SlideShare a Scribd company logo
If a network falls in the Internet does it make a sound? (The top 5 threats you don’t hear enough about.) Jayson E. Street,  CISSP, GSEC, GCFA IEM, IAM, CCSE, CCSA, Security+, etc…
Let go of my EGO Lets start out with a little about yours truly. [email_address]
Know yourself know your enemy Sun Wu (Tzu) “Ping-fa”(The Art of War) “ Thus it is said that one who knows the enemy and knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!”
Contents INTRO The IRC Reverse Engineering Botnets Insider Threats Just google it Now what? Discussion
IRC + CC = SOS
Do things seem a little Fuzzy? Browser bug a day – HD Moore Microsoft patch Tuesday = IDA Pro Wednesday  SQL Slammer a look back at the good ole days. Made known at DEFCON July of 2002 Patched by MS with MS02-039 Hit on 1/25/03. MS06-040 Changed the infection rate from 250,000 machines a month to 250,000 machines a DAY! In the first few days of release.  (Source Trend Micro) Fuzzyri0t.pl Made in Oklahoma
Not domo arigato Mr. Roboto 70 million computers subverted worldwide   (Source Trend Micro) Government Agencies whose computers may have been compromised. Alabama Research and Education Network Argonne National Laboratory Arkansas Dept. of Information Systems Connecticut Dept. of Information Technology Iowa Communications Network Pittsburgh Supercomputing Center U.S. Dept. of Defense U.S. Navy (Source Information Week Magazine 10/9/06)
Hiring the harm A simple question to INFOSEC personnel. Have you used security privileges to look at information you’re not authorized to access? Out of 648 responses on http://darkreading.com 10% Yes on a regular basis 27% Yes a few times in their career. 63% No The 2005 FBI Computer Crime Survey Use of antivirus, antispyware, firewalls and antispam software is almost universal among those who responded. But the software apparently did little to stop malicious insiders.
Got Google?
Okay now what can we do? Without understanding where the opponent's weaknesses are you cannot borrow their strength to use against them.  (Cheng Man Ching) http://www.infragard.net/chapters/oklahoma/  http://OSVDB.org http://www.issa-ok.org/ http://isc.sans.org  This presentation is located @ http://f0rb1dd3n.com/s1s/ WP /
Now let’s learn from others Discussion and Questions???? Or several minutes of uncomfortable silence it is your choice.
Once again those links http://www.infragard.net/chapters/oklahoma/  http://OSVDB.org http://www.issa-ok.org/ http://isc.sans.org  This presentation is located @ http://f0rb1dd3n.com/s1s/ WP /

More Related Content

PPTX
"Wait, Wait! Don't pwn Me!"- AppSec Europe 2014
PPTX
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
PPT
Thane Barnier MACE 2016 presentation
PDF
Social engineering(nulldubai)
PDF
The dark side of social networking
PDF
Cybersecurity and-cyberwar-singer-en-22186
PDF
Hacking 10 2010
PDF
Is the us engaged in a cyber war
"Wait, Wait! Don't pwn Me!"- AppSec Europe 2014
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Thane Barnier MACE 2016 presentation
Social engineering(nulldubai)
The dark side of social networking
Cybersecurity and-cyberwar-singer-en-22186
Hacking 10 2010
Is the us engaged in a cyber war

What's hot (20)

PPTX
Internet in news
PPTX
Phish training final
PDF
AmazingICT_eSafety_2018
PPTX
2015 AppSecUSA 2015 - Wait wait... don't pwn me!
DOCX
Cybersecurity awesome mix vol. II
PDF
Infographic analytics infographic_illustrations_120617
PPTX
An Introduction To IT Security And Privacy for Librarians and Libraries
PDF
Null mumbai news bytes by Rahul Tulaskar
PPTX
Digital security
PPTX
An Introduction To IT Security And Privacy In Libraries & Anywhere
PPTX
Digital Security
PPTX
An Introduction To IT Security And Privacy In Libraries
PDF
Null mumbai Session on ransomware by_Aditya Jamkhande
PDF
CSFI Stuxnet Report
PDF
A Journey Into Pen-tester land: Myths or Facts!
PPT
DOCX
Hacker word that describes person who have special skills in the field of com...
PPTX
ShadyRAT: Anatomy of targeted attack
PPT
ดูเอา ผมงง
PPT
100812 internet security2.0
Internet in news
Phish training final
AmazingICT_eSafety_2018
2015 AppSecUSA 2015 - Wait wait... don't pwn me!
Cybersecurity awesome mix vol. II
Infographic analytics infographic_illustrations_120617
An Introduction To IT Security And Privacy for Librarians and Libraries
Null mumbai news bytes by Rahul Tulaskar
Digital security
An Introduction To IT Security And Privacy In Libraries & Anywhere
Digital Security
An Introduction To IT Security And Privacy In Libraries
Null mumbai Session on ransomware by_Aditya Jamkhande
CSFI Stuxnet Report
A Journey Into Pen-tester land: Myths or Facts!
Hacker word that describes person who have special skills in the field of com...
ShadyRAT: Anatomy of targeted attack
ดูเอา ผมงง
100812 internet security2.0
Ad

Similar to If A Network Falls In The Internet does it make a sound? (20)

PDF
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
PDF
A tale of mobile threats
PDF
Security
PPT
The difference between a duck
PPTX
Hacking with Skynet - How AI is Empowering Adversaries
PPTX
Lecture about network and host security to NII students
PPTX
Emerging Threats to Infrastructure
PPTX
PCM Vision 2019 Breakout: IBM | Red Hat
 
PDF
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
PDF
AI: The New Player in Cybersecurity (Nov. 08, 2023)
PDF
How spam change the world
PPT
Computer And Internet Security
PPT
Computer And Internet Security
PPTX
APT in the Financial Sector
PPTX
CS Cybersecurity is a set of techno.pptx
PPTX
MiraiBotnet.pptx
PPTX
Cyber Security: A Common Problem 2018
PPT
Google to pwn4ge in 60 minutes pt2
PPTX
Honeypots in Cyberwar
DOCX
DSC assignment 3.docx
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
A tale of mobile threats
Security
The difference between a duck
Hacking with Skynet - How AI is Empowering Adversaries
Lecture about network and host security to NII students
Emerging Threats to Infrastructure
PCM Vision 2019 Breakout: IBM | Red Hat
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
AI: The New Player in Cybersecurity (Nov. 08, 2023)
How spam change the world
Computer And Internet Security
Computer And Internet Security
APT in the Financial Sector
CS Cybersecurity is a set of techno.pptx
MiraiBotnet.pptx
Cyber Security: A Common Problem 2018
Google to pwn4ge in 60 minutes pt2
Honeypots in Cyberwar
DSC assignment 3.docx
Ad

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPT
Teaching material agriculture food technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Understanding_Digital_Forensics_Presentation.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Teaching material agriculture food technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction
CIFDAQ's Market Insight: SEC Turns Pro Crypto
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation

If A Network Falls In The Internet does it make a sound?

  • 1. If a network falls in the Internet does it make a sound? (The top 5 threats you don’t hear enough about.) Jayson E. Street, CISSP, GSEC, GCFA IEM, IAM, CCSE, CCSA, Security+, etc…
  • 2. Let go of my EGO Lets start out with a little about yours truly. [email_address]
  • 3. Know yourself know your enemy Sun Wu (Tzu) “Ping-fa”(The Art of War) “ Thus it is said that one who knows the enemy and knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!”
  • 4. Contents INTRO The IRC Reverse Engineering Botnets Insider Threats Just google it Now what? Discussion
  • 5. IRC + CC = SOS
  • 6. Do things seem a little Fuzzy? Browser bug a day – HD Moore Microsoft patch Tuesday = IDA Pro Wednesday SQL Slammer a look back at the good ole days. Made known at DEFCON July of 2002 Patched by MS with MS02-039 Hit on 1/25/03. MS06-040 Changed the infection rate from 250,000 machines a month to 250,000 machines a DAY! In the first few days of release. (Source Trend Micro) Fuzzyri0t.pl Made in Oklahoma
  • 7. Not domo arigato Mr. Roboto 70 million computers subverted worldwide (Source Trend Micro) Government Agencies whose computers may have been compromised. Alabama Research and Education Network Argonne National Laboratory Arkansas Dept. of Information Systems Connecticut Dept. of Information Technology Iowa Communications Network Pittsburgh Supercomputing Center U.S. Dept. of Defense U.S. Navy (Source Information Week Magazine 10/9/06)
  • 8. Hiring the harm A simple question to INFOSEC personnel. Have you used security privileges to look at information you’re not authorized to access? Out of 648 responses on http://darkreading.com 10% Yes on a regular basis 27% Yes a few times in their career. 63% No The 2005 FBI Computer Crime Survey Use of antivirus, antispyware, firewalls and antispam software is almost universal among those who responded. But the software apparently did little to stop malicious insiders.
  • 10. Okay now what can we do? Without understanding where the opponent's weaknesses are you cannot borrow their strength to use against them. (Cheng Man Ching) http://www.infragard.net/chapters/oklahoma/ http://OSVDB.org http://www.issa-ok.org/ http://isc.sans.org This presentation is located @ http://f0rb1dd3n.com/s1s/ WP /
  • 11. Now let’s learn from others Discussion and Questions???? Or several minutes of uncomfortable silence it is your choice.
  • 12. Once again those links http://www.infragard.net/chapters/oklahoma/ http://OSVDB.org http://www.issa-ok.org/ http://isc.sans.org This presentation is located @ http://f0rb1dd3n.com/s1s/ WP /