/
Ethical Hackers Are Your Best Friends Ethical Hackers Are Your Best Friends

Ethical Hackers Are Your Best Friends - PowerPoint Presentation

phoebe-click
phoebe-click . @phoebe-click
Follow
409 views
Uploaded On 2016-05-01

Ethical Hackers Are Your Best Friends - PPT Presentation

Xavier Mertens Principal Security Consultant If the enemy leaves a door open you must rush in Sun Tzu whoami Xavier Mertens Not VENDORS best friend Interested in your DATA ID: 301637

auditing security pentesting conclusion security auditing conclusion pentesting fail limitations agenda introduction step guy hackers constraint software bad good attack ethical target

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Ethical Hackers Are Your Best Friends" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Ethical Hackers Are Your Best Friends

Xavier Mertens - Principal Security Consultant “If the enemy leaves a door open, you must rush in” (Sun Tzu)Slide2

# whoami

Xavier MertensNot $VENDORS’ best friendInterested in your $DATA!Slide3

# whoamiSlide4

<warning>

</warning>Slide5

Agenda

IntroductionWe all failAuditing VS. PentestingHow?Limitations!ConclusionSlide6

Recent Events

December 2013

January 2014

200K Algerian routers vulnerable

Starbucks’

iOS

app stores plain text passwords

Neiman Marcus

databreach

Target stores hacked: 40M CC accounts breached

Microsoft TIFF 0-day vulnerability

CVE-2013-5065

Who’s

Next?Slide7

But I’ve An Antivirus...Slide8

But I Also Have A Firewall...Slide9

And Many Other Stuff...Slide10

Like Airplane CrashesSlide11

The Weakest LinkSlide12

Security $VENDORS

Bound to fail against targeted attacksMight increase the surface attack(1)Prone to broadcast a false sense of security

(1)

Turning your AV into a

botnet

- bit.ly/1aL7GcL

Our 2.0-NG-software deployed in the cloud will protect you against all APT…Slide13

“Ethic”

“A set of moral principles of right and wrong that are accepted by an individual or a social group”Slide14

“Hacking”

“Practice of modifying computer hardware, software or any other electronic device to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called ‘hacker’”. Hackers are good guys!Ethical Hackers help you to find security holes in your infrastructure or process using the same

tools

and

techniques

as bad guysSlide15

Agenda

IntroductionWe all failAuditing VS. PentestingHow?Limitations!ConclusionSlide16

People...

The problem has been located between the keyboard and the chairError is humanPrograms are written by humans, so they have bugsSlide17

MisconfigurationsSlide18

ComplexitySlide19

PatchingSlide20

We are lazy!Slide21

The BusinessSlide22

Agenda

IntroductionWe all failAuditing VS. PentestingHow?Limitations!ConclusionSlide23

Auditing

“Auditing is defined as a systematic and independent examination of data, statements, records and performances (in this case IT) of an enterprise for a stated

purpose”

(Source:

wikipedia

)Slide24

Pentesting

“Pentesting is an act performed with a specific goal which determines the success status of the test. It can be any

combination of

attack

methods depending on the goals and rules of engagement set”

(Source:

wikipedia)Slide25

“It’s A Question of View”

Does you have a Web Application Firewall?Slide26

Think As A Bad Guy

Will you trust this guy?Slide27

But Look Like A Good Guy

And this one?Slide28

Wait, Why Attacking Me?

Information is valuable!Customers detailsFinancial informationPatentYou’re not the end-target. Are you providing services to big customers? (pivot)Slide29

Multiple Targets

Anything that runs“code”Computers, printers,webcams, phones,routersHardwareLocks, cars, SCADA,

scalesSlide30

Impacts

Brand reputationFinancialLoss of revenueEU Data Breach notification law soon?Slide31

Agenda

IntroductionWe all failAuditing VS. PentestingHow?Limitations!ConclusionSlide32

Different ApproachesSlide33

Step 0 – EngagementSlide34

Step 1 – Public Info

“You just have been indexed!”Google is your best friend!site:mytarget.com "Microsoft OLE DB Provider for SQL Server“site:mytarget.com

"You have an error in your SQL syntax“

OSINTSlide35

Step 2 – Reconnaissance

Scan your targetOnsite visit & plug a computerGrab stuff on eBayLook for garbageSlide36

Step 3 - Exploit

ComputersObsolete or internal softwareHumansDrop USB keysSend emailsBuy flowers (secretary) or goodies (techies) ;-)Slide37

Step 4 - Attack

Remain stealthStay inExfiltrateCover your tracksSlide38

Step 5 – Reporting

After the fun, some homework!Address the management(a screenshot is worth a thousand words)Put risks levels on findings (be realistic)Use the report to define your security roadmapSlide39

Agenda

IntroductionWe all failAuditing VS. PentestingHow?Limitations!ConclusionSlide40

Bad Guy VS. Good Guy

No scope constraintNo time constraintNo budget constraintNo NDACan be destructiveEngaged resources are directly related to the target valueSlide41

Agenda

IntroductionWhy we fail?Auditing VS. PentestingHow?Limitations!ConclusionSlide42

Conclusion

Security == Ability to resist to attacksDon’t ask “How?” but “When?”We live in a digital world run by analog managersClassic audit results might give a false sense of securityAsk some help from ethical hackers!Slide43

Conclusion

Keep in mind the “security triangle”

Features

Ease of Use

SecuritySlide44

Thank You!

Interested?Contact your Account

Manager for more

information!