SlideShare uma empresa Scribd logo
1 de 27
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




                     Client-Side Security
                                    K. K. Mookhey
                            kkmookhey@niiconsulting.com




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




• Introduction

• Real-world case study
   •   The drop
   •   Malware analysis
   •   Delivery mechanisms


• Lessons learnt




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




 File name
 Loop Mobile Bill Statement Date 08.11.2011.pdf
 Services.doc     The injection attempt
 The Most wanted terrorist by Delhi police.doc




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




                                      Strings




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




                What heritage are they
                     protecting?
                                     Let’s find out




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                      The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                          http://www.owasp.org
http://www.owasp.in
./win7
./win7/exploit.html
./win7/Exploit.jar
./win7/Exploit.class
./moneytime
./moneytime/abc
./moneytime/abc/dsfd.pdf
./moneytime/report.php
./moneytime/aaaa
./moneytime/aaaa/decr.exe
./moneytime/Aminer
./moneytime/Aminer/Utility_installation_step_by_step.doc
./moneytime/Aminer/aMiner2.0.iso
./moneytime/Aminer/aMiner_Installation_Step_by_Step.doc
./moneytime/Aminer/utilities.iso
./moneytime/email list.txt
./moneytime/WinXpcr.py
./moneytime/main.png
./moneytime/demor
./moneytime/demor/application.doc
./moneytime/Appin
./moneytime/Appin/appin.doc
./moneytime/Appin/appin1.pdf
./moneytime/key
./moneytime/key/conhost.exe
./moneytime/key/smse.exe
                     OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




     WHAT IS AMINER.EXE?




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in

 ./chirag/drop/KAMAL0024BEBE0A80/KeyLog.txt
 ./chirag/drop/KAMAL0024BEBE0A80/ip.txt
 ./chirag/drop/INDIA00012E2598D3
 ./chirag/drop/INDIA00012E2598D3/KeyLog.txt
 ./chirag/drop/INDIA00012E2598D3/ip.txt
 ./chirag/drop/BLUE-INTRA-VM000C29D666CE
 ./chirag/drop/BLUE-INTRA-VM000C29D666CE/123.php                       Who is
 ./chirag/drop/GAMCA300248CC9EE30
 ./chirag/drop/GAMCA300248CC9EE30/KeyLog.txt                           Chirag?
 ./chirag/drop/GAMCA300248CC9EE30/ip.txt
 ./chirag/drop/ADMIN-PC005056C00008
 ./chirag/drop/ADMIN-PC005056C00008/KeyLog.txt
 ./chirag/drop/ADMIN-PC005056C00008/ip.txt
 ./chirag/drop/SABI-D00241D9A5C01
 ./chirag/drop/SABI-D00241D9A5C01/KeyLog.txt
 ./chirag/drop/SABI-D00241D9A5C01/ip.txt
 ./chirag/drop/DESIGN20CF309A9453
 ./chirag/drop/DESIGN20CF309A9453/KeyLog.txt
 ./chirag/drop/DESIGN20CF309A9453/ip.txt
 ./chirag/drop/KAMALC0F8DA7AF26C
 ./chirag/drop/KAMALC0F8DA7AF26C/KeyLog.txt
 ./chirag/drop/KAMALC0F8DA7AF26C/ip.txt
               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




         Typical Delivery Mechanisms




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




                                 Scenario 2
                  Un-authorized usage of USB Drives
                     We inserted USB drives on 8 systems
                          2 systems had USB blocked
              Only 1 person objected to us inserting the USB drive




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




                                    Phishing




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




• APTs are real and here to stay
• It does not take a genius to evade AV
• We need newer solutions – and quick!
• Your end-point defences should be as strong or even
  stronger than the perimeter defences
• In the meanwhile…
    •   Patch all your end-point software
    •   Watch your AV status like a hawk
    •   Constantly propagate security news to your end-users
And
• Be careful, which security vendors you hire!


               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)

Mais conteúdo relacionado

Destaque

Co-Working Presentation April 2016
Co-Working Presentation April 2016Co-Working Presentation April 2016
Co-Working Presentation April 2016
Gary Marshall
 

Destaque (12)

Eca 14 (1)
Eca 14 (1)Eca 14 (1)
Eca 14 (1)
 
Co-Working Presentation April 2016
Co-Working Presentation April 2016Co-Working Presentation April 2016
Co-Working Presentation April 2016
 
Φθινόπωρο στα Τρίκαλα
Φθινόπωρο στα ΤρίκαλαΦθινόπωρο στα Τρίκαλα
Φθινόπωρο στα Τρίκαλα
 
Evaluación del aprendizaje leyva barajas
Evaluación del aprendizaje leyva barajasEvaluación del aprendizaje leyva barajas
Evaluación del aprendizaje leyva barajas
 
Ita b2 ms 02 12-15
Ita b2 ms 02 12-15Ita b2 ms 02 12-15
Ita b2 ms 02 12-15
 
Teoria macros
Teoria macrosTeoria macros
Teoria macros
 
La casa de los simpsons
La casa de los simpsonsLa casa de los simpsons
La casa de los simpsons
 
Herdeiros da Crus
Herdeiros da CrusHerdeiros da Crus
Herdeiros da Crus
 
Nmr Spwla Carbonates
Nmr  Spwla CarbonatesNmr  Spwla Carbonates
Nmr Spwla Carbonates
 
30 días de bilingüismo: Episodio 1
30 días de bilingüismo: Episodio 130 días de bilingüismo: Episodio 1
30 días de bilingüismo: Episodio 1
 
Juegos de Logica de Ingenio
Juegos de Logica de IngenioJuegos de Logica de Ingenio
Juegos de Logica de Ingenio
 
Formation Damage Test.
Formation Damage Test.Formation Damage Test.
Formation Damage Test.
 

Semelhante a Getting the end point security right! - k. k. mookhey

Pinkstar Events Agency [Delhi] Credentials 2016
Pinkstar Events  Agency [Delhi] Credentials 2016Pinkstar Events  Agency [Delhi] Credentials 2016
Pinkstar Events Agency [Delhi] Credentials 2016
Anu tomar
 
eScan National marketing
eScan National marketingeScan National marketing
eScan National marketing
eScan
 

Semelhante a Getting the end point security right! - k. k. mookhey (15)

The magic of passive web vulnerability analysis lava kumar
The magic of passive web vulnerability analysis   lava kumarThe magic of passive web vulnerability analysis   lava kumar
The magic of passive web vulnerability analysis lava kumar
 
Public exploit held private – penetration testing the researcher’s way tama...
Public exploit held private – penetration testing the researcher’s way   tama...Public exploit held private – penetration testing the researcher’s way   tama...
Public exploit held private – penetration testing the researcher’s way tama...
 
Real time evaluation of national network exposure to emerging threats - fyodo...
Real time evaluation of national network exposure to emerging threats - fyodo...Real time evaluation of national network exposure to emerging threats - fyodo...
Real time evaluation of national network exposure to emerging threats - fyodo...
 
Public exploit held private : Penetration Testing the researcher’s way
Public exploit held private : Penetration Testing the researcher’s wayPublic exploit held private : Penetration Testing the researcher’s way
Public exploit held private : Penetration Testing the researcher’s way
 
Pinkstar Events Agency [Delhi] Credentials 2016
Pinkstar Events  Agency [Delhi] Credentials 2016Pinkstar Events  Agency [Delhi] Credentials 2016
Pinkstar Events Agency [Delhi] Credentials 2016
 
Maral overseas pvt ltd,industry visit report by pooja
Maral overseas pvt ltd,industry visit report by poojaMaral overseas pvt ltd,industry visit report by pooja
Maral overseas pvt ltd,industry visit report by pooja
 
Best Event Management Company in Dhaka | Top Event Management Company in Bang...
Best Event Management Company in Dhaka | Top Event Management Company in Bang...Best Event Management Company in Dhaka | Top Event Management Company in Bang...
Best Event Management Company in Dhaka | Top Event Management Company in Bang...
 
Promotion & branding
Promotion & brandingPromotion & branding
Promotion & branding
 
2nd Annual Power & Transmission Summit 2015
2nd Annual Power & Transmission Summit 20152nd Annual Power & Transmission Summit 2015
2nd Annual Power & Transmission Summit 2015
 
Mobile Trends and Innovations
Mobile Trends and InnovationsMobile Trends and Innovations
Mobile Trends and Innovations
 
Serge Ferrari - India projects
Serge Ferrari - India projectsSerge Ferrari - India projects
Serge Ferrari - India projects
 
eScan National marketing
eScan National marketingeScan National marketing
eScan National marketing
 
Agile Kolkata 2022 - Prashant M J | How to Plan your Agile Career
Agile Kolkata 2022 - Prashant M J | How to Plan your Agile CareerAgile Kolkata 2022 - Prashant M J | How to Plan your Agile Career
Agile Kolkata 2022 - Prashant M J | How to Plan your Agile Career
 
Newsletter of the November-December 2017
Newsletter of the November-December 2017Newsletter of the November-December 2017
Newsletter of the November-December 2017
 
District Cooling & Tri-Generation Summit 2014
District Cooling & Tri-Generation Summit 2014District Cooling & Tri-Generation Summit 2014
District Cooling & Tri-Generation Summit 2014
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Getting the end point security right! - k. k. mookhey

  • 1. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in Client-Side Security K. K. Mookhey kkmookhey@niiconsulting.com OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 2. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in • Introduction • Real-world case study • The drop • Malware analysis • Delivery mechanisms • Lessons learnt OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 3. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 4. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in File name Loop Mobile Bill Statement Date 08.11.2011.pdf Services.doc The injection attempt The Most wanted terrorist by Delhi police.doc OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 5. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 6. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 7. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 8. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 9. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in Strings OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 10. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 11. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 12. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 13. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 14. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 15. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in What heritage are they protecting? Let’s find out OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 16. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in ./win7 ./win7/exploit.html ./win7/Exploit.jar ./win7/Exploit.class ./moneytime ./moneytime/abc ./moneytime/abc/dsfd.pdf ./moneytime/report.php ./moneytime/aaaa ./moneytime/aaaa/decr.exe ./moneytime/Aminer ./moneytime/Aminer/Utility_installation_step_by_step.doc ./moneytime/Aminer/aMiner2.0.iso ./moneytime/Aminer/aMiner_Installation_Step_by_Step.doc ./moneytime/Aminer/utilities.iso ./moneytime/email list.txt ./moneytime/WinXpcr.py ./moneytime/main.png ./moneytime/demor ./moneytime/demor/application.doc ./moneytime/Appin ./moneytime/Appin/appin.doc ./moneytime/Appin/appin1.pdf ./moneytime/key ./moneytime/key/conhost.exe ./moneytime/key/smse.exe OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 17. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 18. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 19. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 20. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in WHAT IS AMINER.EXE? OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 21. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in ./chirag/drop/KAMAL0024BEBE0A80/KeyLog.txt ./chirag/drop/KAMAL0024BEBE0A80/ip.txt ./chirag/drop/INDIA00012E2598D3 ./chirag/drop/INDIA00012E2598D3/KeyLog.txt ./chirag/drop/INDIA00012E2598D3/ip.txt ./chirag/drop/BLUE-INTRA-VM000C29D666CE ./chirag/drop/BLUE-INTRA-VM000C29D666CE/123.php Who is ./chirag/drop/GAMCA300248CC9EE30 ./chirag/drop/GAMCA300248CC9EE30/KeyLog.txt Chirag? ./chirag/drop/GAMCA300248CC9EE30/ip.txt ./chirag/drop/ADMIN-PC005056C00008 ./chirag/drop/ADMIN-PC005056C00008/KeyLog.txt ./chirag/drop/ADMIN-PC005056C00008/ip.txt ./chirag/drop/SABI-D00241D9A5C01 ./chirag/drop/SABI-D00241D9A5C01/KeyLog.txt ./chirag/drop/SABI-D00241D9A5C01/ip.txt ./chirag/drop/DESIGN20CF309A9453 ./chirag/drop/DESIGN20CF309A9453/KeyLog.txt ./chirag/drop/DESIGN20CF309A9453/ip.txt ./chirag/drop/KAMALC0F8DA7AF26C ./chirag/drop/KAMALC0F8DA7AF26C/KeyLog.txt ./chirag/drop/KAMALC0F8DA7AF26C/ip.txt OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 22. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 23. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 24. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in Typical Delivery Mechanisms OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 25. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in Scenario 2 Un-authorized usage of USB Drives We inserted USB drives on 8 systems 2 systems had USB blocked Only 1 person objected to us inserting the USB drive OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 26. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in Phishing OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 27. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in • APTs are real and here to stay • It does not take a genius to evade AV • We need newer solutions – and quick! • Your end-point defences should be as strong or even stronger than the perimeter defences • In the meanwhile… • Patch all your end-point software • Watch your AV status like a hawk • Constantly propagate security news to your end-users And • Be careful, which security vendors you hire! OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)