SlideShare une entreprise Scribd logo
1  sur  85
Fi f t y ShadesFi f t y Shades
Of REDOf RED
hi. =)
Thanks
Trigger Warnings
• Cursing
• Racism
• Religious Prejudice
• Sex
• Drugs
• Daddy / Abandonment issues
• Socio Economic Hate crimes
• Thin Skin
• Lack of sense of humor
• Sexual orientation
• Sexism
• Violence
• Vomiting
• Abuse
• Truth
• Honesty
• Facts
Anyway...
I’m Chris
AKA
@indi303
cnickerson@laresconsulting.com
https://vimeo.com/laresconsulting
http://www.scribd.com/Lares_
LARES
Custom Services
OSINT
SIGINT
TSCM/ Bug Sweeping
Exploit Development
Tool Creation
Attack Planning
Offensive Consultation
Adversarial Intelligence
Competitive Intelligence
Attack Modeling
Business ChainVuln Assessments
Custom Physical Bypass Tool
Design
Reverse Engineering
Other stuff I can’t write down…
Cost per incident
2006 – $168,000
2007 – $320,424
2008 – $500,000
2009 – $710,000
2010 – ~$1.5M
2011 – ~$3.7M
2012 – ~$4.5M
2013 – ~$5.4M
Web Application Firewalls (That’s so 1991)
Polymorphic Self Defending Worms (since the 80’s or older if
you count xmastree 1971)
Buffer Overflows (1972)
Cloud Computing (aka Centralized computing, aka Mainframe,
aka…. Remember punch cards? 1960 for IBM’ers, 1832 for
informatics)
Wireless (Bell’s Photophone 1880)
Locks (about 4,000 yrs old)
Perimeters (Since the dawn of human existence)
APT (Since the dawn of human existence)
• Financial fraud:  49 percent, over 12 percent last year (avg:
$450,000)
• Malware Infection:  UP 69 percent, over 50 percent last
year;
• Our heads are in “THE CLOUDS” and now under major
fire.
• 80% of directed attacks involved guessing, cracking, or
reusing valid credentials
• 45% of incidents included public releases of passwords
• DBIR: Over 80% of the intrusions were linked to
PHISHING!
““Seventy-nine percent of respondents selected end-users asSeventy-nine percent of respondents selected end-users as
the number one group responsible for thethe number one group responsible for the
security of cloud service providers.” –Ponemon 2012security of cloud service providers.” –Ponemon 2012
POSTULATES vs. PROOF
Common
misconceptions
• No one is just gonna WALK IN
• We have a process (and it works)
• We have a badge system that
ONLY lets in who we approve
• No one has broken in before
• It’s a lock… you NEED a key
How it’s usually done
• Conduct full test of design
• Review Policy and process
• Site inspection
• Check Access control
procedures, lighting, camera
coverage, Ingress/egress
perimeters, CCTV, intrusion
detection, environmental
concerns and barriers
Common misconceptionsCommon misconceptions
• We will get owned, what's the
point
• It will offend our users
• Doesn’t provide enough value
• No one will leak info
How it’s usually doneHow it’s usually done
• Send a 419 scam style email
• Track clicks
• Write a report to show who
clicked
What ARE we doing?
Common misconceptionsCommon misconceptions
• A Penetration Test will find
ALL the holes But… you
don’t have to test
EVERYTHING, just what's in
scope
• Identify potential impact to
the business
• Confirm vulnerabilities
identified
• Gain a “Real World” View of
an attackers ability to “hack”
the environment and resolve
issues identified
How it’s usually doneHow it’s usually done
• Do all the steps in
Vulnerability Assessment
listed previously
• Run metasploit/Core/Canvas
against hosts
• Try a few other automated
tools
• Call it “SECURE” If those
don’t work
• Do not allow the exploitation
• Restrict the hours of testing
• Restrict the length of testing
• Improperly scope / fail to include ALL assets
• Only perform externally
• Only observe
• Patch/fix/train BEFORE the test
• Only allow directed attacks ( no SE/ Phishing)
• Lack of focus on BUSINESS risk and increased focus on technical
issue
What is convergence
“The merging of distinct technologies,
industries, or devices into a unified whole.”
http://www.merriam-webster.com/dictionary/convergence
“The combining of different forms of electronic
technology, such as data processing and word
processing converging into information processing.”
http://www.thefreedictionary.com/convergence
ElectronicPhysical
EP Convergence
•Attacks on physical systems that are
network enabled
But what do I do?
Badge systems?Badge systems?
Don’t over complicate it.Don’t over complicate it.
Pacom (paycom/pacom and viewer/admin) **VideoPacom (paycom/pacom and viewer/admin) **Video
and Badgeand Badge
Pro Watch (auto login from local user by default)Pro Watch (auto login from local user by default)
WINDSX
Auth can be local OR AD creds
default username
admin:(blank)
-------------------
Ports to scan for
10002 for server
3001 and 2101
-------------------
DSX Database
port 5555 AND 5556
DB defaults as SA (blank)
Ports for management:
8888 –for activation
9999- for license
8189 – DB listening port
Url’s for management:
http://<servername>/lnl.og.web/lnl_og_aam.aspx
http://<servername>/lnl.og.web/lnl_og_videoviewer.aspx
http://<servername>/IdvmHost
Or, if they are using manual sign-on
http://<servername>/ldvmhost/?useAutomaticSSO=false
http://<servername>/AdminApp
Accounts:
SA/SA
LENEL/MULTIMEDIA
ADMIN/ADMIN
Remember
• Replace
• Add
• Promote
• Exploit
REPLACE
ADD
Promote
Exploit
SocialPhysical
PS
Convergence
•Tailgating
•Impersonation
Electronic Social
ES Convergence
•Blackmail
•Phishing
•Profiling
•Creating moles
•Being an employee
Finding Boxes
• dsquery computer domainroot -desc *xxx*
• DSQUERY Server -o rdn
• nltest /dsgetdc:<domain> /PDC or /BDC or /KDC
• Windows network search
ldifde -d "dc=corp,dc=COMPANY,dc=com" -r "(&(objectCategory=computer)
(operatingSystem=Windows 2000*))" -f out.lde
dsquery * dc=COMPANY,dc=com -filter "(&(objectCategory=computer)
(operatingSystem=Windows 2000*))"
Tips for finding users
• DSQUERY USER -name *lastname* | DSGET USER
-samid -display
• net share [sharename]
• Use the Domain search service ** look for computers and
users**
• https://github.com/mubix/netview
• Own the DC and turn on auditing fot the accounts you
are looking for
Manage->SharedFolders->sessions
NetShare
Monitor
Electronic
Physical Social
• Network Penetration Testing
• Surveillance & Implants
• Direct attack on facilities
and systems
• In person Social Engineering
• Phone conversations
• Social profiling
• Baiting
RED
TEAM
EP
Convergence
Attacks on physical systems that are network
enabled
ES Convergence
Phishing
Profiling
Creating moles
Blackmail
PS Convergence
Tailgating
Impersonation
I’m Chris
AKA
@indi303
cnickerson@laresconsulting.com
https://vimeo.com/laresconsulting
http://www.scribd.com/Lares_

Contenu connexe

Tendances

IT system security principles practices
IT system security principles practicesIT system security principles practices
IT system security principles practicesgufranresearcher
 
Lets talk about bug hunting
Lets talk about bug huntingLets talk about bug hunting
Lets talk about bug huntingKirill Ermakov
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2Scott Sutherland
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationChris Gates
 
Phish training final
Phish training finalPhish training final
Phish training finalJen Ruhman
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Eric Kolb
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningSecurityMetrics
 
Lateral Movement by Default
Lateral Movement by DefaultLateral Movement by Default
Lateral Movement by DefaultInnoTech
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Mohammed Adam
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamMohammed Adam
 
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Kirill Ermakov
 
Break IT Down by Josh Smith
Break IT Down by Josh SmithBreak IT Down by Josh Smith
Break IT Down by Josh SmithEC-Council
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDCscriptjunkie
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
Securing the “Weakest Link”
Securing the “Weakest Link”Securing the “Weakest Link”
Securing the “Weakest Link”Priyanka Aash
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesImperva
 
How Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for BusinessHow Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for BusinessSecurityMetrics
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networksjaymemcree
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructurePositive Hack Days
 

Tendances (20)

IT system security principles practices
IT system security principles practicesIT system security principles practices
IT system security principles practices
 
Lets talk about bug hunting
Lets talk about bug huntingLets talk about bug hunting
Lets talk about bug hunting
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability Scanning
 
Lateral Movement by Default
Lateral Movement by DefaultLateral Movement by Default
Lateral Movement by Default
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...
 
Break IT Down by Josh Smith
Break IT Down by Josh SmithBreak IT Down by Josh Smith
Break IT Down by Josh Smith
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDC
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Securing the “Weakest Link”
Securing the “Weakest Link”Securing the “Weakest Link”
Securing the “Weakest Link”
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known Vulnerabilities
 
How Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for BusinessHow Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for Business
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare Infrastructure
 

Similaire à 50 Shades of RED: Stories from the “Playroom” from CONFidence 2014

Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspacezapp0
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security TestingTEST Huddle
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Rui Miguel Feio
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015Daniel Miessler
 
Internet Etiqute
Internet EtiquteInternet Etiqute
Internet EtiquteAnay Mishra
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon usJonathan Sinclair
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DANeil Lines
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowAlienVault
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Cyber security & gaming - LevelUp! 2018 - v.3.1
Cyber security & gaming - LevelUp! 2018 - v.3.1Cyber security & gaming - LevelUp! 2018 - v.3.1
Cyber security & gaming - LevelUp! 2018 - v.3.1Fabrizio Cilli
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 

Similaire à 50 Shades of RED: Stories from the “Playroom” from CONFidence 2014 (20)

Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Internet Etiqute
Internet EtiquteInternet Etiqute
Internet Etiqute
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
 
Competitive Cyber Security
Competitive Cyber SecurityCompetitive Cyber Security
Competitive Cyber Security
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to Know
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Cyber security & gaming - LevelUp! 2018 - v.3.1
Cyber security & gaming - LevelUp! 2018 - v.3.1Cyber security & gaming - LevelUp! 2018 - v.3.1
Cyber security & gaming - LevelUp! 2018 - v.3.1
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 

Dernier

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Dernier (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

50 Shades of RED: Stories from the “Playroom” from CONFidence 2014

  • 1. Fi f t y ShadesFi f t y Shades Of REDOf RED
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Trigger Warnings • Cursing • Racism • Religious Prejudice • Sex • Drugs • Daddy / Abandonment issues • Socio Economic Hate crimes • Thin Skin • Lack of sense of humor • Sexual orientation • Sexism • Violence • Vomiting • Abuse • Truth • Honesty • Facts
  • 9.
  • 10.
  • 11.
  • 12.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. LARES
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Custom Services OSINT SIGINT TSCM/ Bug Sweeping Exploit Development Tool Creation Attack Planning Offensive Consultation Adversarial Intelligence Competitive Intelligence Attack Modeling Business ChainVuln Assessments Custom Physical Bypass Tool Design Reverse Engineering Other stuff I can’t write down…
  • 29.
  • 30.
  • 31.
  • 32. Cost per incident 2006 – $168,000 2007 – $320,424 2008 – $500,000 2009 – $710,000 2010 – ~$1.5M 2011 – ~$3.7M 2012 – ~$4.5M 2013 – ~$5.4M
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. Web Application Firewalls (That’s so 1991) Polymorphic Self Defending Worms (since the 80’s or older if you count xmastree 1971) Buffer Overflows (1972) Cloud Computing (aka Centralized computing, aka Mainframe, aka…. Remember punch cards? 1960 for IBM’ers, 1832 for informatics) Wireless (Bell’s Photophone 1880) Locks (about 4,000 yrs old) Perimeters (Since the dawn of human existence) APT (Since the dawn of human existence)
  • 38. • Financial fraud:  49 percent, over 12 percent last year (avg: $450,000) • Malware Infection:  UP 69 percent, over 50 percent last year; • Our heads are in “THE CLOUDS” and now under major fire. • 80% of directed attacks involved guessing, cracking, or reusing valid credentials • 45% of incidents included public releases of passwords • DBIR: Over 80% of the intrusions were linked to PHISHING!
  • 39. ““Seventy-nine percent of respondents selected end-users asSeventy-nine percent of respondents selected end-users as the number one group responsible for thethe number one group responsible for the security of cloud service providers.” –Ponemon 2012security of cloud service providers.” –Ponemon 2012
  • 40.
  • 41.
  • 42.
  • 43.
  • 45.
  • 46.
  • 47. Common misconceptions • No one is just gonna WALK IN • We have a process (and it works) • We have a badge system that ONLY lets in who we approve • No one has broken in before • It’s a lock… you NEED a key How it’s usually done • Conduct full test of design • Review Policy and process • Site inspection • Check Access control procedures, lighting, camera coverage, Ingress/egress perimeters, CCTV, intrusion detection, environmental concerns and barriers
  • 48.
  • 49. Common misconceptionsCommon misconceptions • We will get owned, what's the point • It will offend our users • Doesn’t provide enough value • No one will leak info How it’s usually doneHow it’s usually done • Send a 419 scam style email • Track clicks • Write a report to show who clicked
  • 50. What ARE we doing?
  • 51.
  • 52. Common misconceptionsCommon misconceptions • A Penetration Test will find ALL the holes But… you don’t have to test EVERYTHING, just what's in scope • Identify potential impact to the business • Confirm vulnerabilities identified • Gain a “Real World” View of an attackers ability to “hack” the environment and resolve issues identified How it’s usually doneHow it’s usually done • Do all the steps in Vulnerability Assessment listed previously • Run metasploit/Core/Canvas against hosts • Try a few other automated tools • Call it “SECURE” If those don’t work
  • 53. • Do not allow the exploitation • Restrict the hours of testing • Restrict the length of testing • Improperly scope / fail to include ALL assets • Only perform externally • Only observe • Patch/fix/train BEFORE the test • Only allow directed attacks ( no SE/ Phishing) • Lack of focus on BUSINESS risk and increased focus on technical issue
  • 54.
  • 55.
  • 56. What is convergence “The merging of distinct technologies, industries, or devices into a unified whole.” http://www.merriam-webster.com/dictionary/convergence “The combining of different forms of electronic technology, such as data processing and word processing converging into information processing.” http://www.thefreedictionary.com/convergence
  • 57. ElectronicPhysical EP Convergence •Attacks on physical systems that are network enabled
  • 58.
  • 59. But what do I do? Badge systems?Badge systems? Don’t over complicate it.Don’t over complicate it. Pacom (paycom/pacom and viewer/admin) **VideoPacom (paycom/pacom and viewer/admin) **Video and Badgeand Badge Pro Watch (auto login from local user by default)Pro Watch (auto login from local user by default)
  • 60. WINDSX Auth can be local OR AD creds default username admin:(blank) ------------------- Ports to scan for 10002 for server 3001 and 2101 ------------------- DSX Database port 5555 AND 5556 DB defaults as SA (blank)
  • 61. Ports for management: 8888 –for activation 9999- for license 8189 – DB listening port Url’s for management: http://<servername>/lnl.og.web/lnl_og_aam.aspx http://<servername>/lnl.og.web/lnl_og_videoviewer.aspx http://<servername>/IdvmHost Or, if they are using manual sign-on http://<servername>/ldvmhost/?useAutomaticSSO=false http://<servername>/AdminApp Accounts: SA/SA LENEL/MULTIMEDIA ADMIN/ADMIN
  • 62. Remember • Replace • Add • Promote • Exploit
  • 64.
  • 65. ADD
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 76.
  • 77.
  • 78. Finding Boxes • dsquery computer domainroot -desc *xxx* • DSQUERY Server -o rdn • nltest /dsgetdc:<domain> /PDC or /BDC or /KDC • Windows network search
  • 79. ldifde -d "dc=corp,dc=COMPANY,dc=com" -r "(&(objectCategory=computer) (operatingSystem=Windows 2000*))" -f out.lde dsquery * dc=COMPANY,dc=com -filter "(&(objectCategory=computer) (operatingSystem=Windows 2000*))"
  • 80. Tips for finding users • DSQUERY USER -name *lastname* | DSGET USER -samid -display • net share [sharename] • Use the Domain search service ** look for computers and users** • https://github.com/mubix/netview • Own the DC and turn on auditing fot the accounts you are looking for
  • 82.
  • 83. Electronic Physical Social • Network Penetration Testing • Surveillance & Implants • Direct attack on facilities and systems • In person Social Engineering • Phone conversations • Social profiling • Baiting RED TEAM EP Convergence Attacks on physical systems that are network enabled ES Convergence Phishing Profiling Creating moles Blackmail PS Convergence Tailgating Impersonation
  • 84.

Notes de l'éditeur

  1. Sorry ya had to wake up early
  2. And sit there to pay atteention
  3. To my stupid ppt
  4. Got drunk last night
  5. Will try not to puke while I am on stage
  6. Who we are
  7. Code review
  8. Incident response
  9. Risk Assessment
  10. Physical security
  11. PenTesting
  12. Red Teaming
  13. Keep you safe (blanket security)