Top Banner
Tbilisi, 14 September 2017 David Kvatadze CERT-GOV-GE Regional Cooperation, Activities & Services
43

CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Mar 23, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Tbilisi, 14 September 2017

David Kvatadze

CERT-GOV-GE

Regional Cooperation,

Activities & Services

Page 2: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

CERT-GOV-GE - Structural unit was formed within the Information Security

and Policy division of LEPL Data Exchange Agency under the Ministry of

Justice of Georgia, which processes, analyses and solves information security

incidents.

Page 3: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Organizational Framework

Ministry of Justice

Data Exchange AgencyMinistry of Internal Affair

Cyber Crime Division

24/7 International

Contact Point

Minister of Defense

Cyber Security

Bureau

State Security and Crisis

Management Council

Established in January 2014

Under the Direct Subordination of the Prime-Minister

Established In December 2012 as a

Structural Unit of the Ministry of

Internal Affairs

Cybercrime division is the only agency

that has Investigatory functions on all

types of Cyber Incidents;

Established in 2014 Under

Supervision of Ministry of

Defense of Georgia

Established in January 2010

Under Supervision on Ministry of

Justice

Information Security Development.

and management of CERT.GOV.GE

State Security

Service of Georgia

Established In 2015

Public

Sector +

SCIS

Cyber CrimeState Secret

Military

Public

Sector +

SCIS

Cyber CrimeState Secret

MilitaryPublic

Sector +

SCIS

Cyber CrimeState Secret

MilitaryPublic

Sector +

SCIS

Cyber CrimeState Secret

Military

Personal Data Protection

Inspectorate

Established in January 2013

Page 4: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

CERT-GOV-GE Constituency

CERT-

GOV-

GE

Critical

Information

systems

subject

Banks

Internet

service

providers

International

CERT’sGovt. Sector

Pvt. Sector

Hosting

Providers

Page 5: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

We are members of the following organizations:

The Cyber security Executing Arm Of The UNITED NATIONS

SPECIALISED AGENCY of The International Telecommunication Union (ITU)

We are full member of FIRST. FIRST is the Forum of Incident Response and

Security Teams.

The Trusted Introducer - a.k.a. TI - is the trusted backbone of the Security

and Incident Response Team community in Europe.

CERT-GOV-GE is Authorized To Use CERT Trademark.

Page 6: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Team Member Certificates:

SANS GIAC Certified Professionals (GIAC)

Systems and Network Auditor (GSNA)

Hacker Tools, Techniques, Exploits and Incident Handling (GCIH)

Secure Coding in Java/JEE: Developing Defensible Applications (GSSP-JAVA)

Certified Information Systems Security Professional

TRANSITS: CSIRT Training

Page 7: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

CERT-GOV-GE Constituency

Page 8: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Blacklist Service

IP and Domain blacklist.

Different formats for different software.

Available for Organization's.

http://blacklists.cert.gov.ge

Safe DNS Georgia

Integrated with Collective Intelligence Framework.

Blocks malware domains and redirecting to warning page.

First DNSSEC Enabled Resolver In Georgia.

5.159.16.165.159.20.20

Page 9: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Network Monitoring Services

NetFlow Sensors (NfDump & NfSen)Network Analyze NetFlow Data For Security.Detects: SSH Brute Force Attacks. Botnets. dDoS Attacks.

Sensor Network Services (Snort):

Automated analysis of the security of the network flow problems.

VRT rules of the Securities and install for free. If you wish to separate physical server for the

organization.

Page 10: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

CERT-GOV-GE Honeypots

•Emulation Of Popular Vulnerable Software

•Using Open Source Honeypot Software:

•Kippo (ssh)

•Dionaea (SMB, http, tftp, MSSQL, MySQL, SIP)

•Conpot (SCADA)

•Capturing Attacker IP Addresses

•More Than 2000 Attacks Per Day

Open Source Project.

Monitors Web Pages for Intrusions (Exploits, Hacker Signatures, Information Leakage).

Custom Rule Based Detection.

Website Intrusion Detection (Threat Factor)

Page 11: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Penetration Test

Spear Phishing Attack Simulation

• Sending e-mail phishing links.

• Phishing attacks by the organization to personalize.

• Any WEB mobile Simulation Built-in educational page.

• Statistics.

Page 12: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 13: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Incident Handling

Contact: [email protected]

Page 14: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Partners:

CERT-EE

Page 15: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Information Provided Daily About Georgian Infections:

Infected 10 000 IP Addresses

Infected 5 000 IP Addresses

Infected 4 000 IP Addresses

Infected 1 000 IP Addresses

Infected 1 000 IP Addresses

Infected 1 000 IP Addresses

15-20 Phishings

25-30 Deface Web-Sites

15-20 Malware Sites

Page 16: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

IP address monitoring portal

20 Million Infected IP,s

220 thousand unique IP’s

Page 17: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 18: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 19: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 20: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 21: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 22: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 23: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 24: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 25: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

3 Day Course For our Constituency

3 Day Course for our Constituency:

• CSIRT introduction

• Incident Handling

• Basic Malware Analysis

• Sysinternal Tools

• Forensics with Linux

• Forensics with Windows

• Case Studies

Page 26: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Cyber Class 2016

6 week lab works for students:

• Malware Analysis

• PCAP File Analysis

• Log File Analysis

• Penetreation test

• Information Gathering

• Information Security

Cyber Class 2015

7 week lab works for students:

• Malware Analysis

• PCAP File Analysis

• Log File Analysis

• Penetreation test

• Information Gathering

• Computer forinsics

• Information Security

Page 27: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

• Afghanistan

• Moldova

• Macedonia

• Montenegro

• Azerbaijan

• Ukraine

• Mongolia

Cyber Defense Training for IT Professionals

Totally Up to 150 Professional

2-3 Day Cyber and Information Security Sessions:

Page 28: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 29: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Education Management Information System

National Public Registry

Ministry of Labour Health and Social Affairs of Georgia

Bank of Georgia

GRENA

State security Service of Georgia

Ministry of Defense

Cybersecurity Bureau

Smart Logic

Public Registry

TBC Bank

Liberty Bank

UGT

Georgian Railway

Ministry of internal Affairs

National Bank of Georgia

Georgian State Electrosystem

CERT-GOV-GE

Page 30: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Cyber EXE Topics: Cryptography

Malware Analysis

Log File Analysis

Reverse Engineering

Network Analysis

Various Content

Number of Exercises: 32 Case

88 Questions

6 Houers and 15 Minutes

Recommended Tools and Applications:

Page 31: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 32: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 33: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 34: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

• Age Limit 25 years

• 50 registered Teams

• 5 exercises

• 35 questions

• Special testing platform

Page 35: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 36: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 37: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Tbilisi, Georgia

October 14-16, 2014

2014

FIRST

Regional

Symposium

Page 38: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 39: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot
Page 40: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Azerbaijan

Sponsor them became Trusted Introducer List member,

Support To FIRTS Membership

Turkey

Joined Training for developing countries

Poland

Sponsor COMcert.pl became Trusted Introducer List member

Joined Training for developing countries

Moldova

Sponsor CERT.md became Trusted Introducer accredited member

Page 41: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

№ Service Name 2015 2012-2015

1 IP Monitoring Portal 312 949

2 Domain Check Portal 1200 6373

3 Network Monitoring Sensors 855 1975

4 Incident Management System 471 751

Collected Cyber incidents from Different

recourses:

Page 42: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

E-mail: [email protected]

Tel: +995 32 291 51 40

Fax: +995 32 291 51 40

Web-page: www.cert.gov.ge

www.facebook.com/certgovge

Page 43: CERT-GOV-GE Regional Cooperation, Activities & Services Regional Cooperation-CERT.pdf · CERT-GOV-GE Honeypots •Emulation Of Popular Vulnerable Software •Using Open Source Honeypot

Thank You! Questions?