Disrupting Nation State Hackers - USENIX · disrupting nation state hackers january 2016. intrusion...

Post on 06-Aug-2018

219 views 0 download

transcript

DISRUPTING NATION STATE HACKERS

JANUARY 2016

INTRUSION PHASES• Reconnaissance

• Initial Exploitation

• Establish Persistence

• Install Tools

• Move Laterally

• Collect Exfil and Exploit

RECONNAISSANCE

Intrusion Phase 1

RECONNAISSANCE

Intrusion Phase 1

RECONNAISSANCE

Intrusion Phase 1

RECONNAISSANCE

Intrusion Phase 1

INITIAL EXPLOITATION

Intrusion Phase 2

INITIAL EXPLOITATION

Intrusion Phase 2

INITIAL EXPLOITATION

Intrusion Phase 2

INITIAL EXPLOITATION

Intrusion Phase 2

ESTABLISH PERSISTENCE

Intrusion Phase 3

INSTALL TOOLS

Intrusion Phase 4

MOVE LATERALLY

Intrusion Phase 5

MOVE LATERALLY

Intrusion Phase 5

MOVE LATERALLY

Intrusion Phase 5

MOVE LATERALLY

Intrusion Phase 5

COLLECT, EXFIL AND EXPLOIT

Intrusion Phase 6

WWW.NSA.GOV

Navigate to:

- Information Assurance

-Mitigation Guidance