i’m a suit in a cyber world!

123
1 I’m a Suit in a Cyber World! October 2011 Twitter: #cybergamut

Upload: gaye

Post on 25-Feb-2016

41 views

Category:

Documents


0 download

DESCRIPTION

October 2011. I’m a Suit in a Cyber World!. Twitter: #cybergamut. Employment History. Financial Services. Employment History. Suit. Financial Services. Employment History. Ski Bum. Employment History. Not-a-Suit. Ski Bum. Employment History. USAF Officer. Employment History. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: I’m a Suit in a Cyber World!

1

I’m a Suit in a Cyber

World!

October 2011

Twitter: #cybergamut

Page 2: I’m a Suit in a Cyber World!

2

Employment History

Financial Services

Page 3: I’m a Suit in a Cyber World!

3

Employment History

Financial Services

Page 4: I’m a Suit in a Cyber World!

4

Employment History

Ski Bum

Page 5: I’m a Suit in a Cyber World!

5

Employment History

Ski Bum

Page 6: I’m a Suit in a Cyber World!

6

Employment History

USAF Officer

Page 7: I’m a Suit in a Cyber World!

7

Employment History

USAF Officer

Page 8: I’m a Suit in a Cyber World!

8

Employment History

SAIC

Page 9: I’m a Suit in a Cyber World!

9

Employment History

SAIC Program Manager

Page 10: I’m a Suit in a Cyber World!

10

Employment History

SAIC Program Manager

Page 11: I’m a Suit in a Cyber World!

11

Employment History

SAIC Division Manager

Page 12: I’m a Suit in a Cyber World!

12

Employment History

SAIC Division Manager

Page 13: I’m a Suit in a Cyber World!

13

Employment History

SAIC Capture Manager

Page 14: I’m a Suit in a Cyber World!

14

Employment History

SAIC Capture Manager

Page 15: I’m a Suit in a Cyber World!

15

Education History

King CollegeBA Economics & Business

Administration

Page 16: I’m a Suit in a Cyber World!

16

Education History

King CollegeBA Economics & Business

Administration

Page 17: I’m a Suit in a Cyber World!

17

Education History

Chartered Life Underwriter

Page 18: I’m a Suit in a Cyber World!

18

Education History

Chartered Life Underwriter

Page 19: I’m a Suit in a Cyber World!

19

Education History

UMD EuropeBowie State University

MS Management Information Systems

Page 20: I’m a Suit in a Cyber World!

20

Education History

UMD EuropeBowie State University

MS Management Information Systems

Page 21: I’m a Suit in a Cyber World!

21

Education History

PMP

Page 22: I’m a Suit in a Cyber World!

22

Education History

PMP

Page 23: I’m a Suit in a Cyber World!

23

Education History

GCIH

Page 24: I’m a Suit in a Cyber World!

24

Education History

GCIH

Page 25: I’m a Suit in a Cyber World!

25

Large Cyber Procurements

SAIC Capture Manager

Page 26: I’m a Suit in a Cyber World!

26

Large Cyber Procurements

> $250,000,000

Page 27: I’m a Suit in a Cyber World!
Page 28: I’m a Suit in a Cyber World!
Page 29: I’m a Suit in a Cyber World!

29

Introduction to

cybergamut

Page 30: I’m a Suit in a Cyber World!

30

History and Why Change• In 2008 SAIC established cybernexus

– Coming together or “nexus” of cyber analysts– Central Maryland

• In 2011 cybernexus renamed cybergamut– Runs the “gamut” of cyber disciplines– Global organization

• cybergamut nodes– Socorro, New Mexico– Sioux Falls, South Dakota– San Antonio, Texas– Northern Virginia (Tysons Corner and Herndon)

Page 31: I’m a Suit in a Cyber World!

31

Mission Statement

cybergamut is a worldwide community of practice for cyber professionals across industry, academia, and government providing ongoing education, training, and certification opportunities throughout all phases of a cyber professional’s career, utilizing traditional methods as well as non-traditional techniques like puzzles, Easter Eggs, and problem solving.

Page 32: I’m a Suit in a Cyber World!

32

Easter Eggs

Page 33: I’m a Suit in a Cyber World!

33

Easter Eggs (eeggs.com)

Page 34: I’m a Suit in a Cyber World!

34

Challenge Cards

Page 35: I’m a Suit in a Cyber World!

35

Challenge Coin

Page 36: I’m a Suit in a Cyber World!

36

Technical Tuesday

• What it is – a technical exchange

• What it is not– A sales presentation– A product endorsement– For discussion of procurements – For discussion of procurement related issues

Page 37: I’m a Suit in a Cyber World!

37

PDU and CPE

• PMI PDU’s– PMI Baltimore approved most Technical Tuesday

events as eligible for PMI PDU’s under Category B, Continuing Education

• CPE’s for CISSP– Self certification

• Other certifications– What do you need?

Page 38: I’m a Suit in a Cyber World!

38

Previous Topics• Defending a Large Network

– Brian Rexroad of AT&T– 2 Dec 2008

• DNI Essentials– Paul Schnegelberger of SAIC and John Sanders of

Northrop Grumman TASC– Nov/Dec 2008

• Digital Forensics– Jim Jaeger of General Dynamics– 13 Jan 2009

• Case Studies in Cyber Attacks – Aaron Wilson of SAIC– 13 Jan 2009

• Trickler– Greg Virgin of RedJack– 27 Jan 2009

• Security Tools– Peiter “Mudge” Zatko of BBN– 27 Jan 2009

• IPv6– David Harris of SAIC– 10 Feb 2009

• Exploitation Prediction – Darryl Ackley of New Mexico Tech– 24 Feb 2009

• Analytic and IO Tools– Clift Briscoe and Nat Cooper of Edge– 24 Mar 2009

• Distributed Systems Technologies and Internet Intelligence

– George Economou of Akamai– 24 Mar 2009

• Exploring the Social World of the Russian Hacker Community

– Tom Holt of Michigan State University– 10 Mar 2009

• Modern Forensic Investigative Techniques – Amber Schroader of Paraben– 10 Mar 2009

• Defending Against BGP Man-In-The-Middle Attacks

– Earl Zmijewski of Renesys– 14 Apr 2009

• Examining the Storm Worm– Nico Lacchini of TDI– 26 May 2009

• No-Tech Hacking– Johnny Long– 11 Jun 2009

• Dirty Secrets of the Security Industry– Bruce Potter of Ponte Technologies– 14 Jul 2009

• Windows Forensic Analysis: Dissecting the Windows Registry

– Rob Lee of MANDIANT and the SANS Institute– 18 Aug 2009

• Silence of the RAM– Sean Bodmer of Savid Corporation– 22 Sep 2009

• VoIP Security - Attacks, Threats and Countermeasures

– Stuart McLeod of Global Knowledge– 3 Nov 2009

Page 39: I’m a Suit in a Cyber World!

39

Previous Topics cont.• A Tale of Two Departments – How Commerce

and State Dealt With Chinese Intrusions: Lessons Learned Plus: Security Heroes and the 20 Critical Controls

– Alan Paller of the SANS Institute– 9 Mar 2010

• Aurora– Aaron Barr of HBGary Federal– 27 Apr 2010

• Malware reverse engineering at ITT – Paul Frank of ITT– 25 May 2010

• Advanced Cyber Collection Techniques; Extracting and Analyzing Information from the Domain Name System

– Tim Cague of The CYAN Group– 10 Aug 2010

• The Rise of the Social Web – Aaron Barr of HBGary Federal– 5 Oct 2010

• Why Security People S#ck – Gene Bransfield of Tenacity Solutions– 9 Nov 2010

• Insider Threat and Real-World Incident Study– Presented by Michael Collins & Greg Virgin of

RedJack along with Jim Downey of DISA PEO-MA– 30 Nov 2010

• Network Monitoring– Josh Goldfarb of 21st Century Technologies– 4 Jan 2011

• Network Device Exploitation with Universal Plug & Play

– Terry Dunlap of Tactical Network Solutions– 8 Feb 2011

• Deep Packet Inspection for Cybersecurity ASW&R

– Jeff Kuhn of Pangia Technologies– 29 Mar 2011

• Stuxnet Redux: Malware Attribution & Lessons Learned

– Tom Parker of Securicon – 19 Apr 2011

• Special Technical Tuesday and renaming– 10 May 2011

• APT Intrusion Remediation: The Top Do's and Don'ts

– Rob Lee of MANDIANT and The SANS Institute– 24 May 2011

• Deep Packet Inspection– Peder Jungck of Cloudshield and SAIC– 28 Jun 2011

• Our Security Status is Grim– Brian Snow– 19 Jul 2011

• Cellular Security– Jason MacLulich of Endace– 9 Aug 2011

• Government Cyber Technical Directors’ Panel– 30 Aug 2011

Page 40: I’m a Suit in a Cyber World!

40

Upcoming Technical Tuesdays• Hacking Windows 7 and defending against physical attacks

– 18 Oct 2011– Jesse Varsalone

• Looking for more speakers and topics such as:– Tor routing– Malware reverse engineering– Cyber situational awareness– Splunk– Cloud computing and cloud forensics– Geolocation of IP addresses and mobile devices– Digital forensics– E-discovery– Attack attribution– Deep packet inspection– Fuzzing– Writing secure code

To suggest topics, volunteer to speak, or to receive an invitation, please contact: [email protected]

Page 41: I’m a Suit in a Cyber World!

41

Interesting Topics from the Chief 5uit’s Perspective

Page 42: I’m a Suit in a Cyber World!

42

Remember!

Page 43: I’m a Suit in a Cyber World!

43

Dash

Page 44: I’m a Suit in a Cyber World!

44

Foreign Language• 1337 = LEET = short for elite (maybe)

– 5uit = Suit• Pwn = Own

– Your computer has been pwned• Teh = the

– Accidents become purposeful– This was before spell checkers – hard to do now

• Texting– LOL– ROFL– - OMG Powerpoint translated : and ) to this

Page 45: I’m a Suit in a Cyber World!

45

Different Culture

• 95% male• Black T-shirts• Interesting facial hair• Body art• Add alcohol and mix vigorously• Stickers everywhere• Lock picking for fun (lock sport)• Hackers aren’t all Bad

– I Hack Charities• As a 5uit, I’m counter-counter-culture

Page 46: I’m a Suit in a Cyber World!
Page 47: I’m a Suit in a Cyber World!
Page 48: I’m a Suit in a Cyber World!
Page 49: I’m a Suit in a Cyber World!

49

Pure evil

• Wireless diabetes pump exploit

Page 50: I’m a Suit in a Cyber World!

50

Pure evil – or is it?

• Wireless diabetes pump exploit

• Exploit released by a pump user• Wants manufacturer to fix the problem

• This is typical of many of the things released

Page 51: I’m a Suit in a Cyber World!

51

Bot in a Botnet

• What’s a Bot and what’s a Botnet?– Computers that have been taken over– Used for distribution of Spam and Malware– Used for other nefarious deeds

Page 52: I’m a Suit in a Cyber World!

52

Bot in a Botnet

• What’s a Bot and what’s a Botnet?– Computers that have been taken over– Used for distribution of Spam and Malware– Used for other nefarious deeds

• Does your Mom care?

Page 53: I’m a Suit in a Cyber World!

53

Bot in a Botnet

• What’s a Bot and what’s a Botnet?– Computers that have been taken over– Used for distribution of Spam and Malware– Used for other nefarious deeds

• Does your Mom care?

• Do you care?

Page 54: I’m a Suit in a Cyber World!

Digital Hygiene

Page 55: I’m a Suit in a Cyber World!

You can’t Patch Stupid!!!

Page 56: I’m a Suit in a Cyber World!

You can’t Patch Stupid!!!

Don’t be “Stupid”

Page 57: I’m a Suit in a Cyber World!
Page 58: I’m a Suit in a Cyber World!
Page 59: I’m a Suit in a Cyber World!
Page 60: I’m a Suit in a Cyber World!
Page 61: I’m a Suit in a Cyber World!
Page 62: I’m a Suit in a Cyber World!
Page 63: I’m a Suit in a Cyber World!
Page 64: I’m a Suit in a Cyber World!
Page 65: I’m a Suit in a Cyber World!
Page 66: I’m a Suit in a Cyber World!
Page 67: I’m a Suit in a Cyber World!
Page 68: I’m a Suit in a Cyber World!
Page 69: I’m a Suit in a Cyber World!
Page 70: I’m a Suit in a Cyber World!
Page 71: I’m a Suit in a Cyber World!
Page 72: I’m a Suit in a Cyber World!
Page 73: I’m a Suit in a Cyber World!
Page 74: I’m a Suit in a Cyber World!

Don’t use Reply All in a Mail

Storm!!!

Page 75: I’m a Suit in a Cyber World!

You can’t Patch Stupid!!!

Page 76: I’m a Suit in a Cyber World!

76

Social Engineering

• Extremely effective

• DEFCON Social Engineering Contest– Amazing what people will give away– Help desks were overly helpful

Page 77: I’m a Suit in a Cyber World!
Page 78: I’m a Suit in a Cyber World!

Click OK to Continue

Page 79: I’m a Suit in a Cyber World!

79

Should I proceed?

Page 80: I’m a Suit in a Cyber World!

80

Should I proceed? I did!!!

Page 81: I’m a Suit in a Cyber World!

81

Phishing and Spearphishing

• E-mails and targeted e-mails– Usually with a link– Watch for typo’s and misspelllings

• V1AGRA

• [Insert company name here] has been sold!

Page 82: I’m a Suit in a Cyber World!

82

Classic Phishing – not Nigeria

Page 83: I’m a Suit in a Cyber World!

83

Phishing maybe???

Page 84: I’m a Suit in a Cyber World!

84

Phishing from GA – Bot??

Page 85: I’m a Suit in a Cyber World!

85

Spearphishing

Page 86: I’m a Suit in a Cyber World!

86

Corporate Response

Page 87: I’m a Suit in a Cyber World!

87

Another One!

Page 88: I’m a Suit in a Cyber World!

88

Phishing and Spearphishing• E-mails and targeted e-mails

– Usually with a link– Watch for typo’s and misspelllings

• V1AGRA

• [Insert company name here] has been sold!

• DEFCON Skybox Demo– Trend tracking via Twitter– Tracking an individual via Social Media– Tiny urls and Bit.ly

Page 89: I’m a Suit in a Cyber World!

89

GPS and other evil devices

• GPS, iPhones, etc remember everything

• iPhones sync EVERYTHING with their host

• Windows 7 Registry saves things a long time

• Forensics examiner’s dream

• Car thieves “Go Home”– You’re not home and now you’re stranded

Page 90: I’m a Suit in a Cyber World!

90

GPS and other evil devices

• GPS, iPhones, etc remember everything

• iPhones sync EVERYTHING with their host

• Windows 7 Registry saves things a long time

• Forensics examiner’s dream

• Car thieves “Go Home”– You’re not home and now you’re stranded

Page 91: I’m a Suit in a Cyber World!

91

Supply Chain

• Where was your code written?• Where was your hardware produced?• How did it get to you?

• Thumb drives• Hard drives

Page 92: I’m a Suit in a Cyber World!

92

X begets Y begets Z…• Needs beget innovation• Innovation begets technology• Policy and strategy follow

– aren’t necessarily “begotten”• Lack of policy begets ineffective or non-strategy• Doctrine is the military word for policy• Tactics are the refinement of military strategy• difference between responsibility and authority

– DHS has responsibilities– DoD has many clearly defined authorities

• National Cyber Policy is challenging– AFCEA story

Page 93: I’m a Suit in a Cyber World!

93

Steganography

• Stuff hidden in pictures• Stuff hidden in other non-obvious places

Page 94: I’m a Suit in a Cyber World!

94

Who votes for #1?

Page 95: I’m a Suit in a Cyber World!

95

Who votes for #2?

Page 96: I’m a Suit in a Cyber World!

96

Who votes for #3?

Page 97: I’m a Suit in a Cyber World!

97

Who votes for #4?

Page 98: I’m a Suit in a Cyber World!

98

Steganography

• Let’s check your votes . . .

Page 99: I’m a Suit in a Cyber World!

99

#1 Malamute???; not Malware

Page 100: I’m a Suit in a Cyber World!

100

#2

Page 101: I’m a Suit in a Cyber World!

101

#2 is Malodorous; not Malware

Page 102: I’m a Suit in a Cyber World!

102

#3 is Mal-wear; not Malware

Page 103: I’m a Suit in a Cyber World!

103

#4 is Malicious; not Malware

Page 104: I’m a Suit in a Cyber World!

104

Steganography

• None of those pictures– I don’t think anyway…

• Very hard to detect in a single picture– Potential detection if you have both pictures

50 KB 450 KB

Page 105: I’m a Suit in a Cyber World!

105

Other Scary/Cool Concepts

• Segmented polymorphic malware– Bad stuff that changes its looks, delivered in parts

• Metamorphic malware– Bad stuff that changes what it does

• Cloud Computing – distributed virtualization– Which denomination?

• Hadoop – son’s toy elephant– Cloud Security– Cloud Forensics

• Zero-day– Brand new malware or exploits

Page 106: I’m a Suit in a Cyber World!

106

Should I click?

Page 107: I’m a Suit in a Cyber World!

107

Social Networking

• “On the Internet, nobody knows you’re a dog”– New Yorker Magazine, 1993– Still true today

• Do you really know who your Friends are?– Would you cross the street to see them in person?– What are you revealing in your posts?

Page 108: I’m a Suit in a Cyber World!

108

Fake Profile???

Page 109: I’m a Suit in a Cyber World!

109

Social Networking• “On the Internet, nobody knows you’re a dog”

– New Yorker Magazine, 1993– Still true today

• Do you really know who your Friends are?– Would you cross the street to see them in person?– What are you revealing in your posts?

• “My Daddy’s dating…”• Twitter - #cybergamut

– Spontaneous and quick– No filter– No retraction after re-tweet

Page 110: I’m a Suit in a Cyber World!
Page 111: I’m a Suit in a Cyber World!

Need this

button

Page 112: I’m a Suit in a Cyber World!

112

Location-based Services

• Facebook Places and Foursquare• Preparation for Travel

– Set up light timers– Make your home look lived in

• “Check in” at out of state locations• Photo metadata• Okay for my Friends to know• What about Friends of Friends?

– What about Mafia Wars Friends of Friends?

Page 113: I’m a Suit in a Cyber World!

113

Facebook Places

Page 114: I’m a Suit in a Cyber World!

114

Clearly Out of Town

Page 115: I’m a Suit in a Cyber World!

• Photo metadata

Page 116: I’m a Suit in a Cyber World!

• Photo metadata

• Facebook actually removes the location information

Page 117: I’m a Suit in a Cyber World!

117

User Names and Passwords• Anonymous and LULZ Sony Attacks

– 77 million users affected

• Other large data thefts

• User Name and Password combinations– How many do you use?

– Remember the Bots?!?

– This got my attention!

Page 118: I’m a Suit in a Cyber World!

118

What do we do?

• I don’t know…

• I think education helps…

Page 119: I’m a Suit in a Cyber World!

119

Cyber Increases

• Volume

• Variety

• Velocity

Page 120: I’m a Suit in a Cyber World!

120

Cyber Increases

• Volume = 123 slides

• Variety

• Velocity

Page 121: I’m a Suit in a Cyber World!

121

Cyber Increases

• Volume = 123 slides

• Variety = 25 topics

• Velocity

Page 122: I’m a Suit in a Cyber World!

122

Cyber Increases

• Volume = 123 slides

• Variety = 25 topics

• Velocity = 1 hour = ~29 sec per slide

Page 123: I’m a Suit in a Cyber World!

123

That’s all we’ve got!