Top Banner
Etichal Hacking in the TDL environment
25

Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Oct 02, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Etichal Hacking in the TDL environment

Page 2: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 3: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

June 27th 2017…

Page 4: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 5: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 6: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Some stats…

…In 2017 there were more than 5200 reported securitybreaches

…more than 7.8 Billion records stolenSource: RiskBased Security (www.riskbasedsecurity.com)

Page 7: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

The average cost of a malware attack on a company is $2,4 Million

Page 8: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

50 days is the average time to resolve a malicious insider attack

23 days to resolve a ransomware attack

Page 9: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Online devices are hacked every day

• Webcams• Databases• ICS (Industrial Control Systems)• SCADA (Supervisory Control and Data Acquisition)• Network devices

Page 10: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 11: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 12: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 13: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 14: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 15: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Two types of hackers…+1

White Hat Black Hat

Page 16: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

The importance of White Hat Hacking

Something to think about during development

Page 17: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

TDL and C2 Systems

COTS hardware and software

Flaws and Vulnerabilities

Page 18: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Misconfigurations

No Hardening

Supply chain

Page 19: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Ethical hacking and pentests

Page 20: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

1. Planning & Preparation

2. Reconnaissance

3. Discovery

4. Analyzing information and risks

5. Active intrusion attempts

6. Final analysis

7. Report Preparation

Page 21: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Fuzzing!

Definition: Fuzzing is the usually automatedprocess of entering random data into a

program and analyzing the results to findpotentially exploitable bugs.

Page 22: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Security by Design!

”Security by design means that a system is constructed from start to finish with security in mind. With the base in a hardened platform.”

Page 23: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

The chain is not stronger than it´sweakest link…

Bad actors are still winning…

Weak enterprise cyber security…

…mistakes by inserting USB

Page 24: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks
Page 25: Etichal Hacking in the TDL environment - Entry Point North · Ethical hacking and pentests. 1. Planning & Preparation 2. Reconnaissance 3. Discovery 4. Analyzing information and risks

Patrik SolstenCombitech ABEmail: [email protected]: +46 73 446 02 53