SlideShare a Scribd company logo
Joe Klein, CISSP
Cybersecurity Fellow, IPv6 Forum
Consultant, Researcher & Trainer, Longboat, LLC
May 2018
Observations from
the lab, field &
executive suite
1
About me: Joe Klein <many certs>
• Spoken at: DefCon, Black Hat, Torcon, SecTor, Security
Days, Hackers on Planet Earth, SANS, IEEE, IoT,…

• Roles: Photographer, Electronics Engineer, Robotics
Engineer, Entrepreneur, CEO, CTO, CSO, ISP, Security
Architect, Developer, Pentester, Incident Handler, Professor,
Policy Writer, Auditor, Assure, Firewall/Network Engineer,
Integrator, Data Scientist, ML experimenter, Threat Intel,
Computer Scientist, Hacker

• Timeline:
• 70’s: Electronics, Radios, Gamer, Magic, Mainframe &
Micro Computers, First ‘Hack’

• 80’s: BBS’s, Game Hacker, Robots, Unix/c/FORTH/Basic/
COBOL/LISP/c++, DEC, SNA Networks, Internet
connected, CyberForensics, Routers/Switches

• 90’s: ISP, IPv6, Penetrations Testing, Network Defender,
Web Developer, Teaching Internet/Web Dev, IETF

• 2000’s: CSO, Linux, Audits, Assessments, Car/IOT/
Building Controls, SCADA Hacking, Teaching
Cybersecurity + SANS, Patents, International Speaking

• 2010’s: DARPA, Policies, Startup, Honeypots, Deception
Networks, IPv6 Fellow, GoLang, IEEE, Sprint Triathlon

Recent Focus: Attacked Forced Time Scoped D&D
2
How to Prepare To Implement IPv6!
It’s Complex…
3
Observation 1 - Establish your IPv6 Standard for all Procurement!
• Why?
• Establish a baseline of technology standards, during technology refresh
• Ensure you are ready to move to IPv6, without big purchases!
• How?
1. Can the Product vender support IPv6? “Eating their own dog Food!”
• Internet Facing Services (Dual Stack) https://ip6.nl/#
• IPv6 only clients behind 6xlt & NAT64/DNS64 https://nat64check.ipv6-
lab.net/v6score
4
Observation 1 - Establish your IPv6 standard for all Procurement!
• How?
1. The Supplier's Declaration of Conformity (SDOC)
• Product suppliers declare product capabilities to buyers, as advertised
• Buyer is responsible for providing specifications
• Seller is responsible to fix, if it does not meet specifications
• https://www-x.antd.nist.gov/usgv6/sdoc.html
5
IPv6 Standards Touch Every Protocol!
6
What does IPv6 compliant mean to me?
IPv6 Standard 86 (RFC 8200) First Order Dependencies
Current IPv6 Standard
Changes to Path MTU
References from
Newer standards (12)
Updates to
older standards (29)
7
IPv6 Standard 86 (RFC 8200)
First & Second Order Path MTU Dependencies
• October 1989 - Updated - Requirements for Internet Hosts -- Communication Layers
• November 1990 - Path MTU Discovery
• November 1996 - Path MTU Discovery for IP version 6 - Obsoleted by 8201 July 2017
• November 1997 - Key words for use in RFCs to Indicate Requirement Levels
• September 2000 - TCP Problems with Path MTU Discovery
• March 2006 - Datagram Congestion Control Protocol (DCCP)
• March 2006 - Internet Control Message Protocol (ICMPv6) for the Internet Protocol
Version 6 (IPv6) Specification - Obsoletes RFC 2463
• March 2007 - Packetization Layer Path MTU Discovery
• September 2007- Neighbor Discovery for IP version 6 (IPv6)- Obsoletes 2461
• May 2007- Neighbor Discovery for IP version 6 (IPv6)- Obsoletes 2461
• September 2007 - Stream Control Transmission Protocol- Obsoletes 2960. 3309
• December 2007 - Deprecation of Type 0 Routing Headers in IPv6 - Obsoletes 2960
• July 2012 - TCP Options and Maximum Segment Size (MSS)
• March 2015- Network File System (NFS) Version 4 Protocol- Obsoletes 3530
• May 2016- RFC Streams, Headers, and Boilerplates - Obsoletes 5741
• March 2017 - UDP Usage Guideline - Obsoletes 5405
• March 2017 - Path MTU Discovery for IP version 6 - Obsoletes 1981
IPv6 Standard
July 2017
Updates to
older standards (17))8
IPv6 will not solve cybersecurity problems, right?
9
Fundamental of
Cyber Security & Privacy
❖ “Remote-access, multi-user resource- sharing
computer system”
❖ Attackers Exploit
❖ Systems
❖ Hardware|Software|Data
❖ Networks
❖ People
❖ Users
❖ Operators
❖ Systems Programmers
❖ Maintenance Man (Person)
April 1967
Reference: https://www.rand.org/pubs/authors/w/ware_willis_h.html
10
First Cybersecurity
Threats Diagram
Willis H. Ware, RAND Corporation
April 1967
Reference: https://www.rand.org/pubs/authors/w/ware_willis_h.html
11
SO why is this happening?
Technical Supply-Chain Debt —
The real problem!
Technical Debt Powerpoint
12
What Does Winning Defender Look Like?
13
Defender's Dilemma
“The intruder only needs to exploit one of the victims in order to
compromise the enterprise.”
Intruder's Dilemma
“The defender only needs to detect one of the indicators of the intruder’s
presence in order 

to initiate incident response within the enterprise.”
Reference: https://taosecurity.blogspot.com/2009/05/defenders-dilemma-and-intruders-dilemma.html
14
The Intruder Game
Tactic - Technical goal of the intruder
Technique - How intruder achieves the goal
The Intruder Chooses Time and Goal, Not You!
The Defender Choose Confidence level of the Detection!
15
How do I Remove the Noise to Find the Attackers and increase
confidence levels?
Reduce False Positives and Negatives!
16
Defenders Game: ATT&CK: Deconstructs the Lifecycle
Freely available, curated knowledge based on
observed adversary behavior
Higher fidelity on right-of-exploit,
post-access phases
Describes behavior and not adversary tools
Built for the “Public Good”
Right of the Boom!
17
MITRE Pre-ATT&CK
Adversarial Tactics, Techniques & Common Knowledge
• Blacklist IP, Hash Domains are fungible, quickly replaceable
• Pre-compromise activities are largely executed outside the
enterprise’s field of view
• Data Brokers (Free and for pay),
• Websites (Partners, Yours, Government),
• Search Engines and Bots
• Social Network Bots
Left-of-the-Boom
18
MITRE ATT&CK Enterprise
Perimeter Defense
• Items in yellow are the only attributes
detectable by tuned perimeter security

• Items in red, address requirements on hosts
and first hop networks.

• Conclusion: 

• Perimeter security has minimal visibility
into attackers insider your environment

• IT slows the attacker, but this is not
measurable

• Tuning the security perimeter security to
detect and alert on pre & post attack items
are critical to catch attackers.
19
The Defenders Goal
• Strong trusted alerts
• Behavior tracking
• Automated response
20
More Detail?
21
Open Source - MITRE Resources
• Interactive Attack Navigator:
• ATT&CK Enterprise: https://mitre.github.io/attack-navigator/enterprise/
• ATT&CK Mobile: https://mitre.github.io/attack-navigator/mobile/
• Source Code: https://github.com/mitre/attack-navigator
• Attacker Groups: https://attack.mitre.org/pre-attack/index.php/Groups
• Attacker Group Tactics: https://attack.mitre.org/pre-attack/index.php/Tactics
• Unfetter Project - Discover and analyze gaps in your security posture
• https://nsacyber.github.io/unfetter/ https://github.com/unfetter-discover/unfetter
• Caldera - An automated adversary emulation system (validate alerts)
• https://github.com/mitre/caldera
22
I understand there is no way of scanning
the IPv6 Internet, is that true?
23
History of Scanning Internet-Facing
IPv6 Devices
• 2^64 or 2^128 - Brute Force - Fails in IPv6!

• May 2005, Marc “van Huser” Heuse, Attacking the
IPv6 Protocol Suite, THC-IPv6 toolkit (1)

• May 2007, Joe Klein, “Scanning and Microsoft
Mobile compromise via 6to4 on SPRINT”,
Responsible Disclosure Notice to Microsoft, Sprint
and US CERT, HOPE 2008 (2)

• March 2008, IETF, RFC 5157, “IPv6 Implications for
Network Scanning” (3)

• May 2012, NMAP for IPv6, version 6 (4)

• March 2016, IETF, RFC 7707, “Network
Reconnaissance in IPv6 Networks” (5)

• December 2018, Joe Klein, “Outbound Initiated
Requests for Passive Scanning of IPv6” (6)

• December 2018, Joe Klein, “Passive IPv6 Scanning
using Certificate Transparency process” (7)
24
So we are safe? Attackers have not used IPv6 in the past?
25
Attacks on IPv6
26
Microsoft Phones are not on IPv6 in 2007
27
Attacks on IPv6
, First DDOS
, Botnet C&C
28
Are their engineering things I can do, to improved detection and
reduce operational complexity?
29
It’s not just 96 more bits
30
It’s not just 96 more bits
31
How long have systems
been compromise via IPv6?
32
Published 2008
33
The opportunity to re-engineer our part of the
Global Internet only happens once in a lifetime!
Ensure it is operational and security!
34
Joe Klein
jsklein@gmail.com
@joeklein
35

More Related Content

PDF
Threat Hunting with Cyber Kill Chain
PPTX
A Brief History of Cryptographic Failures
PPTX
Crypto failures every developer should avoid
PDF
Canberk Bolat - Alice Android Diyarında
PDF
IoT Attack Surfaces -- DEFCON 2015
PPTX
Corporate Espionage without the Hassle of Committing Felonies
PPTX
Python-Assisted Red-Teaming Operation
PDF
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
Threat Hunting with Cyber Kill Chain
A Brief History of Cryptographic Failures
Crypto failures every developer should avoid
Canberk Bolat - Alice Android Diyarında
IoT Attack Surfaces -- DEFCON 2015
Corporate Espionage without the Hassle of Committing Felonies
Python-Assisted Red-Teaming Operation
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies

What's hot (19)

PDF
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
PDF
Texas Bitcoin Conference: Are Privacy Coins Private Enough?
PDF
Beginners guide on how to start exploring IoT 2nd session
PDF
How to hide your browser 0-days
PDF
Exfiltrating Data through IoT
PPTX
Firmware analysis 101
PPTX
Malware Analysis
PPTX
How to assign a CVE to yourself?
PPTX
Defcon Crypto Village - OPSEC Concerns in Using Crypto
PDF
Stranger Danger (NodeSummit, 2016)
PPTX
How to hide your browser 0-day @ Disobey
PDF
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
PDF
【HITCON FreeTalk 2018 - 從晶片設計角度看硬體安全】
PDF
PDF
Shamoon
PPTX
GreyNoise - Lowering Signal To Noise
PPTX
How to be a Hacker (Sut i fod yn Haciwr)
PDF
"Giving the bad guys no sleep"
PDF
Offensive malware usage and defense
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Texas Bitcoin Conference: Are Privacy Coins Private Enough?
Beginners guide on how to start exploring IoT 2nd session
How to hide your browser 0-days
Exfiltrating Data through IoT
Firmware analysis 101
Malware Analysis
How to assign a CVE to yourself?
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Stranger Danger (NodeSummit, 2016)
How to hide your browser 0-day @ Disobey
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
【HITCON FreeTalk 2018 - 從晶片設計角度看硬體安全】
Shamoon
GreyNoise - Lowering Signal To Noise
How to be a Hacker (Sut i fod yn Haciwr)
"Giving the bad guys no sleep"
Offensive malware usage and defense
Ad

Similar to IPv6 Security Talk mit Joe Klein (20)

PDF
Soc analyst course content v3
PDF
Soc analyst course content
PPTX
Securing your Cloud Environment v2
KEY
Introduction to web security @ confess 2012
PDF
Offensive cyber security engineer
PDF
Offensive cyber security engineer pragram course agenda
PDF
Offensive cyber security engineer updated
PPTX
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
PPT
Nomura UCCSC 2009
PDF
Luiz eduardo. introduction to mobile snitch
PPTX
G3t R00t at IUT
PPTX
Open Source & Cybersecurity
PDF
Securing your Cloud Environment
PPTX
Why defensive research is sexy too.. … and a real sign of skill
PDF
Defcon through the_eyes_of_the_attacker_2018_slides
PDF
Avast @ Machine Learning
PDF
Automated Malware Analysis and Cyber Security Intelligence
PDF
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
PPTX
IoTNEXT 2016 - SafeNation Track
PDF
TALK Cybersecurity Summit 2017: Kevin Hofstra of Metova CyberCENTS
Soc analyst course content v3
Soc analyst course content
Securing your Cloud Environment v2
Introduction to web security @ confess 2012
Offensive cyber security engineer
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer updated
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
Nomura UCCSC 2009
Luiz eduardo. introduction to mobile snitch
G3t R00t at IUT
Open Source & Cybersecurity
Securing your Cloud Environment
Why defensive research is sexy too.. … and a real sign of skill
Defcon through the_eyes_of_the_attacker_2018_slides
Avast @ Machine Learning
Automated Malware Analysis and Cyber Security Intelligence
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
IoTNEXT 2016 - SafeNation Track
TALK Cybersecurity Summit 2017: Kevin Hofstra of Metova CyberCENTS
Ad

More from Digicomp Academy AG (20)

PDF
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
PDF
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
PPTX
Innovation durch kollaboration gennex 2018
PDF
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
PDF
Roger basler meetup_21082018_work-smarter-not-harder_handout
PDF
Xing expertendialog zu nudge unit x
PDF
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
PDF
Agiles Management - Wie geht das?
PPTX
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
PDF
Querdenken mit Kreativitätsmethoden – XING Expertendialog
PDF
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
PDF
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
PDF
UX – Schlüssel zum Erfolg im Digital Business
PDF
Minenfeld IPv6
PDF
Was ist design thinking
PDF
Die IPv6 Journey der ETH Zürich
PDF
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
PDF
General data protection regulation-slides
PDF
Möglichkeiten der Online-Werbung - Referat von Matteo Schürch
PDF
Swiss IPv6 Council: IPv6 in der Cloud - Case Study der cloudscale.ch
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Innovation durch kollaboration gennex 2018
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
Xing expertendialog zu nudge unit x
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Agiles Management - Wie geht das?
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
UX – Schlüssel zum Erfolg im Digital Business
Minenfeld IPv6
Was ist design thinking
Die IPv6 Journey der ETH Zürich
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
General data protection regulation-slides
Möglichkeiten der Online-Werbung - Referat von Matteo Schürch
Swiss IPv6 Council: IPv6 in der Cloud - Case Study der cloudscale.ch

Recently uploaded (20)

PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Testing WebRTC applications at scale.pdf
PPTX
Funds Management Learning Material for Beg
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
The Internet -By the Numbers, Sri Lanka Edition
DOCX
Unit-3 cyber security network security of internet system
PPTX
Digital Literacy And Online Safety on internet
PPTX
artificial intelligence overview of it and more
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Testing WebRTC applications at scale.pdf
Funds Management Learning Material for Beg
PptxGenJS_Demo_Chart_20250317130215833.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
INTERNET------BASICS-------UPDATED PPT PRESENTATION
introduction about ICD -10 & ICD-11 ppt.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Sims 4 Historia para lo sims 4 para jugar
Triggering QUIC, presented by Geoff Huston at IETF 123
The Internet -By the Numbers, Sri Lanka Edition
Unit-3 cyber security network security of internet system
Digital Literacy And Online Safety on internet
artificial intelligence overview of it and more
SAP Ariba Sourcing PPT for learning material
An introduction to the IFRS (ISSB) Stndards.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
Module 1 - Cyber Law and Ethics 101.pptx

IPv6 Security Talk mit Joe Klein

  • 1. Joe Klein, CISSP Cybersecurity Fellow, IPv6 Forum Consultant, Researcher & Trainer, Longboat, LLC May 2018 Observations from the lab, field & executive suite 1
  • 2. About me: Joe Klein <many certs> • Spoken at: DefCon, Black Hat, Torcon, SecTor, Security Days, Hackers on Planet Earth, SANS, IEEE, IoT,… • Roles: Photographer, Electronics Engineer, Robotics Engineer, Entrepreneur, CEO, CTO, CSO, ISP, Security Architect, Developer, Pentester, Incident Handler, Professor, Policy Writer, Auditor, Assure, Firewall/Network Engineer, Integrator, Data Scientist, ML experimenter, Threat Intel, Computer Scientist, Hacker • Timeline: • 70’s: Electronics, Radios, Gamer, Magic, Mainframe & Micro Computers, First ‘Hack’ • 80’s: BBS’s, Game Hacker, Robots, Unix/c/FORTH/Basic/ COBOL/LISP/c++, DEC, SNA Networks, Internet connected, CyberForensics, Routers/Switches • 90’s: ISP, IPv6, Penetrations Testing, Network Defender, Web Developer, Teaching Internet/Web Dev, IETF • 2000’s: CSO, Linux, Audits, Assessments, Car/IOT/ Building Controls, SCADA Hacking, Teaching Cybersecurity + SANS, Patents, International Speaking • 2010’s: DARPA, Policies, Startup, Honeypots, Deception Networks, IPv6 Fellow, GoLang, IEEE, Sprint Triathlon Recent Focus: Attacked Forced Time Scoped D&D 2
  • 3. How to Prepare To Implement IPv6! It’s Complex… 3
  • 4. Observation 1 - Establish your IPv6 Standard for all Procurement! • Why? • Establish a baseline of technology standards, during technology refresh • Ensure you are ready to move to IPv6, without big purchases! • How? 1. Can the Product vender support IPv6? “Eating their own dog Food!” • Internet Facing Services (Dual Stack) https://ip6.nl/# • IPv6 only clients behind 6xlt & NAT64/DNS64 https://nat64check.ipv6- lab.net/v6score 4
  • 5. Observation 1 - Establish your IPv6 standard for all Procurement! • How? 1. The Supplier's Declaration of Conformity (SDOC) • Product suppliers declare product capabilities to buyers, as advertised • Buyer is responsible for providing specifications • Seller is responsible to fix, if it does not meet specifications • https://www-x.antd.nist.gov/usgv6/sdoc.html 5
  • 6. IPv6 Standards Touch Every Protocol! 6
  • 7. What does IPv6 compliant mean to me? IPv6 Standard 86 (RFC 8200) First Order Dependencies Current IPv6 Standard Changes to Path MTU References from Newer standards (12) Updates to older standards (29) 7
  • 8. IPv6 Standard 86 (RFC 8200) First & Second Order Path MTU Dependencies • October 1989 - Updated - Requirements for Internet Hosts -- Communication Layers • November 1990 - Path MTU Discovery • November 1996 - Path MTU Discovery for IP version 6 - Obsoleted by 8201 July 2017 • November 1997 - Key words for use in RFCs to Indicate Requirement Levels • September 2000 - TCP Problems with Path MTU Discovery • March 2006 - Datagram Congestion Control Protocol (DCCP) • March 2006 - Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification - Obsoletes RFC 2463 • March 2007 - Packetization Layer Path MTU Discovery • September 2007- Neighbor Discovery for IP version 6 (IPv6)- Obsoletes 2461 • May 2007- Neighbor Discovery for IP version 6 (IPv6)- Obsoletes 2461 • September 2007 - Stream Control Transmission Protocol- Obsoletes 2960. 3309 • December 2007 - Deprecation of Type 0 Routing Headers in IPv6 - Obsoletes 2960 • July 2012 - TCP Options and Maximum Segment Size (MSS) • March 2015- Network File System (NFS) Version 4 Protocol- Obsoletes 3530 • May 2016- RFC Streams, Headers, and Boilerplates - Obsoletes 5741 • March 2017 - UDP Usage Guideline - Obsoletes 5405 • March 2017 - Path MTU Discovery for IP version 6 - Obsoletes 1981 IPv6 Standard July 2017 Updates to older standards (17))8
  • 9. IPv6 will not solve cybersecurity problems, right? 9
  • 10. Fundamental of Cyber Security & Privacy ❖ “Remote-access, multi-user resource- sharing computer system” ❖ Attackers Exploit ❖ Systems ❖ Hardware|Software|Data ❖ Networks ❖ People ❖ Users ❖ Operators ❖ Systems Programmers ❖ Maintenance Man (Person) April 1967 Reference: https://www.rand.org/pubs/authors/w/ware_willis_h.html 10
  • 11. First Cybersecurity Threats Diagram Willis H. Ware, RAND Corporation April 1967 Reference: https://www.rand.org/pubs/authors/w/ware_willis_h.html 11
  • 12. SO why is this happening? Technical Supply-Chain Debt — The real problem! Technical Debt Powerpoint 12
  • 13. What Does Winning Defender Look Like? 13
  • 14. Defender's Dilemma “The intruder only needs to exploit one of the victims in order to compromise the enterprise.” Intruder's Dilemma “The defender only needs to detect one of the indicators of the intruder’s presence in order to initiate incident response within the enterprise.” Reference: https://taosecurity.blogspot.com/2009/05/defenders-dilemma-and-intruders-dilemma.html 14
  • 15. The Intruder Game Tactic - Technical goal of the intruder Technique - How intruder achieves the goal The Intruder Chooses Time and Goal, Not You! The Defender Choose Confidence level of the Detection! 15
  • 16. How do I Remove the Noise to Find the Attackers and increase confidence levels? Reduce False Positives and Negatives! 16
  • 17. Defenders Game: ATT&CK: Deconstructs the Lifecycle Freely available, curated knowledge based on observed adversary behavior Higher fidelity on right-of-exploit, post-access phases Describes behavior and not adversary tools Built for the “Public Good” Right of the Boom! 17
  • 18. MITRE Pre-ATT&CK Adversarial Tactics, Techniques & Common Knowledge • Blacklist IP, Hash Domains are fungible, quickly replaceable • Pre-compromise activities are largely executed outside the enterprise’s field of view • Data Brokers (Free and for pay), • Websites (Partners, Yours, Government), • Search Engines and Bots • Social Network Bots Left-of-the-Boom 18
  • 19. MITRE ATT&CK Enterprise Perimeter Defense • Items in yellow are the only attributes detectable by tuned perimeter security • Items in red, address requirements on hosts and first hop networks. • Conclusion: • Perimeter security has minimal visibility into attackers insider your environment • IT slows the attacker, but this is not measurable • Tuning the security perimeter security to detect and alert on pre & post attack items are critical to catch attackers. 19
  • 20. The Defenders Goal • Strong trusted alerts • Behavior tracking • Automated response 20
  • 22. Open Source - MITRE Resources • Interactive Attack Navigator: • ATT&CK Enterprise: https://mitre.github.io/attack-navigator/enterprise/ • ATT&CK Mobile: https://mitre.github.io/attack-navigator/mobile/ • Source Code: https://github.com/mitre/attack-navigator • Attacker Groups: https://attack.mitre.org/pre-attack/index.php/Groups • Attacker Group Tactics: https://attack.mitre.org/pre-attack/index.php/Tactics • Unfetter Project - Discover and analyze gaps in your security posture • https://nsacyber.github.io/unfetter/ https://github.com/unfetter-discover/unfetter • Caldera - An automated adversary emulation system (validate alerts) • https://github.com/mitre/caldera 22
  • 23. I understand there is no way of scanning the IPv6 Internet, is that true? 23
  • 24. History of Scanning Internet-Facing IPv6 Devices • 2^64 or 2^128 - Brute Force - Fails in IPv6! • May 2005, Marc “van Huser” Heuse, Attacking the IPv6 Protocol Suite, THC-IPv6 toolkit (1) • May 2007, Joe Klein, “Scanning and Microsoft Mobile compromise via 6to4 on SPRINT”, Responsible Disclosure Notice to Microsoft, Sprint and US CERT, HOPE 2008 (2) • March 2008, IETF, RFC 5157, “IPv6 Implications for Network Scanning” (3) • May 2012, NMAP for IPv6, version 6 (4) • March 2016, IETF, RFC 7707, “Network Reconnaissance in IPv6 Networks” (5) • December 2018, Joe Klein, “Outbound Initiated Requests for Passive Scanning of IPv6” (6) • December 2018, Joe Klein, “Passive IPv6 Scanning using Certificate Transparency process” (7) 24
  • 25. So we are safe? Attackers have not used IPv6 in the past? 25
  • 27. Microsoft Phones are not on IPv6 in 2007 27
  • 28. Attacks on IPv6 , First DDOS , Botnet C&C 28
  • 29. Are their engineering things I can do, to improved detection and reduce operational complexity? 29
  • 30. It’s not just 96 more bits 30
  • 31. It’s not just 96 more bits 31
  • 32. How long have systems been compromise via IPv6? 32
  • 34. The opportunity to re-engineer our part of the Global Internet only happens once in a lifetime! Ensure it is operational and security! 34