etichal hacking in the tdl environment - entry point north · ethical hacking and pentests. 1....

25
Etichal Hacking in the TDL environment

Upload: others

Post on 02-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Etichal Hacking in the TDL environment

Page 2: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 3: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

June 27th 2017…

Page 4: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 5: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 6: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Some stats…

…In 2017 there were more than 5200 reported securitybreaches

…more than 7.8 Billion records stolenSource: RiskBased Security (www.riskbasedsecurity.com)

Page 7: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

The average cost of a malware attack on a company is $2,4 Million

Page 8: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

50 days is the average time to resolve a malicious insider attack

23 days to resolve a ransomware attack

Page 9: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Online devices are hacked every day

• Webcams• Databases• ICS (Industrial Control Systems)• SCADA (Supervisory Control and Data Acquisition)• Network devices

Page 10: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 11: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 12: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 13: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 14: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 15: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Two types of hackers…+1

White Hat Black Hat

Page 16: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

The importance of White Hat Hacking

Something to think about during development

Page 17: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

TDL and C2 Systems

COTS hardware and software

Flaws and Vulnerabilities

Page 18: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Misconfigurations

No Hardening

Supply chain

Page 19: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Ethical hacking and pentests

Page 20: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

1. Planning & Preparation

2. Reconnaissance

3. Discovery

4. Analyzing information and risks

5. Active intrusion attempts

6. Final analysis

7. Report Preparation

Page 21: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Fuzzing!

Definition: Fuzzing is the usually automatedprocess of entering random data into a

program and analyzing the results to findpotentially exploitable bugs.

Page 22: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Security by Design!

”Security by design means that a system is constructed from start to finish with security in mind. With the base in a hardened platform.”

Page 23: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

The chain is not stronger than it´sweakest link…

Bad actors are still winning…

Weak enterprise cyber security…

…mistakes by inserting USB

Page 24: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 25: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Patrik SolstenCombitech ABEmail: [email protected]: +46 73 446 02 53