+ All Categories
Home > Documents > Hacking Exposed: The Art of Deterrence (AoD)

Hacking Exposed: The Art of Deterrence (AoD)

Date post: 14-Feb-2017
Category:
Upload: lamthuan
View: 237 times
Download: 1 times
Share this document with a friend
14
SESSION ID: Hacking Exposed: The Art of Deterrence (AoD) EXP-T09 Stuart McClure Brian Wallace Cylance, Inc.
Transcript
Page 1: Hacking Exposed: The Art of Deterrence (AoD)

SESSION ID:

Hacking Exposed: The Art of Deterrence (AoD)

EXP-T09

Stuart McClure

Brian Wallace Cylance, Inc.

Page 2: Hacking Exposed: The Art of Deterrence (AoD)

#RSAC

Agenda

Setting the stage

Demo a working attack – Ripped from the Headlines! Target-esqe breach

POS Malware (Dexter)

Countermeasures Art of Deterrence (AoD)

Mathematical Prevention

Page 3: Hacking Exposed: The Art of Deterrence (AoD)

#RSAC

Setting the Stage

Corporate Network, pop an admin box with PDF exploit via email

Drops C2 server .exe and run it *

Connect to C2 and remote control box, find POS systems nearby

Push Dexter to POS, run it *

Show hijacked data

Page 4: Hacking Exposed: The Art of Deterrence (AoD)

Demo of Exploit

Page 5: Hacking Exposed: The Art of Deterrence (AoD)

Countermeasures

Page 6: Hacking Exposed: The Art of Deterrence (AoD)

#RSAC

AoD Options

Deterrence

Distraction and Disruption*

Discouragement

Attribution

Vengeance

Exposure

Humiliation

Takedown

Hack Back (and counter-attack)*

Page 7: Hacking Exposed: The Art of Deterrence (AoD)

#RSAC

Demo AoD

Identify source (Group A)

Identify source’s competitive peer (Group B)

Discover remote SQLi in Group A’s C2 to dump credentials and bypass authentication

Option #1: Incite war Pose as a legitimate, competitive hacker group

Option #2: Release vulnerability to the public (thank you metasploit!) SQLi on UID in gateway.php

Page 8: Hacking Exposed: The Art of Deterrence (AoD)

Demo of AoD

Page 9: Hacking Exposed: The Art of Deterrence (AoD)

#RSAC

Botnet 0-days

MadnessPro (DDoS) – SQLi (bypass authentication, RCE)

HerpesNet (DDoS) – SQLi (bypass authentication, RCE)

MultiLocker (Ransomware) – Hidden Backdoor (RCE)

Page 10: Hacking Exposed: The Art of Deterrence (AoD)

#RSAC

Traditional Countermeasures

Detect and Block on the IN At the perimeter (email/web gateway, firewalls)

Detect and Block on the endpoint or “at the user” AV/HIPS/WL, Device Control, EMET

Detect and Block on the OUT Beaconing and communication outbound

Page 11: Hacking Exposed: The Art of Deterrence (AoD)

#RSAC

Non-Traditional Countermeasures Prevention – Evolving from Signatures to Math…

Signature World

See an attack after it’s too late (Sacrificial Lamb required)

Identify specific (or generic) characteristics of the attack

Write a signature to detect the next attack

Unscalable, untenable, ineffective

Math World

Collect, Extract, Transform and Train, Classify.

Math future proofs

Page 12: Hacking Exposed: The Art of Deterrence (AoD)

#RSAC

Applying Math to Security Automated Machine Learning

EXTRACT

COLLECT CLASSIFY & CLUSTER

TRANSFORM, VECTORIZE

& TRAIN

BAD

GOOD

Page 13: Hacking Exposed: The Art of Deterrence (AoD)

Demo of Mathematical Prevention

Page 14: Hacking Exposed: The Art of Deterrence (AoD)

HE7 Book Signing: Now @ 5:00pm Children’s Creativity Museum


Recommended