SlideShare a Scribd company logo
BREAK I.T. DOWN
A look at computer network defense
techniques and strategies that actually
work in a world of blinky light sales.
Strait up defense served with a side of
sarcasm.
Joshua Smith – 2016.07.19
ABOUT ME
THE GOAL
Discuss real world defense techniques to that
make an attackers job hard(er)
This does not mean
It will be easy
It will be free (don’t forget about the cost of time)
THE PROBLEM
It’s 2016 and we still see headlines like this:
Noodles & Company Payment Data May Have Been Hacked
From high seas to high tech: Pirates hack shipping company
Hackers selling 117 million LinkedIn passwords
Troy investment company hacked; $495K stolen
Lone wolf claims responsibility for DNC hack
Canadian Gold-Mining Company Hacked, 14.8 GB Data Stolen
China steel firm obtained hacked DuPont trade secrets
HOW?
A macro enabled document, pivot, profit, rinse and repeat
1995 produced the first macro based malware
We are still fighting (and losing) a 20+ year old battle
20 YEARS I SAID
THE ISSUE
Defense is the daughter of offense
 If you don’t know an attackers tradecraft youare going to have a hard time keeping them
out
We are being sold:
 Machine Learning
 Cyber
 Next Gen
 The Cloud
 Etc.
IT’S MACROS TODAY, HOWEVER, JUST REMEMBER
Technical Control Recommendation Priority
Application Whitelisting
Only approved applications should beallowed to run (this includes .exe, .dll,
.js, .bat, etc.) 1
Patch 3rd Party Software 3rd party software(Flash, Silverlight, Java, etc.) needs to bepatched 2
Patch OS OS patches properly distributed in a timely manner 3
Restrict Admin Privileges Users should not berunning with administrativerights 4
Host-based Intrusion
Detection/PreventionSystem
(HIDS/HIPS)
Implement a HIDS/HIPS to identify when prevention has failed and a host has
been successfully compromised 5
Network Segmentation
Network segmentationhelps mitigatepost compromisepivoting (i.e., Pass-
the-Hash and Pass-the-Ticket) 6
Web Application Firewall (WAF)
Implement a WAF to help detect and prevent web based attacks against
external websites 7
Event Monitoring
Implement a monitored SIEM to gain visibility into your networks. Event
sources include, but not limited to firewall, AV, ActiveDirectory, hosts,
IDS/IPS, web logs, etc. 8
Office Document Threat
Prevention
All .doc, .docm, .xls, and .xlsm documents should beblocked if possibleat the
email level and via Group Policy Objects (GPO’s) 9
SSL Interception
SSL traffic should beintercepted (with exceptions) to identifymalicious traffic
and filtered as well. 10
APPLICATION WHITELISTING
Only approved applications are allowed to run
 Free and paid for options
 AV is the inverseof this (blacklisting)
 Not foolproof (seepowershell.exe)
So when a unapproved program tries to run, it gets this:
PATCH 3RD PARTY SOFTWARE
Adobe Flash is currently the most exploited 3rd party software*
Other things like Adobe Reader, Microsoft Silverlight
*This title usedbelongtoOracle/SunJava,butthatisnolongerthe case
PATCH OS
PatchingMatters
 Even on Linux and embedded devices
Remote exploits get all the press, but privilege escalation is what we typically
exploit (if any exploits are used at all)
RESTRICT ADMINISTRATOR PRIVS
Don’t let users run as administrators*
Why?
Pivoting
Passwords
Persistence
* Yes, I know that this can bevery hard
Break IT Down by Josh Smith
HOST BASED IDS/IPS
So I just bypassed your next-gen firewall, IPS, and synergistic AV product to
compromise a fully patched box
DO YOU SEE ME PIVOTING AND
EXFILITRATING ALL OF YOUR DATA
OUT THE FRONT DOOR?
NO? ATTACKER BE LIKE..
TAKEAWAY
If you don’t remember anythingelse from this presentation remember this:
DON’T FORGET
ABOUT DETECTION
Required Reading: https://ghostbin.com/paste/6kho7
NETWORK SEGMENTATION
You have your company critical documents accessible to a machine that can look up
Pokemon Go cheats?
WEB APPLICATION FIREWALL (WAF)
Website logs are often overlooked
Website attacks can be a forewarning of other things to come
EVENT MONITORING
Logs need to be collected *and* analyzed
Budgets often accountfor the cost of tools, not the time required to learn, monitor,
and review those tools
OFFICE DOCUMENT THREAT
PREVENTION
Disable macros
 Can be done via GPOs
SSL INSPECTION
About 50% of web traffic is now encrypted, including a lot of malicious traffic
A NOTE ABOUT “PEN TESTING”
There is a vast difference between
 Vulnerability Assessment
 Penetration Test
 Red Teaming/Adversary Simulation
Helpful when you believe you are secure or you need to grease the wheels to get
more money
To reduce costs don’t be afraid to whitecard (but make sure that doesn’t invalidate
your test to the executives)
SUMMARY
You probably can use a lot of what you already have to make security at your
organization better
Don’t fall for the blinky lights, buzzword laden sales job
Cultural changes are hard and require management by in
Don’t tailor your defense to what security companies are selling, tailor to what
attackers are attacking
Leverage red team engagements to get the support you need to make changes
Don’t forget about detection
Defense is hard, not impossible
REFERENCES
 Infosec Reactions - https://securityreactions.tumblr.com/
 ASD Strategies to Mitigate Targeted Cyber Intrusions - http://www.asd.gov.au/infosec/top-
mitigations/mitigations-2014-table.htm
 Application Whitelisting - http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-167.pdf
 Disable Office Macros - https://medium.com/@networksecurity/it-s-time-to-secure-microsoft-
office-be50ec2797e3#.x5ll30jza

More Related Content

PPTX
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
PDF
Security by Weston Hecker
PPTX
Defending Against 1,000,000 Cyber Attacks by Michael Banks
PDF
Hacking Web Apps by Brent White
PDF
Hunting Layered Malware by Raul Alvarez
PDF
Advanced Threats and Lateral Movement Detection
PPTX
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
PPTX
Invincea fake british airways ticket spear-phish malware 03-21-2014
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Security by Weston Hecker
Defending Against 1,000,000 Cyber Attacks by Michael Banks
Hacking Web Apps by Brent White
Hunting Layered Malware by Raul Alvarez
Advanced Threats and Lateral Movement Detection
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Invincea fake british airways ticket spear-phish malware 03-21-2014

What's hot (20)

PDF
DerbyCon 5 - Tactical Diversion-Driven Defense
PDF
Understanding CryptoLocker (Ransomware) with a Case Study
PPTX
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
PDF
Deception Driven Defense - Infragard 2016
PDF
The Rising Threat of Fileless Malware
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PPTX
Defcon Crypto Village - OPSEC Concerns in Using Crypto
PPTX
Threat hunting - Every day is hunting season
PDF
Capture the Flag Exercise Using Active Deception Defense
PDF
SecureSet WarGames - Logging and Packet Capture Training
PPTX
Lateral Movement by Default
PDF
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
PPTX
Corporate Espionage without the Hassle of Committing Felonies
PPTX
Tracking Exploit Kits - Virus Bulletin 2016
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
PPT
Introduction to Malware - Part 1
PDF
Honeypots for Active Defense
PDF
CSF18 - Incident Response in the Cloud - Yuri Diogenes
PDF
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
PPTX
BSA2016 - Honeypots for Network Security Monitoring
DerbyCon 5 - Tactical Diversion-Driven Defense
Understanding CryptoLocker (Ransomware) with a Case Study
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
Deception Driven Defense - Infragard 2016
The Rising Threat of Fileless Malware
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Threat hunting - Every day is hunting season
Capture the Flag Exercise Using Active Deception Defense
SecureSet WarGames - Logging and Packet Capture Training
Lateral Movement by Default
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
Corporate Espionage without the Hassle of Committing Felonies
Tracking Exploit Kits - Virus Bulletin 2016
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Introduction to Malware - Part 1
Honeypots for Active Defense
CSF18 - Incident Response in the Cloud - Yuri Diogenes
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSA2016 - Honeypots for Network Security Monitoring
Ad

Similar to Break IT Down by Josh Smith (20)

PPTX
Automation: Embracing the Future of SecOps
PPTX
PCM Vision 2019 Breakout: IBM | Red Hat
 
PDF
Web Application Security Testing Guide | Secure Web Apps
PPTX
Prevent Getting Hacked by Using a Network Vulnerability Scanner
PDF
Introduction to the Current Threat Landscape
PDF
It’s time to boost VoIP network security
PDF
2016 CYBERSECURITY PLAYBOOK
PPTX
6 Ways to Deceive Cyber Attackers
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PPT
System Z Mainframe Security For An Enterprise
PPTX
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
ODP
Break it while you make it: writing (more) secure software
PPTX
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
PDF
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
PPT
Security in e-commerce
PDF
How to Secure Web Apps — A Web App Security Checklist
PDF
Protecting Your Privacy: Cyberspace Security, Real World Safety
PDF
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
PPTX
Cyber security awareness for end users
PDF
AEPWP09292016
Automation: Embracing the Future of SecOps
PCM Vision 2019 Breakout: IBM | Red Hat
 
Web Application Security Testing Guide | Secure Web Apps
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Introduction to the Current Threat Landscape
It’s time to boost VoIP network security
2016 CYBERSECURITY PLAYBOOK
6 Ways to Deceive Cyber Attackers
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
System Z Mainframe Security For An Enterprise
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Break it while you make it: writing (more) secure software
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Security in e-commerce
How to Secure Web Apps — A Web App Security Checklist
Protecting Your Privacy: Cyberspace Security, Real World Safety
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyber security awareness for end users
AEPWP09292016
Ad

More from EC-Council (20)

PPTX
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
PDF
Cloud Security Architecture - a different approach
PPTX
Phases of Incident Response
PDF
Weaponizing OSINT – Hacker Halted 2019 – Michael James
PDF
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
PDF
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
PPTX
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
PDF
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
PDF
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
PDF
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
PDF
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
PDF
War Game: Ransomware – Global CISO Forum 2019
PPTX
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
PDF
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
PPTX
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
PPTX
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
PPTX
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
PPTX
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
PPTX
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
PPTX
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
Cloud Security Architecture - a different approach
Phases of Incident Response
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
War Game: Ransomware – Global CISO Forum 2019
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation theory and applications.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
sap open course for s4hana steps from ECC to s4
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation theory and applications.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Break IT Down by Josh Smith

  • 1. BREAK I.T. DOWN A look at computer network defense techniques and strategies that actually work in a world of blinky light sales. Strait up defense served with a side of sarcasm. Joshua Smith – 2016.07.19
  • 3. THE GOAL Discuss real world defense techniques to that make an attackers job hard(er) This does not mean It will be easy It will be free (don’t forget about the cost of time)
  • 4. THE PROBLEM It’s 2016 and we still see headlines like this: Noodles & Company Payment Data May Have Been Hacked From high seas to high tech: Pirates hack shipping company Hackers selling 117 million LinkedIn passwords Troy investment company hacked; $495K stolen Lone wolf claims responsibility for DNC hack Canadian Gold-Mining Company Hacked, 14.8 GB Data Stolen China steel firm obtained hacked DuPont trade secrets
  • 5. HOW? A macro enabled document, pivot, profit, rinse and repeat 1995 produced the first macro based malware We are still fighting (and losing) a 20+ year old battle 20 YEARS I SAID
  • 6. THE ISSUE Defense is the daughter of offense  If you don’t know an attackers tradecraft youare going to have a hard time keeping them out We are being sold:  Machine Learning  Cyber  Next Gen  The Cloud  Etc.
  • 7. IT’S MACROS TODAY, HOWEVER, JUST REMEMBER
  • 8. Technical Control Recommendation Priority Application Whitelisting Only approved applications should beallowed to run (this includes .exe, .dll, .js, .bat, etc.) 1 Patch 3rd Party Software 3rd party software(Flash, Silverlight, Java, etc.) needs to bepatched 2 Patch OS OS patches properly distributed in a timely manner 3 Restrict Admin Privileges Users should not berunning with administrativerights 4 Host-based Intrusion Detection/PreventionSystem (HIDS/HIPS) Implement a HIDS/HIPS to identify when prevention has failed and a host has been successfully compromised 5 Network Segmentation Network segmentationhelps mitigatepost compromisepivoting (i.e., Pass- the-Hash and Pass-the-Ticket) 6 Web Application Firewall (WAF) Implement a WAF to help detect and prevent web based attacks against external websites 7 Event Monitoring Implement a monitored SIEM to gain visibility into your networks. Event sources include, but not limited to firewall, AV, ActiveDirectory, hosts, IDS/IPS, web logs, etc. 8 Office Document Threat Prevention All .doc, .docm, .xls, and .xlsm documents should beblocked if possibleat the email level and via Group Policy Objects (GPO’s) 9 SSL Interception SSL traffic should beintercepted (with exceptions) to identifymalicious traffic and filtered as well. 10
  • 9. APPLICATION WHITELISTING Only approved applications are allowed to run  Free and paid for options  AV is the inverseof this (blacklisting)  Not foolproof (seepowershell.exe) So when a unapproved program tries to run, it gets this:
  • 10. PATCH 3RD PARTY SOFTWARE Adobe Flash is currently the most exploited 3rd party software* Other things like Adobe Reader, Microsoft Silverlight *This title usedbelongtoOracle/SunJava,butthatisnolongerthe case
  • 11. PATCH OS PatchingMatters  Even on Linux and embedded devices Remote exploits get all the press, but privilege escalation is what we typically exploit (if any exploits are used at all)
  • 12. RESTRICT ADMINISTRATOR PRIVS Don’t let users run as administrators* Why? Pivoting Passwords Persistence * Yes, I know that this can bevery hard
  • 14. HOST BASED IDS/IPS So I just bypassed your next-gen firewall, IPS, and synergistic AV product to compromise a fully patched box DO YOU SEE ME PIVOTING AND EXFILITRATING ALL OF YOUR DATA OUT THE FRONT DOOR?
  • 15. NO? ATTACKER BE LIKE..
  • 16. TAKEAWAY If you don’t remember anythingelse from this presentation remember this: DON’T FORGET ABOUT DETECTION Required Reading: https://ghostbin.com/paste/6kho7
  • 17. NETWORK SEGMENTATION You have your company critical documents accessible to a machine that can look up Pokemon Go cheats?
  • 18. WEB APPLICATION FIREWALL (WAF) Website logs are often overlooked Website attacks can be a forewarning of other things to come
  • 19. EVENT MONITORING Logs need to be collected *and* analyzed Budgets often accountfor the cost of tools, not the time required to learn, monitor, and review those tools
  • 20. OFFICE DOCUMENT THREAT PREVENTION Disable macros  Can be done via GPOs
  • 21. SSL INSPECTION About 50% of web traffic is now encrypted, including a lot of malicious traffic
  • 22. A NOTE ABOUT “PEN TESTING” There is a vast difference between  Vulnerability Assessment  Penetration Test  Red Teaming/Adversary Simulation Helpful when you believe you are secure or you need to grease the wheels to get more money To reduce costs don’t be afraid to whitecard (but make sure that doesn’t invalidate your test to the executives)
  • 23. SUMMARY You probably can use a lot of what you already have to make security at your organization better Don’t fall for the blinky lights, buzzword laden sales job Cultural changes are hard and require management by in Don’t tailor your defense to what security companies are selling, tailor to what attackers are attacking Leverage red team engagements to get the support you need to make changes Don’t forget about detection Defense is hard, not impossible
  • 24. REFERENCES  Infosec Reactions - https://securityreactions.tumblr.com/  ASD Strategies to Mitigate Targeted Cyber Intrusions - http://www.asd.gov.au/infosec/top- mitigations/mitigations-2014-table.htm  Application Whitelisting - http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-167.pdf  Disable Office Macros - https://medium.com/@networksecurity/it-s-time-to-secure-microsoft- office-be50ec2797e3#.x5ll30jza