global group was deleted. 
638 A local group was deleted. 
643 A domain policy was modified. 
644 A user account was automatically locked. 
647 A computer account was deleted. 
653 A security-disabled global group was created. 
655 A member was added to a security-disabled global group. 
663 A security-disabled universal group was created. 
665 A member was added to a security-disabled universal group. 
685 Name of an account was changed. 
EVENT LOG 666 BEAST ATTACK DETECTED #airguitar!
Building an IDS out of GFI MAX for Windows Server 2008 R2 
& Windows 7 
2008 R2 & Windows 7 Server Security Event Reference Guide: 
https://support.microsoft.com/kb/977519/en-us 
5144 A network share object was deleted. 4954 Group Policy settings for Windows Firewall were changed, and the new settings were applied. 
5143 A network share object was modified. 4950 A Windows Firewall setting was changed. 
5142 A network share object was added. 4948 A change was made to the Windows Firewall exception list. A rule was deleted. 
5141 A directory service object was deleted. 4947 A change was made to the Windows Firewall exception list. A rule was modified. 
5035 The Windows Firewall Driver failed to start. 4946 A change was made to the Windows Firewall exception list. A rule was added. 
5034 The Windows Firewall Driver was stopped. 4780 The ACL was set on accounts which are members of administrators groups. 
5025 The Windows Firewall service was stopped. 4761 A member was added to a security-disabled universal group. 
4801 The workstation was unlocked. 4751 A member was added to a security-disabled global group. 
4800 The workstation was locked. 4746 A member was added to a security-disabled local group. 
4781 The name of an account was changed: 4724 An attempt was made to reset an account's password. 
4767 A user account was unlocked. 4723 An attempt was made to change an account's password. 
4759 A security-disabled universal group was created. 4648 A logon was attempted using explicit credentials. 
4749 A security-disabled global group was created. 4719 System audit policy was changed. 
4744 A security-disabled local group was created. 4707 A trust to a domain was removed. 
4743 A computer account was deleted. 4706 A new trust was created to a domain. 
4741 A computer account was created. 4702 A scheduled task was updated. 
4740 A user account was locked out. 4698 A scheduled task was created. 
4738 A user account was changed. 4649 A replay attack was detected. 
4726 A user account was deleted. 4625 An account failed to log on. 
4725 A user account was disabled. 4616 The system time was changed. 
4722 A user account was enabled. 4720 A user account was created. 
EVENT 1337 CULT OF THE DEAD COW PWNS YOU
PACKET VIPER DEMO 
- PacketViper is a bi-directional, Point and Click, Intelligent Geo IP Threat Prevention 
& Detection Filter. 
- Geo-IP filtering allows your network to choose places in the world from which it will 
accept or deny network traffic. 
- Kelsey Lucas email: kelsey.lucas@packetviper.com 
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing 
tool for finding vulnerabilities in web applications. It is designed to be used 
by people with a wide range of security experience and as such is ideal for 
developers and functional testers who are new to penetration testing. 
“Simply the best open-source application vulnerability scanner” 
“There is no right and wrong. There's only fun and boring.” – The Plague
Security Tools for the #hardcore 
http://www.informatica64.com/forensicfoca/ 
FOCA (Fingerprinting Organizations with Collected Archives) 
Downloads all documents that have been posted on a Web site 
Extracts the metadata, or the information generated about the document itself. 
Can reveal who created the document, e-mail address, internal IP, Latitude and 
Longitude of images, (Internet Protocol) addresses and much more. 
Vulnerability scanning for auditors and security analysts. Nessus features 
high-speed asset discovery, patch and configuration auditing, asset 
profiling, sensitive data discovery, patch management integration, multi-scanner 
control and vulnerability analysis. 
“Kid, don't threaten me. There are worse things than death, and uh, I can do all of them.” – The Plague
@Pontobunce 
You know when your boyfriend 
figures out he screwed up and 
then he does something really 
nice to make up for it? 
Windows 9. 
@SwiftOnSecurity 
Cloud-based systems utilized by all types of hostile forces 
Large scale DDOS Attacks upwards of 100GB/Sec + 
Critical infrastructure attacks/ POS infrastructure Attacks 
Exploitation of world events to amplify kinetic effects 
IPV6, Cellular, Wireless and 64 Bit malware Advanced 
Persistent Threats 
Cross-platform attacks combining mobile devices with 
traditional infrastructure targets 
New nation states and organizations developing offensive 
cyber warfare capability 
Reduction in kill chain exposure 
Advanced malware frameworks which perform 
reconnaissance, exploitation, exfiltration and data 
destruction attacks TAYLOR SWIFT INFO SEC THOUGHT LEADER using plug-in modules – Flame, Duque
…and the winner for biggest APT to US Interests is: US Justice Department 
Microsoft was ordered on July 31 to comply with a U.S. Department of Justice 
warrant to produce emails stored at the company's data center in Ireland. 
Potentially sets a precedent: Any company with operations in the United States 
must comply with valid warrants for data, even if the content is stored overseas. 
FedEx has possession, custody or control of millions of packages every day, but 
the US government cannot force FedEx to turn over any of those packages with 
a subpoena. In order to seize a package in the US, the government needs a 
warrant. And even with a warrant, the government has no power to force FedEx 
to turn over packages that are outside the US. 
The U.S. Department of Homeland Security on July 5 arrested Roman 
Valerevich Seleznev, the son of a Russian lawmaker, for what it said were crimes 
carried out from 2009 to 2011. Roman Seleznev was apprehended in an airport 
in the Maldives 8 July 2014, the Russian Foreign Ministry said. 
THE LONG LONG LONG ARM OF ‘MERICA
CDC & HACKERSPACES ARE LIKE BATMAN 
Create, educate and mentor emerging cyber defense talent. 
Provide resources and ethical guidance. 
Teach responsible disclosure of vulnerabilities. 
Provide expert level resources and collective learning opportunities. 
Facilitate hands on learning with virtual environments. 
Break things and learn to fix them. 
Network in both senses of the word. 
LIKE A FAT VERSION OF BATMAN
THANK YOU 
Contact Information: 
SALES / sales@octopitech.com 
“IPV 6 will 
revolutionize how we 
communicate with the 
“Internet of Things” 
like your fridge, car 
and maybe a toaster 
oven because some 
jackass, somewhere 
decided that putting a 
web server into a 
toaster oven was a 
good idea.” - Ian 
Trump, 2014 
Special Thanks: 
@MisterPhisch, @NullStream, @SpasticRobot, @Phoul @5683Monkey, 
@Straithe, @Nateloaf, & Oli 
YOU DON’T HAVE TO GO HOME, BUT YOU CANT STAY HERE

More Related Content

What's hot

Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
Phil Agcaoili
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
International Institute for Learning
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
- Mark - Fullbright
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
Dinesh O Bareja
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
Ulf Mattsson
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
Bob Wall
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
Grant Barker
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
Ulf Mattsson
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
Ce hv8 module 19 cryptography
Ce hv8 module 19 cryptographyCe hv8 module 19 cryptography
Ce hv8 module 19 cryptographyMehrdad Jingoism
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
Quick Heal Technologies Ltd.
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
Javier Gonzalez
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattssonUlf Mattsson
 

What's hot (20)

Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
Ce hv8 module 19 cryptography
Ce hv8 module 19 cryptographyCe hv8 module 19 cryptography
Ce hv8 module 19 cryptography
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 

Viewers also liked

MAX State of the Nation: Recent and Upcoming Releases - Mark Petrie
MAX State of the Nation: Recent and Upcoming Releases - Mark PetrieMAX State of the Nation: Recent and Upcoming Releases - Mark Petrie
MAX State of the Nation: Recent and Upcoming Releases - Mark Petrie
MAXfocus
 
The Changing Role of the MSP - GFI MAX
The Changing Role of the MSP - GFI MAXThe Changing Role of the MSP - GFI MAX
The Changing Role of the MSP - GFI MAX
Autotask
 
Best practices in release management
Best  practices in release managementBest  practices in release management
Best practices in release management
Abhinav Sabharwal- Business Analyst Mumbai
 
DropBox: The Dropbox Users Love, with the Control that IT Needs
DropBox: The Dropbox Users Love, with the Control that IT NeedsDropBox: The Dropbox Users Love, with the Control that IT Needs
DropBox: The Dropbox Users Love, with the Control that IT Needs
MAXfocus
 
All about Google
All about GoogleAll about Google
All about Google
Ouriel Ohayon
 
Dropbox Startup Lessons Learned
Dropbox Startup Lessons LearnedDropbox Startup Lessons Learned
Dropbox Startup Lessons Learnedgueste94e4c
 
Introduction to SlideShare for Businesses
Introduction to SlideShare for BusinessesIntroduction to SlideShare for Businesses
Introduction to SlideShare for Businesses
SlideShare
 
How Google Works
How Google WorksHow Google Works
How Google Works
Eric Schmidt
 

Viewers also liked (8)

MAX State of the Nation: Recent and Upcoming Releases - Mark Petrie
MAX State of the Nation: Recent and Upcoming Releases - Mark PetrieMAX State of the Nation: Recent and Upcoming Releases - Mark Petrie
MAX State of the Nation: Recent and Upcoming Releases - Mark Petrie
 
The Changing Role of the MSP - GFI MAX
The Changing Role of the MSP - GFI MAXThe Changing Role of the MSP - GFI MAX
The Changing Role of the MSP - GFI MAX
 
Best practices in release management
Best  practices in release managementBest  practices in release management
Best practices in release management
 
DropBox: The Dropbox Users Love, with the Control that IT Needs
DropBox: The Dropbox Users Love, with the Control that IT NeedsDropBox: The Dropbox Users Love, with the Control that IT Needs
DropBox: The Dropbox Users Love, with the Control that IT Needs
 
All about Google
All about GoogleAll about Google
All about Google
 
Dropbox Startup Lessons Learned
Dropbox Startup Lessons LearnedDropbox Startup Lessons Learned
Dropbox Startup Lessons Learned
 
Introduction to SlideShare for Businesses
Introduction to SlideShare for BusinessesIntroduction to SlideShare for Businesses
Introduction to SlideShare for Businesses
 
How Google Works
How Google WorksHow Google Works
How Google Works
 

Similar to Year of pawnage - Ian trump

Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
Aviva Spectrum™
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
Cybernetic Global Intelligence
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
GDSCCVR
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
Jaime Manteiga
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
ipspat
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
Sohail Gohir
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
United Security Providers AG
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
PECB
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
Positive Hack Days
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsInvincea, Inc.
 

Similar to Year of pawnage - Ian trump (20)

Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
 

More from MAXfocus

Delivering Security Within the MAX Remote Management Platform - Todd Haughland
Delivering Security Within the MAX Remote Management Platform - Todd HaughlandDelivering Security Within the MAX Remote Management Platform - Todd Haughland
Delivering Security Within the MAX Remote Management Platform - Todd Haughland
MAXfocus
 
Creating Positive User Experiences Through Technology - Paul Kenny
Creating Positive User Experiences Through Technology - Paul KennyCreating Positive User Experiences Through Technology - Paul Kenny
Creating Positive User Experiences Through Technology - Paul Kenny
MAXfocus
 
Welcome and MAX Keynotes - Dave Sobel and Alistair Forbes
Welcome and MAX Keynotes   - Dave Sobel and Alistair ForbesWelcome and MAX Keynotes   - Dave Sobel and Alistair Forbes
Welcome and MAX Keynotes - Dave Sobel and Alistair Forbes
MAXfocus
 
Closing Keynote - Dave Sobel
Closing Keynote - Dave SobelClosing Keynote - Dave Sobel
Closing Keynote - Dave Sobel
MAXfocus
 
Maximise Your Reputation in the Marketplace Jason King
Maximise Your Reputation in the Marketplace   Jason KingMaximise Your Reputation in the Marketplace   Jason King
Maximise Your Reputation in the Marketplace Jason King
MAXfocus
 
Consolidating your Services Portfolio with GFI MAX - Jason Parsons and Steve ...
Consolidating your Services Portfolio with GFI MAX - Jason Parsons and Steve ...Consolidating your Services Portfolio with GFI MAX - Jason Parsons and Steve ...
Consolidating your Services Portfolio with GFI MAX - Jason Parsons and Steve ...
MAXfocus
 
Managed Services in 2014: Pricing and Positioning - Dave Sobel
Managed Services in 2014: Pricing and Positioning - Dave SobelManaged Services in 2014: Pricing and Positioning - Dave Sobel
Managed Services in 2014: Pricing and Positioning - Dave Sobel
MAXfocus
 
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform -  Paul FenwickDelivering Security with the MAX RemoteManagement Platform -  Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
MAXfocus
 
Scripting and Automation within the MAX Platform Ernest Byrd
Scripting and Automation within the MAX Platform   Ernest ByrdScripting and Automation within the MAX Platform   Ernest Byrd
Scripting and Automation within the MAX Platform Ernest Byrd
MAXfocus
 
Lessons from the Trenches Selling and Marketing Best Practices Terry Hedden
Lessons from the Trenches Selling and Marketing Best Practices    Terry HeddenLessons from the Trenches Selling and Marketing Best Practices    Terry Hedden
Lessons from the Trenches Selling and Marketing Best Practices Terry Hedden
MAXfocus
 
Recruit & Retain Top Talent - Michael Schmditmann
Recruit & Retain Top Talent - Michael SchmditmannRecruit & Retain Top Talent - Michael Schmditmann
Recruit & Retain Top Talent - Michael Schmditmann
MAXfocus
 
Lessons from the Worlds Top 5 MSPs MAX2014 - Gordon Tan
Lessons from the Worlds Top 5 MSPs MAX2014 - Gordon Tan Lessons from the Worlds Top 5 MSPs MAX2014 - Gordon Tan
Lessons from the Worlds Top 5 MSPs MAX2014 - Gordon Tan
MAXfocus
 
Getting from $400k to $4m - the Four Biggest Operational Challenges - Gordan Tan
Getting from $400k to $4m - the Four Biggest Operational Challenges - Gordan TanGetting from $400k to $4m - the Four Biggest Operational Challenges - Gordan Tan
Getting from $400k to $4m - the Four Biggest Operational Challenges - Gordan Tan
MAXfocus
 
5 Critical Steps for Selling Managed Services - Adam Harris
5 Critical Steps for Selling Managed Services - Adam Harris 5 Critical Steps for Selling Managed Services - Adam Harris
5 Critical Steps for Selling Managed Services - Adam Harris
MAXfocus
 
Max Backup Roadmap and Strategy Presentation - Eric Harless
Max Backup Roadmap and Strategy Presentation - Eric Harless Max Backup Roadmap and Strategy Presentation - Eric Harless
Max Backup Roadmap and Strategy Presentation - Eric Harless
MAXfocus
 
How we turned Office 365 from a threat to an opportunity- Dan Scott
How we turned Office 365 from a threat to an opportunity- Dan ScottHow we turned Office 365 from a threat to an opportunity- Dan Scott
How we turned Office 365 from a threat to an opportunity- Dan Scott
MAXfocus
 
Delivering Security with GFI MAX - Mark Petrie
Delivering Security with GFI MAX - Mark Petrie  Delivering Security with GFI MAX - Mark Petrie
Delivering Security with GFI MAX - Mark Petrie
MAXfocus
 
Scripting and Automation within the MAX Platform - Mark Petrie
Scripting and Automation within the MAX Platform - Mark Petrie Scripting and Automation within the MAX Platform - Mark Petrie
Scripting and Automation within the MAX Platform - Mark Petrie
MAXfocus
 
7 reasons your backups should go to the cloud - Nick Cavalancia
7 reasons your backups should go to the cloud - Nick Cavalancia 7 reasons your backups should go to the cloud - Nick Cavalancia
7 reasons your backups should go to the cloud - Nick Cavalancia
MAXfocus
 
The Mysterious Case of the Vanishing Cloud - Seth Robinson
The Mysterious Case of the Vanishing Cloud - Seth Robinson The Mysterious Case of the Vanishing Cloud - Seth Robinson
The Mysterious Case of the Vanishing Cloud - Seth Robinson
MAXfocus
 

More from MAXfocus (20)

Delivering Security Within the MAX Remote Management Platform - Todd Haughland
Delivering Security Within the MAX Remote Management Platform - Todd HaughlandDelivering Security Within the MAX Remote Management Platform - Todd Haughland
Delivering Security Within the MAX Remote Management Platform - Todd Haughland
 
Creating Positive User Experiences Through Technology - Paul Kenny
Creating Positive User Experiences Through Technology - Paul KennyCreating Positive User Experiences Through Technology - Paul Kenny
Creating Positive User Experiences Through Technology - Paul Kenny
 
Welcome and MAX Keynotes - Dave Sobel and Alistair Forbes
Welcome and MAX Keynotes   - Dave Sobel and Alistair ForbesWelcome and MAX Keynotes   - Dave Sobel and Alistair Forbes
Welcome and MAX Keynotes - Dave Sobel and Alistair Forbes
 
Closing Keynote - Dave Sobel
Closing Keynote - Dave SobelClosing Keynote - Dave Sobel
Closing Keynote - Dave Sobel
 
Maximise Your Reputation in the Marketplace Jason King
Maximise Your Reputation in the Marketplace   Jason KingMaximise Your Reputation in the Marketplace   Jason King
Maximise Your Reputation in the Marketplace Jason King
 
Consolidating your Services Portfolio with GFI MAX - Jason Parsons and Steve ...
Consolidating your Services Portfolio with GFI MAX - Jason Parsons and Steve ...Consolidating your Services Portfolio with GFI MAX - Jason Parsons and Steve ...
Consolidating your Services Portfolio with GFI MAX - Jason Parsons and Steve ...
 
Managed Services in 2014: Pricing and Positioning - Dave Sobel
Managed Services in 2014: Pricing and Positioning - Dave SobelManaged Services in 2014: Pricing and Positioning - Dave Sobel
Managed Services in 2014: Pricing and Positioning - Dave Sobel
 
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform -  Paul FenwickDelivering Security with the MAX RemoteManagement Platform -  Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
 
Scripting and Automation within the MAX Platform Ernest Byrd
Scripting and Automation within the MAX Platform   Ernest ByrdScripting and Automation within the MAX Platform   Ernest Byrd
Scripting and Automation within the MAX Platform Ernest Byrd
 
Lessons from the Trenches Selling and Marketing Best Practices Terry Hedden
Lessons from the Trenches Selling and Marketing Best Practices    Terry HeddenLessons from the Trenches Selling and Marketing Best Practices    Terry Hedden
Lessons from the Trenches Selling and Marketing Best Practices Terry Hedden
 
Recruit & Retain Top Talent - Michael Schmditmann
Recruit & Retain Top Talent - Michael SchmditmannRecruit & Retain Top Talent - Michael Schmditmann
Recruit & Retain Top Talent - Michael Schmditmann
 
Lessons from the Worlds Top 5 MSPs MAX2014 - Gordon Tan
Lessons from the Worlds Top 5 MSPs MAX2014 - Gordon Tan Lessons from the Worlds Top 5 MSPs MAX2014 - Gordon Tan
Lessons from the Worlds Top 5 MSPs MAX2014 - Gordon Tan
 
Getting from $400k to $4m - the Four Biggest Operational Challenges - Gordan Tan
Getting from $400k to $4m - the Four Biggest Operational Challenges - Gordan TanGetting from $400k to $4m - the Four Biggest Operational Challenges - Gordan Tan
Getting from $400k to $4m - the Four Biggest Operational Challenges - Gordan Tan
 
5 Critical Steps for Selling Managed Services - Adam Harris
5 Critical Steps for Selling Managed Services - Adam Harris 5 Critical Steps for Selling Managed Services - Adam Harris
5 Critical Steps for Selling Managed Services - Adam Harris
 
Max Backup Roadmap and Strategy Presentation - Eric Harless
Max Backup Roadmap and Strategy Presentation - Eric Harless Max Backup Roadmap and Strategy Presentation - Eric Harless
Max Backup Roadmap and Strategy Presentation - Eric Harless
 
How we turned Office 365 from a threat to an opportunity- Dan Scott
How we turned Office 365 from a threat to an opportunity- Dan ScottHow we turned Office 365 from a threat to an opportunity- Dan Scott
How we turned Office 365 from a threat to an opportunity- Dan Scott
 
Delivering Security with GFI MAX - Mark Petrie
Delivering Security with GFI MAX - Mark Petrie  Delivering Security with GFI MAX - Mark Petrie
Delivering Security with GFI MAX - Mark Petrie
 
Scripting and Automation within the MAX Platform - Mark Petrie
Scripting and Automation within the MAX Platform - Mark Petrie Scripting and Automation within the MAX Platform - Mark Petrie
Scripting and Automation within the MAX Platform - Mark Petrie
 
7 reasons your backups should go to the cloud - Nick Cavalancia
7 reasons your backups should go to the cloud - Nick Cavalancia 7 reasons your backups should go to the cloud - Nick Cavalancia
7 reasons your backups should go to the cloud - Nick Cavalancia
 
The Mysterious Case of the Vanishing Cloud - Seth Robinson
The Mysterious Case of the Vanishing Cloud - Seth Robinson The Mysterious Case of the Vanishing Cloud - Seth Robinson
The Mysterious Case of the Vanishing Cloud - Seth Robinson
 

Recently uploaded

Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 

Recently uploaded (20)

Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 

Year of pawnage - Ian trump

  • 1. FIND ALL THE BAD THINGS PV Setup Documentation 1) Hotel Internet comes into the WAN port of the Router. It should receive a dynamic address. 2) Eth3 on the Router runs to Eth0 (Management Port) on the Packet Viper. 3) Eth4 on the Router runs to Eth2 (Bridge Port) on the Packet Viper. 4) Eth3 (Bridge Port) on the Packet Viper runs to the Access Point. 5) Users can connect to the WAP and the PV should report their traffic. SSID: VIPER_DEMO Password: There is none PV Management Address: 10.0.0.5 http://10.0.0.5:47880 OR https://10.0.0.5:47881 Username: Octopi Password: Vampire9731! Router Management Address: 10.0.0.1 Username: Octopi Password: Vampire9731! AP Management Address: 10.0.0.20 Username: Octopi Password: Vampire9731! Countries that are blocked by the PV: Russia, China, Mongolia, Ukraine, Antarctica, and Kazakhstan. Examples of websites that are blocked: news.cn mail.ru
  • 2. GFI MAX TAKES ON SECURITY & WINS! Presented By: Ian Trump 9 September 2014 SSID: VIPER_DEMO Orlando, Florida
  • 3. INTRODUCTION A Little Bit About Us
  • 4. Introduction: Consultant with 17 years of experience in IT security and information technology Project work for global companies has helped them secure their enterprise networks from current and future cyber attacks. Security blogger, cyber security educator for the Canadian Armed Forces Board member of (IC)2 and editorial review board member for The EDP Audit, Control, and Security Newsletter 1989 to 1992, Canadian Forces (CF), Military Intelligence Branch 2002 to 2007, CF Military Police Reserves 2007 to 2013, Retired from CF Public Affairs Lead Architect for Canadian Cyber Defence Challenge Pen Test Team Leader, COBIT Auditor, Drinking Buddy SELF IMPORTANT BLOW HARD, WHERE IS YOUR BOOK? “I have a dysfunctional relationship with many things, including the Internet. The Internet appears to be both the source of criminal and foreign intelligence service attacks and the repository of information on how to detect and mitigate those attacks.” – Ian Trump, 2014
  • 5. AGENDA 1. Intro Stuff 2. CMHR Stuff 3. DEFCON 2014 Stuff 4. FUN FACT Stuff 5. SECURITY MARKET Stuff 6. THROAT PUNCH Stuff 7. EPIC PAWNAGE Stuff 8. HACKED PC Stuff 9. CANADIAN THREAT LANDSCAPE Stuff 10. CASE STUDY 1 Stuff 11. GFI MAX PEN TEST W/NMAP Stuff 12. WHO DAT? WHO DAT? G-F-F-I 13. CASE STUDY 2 Stuff 14. GFI MAX IDS Stuff 15. PACKET VIPER & TOOL Stuff 16. TAYLOR SWIFT & FUTURE Stuff 17. FIX THE Stuff 18. TIP YOUR WAITRES & TRY THE VEAL Stuff THE ONLY COOL THING SO FAR WAS THE LAST SLIDE
  • 6. "In Pennsylvania if the Chinese or Russians hack you, you try to put them in Jail. In Canada, if the Chinese hack you, you apologize for having poor security.” – Ian Trump, 2014 SOME PEOPLE DON’T LIKE US CANADIANS VERY MUCH
  • 7. DEFCON 2014. - America Reboots! - Digital Pearl Harbour Cyber Apocalypse Mythology - Do Research that Matters - Were Going to Hack both the System and the Technology - Learn to speak “Cyber” - Economic Loss in IT = Jobs - Customers are demanding privacy! - American Companies have noticed - Words are Important. DRINK ALL THE THINGS HACK ALL THE THINGS #Liverdamage
  • 8. Fun Facts - Cost of Cyber Crime and Cyber Espionage in US $100 Billion per year. - Cost of Cyber Crime and Cyber Espionage world wide is $425 Billion per year. Advanced Persistent Threat (APT): - Coordinated cyber activities of criminals and state level entities - Objective of stealing information, compromising information systems - Criminal organizations monetise all aspects of illicit access - Foreign Intelligence Services gather Intellectual Property - APT tries to stay embedded for as long as possible - APT generally only resorts to destruction upon detection SOMETIMES YOUR USERS ARE THE APT
  • 9. Your Customer Pain is My Security Business Gain Managed Security Services Market (CPE, Cloud/Hosted and Hybrid) – Global Industry Analysis, Size, Share, Growth, Trends, and Forecast, 2013–2019 Managed security services market could be worth more than $24 billion by 2019, up from roughly $9 billion in 2012. Researchers also predicted the managed security services market will expand at a compound annual growth rate (CAGR) of 15.4 percent between 2013 and 2019. DO NOT ASK ABOUT SQL INJECTION ATTACKS
  • 10. Gartner Report 2014: - Security spending gets boost from mobile, social and cloud - Worldwide spending will increase by almost 8 percent this year - Worldwide spending on information security will top US$71 billion this year, an increase of 7. % over 2013 - Data loss prevention segment recording the fastest growth at 18.9 percent - In 2015, roughly 10 percent of overall IT security enterprise capabilities will be delivered as a cloud service - Small and medium sized companies will rely on hosted security services to an even greater extent - Unfortunately, many organizations continue to lack staff with the appropriate security skills. To keep up with hackers, more than half of organizations will by 2018 rely on security services firms that specialize in data protection, risk and infrastructure management GET DRUNK @ BLACKHAT WITH CUTE GARTNER ANALYST
  • 11. Disposing of Counterarguments It’s all hype and scaremongering! • 15 Aug 2012, “Cutting Sword of Justice” launches cyber attack on Saudi Aramco estimated 30,000 workstations are infected • The virus erased data on three-quarters of Aramco’s corporate PCs — documents, spreadsheets, e-mails, files — replacing all of it with an image of a burning American flag • $630 Million estimated loss Hacking has been around for years, IT did not collapse! • Acts of vandalism have evolved • The intent now is to steal, demolish or in some other way monetize a specific organizations’ data We are not important enough to attract an attack! • True - for an organization that has no employees, no customers, no trade secrets and no money • Everyone else is a target Nothing can be done! • Make the attack difficult • Use risk analysis to protect the most important assets • Accept the fact IT security is a enterprise wide responsibility SAND + HEAD = HEAD IN SAND
  • 12. 2014 Year of Epic Carnage due to Pwnage EBay this year’s biggest hack so far. In May, eBay revealed that hackers had managed to steal personal records of 233 million users. Montana State Health Department revealed that a data breach may have affected more than 1 million people. The hack actually happened in July last year, but it wasn’t discovered until May this year, with the identity of the intruders, and the extent of the damage done, still unclear. I WANT ALL THE DATA P. F Chang, The chain restaurant suffered a huge data breach last month that compromised customer payment information. Thousands of newly stolen credit and debit cards went up for sale online on June 9th. Evernote was taken down with a Distributed Denial of Service (DDoS) Domino’s Pizza Hacking group Rex Mundi held Domino’s Pizza to ransom over 600,000 Belgian and French customer records. Being firmly in the cross-hairs of a computer hacker helped put a bullet into Target's fourth quarter net earnings which fell almost 46 percent due to an estimated $450 million lost when hackers stole data from millions of Target customers. CodeSpaces.com closed its doors 19 Jun 2014, following a security breach that began with a distributed denial-of-service (DDoS) attack, and ended 12 hours later after an attempt to extort money from the company.
  • 13. MY OTHER COMPUTER IS YOUR WORK COMPUTER
  • 14. Canadian Cyber Crime Threat Landscape The number of C&C servers on Canadian soil increased 83% and moved Canada to the number eight spot on the current 2013 global cybercrime list. Canada is currently fourth on the global cybercrime list for hosted phishing sites. Foreign cybercriminals are setting up virtual bases in Canada to command espionage attacks. Canada hosted the third largest volume of servers communicating with the type of highly sophisticated malware responsible for stealing valuable corporate data. OVH Canada – DEFCON IP, DNS, ASN (BGP) & Sub Domains 512K Old Router Limit A NEW LOW BAR IN BUSINESS ETHICS = HOSTING COMPANIES Dedicated Infrastructure for your Cyber Crime Business
  • 15. Case Study: Rolling Into Broken 470 End Points, 40 Servers, 80 POS in US and Canada, 300+ Employees, 1000’s of Customers Targeted Phishing Email from similar domain “arctiicglacier.ca” <- Threat Track FTW Managed Anti-Virus(MAV) - Remotely uninstall the current Anti-Virus, old Team Viewer and install our GFI agent. MAV started finding multiple infections across their network. - Symantec Enterprise End Point Sucks. <- US CERT Says so too! Monitoring Installation Templates - Using the install template settings , we created a custom template to install specific checks and services. - Performance issues identified, expired user id’s for services “Blame GFI” THEY MAKE ICE FROM A SECRET RECIPE
  • 16. Case Study: Rolling Into Broken One-Click installer - Manual – sucks for large #, Good for punishing staff/interns/new guy - Group policy MSI – AD seems broken most of the time - One-click installer – Scheduled task Using a batch script and admin cred’s Team Viewer Licensing - Old Team Viewer Installs - DIAF MAV Dies - Occasionally malware nuked MAV. - Developed a script to manually update the MAV definitions. - Downloaded Malware Bytes - just like everyone else does. SO, INTELLECTUAL PROPERTY THEFT IS UNLIKELY
  • 17. Case Study: Rolling Into Broken @echo ON IF exist c:windowsMAX.txt exit ELSE ( rem cd ~ rem cd C:Program Files (x86)Advanced Monitoring Agent rem call unins000.exe /SILENT rem cd .. rem RD /S /Q "C:Program Files (x86)Advanced Monitoring Agent” rem pause rem wmic product where name="Advanced Monitoring Agent GP" call uninstall /NOINTERACTIVE rem pause wmic product where name="Symantec Endpoint Protection" call uninstall /NOINTERACTIVE rem pause wmic product where name="TeamViewer 7 Host (MSI Wrapper)" call uninstall /NOINTERACTIVE rem pause rem call agi-corp-dc-s-1NETLOGONauto.exe wmic product call install true, "" , "agi-corp-dc-s- 1NETLOGONAGENT_AG_WPG_SCRIPT_INST_V9_4_0_GPagent.msi" /NOINTERACTIVE cd ~ cd C: echo SEP uninstall, TV7 uninstall, Max install > c:windowsMAX.txt rem pause rem shutdown /r /f )
  • 18. Security At Law Firms Two Octo - Customers - Obsessed with confidentiality - Law firms have security requirements (Law Society, State Bar, etc.) - GFI Managed Online backup (MOB) - Try to remove Internet facing unencrypted services! Proprietary Software (Java applet) #justsaynotojava One piece of software that the business regularly uses ex. “Land Titles” GFI Patch Management has to ignore java updates through patch manager Desktop & Server Security MAV Web Content Filtering not just for workstations Regular Pen Test and IDS Customization with Dash Board Alerts Q: HOW DO YOU SAVE A DROWING INFO SEC PROFESSIONAL? A: TAKE YOUR FOOT OFF HIS HEAD
  • 19. Use Case: Web Content Filtering Lawyers do a lot of research - Research on the web is dangerous - Downloading Torrents is dangerous - PDF’s and pictures of Cats are the heralds of the apocalypse & they ride upon the world wide web. DATE TOTAL REQUESTS MALICIOUS SITE REQUESTS BLOCKED REQUESTS 12-Aug-2014 44 0 0 11-Aug-2014 320 0 0 07-Aug-2014 27 0 0 06-Aug-2014 1557 35 38 05-Aug-2014 38 0 0 04-Aug-2014 32 0 0 03-Aug-2014 33 0 0 02-Aug-2014 32 0 0 01-Aug-2014 31 0 0 31-Jul-2014 232 0 0 30-Jul-2014 3257 1518 1518 29-Jul-2014 1144 1 7 28-Jul-2014 98 0 0 27-Jul-2014 101 0 0 26-Jul-2014 92 0 0 TOTAL 7038 1554 1563 FILTER ALL THE THINGS
  • 20. Auto Nmap Pen Test Used to flag changes in ports on your customers IPs - The Windows Task Scheduler set to run - An NMAP script to check for differences in the ports and to create - Windows Event Log entries. By throwing up flags in your application - GFI to do a DSC of your Event Logs and notify you when the suspect IDs How is the NMAP Script setup? - When the scan runs it has two different outputs old scan and the new scan. - After the scan is completed, the script will compare the two files and look for new ports. - If any changes have been found, an Event will be created (Different Event ID for each client), and GFI MAX will notify you of this change. VNC & RDP OPEN TO THE INTERNET = PWNAGE
  • 21. Code Stuff Automating a Pen Test with Nmap (Nmap_scan.bat) cd c:program files (x86)nmapoctopitech_scans call "c:program files (x86)nmapoctopitech_scansportscan.bat” call "c:program files (x86)nmapoctopitech_scanscomparescan.bat” set /p var=< scan_log.txt if defined var (eventcreate /l application /t warning /id 501 /d "nmap port scanning found new open ports") else (echo no new open ports found) Port_scan.bat d c:program files (x86)nmapoctopitech_scans del old_nmap_scan.xml rename new_nmap_scan.xml old_nmap_scan.xml nmap -p- -oX new_nmap_scan.xml -iL Target_IP.txt NMAP MAY TELL YOU YOUR STUPID
  • 22. Comparescan.bat cd c:program files (x86)nmapoctopitech_scans ndiff old_nmap_scan.xml new_nmap_scan.xml > compare_scan.txt find /v "+" compare_scan.txt | find "open" > scan_log.txt Notes: Target_IP.txt <-Put in all your external Customer IP Addresses Ron’s Violent Nmap for Pen Testers Nmap TCP & UDP (this is slow - up to 24 hours) ./nmap -PN -oA output/companyname --open --log-errors -p- -d2 --min-parallelism=16 --min-hostgroup=16 -T4 -sT -iL hosts.txt --script=reverse-index ./nmap -PN -oA output/companyname --log-errors --open -p- -d2 --min-parallelism=16 --min-hostgroup=16 -T4 -sU -iL hosts.txt Nmap Detailed scan, fairly safe: ./nmap -sTU -PN -oA output/companyname --open --log-errors -p[list open ports here] -d2 --min-parallelism=16 --min-hostgroup=16 -T4 -sT -iL ipaddresses.txt --script="safe or default" BREAK ALL THE THINGS Nmap Detailed scan, this can break stuff ./nmap -sTU -PN -oA output/companyname --open -- log-errors -p[list open ports here] -d2 --min-parallelism=16 --min-hostgroup= 16 -T4 -sT -iL hosts.txt --script="all and not broadcast and not *fuzz* and not *slow* and not *brute* and not *qscan* and not http-unsafe-output-escaping and not http-stored-xss"
  • 23. Scan All The Things = Security Win! - Scan AG 80+ addresses and find out what ports and associated services were open - Relayed that information back to the client and made them aware of the situation - Remediated and provided guidance on ACL’s for Firewall configuration - Automated monitoring of clients Internet facing IPs for newly closed or opened ports Note: Be sure to use the Daily Safety Check as opposed the 24x7 check. This way you will have more time to see the errors on the dashboard. FIREWALLS ARE LIKE 6 YEAR OLDS THEY NEED RULES
  • 24. Epic War Ferrets in Battle Wagon! BREAK TIME "Who Dat? Who Dat? G-F-F-I” https://www.youtube.com/watch?v=bHr7itw VsMc
  • 25. Case Study 2: Center for Christian Studies - IT Jenga, pulling one block can cause the whole thing to collapse. - Reconnaissance is key - Deploy GFI agent, you can see exactly what is going on (shit show) - Nmap the Internal and external network - Use your Brain! (Layer 0 and Layer 1 Problems) - Use Wifi Explorer to manage channels! Deploy GFI MAX - Server was completely bogged down - 2008 SBS is the Devil! - XP Workstations were missing hundreds of patches - Open ports on the Internet! Architect Solutions - Office 365 (Remove SharePoint & Exchange from Server) - Server AD, DNS, DHCP (Remove WSUS & SQL from Server) - QNAP NAS (Integrate AD File Shares) - UPS All the things! - Get authorised! (ISP, Printer Lease Company, Etc.) - MOB (Off Site Backup), Web Content Filter (Especially on the Server) THERE IS BROKEN & THEN THERE IS SUPER BROKEN
  • 26. Case Study 2: Securing The Network - No open unencrypted ports - Keep Patched and Updated - No Local Admin Permissions - Monitor all the things! (SNMP, Ping, Services (Internal and External)) - Event Log Checks & Count all the things! @echo on del old_dll_count.txt del old_exe_count.txt rem pause rename dll_count.txt old_dll_count.txt rename exe_count.txt old_exe_count.txt rem pause dir c: /s /b | find /c /i ".dll" > dll_count.txt dir c: /s /b | find /c /i ".exe" > exe_count.txt rem pause set /p OldDllCount= < old_dll_count.txt set /p NewDllCount= < dll_count.txt set /p OldExeCount= < old_exe_count.txt set /p NewExeCount= < exe_count.txt rem pause if %NewDllCount% NEQ %OldDllCount% (eventcreate /l APPLICATION /t WARNING /id 510 /d "New Dynamic Link Library found!”) if %NewExeCount% NEQ %OldExeCount% (eventcreate /l APPLICATION /t WARNING /id 511 /d "New Executible found!”) rem pause EXTRA DLL’s & EXE’s ARE NOT COOL
  • 27. Count All The Things! [Redacted] as the example. - Summary file shows where the change happened in the old file; in this case there where new executable was added between “Rental Unit Condition Report.exe.doc” and “Autorun.exe”. "28/08/2014 0:00:57.16" Comparing files old_exe_total.txt and EXE_TOTAL.TXT ***** old_exe_total.txt 52: c:DataSharedNancy- Blank DocumentsRE DeptRental UnitsRental Unit Conditon Report.exe.doc 53: c:maximizerSvrShareUtilitiesMax12_EntreAutorun.exe ***** EXE_TOTAL.TXT 52: c:DataSharedNancy- Blank DocumentsRE DeptRental UnitsRental Unit Conditon Report.exe.doc 53: c:DataUsersjenniferjre-7u40-windows-i586.exe 54: c:maximizerSvrShareUtilitiesMax12_EntreAutorun.exe ***** EASY THING TO CHECK BRAH
  • 28. Building an IDS out of GFI MAX - It takes some effort to build all the event log checks - 2003 OS, 2008 OS and 2008 R2 OS generate different event code codes AUDIT ALL THE THINGS! <- Setup Account Lockout Pro Tip: Make sure your Logs Are set to Overwrite as Required. <- Setup Audit Policy
  • 29. Building an IDS out of GFI MAX for Windows Server 2003 2003 Server Security Event Reference Guide: http://technet.microsoft.com/library/cc163121.aspx#EKH 517 The audit log was cleared. 520 The system time was changed. 529 Logon failure. A logon attempt was made with an unknown user name or a known user name with a bad password. 530 Logon failure. A logon attempt was made outside the allowed time. 531 Logon failure. A logon attempt was made using a disabled account. 532 Logon failure. A logon attempt was made using an expired account. 533 Logon failure. A logon attempt was made by a user who is not allowed to log on at the specified computer. 534 Logon failure. The user attempted to log on with a password type that is not allowed. 535 Logon failure. The password for the specified account has expired. 536 Logon failure. The Net Logon service is not active. 537 Logon failure. The logon attempt failed for other reasons. 539 Logon failure. The account was locked out at the time the logon attempt was made. 550 Notification message that could indicate a possible denial-of-service (DoS) attack. 552 A user successfully logged on to a computer with explicit credentials while already logged on as a different user. 630 A user account was deleted. 634 A global group was deleted. 638 A local group was deleted. 643 A domain policy was modified. 644 A user account was automatically locked. 647 A computer account was deleted. 653 A security-disabled global group was created. 655 A member was added to a security-disabled global group. 663 A security-disabled universal group was created. 665 A member was added to a security-disabled universal group. 685 Name of an account was changed. EVENT LOG 666 BEAST ATTACK DETECTED #airguitar!
  • 30. Building an IDS out of GFI MAX for Windows Server 2008 R2 & Windows 7 2008 R2 & Windows 7 Server Security Event Reference Guide: https://support.microsoft.com/kb/977519/en-us 5144 A network share object was deleted. 4954 Group Policy settings for Windows Firewall were changed, and the new settings were applied. 5143 A network share object was modified. 4950 A Windows Firewall setting was changed. 5142 A network share object was added. 4948 A change was made to the Windows Firewall exception list. A rule was deleted. 5141 A directory service object was deleted. 4947 A change was made to the Windows Firewall exception list. A rule was modified. 5035 The Windows Firewall Driver failed to start. 4946 A change was made to the Windows Firewall exception list. A rule was added. 5034 The Windows Firewall Driver was stopped. 4780 The ACL was set on accounts which are members of administrators groups. 5025 The Windows Firewall service was stopped. 4761 A member was added to a security-disabled universal group. 4801 The workstation was unlocked. 4751 A member was added to a security-disabled global group. 4800 The workstation was locked. 4746 A member was added to a security-disabled local group. 4781 The name of an account was changed: 4724 An attempt was made to reset an account's password. 4767 A user account was unlocked. 4723 An attempt was made to change an account's password. 4759 A security-disabled universal group was created. 4648 A logon was attempted using explicit credentials. 4749 A security-disabled global group was created. 4719 System audit policy was changed. 4744 A security-disabled local group was created. 4707 A trust to a domain was removed. 4743 A computer account was deleted. 4706 A new trust was created to a domain. 4741 A computer account was created. 4702 A scheduled task was updated. 4740 A user account was locked out. 4698 A scheduled task was created. 4738 A user account was changed. 4649 A replay attack was detected. 4726 A user account was deleted. 4625 An account failed to log on. 4725 A user account was disabled. 4616 The system time was changed. 4722 A user account was enabled. 4720 A user account was created. EVENT 1337 CULT OF THE DEAD COW PWNS YOU
  • 31. PACKET VIPER DEMO - PacketViper is a bi-directional, Point and Click, Intelligent Geo IP Threat Prevention & Detection Filter. - Geo-IP filtering allows your network to choose places in the world from which it will accept or deny network traffic. - Kelsey Lucas email: kelsey.lucas@packetviper.com The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. “Simply the best open-source application vulnerability scanner” “There is no right and wrong. There's only fun and boring.” – The Plague
  • 32. Security Tools for the #hardcore http://www.informatica64.com/forensicfoca/ FOCA (Fingerprinting Organizations with Collected Archives) Downloads all documents that have been posted on a Web site Extracts the metadata, or the information generated about the document itself. Can reveal who created the document, e-mail address, internal IP, Latitude and Longitude of images, (Internet Protocol) addresses and much more. Vulnerability scanning for auditors and security analysts. Nessus features high-speed asset discovery, patch and configuration auditing, asset profiling, sensitive data discovery, patch management integration, multi-scanner control and vulnerability analysis. “Kid, don't threaten me. There are worse things than death, and uh, I can do all of them.” – The Plague
  • 33. @Pontobunce You know when your boyfriend figures out he screwed up and then he does something really nice to make up for it? Windows 9. @SwiftOnSecurity Cloud-based systems utilized by all types of hostile forces Large scale DDOS Attacks upwards of 100GB/Sec + Critical infrastructure attacks/ POS infrastructure Attacks Exploitation of world events to amplify kinetic effects IPV6, Cellular, Wireless and 64 Bit malware Advanced Persistent Threats Cross-platform attacks combining mobile devices with traditional infrastructure targets New nation states and organizations developing offensive cyber warfare capability Reduction in kill chain exposure Advanced malware frameworks which perform reconnaissance, exploitation, exfiltration and data destruction attacks TAYLOR SWIFT INFO SEC THOUGHT LEADER using plug-in modules – Flame, Duque
  • 34. …and the winner for biggest APT to US Interests is: US Justice Department Microsoft was ordered on July 31 to comply with a U.S. Department of Justice warrant to produce emails stored at the company's data center in Ireland. Potentially sets a precedent: Any company with operations in the United States must comply with valid warrants for data, even if the content is stored overseas. FedEx has possession, custody or control of millions of packages every day, but the US government cannot force FedEx to turn over any of those packages with a subpoena. In order to seize a package in the US, the government needs a warrant. And even with a warrant, the government has no power to force FedEx to turn over packages that are outside the US. The U.S. Department of Homeland Security on July 5 arrested Roman Valerevich Seleznev, the son of a Russian lawmaker, for what it said were crimes carried out from 2009 to 2011. Roman Seleznev was apprehended in an airport in the Maldives 8 July 2014, the Russian Foreign Ministry said. THE LONG LONG LONG ARM OF ‘MERICA
  • 35. CDC & HACKERSPACES ARE LIKE BATMAN Create, educate and mentor emerging cyber defense talent. Provide resources and ethical guidance. Teach responsible disclosure of vulnerabilities. Provide expert level resources and collective learning opportunities. Facilitate hands on learning with virtual environments. Break things and learn to fix them. Network in both senses of the word. LIKE A FAT VERSION OF BATMAN
  • 36. THANK YOU Contact Information: SALES / sales@octopitech.com “IPV 6 will revolutionize how we communicate with the “Internet of Things” like your fridge, car and maybe a toaster oven because some jackass, somewhere decided that putting a web server into a toaster oven was a good idea.” - Ian Trump, 2014 Special Thanks: @MisterPhisch, @NullStream, @SpasticRobot, @Phoul @5683Monkey, @Straithe, @Nateloaf, & Oli YOU DON’T HAVE TO GO HOME, BUT YOU CANT STAY HERE

Editor's Notes

  1. Tip your waitress Throat