SlideShare a Scribd company logo
Google to Pwnag3 pt.II Preventing the Pwnag3 Jayson E. Street,  CISSP, GSEC, GCIH, GCFA IEM, IAM, CCSE, CCSA, Security+, etc…
Let go of my EGO Lets start out with a little about yours truly. http://stratagem-one.com
Know yourself know your enemy Sun Wu (Tzu) “Ping-fa”(The Art of War) “ Thus it is said that one who knows the enemy and knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!”
Contents INTRO Phase 1 Recon / Defense Phase 2 Scan / Defense Phase 3 Explore / Defense Phase 4 Exploit / Defense Phase 5 Expunge / Defense THE POINT! Resources Discussion
Phase 1 Recon / Defense The hardest one to detect so how do you defend against it? Easy you do it first! Google alerts Look at your website like you want to hack it. Go undercover (cyber-style) BEWARE!
Phase 2 Scan / Defense Stealth Scanning not always that stealthy. Nmap is NOISY!!!!11one11!!! Slow and steady steals the race (but watching your firewall logs can DQ most of your rivals).
Phase 3 Explore / Defense “ Some things aren't and never will be under your control.” Drive by browsing.= means your web developer is your bullet proof vest. The human touch. Is no match for a web head who takes pride in his work.
Phase 4 Exploit / Defense Netcat (wait a minute you let them get netcat on your system?????) Hashing it out. A good time to mention “If they have physical access to your system it is no longer your system.” Got R00T? Not if the admin password is 15 characters long and why shouldn’t it be?
Phase 5 Expunge / Defense Regedit no match for GPO which beats the NWO every time. Events what events? The ones on your remote log server right?  Patch and clean  (there are some bad people out there)
THE POINT! “ If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.” Bruce Schneier
Resources Without understanding where the opponent's weaknesses are you cannot borrow their strength to use against them.  (Cheng Man Ching) http://www.infragard.net/chapters/oklahoma/  http://OSVDB.org http://isc.sans.org  http://forums.stratagem-one.com  (shameless plug) This presentation is located @ http://f0rb1dd3n.com/s1s/ WP /
Now let’s learn from others Discussion and Questions???? Or several minutes of uncomfortable silence it is your choice.
Once again those links http://www.infragard.net/chapters/oklahoma/  http://OSVDB.org http://isc.sans.org  http://forums.stratagem-one.com  (shameless plug) This presentation is located @ http://f0rb1dd3n.com/s1s/ WP /

More Related Content

PPTX
Your Thing is pwnd - Security Challenges for the Internet of Things
PPT
Bush1D0
PPT
Google to pwn4ge pt1
PPTX
Blitzing with your defense bea con
PPTX
Building a cyber fortress - Alexander Sverdlov
PDF
The Art of Cyber War [From Black Hat Brazil 2014]
PPTX
Battlefield network
PPTX
Corp Web Risks and Concerns
Your Thing is pwnd - Security Challenges for the Internet of Things
Bush1D0
Google to pwn4ge pt1
Blitzing with your defense bea con
Building a cyber fortress - Alexander Sverdlov
The Art of Cyber War [From Black Hat Brazil 2014]
Battlefield network
Corp Web Risks and Concerns

Similar to Google to pwn4ge in 60 minutes pt2 (20)

PPTX
Offence oriented Defence
PDF
InfoSecurity Europe 2014: The Art Of Cyber War
PDF
Social Networks And Phishing
PDF
[Bucharest] Catching up with today's malicious actors
PPTX
Emerging Threats to Infrastructure
PPTX
44CON @ IPexpo - You're fighting an APT with what exactly?
PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
PPTX
Wrangle Your Defense Using Offensive Tactics BSides CT 2019
PDF
Wrangle Your Defense Using Offensive Tactics - ISSA May Meeting
PDF
Cloudy Wpcybersecurity
ODP
BSides Cleveland: Active Defense - Helping threat actors hack themselves!
PDF
"Thinking diffrent" about your information security strategy
PPT
Perimeter Defense in a World Without Walls
PPTX
Flipping the script
PDF
Adversary Playbook Tactical Assessment of Protection Techniques
PDF
Break IT Down by Josh Smith
PDF
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
PDF
Managing cyber security
PPT
Computer Attack Stratagems
PDF
Opsec for security researchers
Offence oriented Defence
InfoSecurity Europe 2014: The Art Of Cyber War
Social Networks And Phishing
[Bucharest] Catching up with today's malicious actors
Emerging Threats to Infrastructure
44CON @ IPexpo - You're fighting an APT with what exactly?
Mark Arena - Cyber Threat Intelligence #uisgcon9
Wrangle Your Defense Using Offensive Tactics BSides CT 2019
Wrangle Your Defense Using Offensive Tactics - ISSA May Meeting
Cloudy Wpcybersecurity
BSides Cleveland: Active Defense - Helping threat actors hack themselves!
"Thinking diffrent" about your information security strategy
Perimeter Defense in a World Without Walls
Flipping the script
Adversary Playbook Tactical Assessment of Protection Techniques
Break IT Down by Josh Smith
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Managing cyber security
Computer Attack Stratagems
Opsec for security researchers
Ad

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Modernizing your data center with Dell and AMD
PPTX
Cloud computing and distributed systems.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Monthly Chronicles - July 2025
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Modernizing your data center with Dell and AMD
Cloud computing and distributed systems.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Chapter 3 Spatial Domain Image Processing.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Ad

Google to pwn4ge in 60 minutes pt2

  • 1. Google to Pwnag3 pt.II Preventing the Pwnag3 Jayson E. Street, CISSP, GSEC, GCIH, GCFA IEM, IAM, CCSE, CCSA, Security+, etc…
  • 2. Let go of my EGO Lets start out with a little about yours truly. http://stratagem-one.com
  • 3. Know yourself know your enemy Sun Wu (Tzu) “Ping-fa”(The Art of War) “ Thus it is said that one who knows the enemy and knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!”
  • 4. Contents INTRO Phase 1 Recon / Defense Phase 2 Scan / Defense Phase 3 Explore / Defense Phase 4 Exploit / Defense Phase 5 Expunge / Defense THE POINT! Resources Discussion
  • 5. Phase 1 Recon / Defense The hardest one to detect so how do you defend against it? Easy you do it first! Google alerts Look at your website like you want to hack it. Go undercover (cyber-style) BEWARE!
  • 6. Phase 2 Scan / Defense Stealth Scanning not always that stealthy. Nmap is NOISY!!!!11one11!!! Slow and steady steals the race (but watching your firewall logs can DQ most of your rivals).
  • 7. Phase 3 Explore / Defense “ Some things aren't and never will be under your control.” Drive by browsing.= means your web developer is your bullet proof vest. The human touch. Is no match for a web head who takes pride in his work.
  • 8. Phase 4 Exploit / Defense Netcat (wait a minute you let them get netcat on your system?????) Hashing it out. A good time to mention “If they have physical access to your system it is no longer your system.” Got R00T? Not if the admin password is 15 characters long and why shouldn’t it be?
  • 9. Phase 5 Expunge / Defense Regedit no match for GPO which beats the NWO every time. Events what events? The ones on your remote log server right? Patch and clean (there are some bad people out there)
  • 10. THE POINT! “ If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.” Bruce Schneier
  • 11. Resources Without understanding where the opponent's weaknesses are you cannot borrow their strength to use against them. (Cheng Man Ching) http://www.infragard.net/chapters/oklahoma/ http://OSVDB.org http://isc.sans.org http://forums.stratagem-one.com (shameless plug) This presentation is located @ http://f0rb1dd3n.com/s1s/ WP /
  • 12. Now let’s learn from others Discussion and Questions???? Or several minutes of uncomfortable silence it is your choice.
  • 13. Once again those links http://www.infragard.net/chapters/oklahoma/ http://OSVDB.org http://isc.sans.org http://forums.stratagem-one.com (shameless plug) This presentation is located @ http://f0rb1dd3n.com/s1s/ WP /