SlideShare uma empresa Scribd logo
1 de 9
INSECT
INVASION
A CRUNCHY TABLETOP GAME
Image credit: Misty View @cheatlines
https://www.instagram.com/cheatlines/
THE STORY SO
FAR
CRY HAVOC AND LET SLIP THE CICADAS OF SCIENCE!
Brood X, Inc. is a Virginia-based company founded in 2003 as a
cloud-based SaaS that facilitates the realtime sharing, review,
annotation, and modeling of entomological data. The Brood X
web portal allows scientists and members of the general public to
share information, collaborate on uploaded data, securely share
and compare data, and visualize information on the fly.
Currently, Brood X is exclusively U.S.-based, with most users being
colleges, universities, and independent scholars who probably
need to get out of their offices more often than once every 17
years or so.
This summer is the moment Brood X has been waiting for. The
cicadas are coming, and, for the sake of Brood X’s upcoming IPO,
Brood X had better be ready.
All Brood X data is held in their VPC in AWS US-East 1. Brood X
uses AWS GuardDuty and Falco to detect intrusions. They use
runtime monitoring software and AWS Inspector to detect
potential vulnerabilities. Scans are run daily to check vulnerability
in virtual machines and containers. Cloudwatch and Cloudtrail are
used as anti-exfiltration measures. They use AWS WAF for
protecting their web-based systems and AWS API Gateway
for the APIs that they make available to researchers.
Configuration management is done through AWS Config.
THE OTHER PLAYERS
Brave Tailor Security
Brood X is overly smug about what they consider
to be their impenetrable AWS fortress. Their
angel investors, however, are not. As part of
their pre-IPO maturity assessment, Brood X has
hired BTS for a pentest engagement.
BTS’s goal is to find the most likely attack
vector or vectors and report back to Brood X.
BTS has a total of two weeks and cannot
significantly disrupt end user access, though
they are allowed to test without notifying BTS
as to exactly when they will do so.
The Bugsuckers
The Bugsuckers are a loosely-connected group of amateur entomologists that believes that
insect research should be as free as a cicada on the wind.
The Bugsuckers’ goal is to exfiltrate the research data uploaded to the Brood X portal and
leak it onto the World Wide Web. They have been planning their move for about six months
now, and would like to be ready to fly as soon as all the buzz begins this summer.
Brood Y, Inc.
Brood Y, Inc. is a West Virginia-based company founded in 2003 as a cloud-based SaaS that
facilitates the realtime sharing, review, annotation, and modeling of entomological data.
The Brood Y web portal allows scientists and members of the general public to share
information, collaborate on uploaded data, securely share and compare data, and
visualize information on the fly.
Brood Y prides itself on being “a golden scarab in a world of dull beetles.” After 13 years,
they still claim to embrace a startup culture. Rumors have begun to surface on Twitter
that they have started offering “bug bounties” to anyone that can help them sting Brood
X in advance of their IPO and minimize potential shareholder value.
Brood Y’s goal is to make Brood X look bad. This can be in terms of security, service, or
just plain old scandal. The “bug bounties” have only been offered for about one month.
Brave Tailor
Bugsuckers
Brood Y
Brood X
Red Team Rules
 This time, red goes first.
 BTS, the Bugsuckers, and Brood Y are each a separate red team.
 Each red team gets one move.
 A “move” is a discrete action that each red team will take to further their
specific goal.
 Moves can be any action that the team can reasonably argue would help them
reach their objective. Moves might include, but are not limited to: open port
scans, social engineering, phishing emails, fuzzing, or hamster dancing.
 Moves must include:
 (1) A description of the action taken
 (2) How long that action will take
 (3) When the team began taking that action
Blue Team Rules
 This time, blue is responding to the red attacks.
 Blue gets one counter move to each red team’s move.
 A “move” is a discrete action that each red team will take to defend
or mitigate. Moves can be any action that the team can reasonably
argue would help them reach their objective.
 Moves might include, but are not limited to: patching, employee
training, calling Legal, purchasing new security software, or deploying
kittens into your office production environment.
 Moves must include:
 (1) A description of how you learned about each red team’s action
 (2) A description of the action the blue team is taking in response
 (3) How long that action will take
 (4) When the team began taking that action
ENDGAME
 Both sides will present their
moves publicly, red first, then
blue.
 The GM will adjudicate those
moves based on their feasibility,
appropriateness, and the teams’
arguments.
 Don’t fight the scenario, don’t be
a sore winner or loser.
 A scorpion is a bug. I will die on
this hill.

Mais conteúdo relacionado

Semelhante a Insect invasion slide deck

Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
Andreas Hiller
 
BERKELEY-HAAS CASE SERIES3D RoboticsDISRUPTING THE DRON.docx
BERKELEY-HAAS CASE SERIES3D RoboticsDISRUPTING THE DRON.docxBERKELEY-HAAS CASE SERIES3D RoboticsDISRUPTING THE DRON.docx
BERKELEY-HAAS CASE SERIES3D RoboticsDISRUPTING THE DRON.docx
AASTHA76
 
Response Paper Due Monday, February 6th Write an .docx
Response Paper  Due Monday, February 6th  Write an .docxResponse Paper  Due Monday, February 6th  Write an .docx
Response Paper Due Monday, February 6th Write an .docx
ronak56
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 

Semelhante a Insect invasion slide deck (20)

The Singularity is Here - SXSWi 2011
The Singularity is Here - SXSWi 2011The Singularity is Here - SXSWi 2011
The Singularity is Here - SXSWi 2011
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 
Ms quiz ans
Ms quiz ansMs quiz ans
Ms quiz ans
 
Wearables
WearablesWearables
Wearables
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
BERKELEY-HAAS CASE SERIES3D RoboticsDISRUPTING THE DRON.docx
BERKELEY-HAAS CASE SERIES3D RoboticsDISRUPTING THE DRON.docxBERKELEY-HAAS CASE SERIES3D RoboticsDISRUPTING THE DRON.docx
BERKELEY-HAAS CASE SERIES3D RoboticsDISRUPTING THE DRON.docx
 
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
 
Tech won't build it zine
Tech won't build it zineTech won't build it zine
Tech won't build it zine
 
VR-Zone Tech News for the Geeks Mar 2013 Issue
VR-Zone Tech News for the Geeks Mar 2013 IssueVR-Zone Tech News for the Geeks Mar 2013 Issue
VR-Zone Tech News for the Geeks Mar 2013 Issue
 
Response Paper Due Monday, February 6th Write an .docx
Response Paper  Due Monday, February 6th  Write an .docxResponse Paper  Due Monday, February 6th  Write an .docx
Response Paper Due Monday, February 6th Write an .docx
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Cybercasing and privacy implications of geo tagging
Cybercasing and privacy implications of geo tagging Cybercasing and privacy implications of geo tagging
Cybercasing and privacy implications of geo tagging
 
Augur Press Kit
Augur Press KitAugur Press Kit
Augur Press Kit
 
"AI" for Blockchain Security (Case Study: Cosmos)
"AI" for Blockchain Security (Case Study: Cosmos)"AI" for Blockchain Security (Case Study: Cosmos)
"AI" for Blockchain Security (Case Study: Cosmos)
 
[GE207] Session03: Digital Technology Trends
[GE207] Session03: Digital Technology Trends[GE207] Session03: Digital Technology Trends
[GE207] Session03: Digital Technology Trends
 
7682_RiskWatch_Winter2015_The Future of Cyber Risk
7682_RiskWatch_Winter2015_The Future of Cyber Risk7682_RiskWatch_Winter2015_The Future of Cyber Risk
7682_RiskWatch_Winter2015_The Future of Cyber Risk
 
Glimpses into the future of mobile devices, the internet, and more - updated ...
Glimpses into the future of mobile devices, the internet, and more - updated ...Glimpses into the future of mobile devices, the internet, and more - updated ...
Glimpses into the future of mobile devices, the internet, and more - updated ...
 
AI Gone Wild or Maybe Not
AI Gone Wild or Maybe NotAI Gone Wild or Maybe Not
AI Gone Wild or Maybe Not
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Insect invasion slide deck

  • 1. INSECT INVASION A CRUNCHY TABLETOP GAME Image credit: Misty View @cheatlines https://www.instagram.com/cheatlines/
  • 2. THE STORY SO FAR CRY HAVOC AND LET SLIP THE CICADAS OF SCIENCE! Brood X, Inc. is a Virginia-based company founded in 2003 as a cloud-based SaaS that facilitates the realtime sharing, review, annotation, and modeling of entomological data. The Brood X web portal allows scientists and members of the general public to share information, collaborate on uploaded data, securely share and compare data, and visualize information on the fly. Currently, Brood X is exclusively U.S.-based, with most users being colleges, universities, and independent scholars who probably need to get out of their offices more often than once every 17 years or so. This summer is the moment Brood X has been waiting for. The cicadas are coming, and, for the sake of Brood X’s upcoming IPO, Brood X had better be ready. All Brood X data is held in their VPC in AWS US-East 1. Brood X uses AWS GuardDuty and Falco to detect intrusions. They use runtime monitoring software and AWS Inspector to detect potential vulnerabilities. Scans are run daily to check vulnerability in virtual machines and containers. Cloudwatch and Cloudtrail are used as anti-exfiltration measures. They use AWS WAF for protecting their web-based systems and AWS API Gateway for the APIs that they make available to researchers. Configuration management is done through AWS Config.
  • 3. THE OTHER PLAYERS Brave Tailor Security Brood X is overly smug about what they consider to be their impenetrable AWS fortress. Their angel investors, however, are not. As part of their pre-IPO maturity assessment, Brood X has hired BTS for a pentest engagement. BTS’s goal is to find the most likely attack vector or vectors and report back to Brood X. BTS has a total of two weeks and cannot significantly disrupt end user access, though they are allowed to test without notifying BTS as to exactly when they will do so.
  • 4. The Bugsuckers The Bugsuckers are a loosely-connected group of amateur entomologists that believes that insect research should be as free as a cicada on the wind. The Bugsuckers’ goal is to exfiltrate the research data uploaded to the Brood X portal and leak it onto the World Wide Web. They have been planning their move for about six months now, and would like to be ready to fly as soon as all the buzz begins this summer.
  • 5. Brood Y, Inc. Brood Y, Inc. is a West Virginia-based company founded in 2003 as a cloud-based SaaS that facilitates the realtime sharing, review, annotation, and modeling of entomological data. The Brood Y web portal allows scientists and members of the general public to share information, collaborate on uploaded data, securely share and compare data, and visualize information on the fly. Brood Y prides itself on being “a golden scarab in a world of dull beetles.” After 13 years, they still claim to embrace a startup culture. Rumors have begun to surface on Twitter that they have started offering “bug bounties” to anyone that can help them sting Brood X in advance of their IPO and minimize potential shareholder value. Brood Y’s goal is to make Brood X look bad. This can be in terms of security, service, or just plain old scandal. The “bug bounties” have only been offered for about one month.
  • 7. Red Team Rules  This time, red goes first.  BTS, the Bugsuckers, and Brood Y are each a separate red team.  Each red team gets one move.  A “move” is a discrete action that each red team will take to further their specific goal.  Moves can be any action that the team can reasonably argue would help them reach their objective. Moves might include, but are not limited to: open port scans, social engineering, phishing emails, fuzzing, or hamster dancing.  Moves must include:  (1) A description of the action taken  (2) How long that action will take  (3) When the team began taking that action
  • 8. Blue Team Rules  This time, blue is responding to the red attacks.  Blue gets one counter move to each red team’s move.  A “move” is a discrete action that each red team will take to defend or mitigate. Moves can be any action that the team can reasonably argue would help them reach their objective.  Moves might include, but are not limited to: patching, employee training, calling Legal, purchasing new security software, or deploying kittens into your office production environment.  Moves must include:  (1) A description of how you learned about each red team’s action  (2) A description of the action the blue team is taking in response  (3) How long that action will take  (4) When the team began taking that action
  • 9. ENDGAME  Both sides will present their moves publicly, red first, then blue.  The GM will adjudicate those moves based on their feasibility, appropriateness, and the teams’ arguments.  Don’t fight the scenario, don’t be a sore winner or loser.  A scorpion is a bug. I will die on this hill.