+ All Categories
Home > Documents > Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats...

Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats...

Date post: 22-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
19
Transcript
Page 1: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT
Page 2: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

Understanding the Threats to

Intelligently Defend: OSINT

Leonard Kleinman

Chief Cyber Security Advisor, RSA

Page 3: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

CREDIT: http://bmastech.com/society-services.html

Page 4: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

https://www.gdatasoftware.com/blog/2018/09/31037-malware-figures-first-half-2018-danger-web

Page 5: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

What is Open Source INTelligence (OSINT)?

“Any intelligence produced from publicly available

information that is collected, exploited, and disseminated in

a timely manner to an appropriate audience for the purpose

of addressing a specific intelligence requirement.” (U..S. Director of

National Intelligence and the U.S. Department of Defense (DoD)

“Minimise risk and prevent the realization of threats by

identifying, evaluating and assigning credibility to potential

cyberthreats.”

Page 6: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

The OSINT Process

Page 7: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

OSINT Tools

Page 8: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT
Page 9: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

Spam Example

URLVOID Website Reputation Checker

Page 10: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

Shodan Example

Page 11: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

Shodan Example

Page 12: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

Shodan Example

Page 13: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT
Page 14: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT
Page 15: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

Social Engineering Example

Page 16: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT
Page 17: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

CREDIT: Wikipedia CREDIT: Redteamsecure.com

Phases of the Penetration test / Red team

Page 18: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

MotivationThe data and the Money.

Monetisation of Assets.

AwarenessHumans are the weakest

link. Mandatory staff training.

Poor rate of timely

breach discovery

Increase visibility to prevent,

investigate and remediate.

Exercise CareBe mindful of the information

you share online. No work

information at all.

Your adversaries

are using it

Fundamental mechanism

employed by the bad guys. Why aren’t you using it?

Page 19: Understanding the Threats to - ETDA...UNPLUGGED ÇCYBERT ASIA2019 Kleinman Understanding the Threats to Intelligently Defend \jef Cyber Se rity Advisor Asia Pacific Japan, RSA CRT

THANK YOU!


Recommended