SlideShare une entreprise Scribd logo
1  sur  57
Télécharger pour lire hors ligne
It's Okay To Touch Yourself!
DerbyCon 2013
Ben Ten
(@Ben0xA)
About Me
● 12+ years experience in Health Care
Information Systems
● Vice President & Security Officer
● Developer (Builder)
● Security Consultant, Trainer
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
About Me
● Federal Regulation Compliance
Oversight (HIPAA, HITECH, PCI,
Meaningful Use, Red Flag)
● Manager
● Gamer
● Love Science Fiction
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Overview
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
This talk is SFW!
Overview
● State of Breach Detection
● What is a Self Assessment
● Performing Fire Drills
● Pitfalls to Avoid
● Tools
● Acknowledgments
● Q&A
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
#10
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
#9
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
#8
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
#7
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
#6
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
#5
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
#4
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
#3
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
#2
DerbyConTest
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
#1
Why This Talk? Why Me?
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
A @dave_rel1k story...
Why This Talk? Why Me?
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
64% of businesses did not
detect they had a breach
until after 90 days!
Source: 2013 Global Security Report ~ Trustwave
https://www2.trustwave.com/2013GSR.html
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Approximately 70% of
breaches were discovered
by external parties who
then notified the victim.
Source: 2013 Data Breach Investigations Report ~ Verizon
http://www.verizonenterprise.com/DBIR/2013/
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Source: 2013 Data Breach Investigations Report ~ Verizon
http://www.verizonenterprise.com/DBIR/2013/
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
But we have these tools!!!11!!!two
● SIEM
● DLP
● IDS/IPS
● Logs
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
So, what's the problem?
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
● Poorly implemented tools
● Lack of implemented tools
● Or maybe it's a perception
issue...
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Security by Obscurity
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Security by Vicinity
State of Breach Detection
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Security by Divinity
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
It's time to get intimate
with your...network!
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
At the very least, the critical
parts of your network!
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
PTES – An Intro
● Pre-engagement Interactions
● Intelligence Gathering
● Threat Modeling
● Vulnerability Analysis
● Exploitation
● Post Exploitation
● Reporting
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
● Pre-engagement Interactions
● Intelligence Gathering
● Threat Modeling
● Vulnerability Analysis
● Exploitation
● Post Exploitation
● Reporting
PTES – An Intro
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
http://www.pentest-standard.org/index.php/Vulnerability_Analysis
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
http://www.pentest-standard.org/index.php/Vulnerability_Analysis
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
http://www.pentest-standard.org/index.php/Vulnerability_Analysis
DISCLAIMER
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
● I am not a professional penetration
tester. But, I am staying at the Hyatt.
● Do not attempt anything on any
network unless you have written
permission!
● Do not do this on production first. Use a
test environment!
DISCLAIMER
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
DISCLAIMER
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Getting Intimate
Know your Ports!
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Getting Intimate
Know your Logs!
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Getting Intimate
Know your Software!
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
https://www2.trustwave.com/cpn-hackers-playbook-2013-sm.html
Self Assessment
Self Assessment
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Tools
● NeXpose (Rapid7)
● Nessus (Tenable)
● BurpSuite
● Health Monitor
● nmap/zenmap
● ninite
Fire Drills
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Why?
Fire Drills
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
● Are your tools working?
● Does your team react appropriately?
● What is happening during that nmap,
nexpose, nessus, scan?
● What's the Incident Response plan and is it
working?
Pitfalls to Avoid
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
● Verify Scope!
● Start Small / Focused
● Be wary of untested tools!
● Secure your results
● Don't DoS yourself
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
“[T]he ultimate goal should be to
develop an environment in which
security events are discovered
innately—by both responsible
security professionals or others in
the organization.”
Source: 2013 Global Security Report ~ Trustwave
https://www2.trustwave.com/2013GSR.html
New Tool
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
My Big Security Idea!
New Tool
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
New Tool
Will Steele @pen_test
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
New Tool
Conclusion
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
In Conclusion
Acknowledgments
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
● @securitymoey
● @jwgoerlich
● @jaysonstreet
● @elizmmartin
● @rogueclown
● @dualcoremusic
● @derbycon
Conclusion
PoshSec Developers
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
● @mwjohnson
● @jwgoerlich
● @securitymoey
● @mortprime
● @rjcassara
● @PoshSec
Conclusion
PoshSec Framework - Beta
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
http://github.com/poshsec/poshsecframework
Conclusion
View the ReadMe!
Contact Information
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
● @Ben0xA
● Ben0xA on Freenode (IRC)
● derbycon@ben0xa.com
● http://ben0xa.com
● http://github.com/Ben0xA
● http://github.com/PoshSec
Questions?
Conclusion
Thank You!
It's Okay To Touch Yourself
Ben0xA - DerbyCon 2013
Conclusion

Contenu connexe

Tendances

Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike
 
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCyphort
 
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by C...
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by  C...[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by  C...
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by C...CODE BLUE
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For MoneyShubham Gupta
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdStrike
 
CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdStrike
 
Understanding Information Security Assessment Types
Understanding Information Security Assessment TypesUnderstanding Information Security Assessment Types
Understanding Information Security Assessment TypesHackerOne
 
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptxChi En (Ashley) Shen
 
An Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware OutbreakAn Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware OutbreakCrowdStrike
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCrowdStrike
 
Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning CrowdStrike
 
From Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedFrom Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedMITRE - ATT&CKcon
 
Navigating the Security Landscape
Navigating the Security LandscapeNavigating the Security Landscape
Navigating the Security LandscapeSucuri
 
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemUnderstanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemCrowdStrike
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
Modlishka - Is a Mantis Eating 2FA's Lunch?
Modlishka - Is a Mantis Eating 2FA's Lunch?Modlishka - Is a Mantis Eating 2FA's Lunch?
Modlishka - Is a Mantis Eating 2FA's Lunch?Lance Peterman
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeNowSecure
 
Leveraging Static Analysis to Secure Software
Leveraging Static Analysis to Secure SoftwareLeveraging Static Analysis to Secure Software
Leveraging Static Analysis to Secure SoftwareParasoft
 
Wireless crime and forensic investigation g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation   g. kipper (auerbach, 2007) wwWireless crime and forensic investigation   g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation g. kipper (auerbach, 2007) wwyesumanitvr
 

Tendances (20)

Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
 
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
 
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by C...
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by  C...[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by  C...
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by C...
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
 
CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the Indicator
 
Understanding Information Security Assessment Types
Understanding Information Security Assessment TypesUnderstanding Information Security Assessment Types
Understanding Information Security Assessment Types
 
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
 
An Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware OutbreakAn Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware Outbreak
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
 
Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning
 
From Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedFrom Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have Changed
 
Navigating the Security Landscape
Navigating the Security LandscapeNavigating the Security Landscape
Navigating the Security Landscape
 
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemUnderstanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Modlishka - Is a Mantis Eating 2FA's Lunch?
Modlishka - Is a Mantis Eating 2FA's Lunch?Modlishka - Is a Mantis Eating 2FA's Lunch?
Modlishka - Is a Mantis Eating 2FA's Lunch?
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
 
Leveraging Static Analysis to Secure Software
Leveraging Static Analysis to Secure SoftwareLeveraging Static Analysis to Secure Software
Leveraging Static Analysis to Secure Software
 
Wireless crime and forensic investigation g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation   g. kipper (auerbach, 2007) wwWireless crime and forensic investigation   g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation g. kipper (auerbach, 2007) ww
 

Similaire à It's Okay To Touch Yourself - DerbyCon 2013

Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018 Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018 Codemotion
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...NowSecure
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)Dinis Cruz
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tBeau Christensen
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborTurner and Associates, Inc.
 
Security Monitoring (SPaaS)
Security Monitoring (SPaaS)Security Monitoring (SPaaS)
Security Monitoring (SPaaS)cyberware AI
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firmsRobert Westmacott
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingaleoscon2007
 
Beyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UImozilla.presentations
 

Similaire à It's Okay To Touch Yourself - DerbyCon 2013 (20)

Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018 Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
 
BSides LA/PDX
BSides LA/PDXBSides LA/PDX
BSides LA/PDX
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 
Security Monitoring (SPaaS)
Security Monitoring (SPaaS)Security Monitoring (SPaaS)
Security Monitoring (SPaaS)
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firms
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
 
Beyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UI
 

Dernier

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

It's Okay To Touch Yourself - DerbyCon 2013

  • 1. It's Okay To Touch Yourself! DerbyCon 2013 Ben Ten (@Ben0xA)
  • 2. About Me ● 12+ years experience in Health Care Information Systems ● Vice President & Security Officer ● Developer (Builder) ● Security Consultant, Trainer It's Okay To Touch Yourself Ben0xA - DerbyCon 2013
  • 3. About Me ● Federal Regulation Compliance Oversight (HIPAA, HITECH, PCI, Meaningful Use, Red Flag) ● Manager ● Gamer ● Love Science Fiction It's Okay To Touch Yourself Ben0xA - DerbyCon 2013
  • 4. Overview It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 This talk is SFW!
  • 5. Overview ● State of Breach Detection ● What is a Self Assessment ● Performing Fire Drills ● Pitfalls to Avoid ● Tools ● Acknowledgments ● Q&A It's Okay To Touch Yourself Ben0xA - DerbyCon 2013
  • 6. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013
  • 7. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 #10
  • 8. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 #9
  • 9. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 #8
  • 10. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 #7
  • 11. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 #6
  • 12. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 #5
  • 13. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 #4
  • 14. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 #3
  • 15. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 #2
  • 16. DerbyConTest It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 #1
  • 17. Why This Talk? Why Me? It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 A @dave_rel1k story...
  • 18. Why This Talk? Why Me? It's Okay To Touch Yourself Ben0xA - DerbyCon 2013
  • 19. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 64% of businesses did not detect they had a breach until after 90 days! Source: 2013 Global Security Report ~ Trustwave https://www2.trustwave.com/2013GSR.html
  • 20. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013
  • 21. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Approximately 70% of breaches were discovered by external parties who then notified the victim. Source: 2013 Data Breach Investigations Report ~ Verizon http://www.verizonenterprise.com/DBIR/2013/
  • 22. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013
  • 23. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Source: 2013 Data Breach Investigations Report ~ Verizon http://www.verizonenterprise.com/DBIR/2013/
  • 24. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 But we have these tools!!!11!!!two ● SIEM ● DLP ● IDS/IPS ● Logs
  • 25. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 So, what's the problem?
  • 26. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 ● Poorly implemented tools ● Lack of implemented tools ● Or maybe it's a perception issue...
  • 27. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Security by Obscurity
  • 28. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Security by Vicinity
  • 29. State of Breach Detection It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Security by Divinity
  • 30. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 It's time to get intimate with your...network!
  • 31. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 At the very least, the critical parts of your network!
  • 32. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 PTES – An Intro ● Pre-engagement Interactions ● Intelligence Gathering ● Threat Modeling ● Vulnerability Analysis ● Exploitation ● Post Exploitation ● Reporting
  • 33. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 ● Pre-engagement Interactions ● Intelligence Gathering ● Threat Modeling ● Vulnerability Analysis ● Exploitation ● Post Exploitation ● Reporting PTES – An Intro
  • 34. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 http://www.pentest-standard.org/index.php/Vulnerability_Analysis
  • 35. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 http://www.pentest-standard.org/index.php/Vulnerability_Analysis
  • 36. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 http://www.pentest-standard.org/index.php/Vulnerability_Analysis
  • 37. DISCLAIMER It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 ● I am not a professional penetration tester. But, I am staying at the Hyatt. ● Do not attempt anything on any network unless you have written permission! ● Do not do this on production first. Use a test environment!
  • 38. DISCLAIMER It's Okay To Touch Yourself Ben0xA - DerbyCon 2013
  • 39. DISCLAIMER It's Okay To Touch Yourself Ben0xA - DerbyCon 2013
  • 40. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Getting Intimate Know your Ports!
  • 41. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Getting Intimate Know your Logs!
  • 42. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Getting Intimate Know your Software!
  • 43. It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 https://www2.trustwave.com/cpn-hackers-playbook-2013-sm.html Self Assessment
  • 44. Self Assessment It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Tools ● NeXpose (Rapid7) ● Nessus (Tenable) ● BurpSuite ● Health Monitor ● nmap/zenmap ● ninite
  • 45. Fire Drills It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Why?
  • 46. Fire Drills It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 ● Are your tools working? ● Does your team react appropriately? ● What is happening during that nmap, nexpose, nessus, scan? ● What's the Incident Response plan and is it working?
  • 47. Pitfalls to Avoid It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 ● Verify Scope! ● Start Small / Focused ● Be wary of untested tools! ● Secure your results ● Don't DoS yourself
  • 48. It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 “[T]he ultimate goal should be to develop an environment in which security events are discovered innately—by both responsible security professionals or others in the organization.” Source: 2013 Global Security Report ~ Trustwave https://www2.trustwave.com/2013GSR.html New Tool
  • 49. It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 My Big Security Idea! New Tool
  • 50. It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 New Tool Will Steele @pen_test
  • 51. It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 New Tool
  • 52. Conclusion It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 In Conclusion
  • 53. Acknowledgments It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 ● @securitymoey ● @jwgoerlich ● @jaysonstreet ● @elizmmartin ● @rogueclown ● @dualcoremusic ● @derbycon Conclusion
  • 54. PoshSec Developers It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 ● @mwjohnson ● @jwgoerlich ● @securitymoey ● @mortprime ● @rjcassara ● @PoshSec Conclusion
  • 55. PoshSec Framework - Beta It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 http://github.com/poshsec/poshsecframework Conclusion View the ReadMe!
  • 56. Contact Information It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 ● @Ben0xA ● Ben0xA on Freenode (IRC) ● derbycon@ben0xa.com ● http://ben0xa.com ● http://github.com/Ben0xA ● http://github.com/PoshSec Questions? Conclusion
  • 57. Thank You! It's Okay To Touch Yourself Ben0xA - DerbyCon 2013 Conclusion