39
Pre-Talk Vote! https://tinyurl.com/ fartech Point your camera at this thing with your iPhone built-in camera or Android QR scanner:

Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Pre-Talk Vote!

https://tinyurl.com/fartech

Point your camera at this thing with your iPhone built-in camera or Android QR scanner:

Page 2: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Cybersecurity Awareness:C-Suite Considerations

FAR Luncheon

1/17/18

Page 3: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Overview

•Who, why, where, what

•HOW the fun part

•4 things to ask your IT team

•4 things to start doing today

•Further reading and additional resources

Page 4: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Let’s Log In!But first…

http://login.lautman.net

Page 5: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Who?

A hacker bypasses systems and passwords to access confidential information.

Page 6: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Why?

•Political

•$$$ (extortion, cc fraud, company secrets)

•Fun

Page 7: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Where? Attack sources

Internal

Intentional

External

Accidental

Page 8: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Source: Electronic Frontier Foundation

Where?

Page 9: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

What data can be targeted?

Proprietary info

Personal info

Passwords

No data

Page 10: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

How?The fun part…

Page 11: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

How is data compromised?

Physical theft

SQL injection

CrackingSocial

engineering

Malware

Internal

Page 12: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Discussion

•Have you witnessed an attempted attack?

•Have you witnessed a successful attack?

•How did your organization recover?

Page 13: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Let’s Get Hacking!

Page 14: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Step 1: Reconnaissance

•Email harvesting

•Web vulnerability scanning

•Targeted recon

demo

Page 15: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Nessus scan sample result

Page 16: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Nmap scan sample result

Page 17: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Email harvesting sample result

Page 18: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Targeting an individual

• Google

• LinkedIn

• Twitter

• White Pages

• Corporate website

Page 19: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Step 2: Design The Trap

•Trap 1: a virus

•Trap 2: a wireless network

demo

Page 20: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Virus sample

Page 21: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Rogue Wi-Fi Sample

Page 22: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Step 3: Social Engineering

•Gain trust: easier than you think!

•Say please, thank you, smile

•Look official physicallyor virtually (email)

Page 23: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Step 4: Compromise target

•Get target to give me information (fake login)

•Get target to click on my link

Page 24: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Step 5: …profit?

Ransomware

Next Target

Sell info

Leak info

Fun / Grudge

Page 25: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Step 5: impact

Reputational damage

Data loss

Financial loss

Fines

Hidden costs

Page 26: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Further reading

Page 27: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Further reading

Page 28: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Further reading

Page 29: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Next Steps

Page 30: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

4 questions to ask your IT team

1. Where is our data?

2. How are we protecting our digital assets?

3. What is our plan to recover from disaster x?

4. When was our last security assessment?

Page 31: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

4 things to start doing today

1. As an executive: get involved in infosec

2. Enforce security standards evenly

3. Train your staff

4. Multifactor Authentication

Page 32: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Survey Results

• Survey results here

Page 33: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Source: ISACA State of Cybersecurity 2017

Page 34: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Cybersecurity/Risk AssessmentsHow do they work?

Page 35: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Risk Assessment: Goals

Compliance

Specific concern

Independent review

Budget allocation

Page 36: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Risk Assessment: What To Expect

Network Policies and Procedures Vulnerability Scanning

Penetration Testing Phishing simulation

Page 37: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Risk Assessment: Deliverables

•List of identified vulnerabilities/issues

•Recommended solutions

•LOE estimate for remediation

Page 38: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Additional resources

•Learn about cybersecurity:•Coursera.org – online courses•Hackallthethings.com – online courses•Overthewire.org – war games

•Certifications•CEH•CISSP•CCNP-Security

Page 39: Pre-Talk Vote!...•HOW the fun part •4 things to ask your IT team ... Let’s Get Hacking! Step 1: Reconnaissance •Email harvesting •Web vulnerability scanning •Targeted recon

Dan LautmanDelCor Technology Solutions

[email protected]