SlideShare a Scribd company logo
Secure yourself,
practice what we preach
Michael Gough – Founder
MalwareArchaeology.com
Who am I
• Blue Team Defender Ninja, Logoholic, Malware
Archaeologist
• @HackerHurricane also my Blog
• Inventor of the Malware Management
Framework
• I love logs – they tell us Who, What, Where,
When and hopefully How
This talk is a discussion
• Your input is required
• Don’t be a Ding Dong, and you might get one!
• Share, Share, Share!
• We all want to know what you know
Why this talk?
• It dawned on me we are not talking about our
personal experiences
• We have personal systems
• We have work systems
• We have families and they have systems
• How can we ask our employers to secure stuff
if we don’t do it ourselves?
Which method is best?
• Let’s avoid this area, it will take too long
• Let’s focus on What is being used and get other
options for everyone to investigate
• This is about sharing
• So we can protect ourselves
• And practice what we preach
• Take that to our employers and improve the
condition there too
The Anthem Breach
• And many others that leaked our PII
• Can be used to apply for credit
• Steal your identity
• File a fake tax return
• Etc.
Credit Cards
• Thank you Target… (last year’s motto)
• Screw you Anthem (thus this year’s motto)
• Due to Target I stopped using my Debit Card
except at one location where I can get cash and
gas and gift cards (MY MONEY !!!)
• Credit Cards for everything (their money not
mine)
• Two cards, one for everyday (popped 3 times in
2014)
• One for online only
Your Credit
• Putting a “Freeze” on your credit is one way to
prevent your credit misuse
• Cost vary by State
• Texas is $10-$10.83 for each Credit Reporting
agency
• You have to do all 3 Reporting Agencies
• Credit Monitoring
Credit Freeze
EXPERIAN:
• To request a security freeze,
• log on to www.experian.com/freeze,
• Call 1 888 EXPERIAN (1 888 397 3742)
TRANSUNION:
• Place a Security Freeze on your TransUnion Credit Report
• Online: https://freeze.transunion.com
• Phone: 888-909-8872
EQUIFAX:
• For other ways to add a Security Freeze to your credit file,
• please contact our Automated Security Freeze System at (800) 349-9960.
• https://www.freeze.equifax.com
How you build your system
• We need to backup our data
• Build your system with an OS drive and a Data
drive
• NO DATA on your OS drive
• Make it easy to rebuild if something fishy
happens
Build Standards
• Center for Internet Security
• CIS Benchmarks can help you know what to
set
• Both personally and for the enterprise
• Windows
• MAC
• Linux
• IE, FireFox, Safari
Backups
• Encrypt it !
• On-Site – multiple copies
• Off-Site – Drive at family or friend
• Cloud
– CloudBerry
• Amazon S3
• Glacier
– CrashPlan
– Carbonite
Password Managers
• LastPass
– YubiKey
– Google Auth
• Dashlane
– Google Auth
• Password Safe
– Yubikey
• KeyPass
• 1Password
• RoboForm
Multi-Factor Auth
• Fido
• Yubikey
• Google Auth
• Lots of standards
• PayPal
• eBay
Browsers
• Don’t use IE
• FireFox
– Script Block
– Web of Trust
– AdBlock Plus
– EFF – Privacy Badger
• Chrome
– Script Block
– Web of Trust
– AdBlock Plus
– EFF – Privcy Badger
• Safari
• Aviator
Search Engines
• Google
• Bing
• Yahoo
• DuckDuckGo
• Yandex
Drive Encryption
• TruCrypt – 7.1a
• BitLocker
• File Vault
Cloud Storage
• Do you store your data in the Cloud?
• InstantCryptor.com
– Browser based encryption – FireFox & Chrome
– DropBox
– Google Drive
• Trucrypt 7.1a
Bookmarks
• Xmarks
• Sync your bookmarks so recovery is easy
• Save stuff at home, see it at work and visa-
versa
• FireFox Sync
DNS
• OpenDNS
– Nice for your family - FREE
• Google DNS
Remote Access
• VNC
• GoToMyPC
• OpenVPN
• Your FW HW
• TOR
Mac, PC or Linux?
• We could spend an hour on this topic alone
• Windows is ~85% of our systems
• MAC’s get less malware, but still get malware
• Linux?
• Whatever you use, don’t be an Administrator
• 90% reduction of risk
MAC
Knock Knock - github.com/synack/knockknock
• KnockKnock displays persistent items (scripts,
commands, binaries, etc.), that are set to execute
automatically on OS X. For a comprehensive
presentation on OS X malware, persistence, and
KnockKnock, see the following slides.
• $ python knockknock.py
Cell Phones
• I use an Apple…
• It gets updated
• What do you do ?
• CIS Benchmarks for IOS and Android
Software Restrictions
• Windows only
• AppBlocker (service – Audit mode)
• Software Restriction Policies
• Only on Pro, Ultimate and
Enterprise
• Stops .EXE from running in
C:Users
• Can really slow down the
malwarez
Software Restrictions
Software Restrictions
• https://technet.microsoft.com/en-us/magazine/2008.06.srp.aspx
Software Restrictions
• EventCode = 866
*
Logs
• Windows Logging Cheat Sheet
• Enable the logs
• Collect locally
• Learn how to read them
• Try and send to a Log Management solution
– SumoLogic
– Splunk server
– ELK stack
– Or do it manually
Wireless
• Anything we don’t know?
• WPA
• Use Guest for guests
• Set OpenDNS as the DNS server to affect all
users
– Provides reporting
Cell Phones
• ATT Smart Limits
• Sprint Parent Controls
• Verizon Family Safeguards
• T-Mobile Family Allowances
• Great for our kids
Social Networking
• LinkedIn
• Facebook
• Twitter
• Etc…
Privacy
• Lots of breaches here
• NSA, GCHQ, etc…
• Social Networking
• What do you do ?
• 5 min discussion
Questions?
• HackerHurricane.com
• @HackerHurricane
• MalwareArchaeology.com

More Related Content

PDF
Info sec is not daunting v1.0
PDF
RMISC logging for hackers
PDF
Ask a Malware Archaeologist
PDF
Logging for hackers SAINTCON
PDF
Logging for Hackers - What you need to know to catch them
PDF
Mw arch mac_tips and tricks v1.0
PDF
Deeplook into apt and how to detect and defend v1.0
PDF
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
Info sec is not daunting v1.0
RMISC logging for hackers
Ask a Malware Archaeologist
Logging for hackers SAINTCON
Logging for Hackers - What you need to know to catch them
Mw arch mac_tips and tricks v1.0
Deeplook into apt and how to detect and defend v1.0
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01

What's hot (20)

PDF
Logging for Hackers v1.0
PDF
Finding attacks with these 6 events
PDF
Sandbox vs manual analysis v2.1
PDF
What can you do about ransomware
PDF
Proper logging can catch breaches like retail PoS
PDF
Windows logging workshop - BSides Austin 2014
PDF
Logs, Logs, Logs - What you need to know to catch a thief
PDF
Sandbox vs manual malware analysis v1.1
PDF
Commodity malware means YOU
PDF
InnoTech 2017_Defend_Against_Ransomware 3.0
PDF
DIR ISF - Email keeps getting us pwned v1.1
PDF
Malware Management - HouSecCon 2014
PDF
Detecting WMI Exploitation v1.1
PDF
Email keeps getting us pwned v1.1
PDF
Email keeps getting us pwned - Avoiding Ransomware and malware
PDF
Windows IR made easier and faster v1.0
PDF
You need a PROcess to catch running processes and their modules_v2.0
PDF
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
PDF
Windows Incident Response is hard, but doesn't have to be
PDF
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
Logging for Hackers v1.0
Finding attacks with these 6 events
Sandbox vs manual analysis v2.1
What can you do about ransomware
Proper logging can catch breaches like retail PoS
Windows logging workshop - BSides Austin 2014
Logs, Logs, Logs - What you need to know to catch a thief
Sandbox vs manual malware analysis v1.1
Commodity malware means YOU
InnoTech 2017_Defend_Against_Ransomware 3.0
DIR ISF - Email keeps getting us pwned v1.1
Malware Management - HouSecCon 2014
Detecting WMI Exploitation v1.1
Email keeps getting us pwned v1.1
Email keeps getting us pwned - Avoiding Ransomware and malware
Windows IR made easier and faster v1.0
You need a PROcess to catch running processes and their modules_v2.0
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
Windows Incident Response is hard, but doesn't have to be
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
Ad

Viewers also liked (20)

PDF
Home Brewing R.U.M - Analyzing application performance with real user monitoring
PDF
Book of Fauna and Flora
PDF
Building Awesome APIs with Lumen
PPTX
Micropipetten
PDF
Yodlee Customer Presentation
PPTX
Finland powerpoint
PDF
Mohamed Ahmed Abdelkhalek
PPTX
Joomladagen 2015 Joomla Performance
PDF
Open Source Approach to Design and Deployment of Microservices-based VNF
PPTX
Cedar Ridge Weekly Report
KEY
Performance Pack
 
PPT
Wapenrusting
PPTX
Lost in Translation - Blackhat Brazil 2014
PDF
Metrics, Logs, Transaction Traces, Anomaly Detection at Scale
PPTX
Teaching for Peace, Renewing the Spirit - TESOL 2014
PDF
Open Development
PDF
An Introduction to event sourcing and CQRS
PPT
Database2011 MySQL Sharding
DOCX
Dialogue Assessment
PDF
Incident Command: The far side of the edge
Home Brewing R.U.M - Analyzing application performance with real user monitoring
Book of Fauna and Flora
Building Awesome APIs with Lumen
Micropipetten
Yodlee Customer Presentation
Finland powerpoint
Mohamed Ahmed Abdelkhalek
Joomladagen 2015 Joomla Performance
Open Source Approach to Design and Deployment of Microservices-based VNF
Cedar Ridge Weekly Report
Performance Pack
 
Wapenrusting
Lost in Translation - Blackhat Brazil 2014
Metrics, Logs, Transaction Traces, Anomaly Detection at Scale
Teaching for Peace, Renewing the Spirit - TESOL 2014
Open Development
An Introduction to event sourcing and CQRS
Database2011 MySQL Sharding
Dialogue Assessment
Incident Command: The far side of the edge
Ad

Similar to Secure Yourself, Practice what we preach - BSides Austin 2015 (20)

PPTX
Implementing security for your library | PLAN Tech Day Conference
PPTX
It security the condensed version
PDF
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
PDF
Invited Talk - Cyber Security and Open Source
PPT
Computers.ppt
PPTX
Security Minded - Ransomware Awareness
PDF
2017 Legal Seminar for Credit Professionals - Columbus
PDF
Securing and Safeguarding Your Library Setup
PPT
IT security awareness
PPT
UserSecurityAwarenessUniversityTemplate.ppt
PPT
End User Security Awareness - Information Security
PDF
The Security Of Information Security
PDF
2017 Legal Seminar for Credit Professionals - Cleveland
PPTX
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
PPTX
Computer-Security.pptx
PPTX
Social Engineering and Identity Theft.pptx
PPTX
Private Data and Prying Eyes
PDF
CYB 102 – Fundamentals of Cyber Security 3.pdf
PDF
CYB 102 – Fundamentals of Cyber Security 3.pdf
PPTX
Social Engineering and Identity Theft
Implementing security for your library | PLAN Tech Day Conference
It security the condensed version
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
Invited Talk - Cyber Security and Open Source
Computers.ppt
Security Minded - Ransomware Awareness
2017 Legal Seminar for Credit Professionals - Columbus
Securing and Safeguarding Your Library Setup
IT security awareness
UserSecurityAwarenessUniversityTemplate.ppt
End User Security Awareness - Information Security
The Security Of Information Security
2017 Legal Seminar for Credit Professionals - Cleveland
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Computer-Security.pptx
Social Engineering and Identity Theft.pptx
Private Data and Prying Eyes
CYB 102 – Fundamentals of Cyber Security 3.pdf
CYB 102 – Fundamentals of Cyber Security 3.pdf
Social Engineering and Identity Theft

More from Michael Gough (12)

PDF
Hacking a backup power solution(s) for your home, Tornado tested!
PDF
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
PDF
My InfoSec journey led me to create my own IR tools, how, and why you should too
PDF
Sophisticated Attacks - Can We Really Detect Them _v1.2.pdf
PPTX
Incident Response Fails
PDF
When Security Tools Fail You
PDF
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
PDF
MITRE AttACK framework it is time you took notice_v1.0
PDF
You can detect PowerShell attacks
PDF
Cred stealing emails bsides austin_2018 v1.0
PDF
Email keeps getting us pwned v1.0
PDF
Proper logging can catch breaches like retail PoS
Hacking a backup power solution(s) for your home, Tornado tested!
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
My InfoSec journey led me to create my own IR tools, how, and why you should too
Sophisticated Attacks - Can We Really Detect Them _v1.2.pdf
Incident Response Fails
When Security Tools Fail You
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
MITRE AttACK framework it is time you took notice_v1.0
You can detect PowerShell attacks
Cred stealing emails bsides austin_2018 v1.0
Email keeps getting us pwned v1.0
Proper logging can catch breaches like retail PoS

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
PPTX
A Presentation on Artificial Intelligence
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Approach and Philosophy of On baking technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Modernizing your data center with Dell and AMD
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Big Data Technologies - Introduction.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
A Presentation on Artificial Intelligence
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Reach Out and Touch Someone: Haptics and Empathic Computing
Modernizing your data center with Dell and AMD
Advanced methodologies resolving dimensionality complications for autism neur...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Monthly Chronicles - July 2025
Big Data Technologies - Introduction.pptx
Chapter 3 Spatial Domain Image Processing.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Secure Yourself, Practice what we preach - BSides Austin 2015

  • 1. Secure yourself, practice what we preach Michael Gough – Founder MalwareArchaeology.com
  • 2. Who am I • Blue Team Defender Ninja, Logoholic, Malware Archaeologist • @HackerHurricane also my Blog • Inventor of the Malware Management Framework • I love logs – they tell us Who, What, Where, When and hopefully How
  • 3. This talk is a discussion • Your input is required • Don’t be a Ding Dong, and you might get one! • Share, Share, Share! • We all want to know what you know
  • 4. Why this talk? • It dawned on me we are not talking about our personal experiences • We have personal systems • We have work systems • We have families and they have systems • How can we ask our employers to secure stuff if we don’t do it ourselves?
  • 5. Which method is best? • Let’s avoid this area, it will take too long • Let’s focus on What is being used and get other options for everyone to investigate • This is about sharing • So we can protect ourselves • And practice what we preach • Take that to our employers and improve the condition there too
  • 6. The Anthem Breach • And many others that leaked our PII • Can be used to apply for credit • Steal your identity • File a fake tax return • Etc.
  • 7. Credit Cards • Thank you Target… (last year’s motto) • Screw you Anthem (thus this year’s motto) • Due to Target I stopped using my Debit Card except at one location where I can get cash and gas and gift cards (MY MONEY !!!) • Credit Cards for everything (their money not mine) • Two cards, one for everyday (popped 3 times in 2014) • One for online only
  • 8. Your Credit • Putting a “Freeze” on your credit is one way to prevent your credit misuse • Cost vary by State • Texas is $10-$10.83 for each Credit Reporting agency • You have to do all 3 Reporting Agencies • Credit Monitoring
  • 9. Credit Freeze EXPERIAN: • To request a security freeze, • log on to www.experian.com/freeze, • Call 1 888 EXPERIAN (1 888 397 3742) TRANSUNION: • Place a Security Freeze on your TransUnion Credit Report • Online: https://freeze.transunion.com • Phone: 888-909-8872 EQUIFAX: • For other ways to add a Security Freeze to your credit file, • please contact our Automated Security Freeze System at (800) 349-9960. • https://www.freeze.equifax.com
  • 10. How you build your system • We need to backup our data • Build your system with an OS drive and a Data drive • NO DATA on your OS drive • Make it easy to rebuild if something fishy happens
  • 11. Build Standards • Center for Internet Security • CIS Benchmarks can help you know what to set • Both personally and for the enterprise • Windows • MAC • Linux • IE, FireFox, Safari
  • 12. Backups • Encrypt it ! • On-Site – multiple copies • Off-Site – Drive at family or friend • Cloud – CloudBerry • Amazon S3 • Glacier – CrashPlan – Carbonite
  • 13. Password Managers • LastPass – YubiKey – Google Auth • Dashlane – Google Auth • Password Safe – Yubikey • KeyPass • 1Password • RoboForm
  • 14. Multi-Factor Auth • Fido • Yubikey • Google Auth • Lots of standards • PayPal • eBay
  • 15. Browsers • Don’t use IE • FireFox – Script Block – Web of Trust – AdBlock Plus – EFF – Privacy Badger • Chrome – Script Block – Web of Trust – AdBlock Plus – EFF – Privcy Badger • Safari • Aviator
  • 16. Search Engines • Google • Bing • Yahoo • DuckDuckGo • Yandex
  • 17. Drive Encryption • TruCrypt – 7.1a • BitLocker • File Vault
  • 18. Cloud Storage • Do you store your data in the Cloud? • InstantCryptor.com – Browser based encryption – FireFox & Chrome – DropBox – Google Drive • Trucrypt 7.1a
  • 19. Bookmarks • Xmarks • Sync your bookmarks so recovery is easy • Save stuff at home, see it at work and visa- versa • FireFox Sync
  • 20. DNS • OpenDNS – Nice for your family - FREE • Google DNS
  • 21. Remote Access • VNC • GoToMyPC • OpenVPN • Your FW HW • TOR
  • 22. Mac, PC or Linux? • We could spend an hour on this topic alone • Windows is ~85% of our systems • MAC’s get less malware, but still get malware • Linux? • Whatever you use, don’t be an Administrator • 90% reduction of risk
  • 23. MAC Knock Knock - github.com/synack/knockknock • KnockKnock displays persistent items (scripts, commands, binaries, etc.), that are set to execute automatically on OS X. For a comprehensive presentation on OS X malware, persistence, and KnockKnock, see the following slides. • $ python knockknock.py
  • 24. Cell Phones • I use an Apple… • It gets updated • What do you do ? • CIS Benchmarks for IOS and Android
  • 25. Software Restrictions • Windows only • AppBlocker (service – Audit mode) • Software Restriction Policies • Only on Pro, Ultimate and Enterprise • Stops .EXE from running in C:Users • Can really slow down the malwarez
  • 29. Logs • Windows Logging Cheat Sheet • Enable the logs • Collect locally • Learn how to read them • Try and send to a Log Management solution – SumoLogic – Splunk server – ELK stack – Or do it manually
  • 30. Wireless • Anything we don’t know? • WPA • Use Guest for guests • Set OpenDNS as the DNS server to affect all users – Provides reporting
  • 31. Cell Phones • ATT Smart Limits • Sprint Parent Controls • Verizon Family Safeguards • T-Mobile Family Allowances • Great for our kids
  • 32. Social Networking • LinkedIn • Facebook • Twitter • Etc…
  • 33. Privacy • Lots of breaches here • NSA, GCHQ, etc… • Social Networking • What do you do ? • 5 min discussion