SlideShare a Scribd company logo
Cloud Proxy Technology
Cyber Security in a Web Browsing AgeJeff Silver; CISSP
Symantec
Senior Security Engineer
SESSION AGENDA
• Proxy Fundamentals [Quick overview as a foundation]
• Cyber Security ‘Real’ Forensics Stories
• Proxy Architecture in the Modern Business Environment
• Q & A
What Is a Proxy?
What makes it unique and valuable in the security space
PROXY
3
When you put a proxy between a user and
a server on the internet, you are
terminating the connection at the proxy,
between the proxy and the user.
The request from Alice ends at the proxy.
A completely new session is started by the
proxy to ask Bob for the current time.
This is what makes a proxy so secure. It
terminates connections and waits for
entire objects to be assembled at the proxy
for inspection.
Proxy and Downloaded Objects
4
NETWORK CONNECTIONS AND OBJECTS
Proxy Architecture Compared to a Firewall
SANDBOX
Proxy
Firewall
Malicious payload
delivered to end user
Malicious payload
detected by content
analysis, blocked
from delivery
5
CYBER INTELLIGENCE IS THE KEY
https://sitereview.bluecoat.com
www.tekdefense.com/downloads/malware-samples/
www.westfallave.com/insight/cloudcar.exe
virustotal.com
https://www.talosintelligence.com/reputation_center
eicar.org
Real World Example
User Is Prevented From Going To The Site
9
THREAT INTELLIGENCE
URL Threat Risk Levels
Risk Level10: Solid evidence of malicious (rated in database)
Risk Level 9: Almost certainly malicious
Risk Level 8: Stronger evidence of maliciousness
Risk Level 7: Shady behavior (including Spam and Scams)
Risk Level 6: Exercise caution; very new sites, or some evidence of shady behavior
Risk Level 5: No established history of normal behavior
Risk Level 4: Still probably safe (may be starting to establish a history of normal behavior)
Risk Level 3: Probably safe
Risk Level 2: Other top sites; consistently well-behaved
Risk Level 1: Big names; long history of good behavior; huge traffic
Risk Level 0: Customer Whitelist
Real World Incident 1
Please don’t feed the Phish!
FRESH ‘VANILLA’ PHISH
PHISH DECONSTRUCTION
https://sitereview.bluecoat.com
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Real World Incident 2
Malware LOVES its Mommy!
LETS GET A LITTLE GEEKY
Jeff…Really, How do
you know these PCs are
infected with Malware?
Because they ALWAYS
ALWAYS speak back to
to the Mother Ship!
WHAT A SECURITY ADMIN SEES
PROPER MALWARE REMOVAL TECHNIQUE
Real World Incident 3
An All Expense Paid Trip to Portugal!
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Side Loaded Browser May Send You Places
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Real World Incident 4
What Happens When it gets Messy?!!
SECURITY BLEEDS INTO HR
What is the company policy on reporting this? Is there one? Make sure you know!
Don’t confront the person if you know them.
No emotion in reporting. Stick to the facts as you have the data to back it up.
SECURITY BLEEDS INTO LEGAL
What is the law in your state?
Who takes this from you…and have you gone through that drill before it actually
happens?
You cannot just turn a blind eye to this for moral and legal reasons.
PROXY WHITEBOARD
CLOUD PROXY
Site A
Headquarters
Work & Personal Devices
Roaming
Users
PROX
Y
PROX
Y
PROX
Y
Site B
Global Intelligence Network
Content Analysis
Sandboxing
Web Isolation
SSL
Cert.
Question and Answers

More Related Content

PDF
Weaponizing OSINT – Hacker Halted 2019 – Michael James
PDF
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
PPTX
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
PPTX
Jerod Brennen - What You Need to Know About OSINT
PPTX
Jason Samide - State of Security & 2016 Predictions
PDF
Opsec for security researchers
PDF
OSINT Basics for Threat Hunters and Practitioners
PPTX
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Jerod Brennen - What You Need to Know About OSINT
Jason Samide - State of Security & 2016 Predictions
Opsec for security researchers
OSINT Basics for Threat Hunters and Practitioners
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...

What's hot (20)

PDF
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
PDF
Analogic Opsec 101
PDF
SACON - Deception Technology (Sahir Hidayatullah)
PPTX
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
PPTX
Defending Against 1,000,000 Cyber Attacks by Michael Banks
PDF
Cyber Security Extortion: Defending Against Digital Shakedowns
PPT
An Underground education
PDF
An Underground education
PDF
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
PDF
Social Engineering
PDF
CrowdCast Monthly: Operationalizing Intelligence
PPT
Social Engineering
PDF
You Can't Stop The Breach Without Prevention And Detection
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PPTX
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
PDF
Texas Bitcoin Conference: Are Privacy Coins Private Enough?
PDF
Security for Human Beings
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PDF
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
PDF
Zero-Knowledge Proofs: Identity Proofing and Authentication
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Analogic Opsec 101
SACON - Deception Technology (Sahir Hidayatullah)
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Defending Against 1,000,000 Cyber Attacks by Michael Banks
Cyber Security Extortion: Defending Against Digital Shakedowns
An Underground education
An Underground education
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
Social Engineering
CrowdCast Monthly: Operationalizing Intelligence
Social Engineering
You Can't Stop The Breach Without Prevention And Detection
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
Texas Bitcoin Conference: Are Privacy Coins Private Enough?
Security for Human Beings
Effective Threat Hunting with Tactical Threat Intelligence
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
Zero-Knowledge Proofs: Identity Proofing and Authentication

Similar to Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver (20)

PDF
PPTX
The 2018 Threatscape
PDF
Living with Determined Attackers MOSI Edition
PDF
Ht seminar uniten-cyber security threat landscape
PPTX
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
PDF
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
PPTX
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
PPTX
7 mike-steenberg-carlos-lopera-us-bank
PPT
Secure by design and secure software development
PDF
Cyber security general perspective a
PPT
Web Security and Network Security
PPTX
11 19-2015 - iasaca membership conference - the state of security
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PPTX
What is the Cybersecurity plan for tomorrow?
PPTX
The Whys and Wherefores of Web Security – by United Security Providers
PPTX
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
PPTX
Threat Hunting with Splunk
PDF
CC_Futureinc_Cyber Security
PPTX
Scot Secure 2015
PDF
Living with the threat of Determined Attackers - RANT0214
The 2018 Threatscape
Living with Determined Attackers MOSI Edition
Ht seminar uniten-cyber security threat landscape
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
7 mike-steenberg-carlos-lopera-us-bank
Secure by design and secure software development
Cyber security general perspective a
Web Security and Network Security
11 19-2015 - iasaca membership conference - the state of security
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
What is the Cybersecurity plan for tomorrow?
The Whys and Wherefores of Web Security – by United Security Providers
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
Threat Hunting with Splunk
CC_Futureinc_Cyber Security
Scot Secure 2015
Living with the threat of Determined Attackers - RANT0214

More from EC-Council (20)

PPTX
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
PDF
Cloud Security Architecture - a different approach
PPTX
Phases of Incident Response
PDF
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
PDF
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
PDF
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
PDF
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
PDF
War Game: Ransomware – Global CISO Forum 2019
PPTX
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
PDF
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
PPTX
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
PPTX
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
PPTX
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
PPTX
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
PPTX
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
PPTX
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
PPTX
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
PPTX
Global CCISO Forum 2018 | Sharon Smith "Don't Panic"
PPTX
Global CCISO Forum 2018 | AI vs Malware 2018
PPTX
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
Cloud Security Architecture - a different approach
Phases of Incident Response
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
War Game: Ransomware – Global CISO Forum 2019
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
Global CCISO Forum 2018 | Sharon Smith "Don't Panic"
Global CCISO Forum 2018 | AI vs Malware 2018
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
KodekX | Application Modernization Development
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25 Week I
Digital-Transformation-Roadmap-for-Companies.pptx
sap open course for s4hana steps from ECC to s4
Dropbox Q2 2025 Financial Results & Investor Presentation
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Programs and apps: productivity, graphics, security and other tools
KodekX | Application Modernization Development

Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver

  • 1. Cloud Proxy Technology Cyber Security in a Web Browsing AgeJeff Silver; CISSP Symantec Senior Security Engineer
  • 2. SESSION AGENDA • Proxy Fundamentals [Quick overview as a foundation] • Cyber Security ‘Real’ Forensics Stories • Proxy Architecture in the Modern Business Environment • Q & A
  • 3. What Is a Proxy? What makes it unique and valuable in the security space PROXY 3 When you put a proxy between a user and a server on the internet, you are terminating the connection at the proxy, between the proxy and the user. The request from Alice ends at the proxy. A completely new session is started by the proxy to ask Bob for the current time. This is what makes a proxy so secure. It terminates connections and waits for entire objects to be assembled at the proxy for inspection.
  • 5. NETWORK CONNECTIONS AND OBJECTS Proxy Architecture Compared to a Firewall SANDBOX Proxy Firewall Malicious payload delivered to end user Malicious payload detected by content analysis, blocked from delivery 5
  • 6. CYBER INTELLIGENCE IS THE KEY https://sitereview.bluecoat.com www.tekdefense.com/downloads/malware-samples/ www.westfallave.com/insight/cloudcar.exe virustotal.com https://www.talosintelligence.com/reputation_center eicar.org
  • 8. User Is Prevented From Going To The Site
  • 10. URL Threat Risk Levels Risk Level10: Solid evidence of malicious (rated in database) Risk Level 9: Almost certainly malicious Risk Level 8: Stronger evidence of maliciousness Risk Level 7: Shady behavior (including Spam and Scams) Risk Level 6: Exercise caution; very new sites, or some evidence of shady behavior Risk Level 5: No established history of normal behavior Risk Level 4: Still probably safe (may be starting to establish a history of normal behavior) Risk Level 3: Probably safe Risk Level 2: Other top sites; consistently well-behaved Risk Level 1: Big names; long history of good behavior; huge traffic Risk Level 0: Customer Whitelist
  • 11. Real World Incident 1 Please don’t feed the Phish!
  • 15. Real World Incident 2 Malware LOVES its Mommy!
  • 16. LETS GET A LITTLE GEEKY Jeff…Really, How do you know these PCs are infected with Malware? Because they ALWAYS ALWAYS speak back to to the Mother Ship!
  • 17. WHAT A SECURITY ADMIN SEES
  • 19. Real World Incident 3 An All Expense Paid Trip to Portugal!
  • 21. Side Loaded Browser May Send You Places
  • 24. Real World Incident 4 What Happens When it gets Messy?!!
  • 25. SECURITY BLEEDS INTO HR What is the company policy on reporting this? Is there one? Make sure you know! Don’t confront the person if you know them. No emotion in reporting. Stick to the facts as you have the data to back it up.
  • 26. SECURITY BLEEDS INTO LEGAL What is the law in your state? Who takes this from you…and have you gone through that drill before it actually happens? You cannot just turn a blind eye to this for moral and legal reasons.
  • 27. PROXY WHITEBOARD CLOUD PROXY Site A Headquarters Work & Personal Devices Roaming Users PROX Y PROX Y PROX Y Site B Global Intelligence Network Content Analysis Sandboxing Web Isolation SSL Cert.

Editor's Notes

  • #4: Real quickly let’s get a reminder on what a proxy is and what makes it so special in the security space. Here’s the very basic level definition of a proxy, It handles all the communication between two parties. When you put a proxy between two users (or a user and a server on the internet), you are terminating the connection at the proxy, between the proxy and the user. So in this example, Alice is the user, and asks Bob (who could be a server) for the current time. The request from Alice ends at the proxy. A completely new session is started by the proxy to ask Bob for the current time. This is what makes a proxy so secure. It doesn’t allow a connection to tunnel or make it through the proxy. It terminates the connections, and waits for entire objects to be assembled at the proxy for inspection. These features allow the proxy to guarantee all objects are inspected, and no evasive techniques can be used to bypass the proxy.
  • #5: A proxy, on the other hand, reconstructs the full file before it attempts to make a decision on the content. Not only this makes scanning the content more effective, but it also eliminate one of the major attack vectors against streaming solutions, namely out-of-order TCP packet attack. Most people can recognize this picture now that it is fully constructed.
  • #6: Let’s look at this in more detail. Here’s an example, where fragmenting a piece of malware and introducing a delay in some of the packets has no effect on the proxy detecting a piece of malware, but in the NGFW, the slight delay in some packets means that NGFW has already passed on parts of the malware and by the time the remaining packets show up, they also get delivered, and the end user gets the entire piece of malware.
  • #7: How do you test out your vehicle’s air bags? Your family drives in that car…and they are important to you, so have you tested the airbags to make sure they work  Trick question….of course you cannot do that. You also cannot go to malicious sites to check to make sure they are in fact…malicious. There is a better way.
  • #10: Add a GIN graphic and remove the data feed one.