SlideShare a Scribd company logo
Exodus intel slideshare 2019
The Problem
How do you detect new attacks when
there is no IOC?
How do you detect attacks that no
commercial security equipment can
detect?
The greatest threat is the unknown
threat
Patch efficacy is decreasing / Patch
failure rates are increasing
 Zero-day Intelligence
 N-day Intelligence
0-Day | N-Day Intelligence
We focus purely on
vulnerability discovery
and Exploitation
Zero-day and N-day (known vulnerabilities)
100B+ Lines of New Code every year
Exodus research is focused on exploitable vulnerabilities
 Zero-day Intelligence
 N-day Intelligence
100B+ Lines of New Code every year
Exodus research is focused on exploitable vulnerabilities
We provide clients with detailed reports, exploits
and mitigation guidance
on Zero-day and
N-day (known vulnerabilities)
 Zero-day Intelligence
 N-day Intelligence
Augment / Outsource
Vulnerability Research
Product
Validation
Secure Your
Network
• Leverage a world-class
research team
• Gain Access to a deep
catalog of historical work
• Use detailed reports to
generate appropriate
signatures/ rules
• Full subscription cost of
Exodus similar to the cost
of a single researcher but
with 6:1 intel generated
• Use exploits to measure
security effectiveness of
your products
• Use exploits to measure
security effectiveness of
your competitors
• Identify issues and
effectiveness and update
product roadmap
accordingly
• Use the vulnerability
reports to determine
mitigations for affected
systems on your internal
network
• Use the exploits to test
your existing network
defenses to insure proper
coverage
• Reduce Cyber Exposures/
Attack Surface
 Zero-day Intelligence
 N-day Intelligence
Use Cases
0-Day | N-Day Intelligence
 Zero-day Intelligence
 N-day Intelligence
Enterprise clients can subscribe to Exodus Intelligence
Enterprise Feeds (Zero-Day | N-Day Feeds) :
 Exodus vulnerability intelligence feeds are available via portal
access, RESTful API and XML with metadata for
integration into third-party SIEM products.
 Feeds include detailed reports on the vulnerabilities; network
packet captures of both malicious and benign traffic; and
working exploits in the form of a Metasploit modules
0-Day | N-Day Intelligence
DON’T
WAIT
FOR A
PATCH
[Zero-Day Research]
0-Day  Zero-day Intelligence
 N-day Intelligence
01 DISCOVER
The Exodus team discovers
a zero-day vulnerability in
the lab.
02 ANALYZE
The vulnerability is analyzed
to determine whether or not
it is critical enough to warrant
notifying Exodus’ customers.
03 EXPLOIT
The team employs exclusive
in-house techniques to
create a working exploit tool
for the vulnerability.
04 DOCUMENT 05 DISTRIBUTE
A thorough report is created
that documents every
relevant aspect of the threat.
The report and accompanying
materials are securely distributed to
clients via the Exodus web portal.
 Zero-day Intelligence
 N-day Intelligence
0-Day
 Zero-day Intelligence
 N-day Intelligence
The vulnerability details are made public
due to the release of a vendor patch or
the detection of an in-the-wild attack
abusing the zero-day flaw.
Those responsible for implementing defensive
measures must prioritize how to address the
multiple vulnerabilities that are frequently
patched in one release. Attackers also prioritize
which flaws are ideal for exploitation.
Both malicious actors and those working to defend
begin racing to develop and deploy a working
solution. The problem is only one of these groups is
constrained by a traditional work schedule.
06 PUBLICIZED 07 PRIORITIZED
08 RACE BEGINS
OTHERS
0-Day
 Zero-day Intelligence
 N-day Intelligence
N-Day
Exodus regularly encounters
failed patches or discovers
adjacent zero-day
vulnerabilities
Failed Patches
leave organizations at risk
even if they vigilantly keep
up with software updates
and security advisories.
In 2018 Exodus identified
dozens of publicly disclosed
vulnerabilities that were
reportedly patched but in
fact were still vulnerable
because the patch did not
address the root cause.
 Zero-day Intelligence
 N-day Intelligence
N-Day
We deliver an average of 100+ exploits yearly to our clients with an
average of 100 additional proof-of-concepts.
Exodus N-Day Feed
includes all patch failures
identified by Exodus along
with mitigation guidance.
Failed Patches
Exodus researchers take
high profile publicly known
PATCHED vulnerabilities
and reverse engineer the
patches to determine the
root cause of the
vulnerability, then if possible,
develop an exploit for the
vulnerability.
Exodus regularly encounters
failed patches or discovers
adjacent zero-day
vulnerabilities
 Zero-day Intelligence
 N-day Intelligence
N-Day
We deliver an average of 100+ exploits yearly to our clients with an
average of 100 additional proof-of-concepts.
N-Day
Exodus N-Day Feed
includes all patch failures
identified by Exodus along
with mitigation guidance.
Failed Patches
Exodus researchers take
high profile publicly known
PATCHED vulnerabilities
and reverse engineer the
patches to determine the
root cause of the
vulnerability, then if possible,
develop an exploit for the
vulnerability.
Critically Exploitable
Estimations
 Zero-day Intelligence
 N-day Intelligence
Zero-Day & N-Day Reports and Exploits
Training courses focused on vulnerability
discovery and exploitation
High Quality Analysis and exploits for
externally discovered high visibility CVEs
Teaming partnerships / technical advisor
support roles
Proprietary & Targeted vulnerability identification
and exploit development for specialized use-cases
WHAT WE PROVIDE
 SERVICES
 Zero-day Intelligence
 N-day Intelligence
Thank you!

More Related Content

PDF
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
PDF
The AppSec Path to Enlightenment
PPTX
Empowering Application Security Protection in the World of DevOps
PDF
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
PPTX
Software Security Assurance for DevOps
PDF
Mobile Application Security Threats through the Eyes of the Attacker
PPTX
FROM OPEN SOURCE COMPLIANCE TO SECURITY
PPTX
Software Security Assurance for Devops
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
The AppSec Path to Enlightenment
Empowering Application Security Protection in the World of DevOps
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Software Security Assurance for DevOps
Mobile Application Security Threats through the Eyes of the Attacker
FROM OPEN SOURCE COMPLIANCE TO SECURITY
Software Security Assurance for Devops

What's hot (19)

PDF
Application Security in the Age of Open Source
PPTX
Welcome & The State of Open Source Security
PDF
PCI and Vulnerability Assessments - What’s Missing?
PPTX
Threat Modeling with Threat Dragon
PDF
Webinar–OWASP Top 10 for JavaScript for Developers
PPTX
Practioners Guide to SOC
PPTX
Mobile security recipes for xamarin
PPTX
Black Duck & IBM Present: Application Security in the Age of Open Source
PPTX
Keynote - Lou Shipley
PPTX
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
PPTX
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
PDF
Key Takeaways from Instructure's Successful Bug Bounty Program
PDF
Failure Of Antivirus
PDF
Winning open source vulnerabilities without loosing your deveopers - Azure De...
PDF
Revitalizing Product Securtiy at Zephyr Health
PDF
Webinar–Best Practices for DevSecOps at Scale
PPTX
451 and Cylance - The Roadmap To Better Endpoint Security
PPTX
7 Steps to Build a SOC with Limited Resources
PPTX
Practical DevSecOps Using Security Instrumentation
Application Security in the Age of Open Source
Welcome & The State of Open Source Security
PCI and Vulnerability Assessments - What’s Missing?
Threat Modeling with Threat Dragon
Webinar–OWASP Top 10 for JavaScript for Developers
Practioners Guide to SOC
Mobile security recipes for xamarin
Black Duck & IBM Present: Application Security in the Age of Open Source
Keynote - Lou Shipley
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Key Takeaways from Instructure's Successful Bug Bounty Program
Failure Of Antivirus
Winning open source vulnerabilities without loosing your deveopers - Azure De...
Revitalizing Product Securtiy at Zephyr Health
Webinar–Best Practices for DevSecOps at Scale
451 and Cylance - The Roadmap To Better Endpoint Security
7 Steps to Build a SOC with Limited Resources
Practical DevSecOps Using Security Instrumentation
Ad

Similar to Exodus intel slideshare 2019 (20)

PDF
What Role Do Zero-Day Vulnerabilities Play In Modern Security Solutions?
PDF
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
PPTX
Zero-day Vulnerabilities
PDF
Zero Day Vulnerabilities: A threat to security.
DOCX
Zero-Day Vulnerability and Heuristic Analysis
PDF
What Is a Zero-Day Vulnerability? How It
PPTX
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
Aujas incident management webinar deck 08162016
PDF
Stopping zero day threats
PDF
[Bucharest] Attack is easy, let's talk defence
PDF
Rand rr1751
PDF
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
PPTX
Patch Management Best Practices 2019
PPT
13734729.ppt
PDF
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
PDF
Security operations center 5 security controls
DOCX
Weathering the Storm of IT Security Compliance
PDF
Revolutionary, Not Evolutionary
What Role Do Zero-Day Vulnerabilities Play In Modern Security Solutions?
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
Zero-day Vulnerabilities
Zero Day Vulnerabilities: A threat to security.
Zero-Day Vulnerability and Heuristic Analysis
What Is a Zero-Day Vulnerability? How It
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Aujas incident management webinar deck 08162016
Stopping zero day threats
[Bucharest] Attack is easy, let's talk defence
Rand rr1751
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
Patch Management Best Practices 2019
13734729.ppt
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Security operations center 5 security controls
Weathering the Storm of IT Security Compliance
Revolutionary, Not Evolutionary
Ad

Recently uploaded (20)

PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Patient Appointment Booking in Odoo with online payment
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PDF
iTop VPN Crack Latest Version Full Key 2025
PPTX
history of c programming in notes for students .pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PPTX
assetexplorer- product-overview - presentation
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
Cost to Outsource Software Development in 2025
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Designing Intelligence for the Shop Floor.pdf
Patient Appointment Booking in Odoo with online payment
Advanced SystemCare Ultimate Crack + Portable (2025)
Weekly report ppt - harsh dattuprasad patel.pptx
iTop VPN Crack Latest Version Full Key 2025
history of c programming in notes for students .pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
assetexplorer- product-overview - presentation
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Design an Analysis of Algorithms I-SECS-1021-03
Why Generative AI is the Future of Content, Code & Creativity?
Cost to Outsource Software Development in 2025
17 Powerful Integrations Your Next-Gen MLM Software Needs
Wondershare Filmora 15 Crack With Activation Key [2025
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
CHAPTER 2 - PM Management and IT Context
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx

Exodus intel slideshare 2019

  • 2. The Problem How do you detect new attacks when there is no IOC? How do you detect attacks that no commercial security equipment can detect? The greatest threat is the unknown threat Patch efficacy is decreasing / Patch failure rates are increasing
  • 3.  Zero-day Intelligence  N-day Intelligence 0-Day | N-Day Intelligence
  • 4. We focus purely on vulnerability discovery and Exploitation Zero-day and N-day (known vulnerabilities) 100B+ Lines of New Code every year Exodus research is focused on exploitable vulnerabilities  Zero-day Intelligence  N-day Intelligence
  • 5. 100B+ Lines of New Code every year Exodus research is focused on exploitable vulnerabilities We provide clients with detailed reports, exploits and mitigation guidance on Zero-day and N-day (known vulnerabilities)  Zero-day Intelligence  N-day Intelligence
  • 6. Augment / Outsource Vulnerability Research Product Validation Secure Your Network • Leverage a world-class research team • Gain Access to a deep catalog of historical work • Use detailed reports to generate appropriate signatures/ rules • Full subscription cost of Exodus similar to the cost of a single researcher but with 6:1 intel generated • Use exploits to measure security effectiveness of your products • Use exploits to measure security effectiveness of your competitors • Identify issues and effectiveness and update product roadmap accordingly • Use the vulnerability reports to determine mitigations for affected systems on your internal network • Use the exploits to test your existing network defenses to insure proper coverage • Reduce Cyber Exposures/ Attack Surface  Zero-day Intelligence  N-day Intelligence Use Cases 0-Day | N-Day Intelligence
  • 7.  Zero-day Intelligence  N-day Intelligence Enterprise clients can subscribe to Exodus Intelligence Enterprise Feeds (Zero-Day | N-Day Feeds) :  Exodus vulnerability intelligence feeds are available via portal access, RESTful API and XML with metadata for integration into third-party SIEM products.  Feeds include detailed reports on the vulnerabilities; network packet captures of both malicious and benign traffic; and working exploits in the form of a Metasploit modules 0-Day | N-Day Intelligence
  • 8. DON’T WAIT FOR A PATCH [Zero-Day Research] 0-Day  Zero-day Intelligence  N-day Intelligence
  • 9. 01 DISCOVER The Exodus team discovers a zero-day vulnerability in the lab. 02 ANALYZE The vulnerability is analyzed to determine whether or not it is critical enough to warrant notifying Exodus’ customers. 03 EXPLOIT The team employs exclusive in-house techniques to create a working exploit tool for the vulnerability. 04 DOCUMENT 05 DISTRIBUTE A thorough report is created that documents every relevant aspect of the threat. The report and accompanying materials are securely distributed to clients via the Exodus web portal.  Zero-day Intelligence  N-day Intelligence 0-Day
  • 10.  Zero-day Intelligence  N-day Intelligence The vulnerability details are made public due to the release of a vendor patch or the detection of an in-the-wild attack abusing the zero-day flaw. Those responsible for implementing defensive measures must prioritize how to address the multiple vulnerabilities that are frequently patched in one release. Attackers also prioritize which flaws are ideal for exploitation. Both malicious actors and those working to defend begin racing to develop and deploy a working solution. The problem is only one of these groups is constrained by a traditional work schedule. 06 PUBLICIZED 07 PRIORITIZED 08 RACE BEGINS OTHERS 0-Day
  • 11.  Zero-day Intelligence  N-day Intelligence N-Day Exodus regularly encounters failed patches or discovers adjacent zero-day vulnerabilities Failed Patches leave organizations at risk even if they vigilantly keep up with software updates and security advisories. In 2018 Exodus identified dozens of publicly disclosed vulnerabilities that were reportedly patched but in fact were still vulnerable because the patch did not address the root cause.
  • 12.  Zero-day Intelligence  N-day Intelligence N-Day We deliver an average of 100+ exploits yearly to our clients with an average of 100 additional proof-of-concepts. Exodus N-Day Feed includes all patch failures identified by Exodus along with mitigation guidance. Failed Patches Exodus researchers take high profile publicly known PATCHED vulnerabilities and reverse engineer the patches to determine the root cause of the vulnerability, then if possible, develop an exploit for the vulnerability. Exodus regularly encounters failed patches or discovers adjacent zero-day vulnerabilities
  • 13.  Zero-day Intelligence  N-day Intelligence N-Day We deliver an average of 100+ exploits yearly to our clients with an average of 100 additional proof-of-concepts. N-Day Exodus N-Day Feed includes all patch failures identified by Exodus along with mitigation guidance. Failed Patches Exodus researchers take high profile publicly known PATCHED vulnerabilities and reverse engineer the patches to determine the root cause of the vulnerability, then if possible, develop an exploit for the vulnerability. Critically Exploitable Estimations
  • 14.  Zero-day Intelligence  N-day Intelligence Zero-Day & N-Day Reports and Exploits Training courses focused on vulnerability discovery and exploitation High Quality Analysis and exploits for externally discovered high visibility CVEs Teaming partnerships / technical advisor support roles Proprietary & Targeted vulnerability identification and exploit development for specialized use-cases WHAT WE PROVIDE  SERVICES
  • 15.  Zero-day Intelligence  N-day Intelligence Thank you!