SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1
The 7 Steps to a
Successful
Cyberattack: How to
Defend Against Them
Chris Stoneff
September 20, 2018
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2
Chris Stoneff
VP, Security Solutions
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3
Follow along on social media!
@Bomgar
#bomgarwebinar
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4
• About Bomgar
• 7 common cyberattack steps
• Mitigating threats to stand up against
today’s threats
• Additional resources
• Q&A
Agenda
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5
Privileged Access Security Solutions
IDENTITY
Protect and manage
privileged credentials
and accounts
ACCESS
Secure and manage
remote access and
privileged sessions
ENDPOINTS
Defend endpoints by
removing excess
admin rights
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6
Planning and Executing Cyberattacks
• Reconnaissance
• Scanning
• Access and Escalation
• Exfiltration
• Sustainment
• Assault
• Obfuscation
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7
Reconnaissance
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8
Reconnaissance
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9
Reconnaissance
– Metagoofil,
Exiftool, Strings,
Maltego
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10
Social 360
• Monitors social networks
for other companies
• Offers special “crisis-
monitoring” service which
aims to identity protestor
activities that might be
threatening to companies
tarnished by scandals
The World’s Largest Social Networks
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11
Attack Defense
Reconnaissance • Control sensitive information in public domain
Attacks - Defense
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12
Scanning
• NMAP
• Nessus
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13
Attack Defense
Reconnaissance • Control sensitive information in public domain
Scanning • Prevent information leakage to scanners
Attacks - Defense
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14
• Hydra
• Mimikatz
Access and Escalation
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15
Metasploit
• Target servers, network devices,
databases, web applications, endpoint
systems and virtual machines.
• Exploit machines, choosing from the
world’s largest public collection of quality-
tested exploits.
• Brute force passwords on over a dozen
services, including databases, webservers
and SSH.
• Launch a social engineering campaign to
compromise user machines with phishing
emails and malicious websites and
attachments.
• Jump from one compromised machine to
the next through VPN pivoting until you’ve
owned the entire network.
Access & Escalation
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16
Access & Escalation
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17
Attack Defense
Reconnaissance • Control sensitive information in public domain
Scanning • Prevent information leakage to scanners
Access & Escalation
• Control all passwords for accounts that allow
escalation or privileged access
Attacks – Defense
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18
• Truecrypt
• Create encrypted volumes on
storage media which appear to be
random noise on the media and are
neither detectable nor recoverable
without the proper keys or
passwords
• Puff/OutGuess
• Hide data in images or audio files
• Corkscrew/OzymanDNS
• Tunnel SSH in HTTP
Exfiltration
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19
• Truecrypt
• Create encrypted volumes on
storage media which appear to be
random noise on the media and are
neither detectable nor recoverable
without the proper keys or
passwords
• Puff/OutGuess
• Hide data in images or audio files
• Corkscrew/OzymanDNS
• Tunnel SSH in HTTP
Exfiltration
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20
Attack Defense
Reconnaissance • Control sensitive information in public domain
Scanning • Prevent information leakage to scanners
Access & Escalation
• Control all passwords for accounts that allow
escalation or privileged access
Exfiltration
• Restrict access and monitor. Password and
session management
Attacks - Defense
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21
• Access system and reach the
desired level of access
• Add “authorized” access
• Add ourselves to the list of users
that is legitimately allowed access
• Useradd on Unix-like
systems
• Netuser command on
Windows systems
• Create additional access to
applications, networks, and
any number of other
systems in the
environment
• Backdoors
• Exploit known application
vulnerabilities
• Ex: Target Breach
Sustainment
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22
Attack Defense
Reconnaissance • Control Sensitive Information in Public Domain
Scanning • Prevent information leakage to scanners
Access & Escalation
• Control all passwords for accounts that allow
escalation or privileged access
Exfiltration
• Restrict access and monitor. Password and
session management
Sustainment
• Harden systems and applications; restrict outgoing
and incoming as much as possible and still
function properly
• Lock down admin access to systems
• Audit accounts, system access, open ports, and
other items that could be used to create a
backdoor
Attacks – Defense
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23
• Usually requires administrative rights
• Achieved with simple commands
• cat / dev/ zero > file average system will
product 4 GB of zeros in 6 seconds
• Change system time settings
• Emails, logs, timestamps, etc. are
impacted
• Change the umask setting on a database
server
• Will result in database failures by
changing file settings in database
• Alter environment variables
• Linux: # echo “fs.file-max = 1” > >
/etc/sysctl.conf
• Tells system to only open one file
at a time
• System crash!
Assault - Software
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24
• Requires administrative access
• Flash ROM
• Alter the functionality of the hardware, or disable the hardware entirely
• Delete drivers
Assault - Hardware
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25
Attack Defense
Reconnaissance • Control Sensitive Information in Public Domain
Scanning • Prevent information leakage to scanners
Access & Escalation
• Control all passwords for accounts that allow
escalation or privileged access
Exfiltration
• Restrict access and monitor. Password and
session management
Sustainment
• Harden systems and applications; restrict outgoing
and incoming as much as possible and still function
properly
• Lock down admin access to systems
• Audit accounts, system access, open ports, and
other items that could be used to create a
backdoor
Assault
• Control administrative rights on a machine
• Prevent attackers from gaining administrative
rights on the system
Attacks - Defense
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26
• Location obscuration
• Log manipulation
• File manipulation
Obfuscation - Smokescreen
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 27
Attack Defense
Reconnaissance • Control Sensitive Information in Public Domain
Scanning • Prevent information leakage to scanners
Access & Escalation
• Control all passwords for accounts that allow
escalation or privileged access
Exfiltration
• Restrict access and monitor. Password and session
management
Sustainment
• Harden systems and applications; restrict outgoing
and incoming as much as possible and still function
properly
• Lock down admin access to systems
• Audit accounts, system access, open ports, and other
items that could be used to create a backdoor
Assault
• Control administrative rights on a machine
• Prevent attackers from gaining administrative rights
on the system
Obfuscation
• Control admin rights on a machine
• Log real-time file and log manipulation
• Export logs to secure systems
Attacks - Defense
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 28
Defending Against
Cyberattacks with
Bomgar’s solutions
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 29
Attack Defense Solutions
Reconnaissance • Control Sensitive Information in Public
Domain
• Privileged Identity
Scanning • Prevent information leakage to
scanners
• Privileged Identity + Endpoint
Privilege Management
Access & Escalation • Control all passwords for accounts that
allow escalation or privileged access
• Privileged Identity + Endpoint
Privilege Management
Exfiltration • Restrict access and monitor. Password
and session management
• Privileged Access + Privileged
Identity + Endpoint Privilege
Management
Sustainment • Harden systems and applications;
restrict outgoing and incoming as
much as possible and still function
properly
• Lock down admin access to systems
• Audit accounts, system access, open
ports, and other items that could be
used to create a backdoor
• Privileged Access + Privileged
Identity + Endpoint Privilege
Management
Assault • Control administrative rights on a
machine
• Prevent attackers from gaining
administrative rights on the system
• Privileged Identity + Endpoint
Privilege Management
Obfuscation • Control admin rights on a machine
• Log real-time file and log manipulation
• Export logs to secure systems
• Endpoint Privilege Management
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 30
• 2018 Privileged Access Threat
Report
• Bomgar Privileged Access
• Bomgar Privileged Identity
• Endpoint Privilege Management
Additional Resources
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 31
Questions?
Thank you for joining us!

Mais conteúdo relacionado

Mais procurados

2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Alliance
 
Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - GatedefenderPanda Security
 
Vizru GDPR compliance framework
Vizru GDPR compliance frameworkVizru GDPR compliance framework
Vizru GDPR compliance frameworkRamesh Mahalingam
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)Kimberly Simon MBA
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance ChecklistControlCase
 
Vendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementVendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementInfo-Tech Research Group
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist PriyaNemade
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessForgeRock
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Kimberly Simon MBA
 
Keep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approachKeep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approachNagib Aouini
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemSBWebinars
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanTripwire
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the CloudControlCase
 

Mais procurados (20)

2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - feb
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - Gatedefender
 
Vizru GDPR compliance framework
Vizru GDPR compliance frameworkVizru GDPR compliance framework
Vizru GDPR compliance framework
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
Vendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementVendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event Management
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
Keep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approachKeep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approach
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 

Semelhante a The 7 Steps to a Successful Cyberattack: How to Defend Against Them

Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Kehinde Tolude
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Digital skimming root_conf_ppt
Digital skimming root_conf_pptDigital skimming root_conf_ppt
Digital skimming root_conf_pptArjun BM
 
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems Pvt. Ltd
 
gkkwqdqqndqw2121234Security essentials domain 4
gkkwqdqqndqw2121234Security essentials   domain 4gkkwqdqqndqw2121234Security essentials   domain 4
gkkwqdqqndqw2121234Security essentials domain 4Anne Starr
 
Practical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPractical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPRISMA CSI
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2securityAnne Starr
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksSecurity Bootcamp
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM IntegrationPrecisely
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016Tomppa Järvinen
 
HIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best PracticesHIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best PracticesHostway|HOSTING
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE - ATT&CKcon
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksJames Cash
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Decisions
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessPrecisely
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 

Semelhante a The 7 Steps to a Successful Cyberattack: How to Defend Against Them (20)

Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Digital skimming root_conf_ppt
Digital skimming root_conf_pptDigital skimming root_conf_ppt
Digital skimming root_conf_ppt
 
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
 
gkkwqdqqndqw2121234Security essentials domain 4
gkkwqdqqndqw2121234Security essentials   domain 4gkkwqdqqndqw2121234Security essentials   domain 4
gkkwqdqqndqw2121234Security essentials domain 4
 
Practical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPractical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber Security
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2security
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
HIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best PracticesHIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best Practices
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber Attacks
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 

Mais de Bomgar

The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management Bomgar
 
Post GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote AccessPost GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote AccessBomgar
 
10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk Value10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk ValueBomgar
 
Privileged Access in Healthcare
Privileged Access in HealthcarePrivileged Access in Healthcare
Privileged Access in HealthcareBomgar
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Bomgar
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, TooBomgar
 

Mais de Bomgar (6)

The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management
 
Post GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote AccessPost GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote Access
 
10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk Value10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk Value
 
Privileged Access in Healthcare
Privileged Access in HealthcarePrivileged Access in Healthcare
Privileged Access in Healthcare
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
 

Último

Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 

Último (20)

Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 

The 7 Steps to a Successful Cyberattack: How to Defend Against Them

  • 1. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 The 7 Steps to a Successful Cyberattack: How to Defend Against Them Chris Stoneff September 20, 2018
  • 2. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2 Chris Stoneff VP, Security Solutions
  • 3. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3 Follow along on social media! @Bomgar #bomgarwebinar
  • 4. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4 • About Bomgar • 7 common cyberattack steps • Mitigating threats to stand up against today’s threats • Additional resources • Q&A Agenda
  • 5. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5 Privileged Access Security Solutions IDENTITY Protect and manage privileged credentials and accounts ACCESS Secure and manage remote access and privileged sessions ENDPOINTS Defend endpoints by removing excess admin rights
  • 6. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6 Planning and Executing Cyberattacks • Reconnaissance • Scanning • Access and Escalation • Exfiltration • Sustainment • Assault • Obfuscation
  • 7. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7 Reconnaissance
  • 8. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8 Reconnaissance
  • 9. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9 Reconnaissance – Metagoofil, Exiftool, Strings, Maltego
  • 10. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10 Social 360 • Monitors social networks for other companies • Offers special “crisis- monitoring” service which aims to identity protestor activities that might be threatening to companies tarnished by scandals The World’s Largest Social Networks
  • 11. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11 Attack Defense Reconnaissance • Control sensitive information in public domain Attacks - Defense
  • 12. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12 Scanning • NMAP • Nessus
  • 13. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13 Attack Defense Reconnaissance • Control sensitive information in public domain Scanning • Prevent information leakage to scanners Attacks - Defense
  • 14. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14 • Hydra • Mimikatz Access and Escalation
  • 15. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15 Metasploit • Target servers, network devices, databases, web applications, endpoint systems and virtual machines. • Exploit machines, choosing from the world’s largest public collection of quality- tested exploits. • Brute force passwords on over a dozen services, including databases, webservers and SSH. • Launch a social engineering campaign to compromise user machines with phishing emails and malicious websites and attachments. • Jump from one compromised machine to the next through VPN pivoting until you’ve owned the entire network. Access & Escalation
  • 16. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16 Access & Escalation
  • 17. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17 Attack Defense Reconnaissance • Control sensitive information in public domain Scanning • Prevent information leakage to scanners Access & Escalation • Control all passwords for accounts that allow escalation or privileged access Attacks – Defense
  • 18. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18 • Truecrypt • Create encrypted volumes on storage media which appear to be random noise on the media and are neither detectable nor recoverable without the proper keys or passwords • Puff/OutGuess • Hide data in images or audio files • Corkscrew/OzymanDNS • Tunnel SSH in HTTP Exfiltration
  • 19. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19 • Truecrypt • Create encrypted volumes on storage media which appear to be random noise on the media and are neither detectable nor recoverable without the proper keys or passwords • Puff/OutGuess • Hide data in images or audio files • Corkscrew/OzymanDNS • Tunnel SSH in HTTP Exfiltration
  • 20. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20 Attack Defense Reconnaissance • Control sensitive information in public domain Scanning • Prevent information leakage to scanners Access & Escalation • Control all passwords for accounts that allow escalation or privileged access Exfiltration • Restrict access and monitor. Password and session management Attacks - Defense
  • 21. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21 • Access system and reach the desired level of access • Add “authorized” access • Add ourselves to the list of users that is legitimately allowed access • Useradd on Unix-like systems • Netuser command on Windows systems • Create additional access to applications, networks, and any number of other systems in the environment • Backdoors • Exploit known application vulnerabilities • Ex: Target Breach Sustainment
  • 22. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22 Attack Defense Reconnaissance • Control Sensitive Information in Public Domain Scanning • Prevent information leakage to scanners Access & Escalation • Control all passwords for accounts that allow escalation or privileged access Exfiltration • Restrict access and monitor. Password and session management Sustainment • Harden systems and applications; restrict outgoing and incoming as much as possible and still function properly • Lock down admin access to systems • Audit accounts, system access, open ports, and other items that could be used to create a backdoor Attacks – Defense
  • 23. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23 • Usually requires administrative rights • Achieved with simple commands • cat / dev/ zero > file average system will product 4 GB of zeros in 6 seconds • Change system time settings • Emails, logs, timestamps, etc. are impacted • Change the umask setting on a database server • Will result in database failures by changing file settings in database • Alter environment variables • Linux: # echo “fs.file-max = 1” > > /etc/sysctl.conf • Tells system to only open one file at a time • System crash! Assault - Software
  • 24. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24 • Requires administrative access • Flash ROM • Alter the functionality of the hardware, or disable the hardware entirely • Delete drivers Assault - Hardware
  • 25. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25 Attack Defense Reconnaissance • Control Sensitive Information in Public Domain Scanning • Prevent information leakage to scanners Access & Escalation • Control all passwords for accounts that allow escalation or privileged access Exfiltration • Restrict access and monitor. Password and session management Sustainment • Harden systems and applications; restrict outgoing and incoming as much as possible and still function properly • Lock down admin access to systems • Audit accounts, system access, open ports, and other items that could be used to create a backdoor Assault • Control administrative rights on a machine • Prevent attackers from gaining administrative rights on the system Attacks - Defense
  • 26. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26 • Location obscuration • Log manipulation • File manipulation Obfuscation - Smokescreen
  • 27. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 27 Attack Defense Reconnaissance • Control Sensitive Information in Public Domain Scanning • Prevent information leakage to scanners Access & Escalation • Control all passwords for accounts that allow escalation or privileged access Exfiltration • Restrict access and monitor. Password and session management Sustainment • Harden systems and applications; restrict outgoing and incoming as much as possible and still function properly • Lock down admin access to systems • Audit accounts, system access, open ports, and other items that could be used to create a backdoor Assault • Control administrative rights on a machine • Prevent attackers from gaining administrative rights on the system Obfuscation • Control admin rights on a machine • Log real-time file and log manipulation • Export logs to secure systems Attacks - Defense
  • 28. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 28 Defending Against Cyberattacks with Bomgar’s solutions
  • 29. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 29 Attack Defense Solutions Reconnaissance • Control Sensitive Information in Public Domain • Privileged Identity Scanning • Prevent information leakage to scanners • Privileged Identity + Endpoint Privilege Management Access & Escalation • Control all passwords for accounts that allow escalation or privileged access • Privileged Identity + Endpoint Privilege Management Exfiltration • Restrict access and monitor. Password and session management • Privileged Access + Privileged Identity + Endpoint Privilege Management Sustainment • Harden systems and applications; restrict outgoing and incoming as much as possible and still function properly • Lock down admin access to systems • Audit accounts, system access, open ports, and other items that could be used to create a backdoor • Privileged Access + Privileged Identity + Endpoint Privilege Management Assault • Control administrative rights on a machine • Prevent attackers from gaining administrative rights on the system • Privileged Identity + Endpoint Privilege Management Obfuscation • Control admin rights on a machine • Log real-time file and log manipulation • Export logs to secure systems • Endpoint Privilege Management
  • 30. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 30 • 2018 Privileged Access Threat Report • Bomgar Privileged Access • Bomgar Privileged Identity • Endpoint Privilege Management Additional Resources
  • 31. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 31 Questions? Thank you for joining us!