The Other Side of the Fence.
Dealing with Malware *Hackers

              Prasanna V
         http://vprasanna.com
We generally hear about hackers
We generally hear about hackers
& malware, the damage they create,
& malware, the damage they create,
the money & data they steal.
the money & data they steal.

How's it to be on The Other Side?
How's it to be on The Other Side?
Episode 1:
The Conficker Strikes
Somewhere during November 2008, an enterprise
having thousands of systems spread across
the world
Holiday season, most of team were on leave
Complaints of network congestion,
Domain controller was slow



We saw unprecedented network traffic, within LAN
& Outbound to unusual IP addresses!



Rapid replication of suspicious
system behavior across the globe
Antivirus on the systems were
generally up-to-date with definitions
Our Network IDS was detecting traffic
destined to random global IP addresses
on destination ports 445


        Turns out that the infected machines
        were missing patches, most importantly
        MS08-67


 Apparently, these systems were also
 missing OS hardening that was put in
 place
We had Failed!
Effective logging and monitoring
             are like
         torchlight
Layered defense mechanism and
the role of Security Information &
Event Management (SIEM)
Security information from hosts & network
  logs helped identify the infected machines



                   Pivot!
Being good in spreadsheet helps the admins 




Patch the systems or disable network access
Foolproof security ?


Anti-Virus and Firewall are not the ultimate solutions
to today’s sophisticated threats.
There is Reasonable Security




   ……And it is achieved in layers
                                    14
Episode 2 - DHCP Server Goes
            Rogue

    An admin’s worst nightmare
Catastrophe Strikes!
1. Logged to gateway / router. Internet is fine.
2. Logged into UTM, sessions have doubled.
3. No malwares reported in the AV manager!
Wireshark is an Admin’s
 best friend!
“Documentation is your life
           savior”


Was able to identify the offending machine based on a
list I had generated earlier
Turns out that a user had set up a server
                  and
     did not know to disable DHCP
             functionality!
People are
                    the
                    weakest
                    link




Learning's:
  • Internal users can cause as much trouble as hackers and
    malware
Information Security is about
People, Process & Technology




                                22
                        Prx
The Other Side Of The Fence. Dealing With Hackers And Malware
Disclaimer

All opinions mentioned here are my personal and not necessarily

  of my employer, current or previous.
Thank You

Prasanna V

Cofounder @PacketVerify

http://vprasanna.com

@terminalfix

More Related Content

PDF
Computer Security and Risks
PPTX
Security concepts
PPT
Computer security and_privacy_2010-2011
PPTX
Threats to a computer
PPTX
Computer security risks
PPTX
Viruses, worms, and trojan horses
PPTX
Network Security
PPTX
Computer security basics
Computer Security and Risks
Security concepts
Computer security and_privacy_2010-2011
Threats to a computer
Computer security risks
Viruses, worms, and trojan horses
Network Security
Computer security basics

What's hot (20)

PDF
Free Libre Open Source Software Development
PPTX
Computer Security risks Shelly
PPTX
4.2.1 computer security risks
PPTX
Information Technology - System Threats
PPTX
Computer security threats & prevention
PPTX
Intrusion detection
 
PDF
Ch 3: Network and Computer Attacks
PPT
Ch08 Microsoft Operating System Vulnerabilities
PPTX
Network security and System Admin
PPT
Complete notes security
PPTX
Basic concepts in computer security
PPT
3.2.1 computer security risks
PPTX
Types of Attack in Information and Network Security
PPTX
Computer security and
PPT
Network Security Tools and applications
PPTX
Computer Security
PPTX
Basic practices for information & computer security
PPT
Threats and Security Tips of Computer System
PPT
Windows network security
PPTX
Computer security ethics_and_privacy
Free Libre Open Source Software Development
Computer Security risks Shelly
4.2.1 computer security risks
Information Technology - System Threats
Computer security threats & prevention
Intrusion detection
 
Ch 3: Network and Computer Attacks
Ch08 Microsoft Operating System Vulnerabilities
Network security and System Admin
Complete notes security
Basic concepts in computer security
3.2.1 computer security risks
Types of Attack in Information and Network Security
Computer security and
Network Security Tools and applications
Computer Security
Basic practices for information & computer security
Threats and Security Tips of Computer System
Windows network security
Computer security ethics_and_privacy

Viewers also liked (6)

PPTX
how to improve Chateau Martinat as a Ebusiness model ?
PDF
Prune mateo consulting project_report
PPTX
workshop crowdsourcing
PPTX
Tripwolf vs boo
PPTX
Policy and political engagement: Entanglement? Responsibility? Opportunity?
PDF
Interim results Q4 2009
 
how to improve Chateau Martinat as a Ebusiness model ?
Prune mateo consulting project_report
workshop crowdsourcing
Tripwolf vs boo
Policy and political engagement: Entanglement? Responsibility? Opportunity?
Interim results Q4 2009
 

Similar to The Other Side Of The Fence. Dealing With Hackers And Malware (20)

PPTX
Computing safety
PDF
Research and discuss an incident where it was discovered that a Remo.pdf
PPTX
Crack the Code
PPTX
Ransomeware and malware power point presentation
PDF
The Media Access Control Address
PPTX
Lecture about network and host security to NII students
PDF
Introduction of hacking and cracking
PPTX
Network Security.pptx
PPT
CyberSecurity presentation for basic knowledge about this topic
PPTX
Parag presentation on ethical hacking
PDF
Final presentation of IT security project
PPTX
Malware, Hacker Techniques, and Wireshark.pptx
PPS
Workshop on BackTrack live CD
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPT
Kunal - Introduction to BackTrack - ClubHack2008
PPTX
PoS Malware and Other Threats to the Retail Industry
PDF
Supply Chain Attack Backdooring Your Networks
PPTX
Basics of System Security and Tools
Computing safety
Research and discuss an incident where it was discovered that a Remo.pdf
Crack the Code
Ransomeware and malware power point presentation
The Media Access Control Address
Lecture about network and host security to NII students
Introduction of hacking and cracking
Network Security.pptx
CyberSecurity presentation for basic knowledge about this topic
Parag presentation on ethical hacking
Final presentation of IT security project
Malware, Hacker Techniques, and Wireshark.pptx
Workshop on BackTrack live CD
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
PoS Malware and Other Threats to the Retail Industry
Supply Chain Attack Backdooring Your Networks
Basics of System Security and Tools

Recently uploaded (20)

PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Modernising the Digital Integration Hub
PPT
What is a Computer? Input Devices /output devices
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Architecture types and enterprise applications.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
A proposed approach for plagiarism detection in Myanmar Unicode text
A review of recent deep learning applications in wood surface defect identifi...
Benefits of Physical activity for teenagers.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Module 1.ppt Iot fundamentals and Architecture
Modernising the Digital Integration Hub
What is a Computer? Input Devices /output devices
Microsoft Excel 365/2024 Beginner's training
UiPath Agentic Automation session 1: RPA to Agents
Abstractive summarization using multilingual text-to-text transfer transforme...
sustainability-14-14877-v2.pddhzftheheeeee
Flame analysis and combustion estimation using large language and vision assi...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Architecture types and enterprise applications.pdf
Final SEM Unit 1 for mit wpu at pune .pptx

The Other Side Of The Fence. Dealing With Hackers And Malware

  • 1. The Other Side of the Fence. Dealing with Malware *Hackers Prasanna V http://vprasanna.com
  • 2. We generally hear about hackers We generally hear about hackers & malware, the damage they create, & malware, the damage they create, the money & data they steal. the money & data they steal. How's it to be on The Other Side? How's it to be on The Other Side?
  • 4. Somewhere during November 2008, an enterprise having thousands of systems spread across the world
  • 5. Holiday season, most of team were on leave
  • 6. Complaints of network congestion, Domain controller was slow We saw unprecedented network traffic, within LAN & Outbound to unusual IP addresses! Rapid replication of suspicious system behavior across the globe
  • 7. Antivirus on the systems were generally up-to-date with definitions
  • 8. Our Network IDS was detecting traffic destined to random global IP addresses on destination ports 445 Turns out that the infected machines were missing patches, most importantly MS08-67 Apparently, these systems were also missing OS hardening that was put in place
  • 10. Effective logging and monitoring are like torchlight
  • 11. Layered defense mechanism and the role of Security Information & Event Management (SIEM)
  • 12. Security information from hosts & network logs helped identify the infected machines Pivot! Being good in spreadsheet helps the admins  Patch the systems or disable network access
  • 13. Foolproof security ? Anti-Virus and Firewall are not the ultimate solutions to today’s sophisticated threats.
  • 14. There is Reasonable Security ……And it is achieved in layers 14
  • 15. Episode 2 - DHCP Server Goes Rogue An admin’s worst nightmare
  • 17. 1. Logged to gateway / router. Internet is fine. 2. Logged into UTM, sessions have doubled. 3. No malwares reported in the AV manager!
  • 18. Wireshark is an Admin’s best friend!
  • 19. “Documentation is your life savior” Was able to identify the offending machine based on a list I had generated earlier
  • 20. Turns out that a user had set up a server and did not know to disable DHCP functionality!
  • 21. People are the weakest link Learning's: • Internal users can cause as much trouble as hackers and malware
  • 22. Information Security is about People, Process & Technology 22 Prx
  • 24. Disclaimer All opinions mentioned here are my personal and not necessarily of my employer, current or previous.
  • 25. Thank You Prasanna V Cofounder @PacketVerify http://vprasanna.com @terminalfix

Editor's Notes

  • #2: www.packetverify.com www.packetverify.com
  • #4: www.packetverify.com www.packetverify.com
  • #6: www.packetverify.com www.packetverify.com
  • #7: www.packetverify.com www.packetverify.com
  • #8: www.packetverify.com www.packetverify.com
  • #9: www.packetverify.com www.packetverify.com
  • #10: www.packetverify.com www.packetverify.com
  • #12: www.packetverify.com www.packetverify.com
  • #13: www.packetverify.com www.packetverify.com
  • #15: www.packetverify.com www.packetverify.com
  • #16: www.packetverify.com www.packetverify.com
  • #17: www.packetverify.com www.packetverify.com
  • #18: www.packetverify.com www.packetverify.com
  • #20: www.packetverify.com www.packetverify.com
  • #21: www.packetverify.com
  • #23: www.packetverify.com www.packetverify.com
  • #25: www.packetverify.com www.packetverify.com