SlideShare a Scribd company logo
Breaking the Cyber Kill Chain!
Md Nahidul kibria
Co-Founder, Beetles
Md Nahidul Kibria
Co-Founder, Beetles
@nahidupa
[~] $ whoami
What is this talk about?
We ensure all compliance
We still get compromised!
We spend money to buy all good
equipments
We still get compromised!
We ensure…
We do that…
We did that...
We still get compromised!
Breaking the cyber kill chain!
Breaking the cyber kill chain!
Proactive security
Cyber Attack Lifecycle
Cyber Kill Chain
Threat hunting
Let's Detect and Response
Sensors >> Data >> monitoring
Approaches to Threat Hunting
1. Data-centric Hunting
2. Hunting on the Endpoint(DFIR)
3. Deception
Adversary simulation
1. Attacking web application
2. OS Command execute
3. Download malicious files (powershell webclient)
4. Getting reverse shell
5. Privilege escape
6. Scan internal host
7. Lateral Movement
8. Install APT(c2)
9. Data Exfiltration
Hunt Lateral Movement
Attackers quietly traverse your Network.
Lateral Movement - Techniques, Tactics &
Procedures (TTPs)
Psexec
File shares
Powershell
Pass-the-hash
Scheduled tasks
Windows Management
Instrumentation (WMI)
SMB
SSH
Detect using windows event log
/Sysmon
WebShell -Command injection
Psexec
psexec.exe -i -s %SystemRoot%system32cmd.exe
Sysmon event - psexc.exe
Hunt other TTPs
“net” Reconnaissance of Domain Admin Group
Command
● C: > net group "Domain Admin" /domain
Credential Harvesting with WMI and WCE
● net use 172.31.3.16 PASSWORD /user:SANDBOXAdministrator
● copy w.exe 172.31.3.16c$PerfLogs
● wmic /NODE:172.31.3.16 /USER:"SANDBOXAdministrator" /PASSWORD:"PASSWORD" process call create "cmd /c C:Perflogsw.exe -w
> C:Perflogso.txt"
Ref: http://www.crypsisgroup.com/images/site/CG_WhitePaper_Splunkmon_1216.pdf
Ref: http://www.crypsisgroup.com/images/site/CG_WhitePaper_Splunkmon_1216.pdf
Sysmon
dashboard
Hunting Command and
Control(c2)
Hunting Command and Control(c2)
C2 via Dynamic DNS
Finding the Unknown with HTTP URIs
Beacon Detection via Intra-Request Time Deltas
Finding C2 in Network Sessions
Detection Using Bro
#wannacry
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com.
Hunt for Data Exfiltration
Producer-Consumer Ratio for Detecting Data Exfiltration
Ref
https://github.com/ThreatHuntingProject/ThreatHunting/blob/master/hunts/analyze_producer_consumer_ratio.md
Hunt for Malware
Unusual Windows Behavior
https://www.sans.org/security-resources/posters/dfir-find-evil/35/download
Svchost.exe with no -k
WannaCry detection
Ref:
https://github.com/Neo23x0/sigma/tree/master/rules/windows/sysmon
Query
(NewProcessName: "svchost.exe" AND NOT NewProcessName: "C:WindowsSystem32svchost.exe") OR (NewProcessName:
"smss.exe" AND NOT NewProcessName: "C:WindowsSystem32smss.exe") OR (NewProcessName: "wininit.exe" AND NOT
NewProcessName: "C:WindowsSystem32wininit.exe") OR (NewProcessName: "taskhost.exe" AND NOT NewProcessName:
"C:WindowsSystem32taskhost.exe") OR (NewProcessName: "lsass.exe" AND NOT NewProcessName:
"C:WindowsSystem32lsass.exe") OR (NewProcessName: "winlogon.exe" AND NOT NewProcessName:
"C:WindowsSystem32winlogon.exe") OR (NewProcessName: "explorer.exe" AND NOT NewProcessName:
"C:Windowsexplorer.exe") OR (NewProcessName: "lsm.exe" AND NOT NewProcessName: "C:WindowsSystem32lsm.exe")
OR (NewProcessName: "services.exe" AND NOT NewProcessName: "C:WindowsSystem32services.exe") OR
(NewProcessName: "csrss.exe" AND NOT NewProcessName: "C:WindowsSystem32csrss.exe")
Hunt in memory
Malware become fileless- Kovter,Poweliks
Volatility-/rekall
Breaking the cyber kill chain!
Breaking the cyber kill chain!
Here can come Security Operation Center
Machine Learning for
Incident Detection
Breaking the cyber kill chain!
The Hunting Maturity Model
Breaking the cyber kill chain!
Happy Hunting!
@nahidupa
Break the Cyber Kill
Chain!

More Related Content

PPTX
Osint {open source intelligence }
PPTX
Hash function
PPTX
Distributed system lamport's and vector algorithm
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PDF
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
PDF
Web Application Security 101
PPTX
Footprinting and reconnaissance
PPT
Secure shell ppt
Osint {open source intelligence }
Hash function
Distributed system lamport's and vector algorithm
Virus and its CounterMeasures -- Pruthvi Monarch
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Web Application Security 101
Footprinting and reconnaissance
Secure shell ppt

What's hot (20)

PPTX
PPTX
OSI Security Architecture
PPT
Disk management
PDF
Super Easy Memory Forensics
 
DOC
Distributed Mutual exclusion algorithms
PPTX
Red Team vs. Blue Team
PPT
PPTX
Distributed system architecture
PPT
Keyloggers.ppt
PPT
Distributed Transaction
PDF
IP Security
PPT
Authentication Protocols
PPT
File system
PDF
Zksnarks in english
PPTX
Malware Static Analysis
PPTX
Design Goals of Distributed System
PPT
Ssl https
PDF
Azure Penetration Testing
PPTX
x.509-Directory Authentication Service
OSI Security Architecture
Disk management
Super Easy Memory Forensics
 
Distributed Mutual exclusion algorithms
Red Team vs. Blue Team
Distributed system architecture
Keyloggers.ppt
Distributed Transaction
IP Security
Authentication Protocols
File system
Zksnarks in english
Malware Static Analysis
Design Goals of Distributed System
Ssl https
Azure Penetration Testing
x.509-Directory Authentication Service
Ad

Similar to Breaking the cyber kill chain! (20)

PPTX
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
PDF
Anti forensics-techniques-for-browsing-artifacts
PPTX
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
PPTX
Unmasking Careto through Memory Forensics (video in description)
PDF
Attack Chaining: Advanced Maneuvers for Hack Fu
PDF
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
PDF
DrupalCamp London 2017 - Web site insecurity
PDF
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
PPTX
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
PPTX
Basic malware analysis
PDF
Derbycon 2017: Hunting Lateral Movement For Fun & Profit
PDF
SE2016 Android Denis Zhuchinski "Ways of enhancing application security"
PDF
Denis Zhuchinski Ways of enhancing application security
PDF
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
PPT
Anton Chuvakin on Discovering That Your Linux Box is Hacked
PPTX
Indicators of compromise: From malware analysis to eradication
PPTX
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
PDF
Automating cloud security - Jonny Griffin
PPTX
Living off the land and fileless attack techniques
PDF
Case Studies TeamTNT - AWS & Container Cryptomining Worm DFIR.pdf
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Anti forensics-techniques-for-browsing-artifacts
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Unmasking Careto through Memory Forensics (video in description)
Attack Chaining: Advanced Maneuvers for Hack Fu
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
DrupalCamp London 2017 - Web site insecurity
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
Basic malware analysis
Derbycon 2017: Hunting Lateral Movement For Fun & Profit
SE2016 Android Denis Zhuchinski "Ways of enhancing application security"
Denis Zhuchinski Ways of enhancing application security
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Indicators of compromise: From malware analysis to eradication
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
Automating cloud security - Jonny Griffin
Living off the land and fileless attack techniques
Case Studies TeamTNT - AWS & Container Cryptomining Worm DFIR.pdf
Ad

More from Nahidul Kibria (6)

PPTX
Sending a for ahuh. win32 exploit development old school
PPTX
Scaling application with RabbitMQ
PPTX
G3t R00t at IUT
PPTX
Banking malware zeu s zombies are using in online banking theft.
PPTX
Everybody loves html5,h4ck3rs too
PDF
Penetration testing web application web application (in) security
Sending a for ahuh. win32 exploit development old school
Scaling application with RabbitMQ
G3t R00t at IUT
Banking malware zeu s zombies are using in online banking theft.
Everybody loves html5,h4ck3rs too
Penetration testing web application web application (in) security

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI Monthly Chronicles - July 2025
Encapsulation_ Review paper, used for researhc scholars
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
The AUB Centre for AI in Media Proposal.docx
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Review of recent advances in non-invasive hemoglobin estimation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Dropbox Q2 2025 Financial Results & Investor Presentation
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Breaking the cyber kill chain!

Editor's Notes

  • #2: Hello Who is come at least second time this con?
  • #3: Cyber security company Pentesting-> malware analysis-> manage security service Synack-Web application, mobile application Free time Owasp Sofo
  • #4: How do we look at security right now,/ proactive security /threat hunting/ SOC
  • #5: Current mindset of security Compliance is not bad/
  • #6: We give user 2fa device/
  • #7: patched / ..insider threat / 0 days/
  • #8: We did everything alright whole year but a simple mistake all our credits gone, We need to change mindset
  • #12: An attack doesn’t just happen instantaneously, it takes time and effort. If we can detect in that duration
  • #13: Not a new concept Not Alert Driven Not a tool or product Not standardized Not a silver bullet
  • #14: Let's start detect from most important
  • #22: psexec.exe -i -s %SystemRoot%\system32\cmd.exe
  • #24: http://www.crypsisgroup.com/images/site/CG_WhitePaper_Splunkmon_1216.pdf
  • #38: https://github.com/google/rekall
  • #40: www.threathunting.net
  • #44: 0=> Automatic alerting- 1=> Threat intel feed,IOC search =>3=> Procedural=>4=>Innovative way=> 5. Automation and analytics. http://blog.sqrrl.com/the-cyber-hunting-maturity-model
  • #46: MindSet..raise the bar