Top Banner
33

Future Cyber Warriors

Feb 24, 2016

Download

Documents

Lilia

Future Cyber Warriors. Why Network Forensics? . Encrypted Hard Disks Re-imaged Boxes USB Response Difficulty Increase in Number of Intrusions IP End Point Analysis Log Analysis Geolocation Proxies. How do they get in?. Spear Phish Links (Twitter) Vulnerabilities Applications OS - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Future Cyber Warriors
Page 2: Future Cyber Warriors
Page 3: Future Cyber Warriors
Page 4: Future Cyber Warriors
Page 5: Future Cyber Warriors
Page 6: Future Cyber Warriors
Page 7: Future Cyber Warriors
Page 8: Future Cyber Warriors
Page 9: Future Cyber Warriors
Page 10: Future Cyber Warriors
Page 11: Future Cyber Warriors
Page 12: Future Cyber Warriors
Page 13: Future Cyber Warriors

Future Cyber Warriors

Page 14: Future Cyber Warriors

Why Network Forensics?

• Encrypted Hard Disks• Re-imaged Boxes• USB Response Difficulty • Increase in Number of Intrusions• IP End Point Analysis• Log Analysis• Geolocation– Proxies

Page 15: Future Cyber Warriors

How do they get in?

• Spear Phish• Links (Twitter)• Vulnerabilities– Applications– OS

• Weak Passwords

Page 16: Future Cyber Warriors

And Let’s Not Forget

• The Insider Threat

Page 17: Future Cyber Warriors

The Old Ping Scan

Page 18: Future Cyber Warriors

Can’t We be Quieter ?

• Use tcpdump with no IP– Listen Passively

Page 19: Future Cyber Warriors

Zenmap can be Indecisive

• Accurate as the weather…

• And noisy, so you will be noticed in Logs

Page 20: Future Cyber Warriors

Getting a Better OS Guess

Page 21: Future Cyber Warriors

Searching for 08 exploits

Page 22: Future Cyber Warriors

Setting Options within Metasploit

Page 23: Future Cyber Warriors

Exploiting the Victim

• Firewall and UAC Enabled…

Page 24: Future Cyber Warriors

Important Facts when you Hacks

• Who are You?

• How are you in?• Got PID?• Why no GUI?

Page 25: Future Cyber Warriors

Step Right Up – Get Your Malware

• How do you get malware on the victim?– Meterpreter upload– FTP Answer File– Write a BAT FILE– Use DEBUG to Compile– TFTP (not likely)– wget or curl (if Linux)

Page 26: Future Cyber Warriors

You got caught doing bad things

• At least rename your stuff

Page 27: Future Cyber Warriors

I hate it when I get Dumped

Page 28: Future Cyber Warriors

You don’t want to get Caned Either

Page 29: Future Cyber Warriors

Help the Admin Manage Users

Page 30: Future Cyber Warriors

Looking at the Traffic

Page 31: Future Cyber Warriors

Snort Sees Bad People

Page 32: Future Cyber Warriors

Summary

• Hackers get in• Network Forensics may explain:– Who– How– What– When

• At a minimum, endpoint analysis• Actions can help mitigate future attacks

Page 33: Future Cyber Warriors

Questions and Comments

• Thank You!