wuerthphoenix neteye presentation

52
1

Upload: others

Post on 20-Apr-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: WUERTHPHOENIX NetEye Presentation

1

Page 2: WUERTHPHOENIX NetEye Presentation

2… more than software© Würth Phoenix – December 2020

OUR PORTFOLIO

ERPIT System &

Service MGMTCRM

Business intelligence

CyberSECURITY

BUSINESSCONSULTING

SYSTEMINTEGRATION

PROJECTMANAGEMENT

SOFTWAREDEVELOPMENT

TRAINING SUPPORT

2

Page 3: WUERTHPHOENIX NetEye Presentation

3

DATA & FACTS

3© Würth Phoenix

10.467.311.280 pwned accounts

2020

90% malware

comes from email

Over 43 billion yearly spent

Threatsconstantly evolving

75% of violations

are caused by human error

… more than software

Cybercrime will never end because it is profitable and low risk

Page 4: WUERTHPHOENIX NetEye Presentation

4

CYBER SECURITY

4© Würth Phoenix

OFFENSIVE

PENETRATION TEST

SOCIAL ENGINEERING

RED TEAMING

DEFENSIVE

PASSWORD AUDIT

EXPOSURE ASSESSMENT

VULNERABILITY ASSESSMENT

GAP ANALYSIS

SECURITY TRAINING

OneTime | SaaS | SaaS&Managed

OneTime | On-Prem

… more than software

Page 5: WUERTHPHOENIX NetEye Presentation

55© Würth Phoenix

EXPOSURE ASSESSMENTOne Time | SaaS | SaaS & Managed

DEFENSIVE

Page 6: WUERTHPHOENIX NetEye Presentation

6

Verification of exposed resources

Reproduction of the attacker's point of view

Reconnaissance phase simulation

Mitigation and remediation actions

WHAT

EXPOSURE ASSESSMENT | One Time

6© Würth Phoenix D E F E N S I V E

OSINT

Page 7: WUERTHPHOENIX NetEye Presentation

7

EXPOSURE ASSESSMENT | One Time

7© Würth Phoenix D E F E N S I V E

HOW

Company inputs collection

Objects collection

Research of weaknesses

Research of correlations

Creation of a detailed report

Report presentation

Domain(s) | Keywords

Hostnames | IP addresses | Account e-mail

Remotely

Page 8: WUERTHPHOENIX NetEye Presentation

8

EXPOSURE ASSESSMENT | One Time

8© Würth Phoenix D E F E N S I V E

WHERE

Surface Web

Deep Web

Dark Web

Paste Site Search |Open Bug Bounty | Brand ReputationSocial Network | Blacklisted IPs| WayBack Machine| Telegram Groups & Channels | Data Leak Forums

Data Breach Databases | TOR Network |Cyber Attacker Group Sites

Google Dorks | Organization website

Page 9: WUERTHPHOENIX NetEye Presentation

9

Verification of exposed resources

Reproduction of the attacker's point of view

Reconnaissance phase simulation

Mitigation and remediation actions

WHAT

EXPOSURE ASSESSMENT | SaaS

9© Würth Phoenix D E F E N S I V E

OSINT

Page 10: WUERTHPHOENIX NetEye Presentation

10

EXPOSURE ASSESSMENT | SaaS

10© Würth Phoenix D E F E N S I V E

HOW

Domain(s) | keywords

Hostnames | IP address | E-mail account

Graphs | Reports | Stats | Notifications

Company inputs collection

Continuous objects collection

Research of weaknesses

Research of correlations

Autonomous use of SATAYO Portal

API for Monitoring platforms

Notification via Telegram and e-mail

Daily report generation

NetEye

Page 11: WUERTHPHOENIX NetEye Presentation

11

EXPOSURE ASSESSMENT | SaaS

11© Würth Phoenix D E F E N S I V E

WHERE

Surface Web

Deep Web

Dark Web

Paste Site Search |Open Bug Bounty | Brand ReputationSocial Network | Blacklisted IPs| WayBack Machine| Telegram Groups & Channels | Data Leak Forums

Data Breach Databases | TOR Network |Cyber Attacker Group Sites

Google Dorks | Organization website

Page 12: WUERTHPHOENIX NetEye Presentation

12

Verification of exposed resources

Reproduction of the attacker's point of view

Reconnaissance phase simulation

Mitigation and remediation actions

WHAT

EXPOSURE ASSESSMENT | SaaS & Managed

12© Würth Phoenix D E F E N S I V E

OSINT

Page 13: WUERTHPHOENIX NetEye Presentation

13

EXPOSURE ASSESSMENT | SaaS & Managed

13© Würth Phoenix D E F E N S I V E

HOW

Domain(s) | keywords

Hostnames | IP address | E-mail account

Graphs | Reports | Stats | Notifications

Company inputs collection

Continuous objects collection

Research of weaknesses

Research of correlations

Joinly use of SATAYO Web Portal

API for Monitoring platform

Analysis and solution proposal

Daily report generation

Ticket | Phone call | E-mail

NetEye

Page 14: WUERTHPHOENIX NetEye Presentation

14

EXPOSURE ASSESSMENT | SaaS & Managed

14© Würth Phoenix D E F E N S I V E

WHERE

Surface Web

Deep Web

Dark Web

Paste Site Search |Open Bug Bounty | Brand ReputationSocial Network | Blacklisted IPs| WayBack Machine| Telegram Groups & Channels | Data Leak Forums

Data Breach Databases | TOR Network |Cyber Attacker Group Sites

Google Dorks | Organization website

Page 15: WUERTHPHOENIX NetEye Presentation

15

SATAYO provides detected evidences (per

domain) appropriately filtered on the basis of

sources and keywords selected by cyber

security analysts team1.

EXPOSURE ASSESSMENT SaaS |

15© Würth Phoenix D E F E N S I V E

DEEP & DARK WEB

Ursula von derLeyenPresidente della Commissione europea

Ursula Gertrud von der Leyen, nata Albrecht, è una politica tedesca,

membro della CDU e Presidente della Commissione europea dal 1°

Dicembre 2019. Wikipedia

1 All members of our team are CEH (Certified Ethical Hacker) certified and are required to observe a specific code of ethics.

Source: https://doxbin.org/

Page 16: WUERTHPHOENIX NetEye Presentation

16

SATAYO is able to provide extracts of passwordsand accounts used to register on services that havesuffered data breaches; these are constantlyupdated by our cyber security analysts team.

DATA BREACH

EXPOSURE ASSESSMENT SaaS |

16© Würth Phoenix D E F E N S I V E

No metric can be used with certainty toindicate how costly the data breach ofa single access credential might be. Thepotential actions stemming from thatdata breach are wide-ranging and thevalues are calculated on the basis ofthe risk assessment specific to eachorganization.

Some examples

Unicredit (600k)

Università Campus Bio-medico di Roma (20k)

Page 17: WUERTHPHOENIX NetEye Presentation

1717© Würth Phoenix D E F E N S I V E

SIMILAR DOMAINS

EXPOSURE ASSESSMENT SaaS |

xn--teslamtors-dx3e.com teslamọtors.com

SATAYO is able to detect registered

domains that are similar to the one used by

your organization. In fact they could be

potentially used to generate targeted phishing

attacks (spear phishing).

Page 18: WUERTHPHOENIX NetEye Presentation

18

SATAYO shows an extraction of the

evidences (example: logs, config. files,

passwords, etc...) detected within the

repositories used by the developers of the

organization.

18© Würth Phoenix D E F E N S I V E

REPOSITORY

EXPOSURE ASSESSMENT SaaS |

Page 19: WUERTHPHOENIX NetEye Presentation

19

SATAYO shows the weaknesses detected on

the organization's resources:

unmanaged social pages poorly configured mail servers SSL misconfigurations management ports insecure protocols

WEAKNESSES

19© Würth Phoenix D E F E N S I V E

EXPOSURE ASSESSMENT SaaS |

Page 20: WUERTHPHOENIX NetEye Presentation

20

VULNERABILITY ASSESSMENTOne Time | On-Prem

20© Würth Phoenix

DEFENSIVE

Page 21: WUERTHPHOENIX NetEye Presentation

21

WHAT

VULNERABILITY ASSESSMENT | One Time

21© Würth Phoenix D E F E N S I V E

Vulnerabilities identifications

Vulnerabilities quantification

Vulnerabilities prioritization

Page 22: WUERTHPHOENIX NetEye Presentation

22

VULNERABILITY ASSESSMENT | One Time

22© Würth Phoenix D E F E N S I V E

HOW

Private IP addresses | Public IP addressesScope of engagement definition

Cataloging of assets & resources

Identification of vulnerabilities for each resource

Vulnerability analysis and solution proposal

Creation of a detailed report

Report presentation Remotely

Page 23: WUERTHPHOENIX NetEye Presentation

23

VULNERABILITY ASSESSMENT | One Time

23© Würth Phoenix D E F E N S I V E

WHERE

Networking equipments

WiFi

Server & clients

IoT & IIoT

Page 24: WUERTHPHOENIX NetEye Presentation

24

WHAT

VULNERABILITY ASSESSMENT | On-Prem

24© Würth Phoenix D E F E N S I V E

Vulnerabilities identifications

Vulnerabilities quantification

Vulnerabilities prioritization

Page 25: WUERTHPHOENIX NetEye Presentation

25

VULNERABILITY ASSESSMENT | On-Prem

25© Würth Phoenix D E F E N S I V E

HOW

Private IP addresses | Public IP addressesScope of engagement definition

Cataloging assets & resources

Continuous identification of vulnerabilities

Integration of 3rd party system Monitoring | SIEM

For each resource

Page 26: WUERTHPHOENIX NetEye Presentation

26

VULNERABILITY ASSESSMENT | On-Prem

26© Würth Phoenix D E F E N S I V E

WHERE

Networking equipments

Server & clients

IoT & IIoT

Page 27: WUERTHPHOENIX NetEye Presentation

27

GAP ANALYSIS

27© Würth Phoenix

DEFENSIVE

Page 28: WUERTHPHOENIX NetEye Presentation

28

WHAT

GAP ANALYSIS

28© Würth Phoenix D E F E N S I V E

Identification of current risk controls

Identification of residual risks

Page 29: WUERTHPHOENIX NetEye Presentation

2929© Würth Phoenix D E F E N S I V E

HOW

Interview to organization key people

Use of CIS Controls

Analysis of «AS IS»

Identification of «TO BE» set of cyber actions

Creation of a detailed report

Report presentation

GAP ANALYSIS

TM

Remotely

Page 30: WUERTHPHOENIX NetEye Presentation

3030© Würth Phoenix D E F E N S I V E

WHERE

GAP ANALYSIS

Physical interview

Remote interview

Page 31: WUERTHPHOENIX NetEye Presentation

3131© Würth Phoenix

SECURITY TRAINING

DEFENSIVE

Page 32: WUERTHPHOENIX NetEye Presentation

32

WHAT

32© Würth Phoenix D E F E N S I V E

SECURITY TRAINING

Cyber Security Essential

Cyber Security Intermediate

Cyber Security Advanced

Exposure Analysis with OSINT

Social Engineering + ETEL game

Industrial Control System Security

Tailored to the needs of the organization

Page 33: WUERTHPHOENIX NetEye Presentation

3333© Würth Phoenix D E F E N S I V E

HOW

SECURITY TRAINING

Class room

Training on the job

Page 34: WUERTHPHOENIX NetEye Presentation

3434© Würth Phoenix D E F E N S I V E

WHERE

SECURITY TRAINING

Customer site

Würth Phoenix

Microsoft Teams

Page 35: WUERTHPHOENIX NetEye Presentation

35

PENETRATION TEST

35© Würth Phoenix

OFFENSIVE

Page 36: WUERTHPHOENIX NetEye Presentation

36

WHAT

O F F E N S I V E 36© Würth Phoenix

Exploits detected vulnerabilities

Performed according to standard methodology

PENETRATION TEST

Page 37: WUERTHPHOENIX NetEye Presentation

37

HOW

Vulnerability Assessment

Research on vulnerabilities exploitation

Exploit

Creation of a detailed report

Report Presentation

PENETRATION TEST

O F F E N S I V E 37© Würth Phoenix

NIST Methodology

Page 38: WUERTHPHOENIX NetEye Presentation

38

WHERE

PENETRATION TEST

O F F E N S I V E 38© Würth Phoenix

Networking equipments

WiFi

Server & clients

IoT & IIoT

Web services

Web applications

Mobile applications

Page 39: WUERTHPHOENIX NetEye Presentation

39

PASSWORD AUDIT

39© Würth Phoenix

OFFENSIVE

Page 40: WUERTHPHOENIX NetEye Presentation

40

WHAT

O F F E N S I V E 40© Würth Phoenix

Dictionary attack

Rainbow Table attack

Brute Force attack

Hybrid attack

PASSWORD AUDIT

Page 41: WUERTHPHOENIX NetEye Presentation

41

HOW

Company inputs collection

Cracking execution

Creation of a detailed report

Report presentation

PASSWORD AUDIT

O F F E N S I V E 41© Würth Phoenix

Password hashes

One method | Multi method

Remotely

Page 42: WUERTHPHOENIX NetEye Presentation

42

WHERE

PASSWORD AUDIT

O F F E N S I V E 42© Würth Phoenix

Active Directory

Database

WiFi

Page 43: WUERTHPHOENIX NetEye Presentation

4343© Würth Phoenix

SOCIAL ENGINEERING

OFFENSIVE

Page 44: WUERTHPHOENIX NetEye Presentation

44

WHAT

O F F E N S I V E 44© Würth Phoenix

Exploits of human factor

SOCIAL ENGINEERING

Page 45: WUERTHPHOENIX NetEye Presentation

45

HOW

SOCIAL ENGINEERING

O F F E N S I V E 45© Würth Phoenix

Phishing | Dumpster diving | Evil TwinImpersonation | Baiting | Vishing | Lockpicking

Choice of Attack Vector(s)

Info gathering

Attack simulation

Creation of a detailed report

Report presentation

OSINT

Page 46: WUERTHPHOENIX NetEye Presentation

46

WHERE

SOCIAL ENGINEERING

O F F E N S I V E 46© Würth Phoenix

Employees

Top management

Key people

Page 47: WUERTHPHOENIX NetEye Presentation

4747© Würth Phoenix

RED TEAMING

OFFENSIVE

Page 48: WUERTHPHOENIX NetEye Presentation

48

WHAT

O F F E N S I V E 48© Würth Phoenix

RED TEAMING

Multi-layered attack simulation

Organization's detection and response capabilities test

Focuses on the objectives rather than on used methods

Page 49: WUERTHPHOENIX NetEye Presentation

49

HOW

RED TEAMING

O F F E N S I V E 49© Würth Phoenix

Info gathering

Identification of weaknesses

Attack simulation

Creation of a detailed report

Report presentation

OSINT

Remotely

Page 50: WUERTHPHOENIX NetEye Presentation

50

WHERE

RED TEAMING

O F F E N S I V E 50© Würth Phoenix

All organizational resources

Page 51: WUERTHPHOENIX NetEye Presentation

51

THE RIGHT SERVICE

… more than software© Würth Phoenix 51

PEOPLE

PROCESS

IT SERVICES

ORGANIZATION

INCREASING AWARENESS

POSTURE COMPLIANCY

SECURITY IMPROVEMENT

INCIDENT DETECTION

RESPONSE CAPABILITY

SECURITY TRAINING

SOCIAL ENGINEERING

PASSWORDAUDIT

GAP ANALYSIS

PENETRATION TEST

EXPOSURE ASSESSMENT

RED TEAMING

VULNERABILITYASSESSMENT

Page 52: WUERTHPHOENIX NetEye Presentation

52© Würth Phoenix 52… more than software