hey you... stay away from my network - techinsights 2011 sea

23

Upload: esmaeil-sarabadani

Post on 09-Jun-2015

569 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Hey you... Stay away from my network - Techinsights 2011 SEA
Page 2: Hey you... Stay away from my network - Techinsights 2011 SEA

Hey you… Stay away from my network…

Esmaeil SarabadaniSystems and Security ConsultantRedynamics Asia Sdn. Bhd.

Page 3: Hey you... Stay away from my network - Techinsights 2011 SEA

What will be covered…

• Cloud computing, Social Networking and the Information Leak

• Social Engineering• Port Scanning and Nmap• Vulnerability scanning with MBSA &

Nessus• Microsoft Security Response Center• Enhanced Mitigation Experience Toolkit• Security Best Practices

Page 4: Hey you... Stay away from my network - Techinsights 2011 SEA

The world is changing …

Page 5: Hey you... Stay away from my network - Techinsights 2011 SEA

Cloud Computing…

Page 6: Hey you... Stay away from my network - Techinsights 2011 SEA

Revealing Information…

Social Networks vs. Social EngineeringThere is no patch for human stupidity!

Page 7: Hey you... Stay away from my network - Techinsights 2011 SEA

What kind of risk ?!!

• Employees reveal so much information about the company.

• Hackers create fake Facebook profiles pretending to be your colleagues.

• Convincing the employees to click on malicious URLs that they post on Facebook.

• People leave their:• Phone numbers• Photos• Status messages containing very important

information

Page 8: Hey you... Stay away from my network - Techinsights 2011 SEA

What kind of risk ?!!

How much would you get to sell out your colleague?

Would you accept 1000 USD to give out a simple document from inside the company?

• How about 10,000 USD ???• How about 100,000 USD ???

Do you trust everyone at work?

How do you realize if someone is the bad guy?

Page 9: Hey you... Stay away from my network - Techinsights 2011 SEA

Educate your users and employees...

Let them know about the threats...

Do not block Facebook to them at work…

Evaluate their awareness every now and then…

Page 10: Hey you... Stay away from my network - Techinsights 2011 SEA

Step 1Reconnaissance

Step 2Initial intrusion

into the network

Step 3Establish a

backdoor into the network

Step 4Obtain user credentials

Step 5Install various

utilities

Step 6Privilege escalation /lateral movement /data exfiltration

Step 7Maintain

persistence

The Steps in Hacking

Page 11: Hey you... Stay away from my network - Techinsights 2011 SEA

Port ScanningScanning the target computer to detect the open ports.

• Detect Open Ports• Detect the services behind those

ports• Find security vulnerabilities of those

services• Attack the vulnerabilities

What hackers do…

Page 12: Hey you... Stay away from my network - Techinsights 2011 SEA

DEMONmap

Page 13: Hey you... Stay away from my network - Techinsights 2011 SEA

Vulnerability Scanning

Scanning the target computer:

• For possible security bugs and vulnerabilities

• For open and filtered ports• To detect the target OS• To get a solution to fix the

bug• To get a link for the exploits

Page 14: Hey you... Stay away from my network - Techinsights 2011 SEA

DEMONessus & MBSA

Page 15: Hey you... Stay away from my network - Techinsights 2011 SEA

• Discovering Vulnerabilities in Microsoft Products

• Releasing Security Updates, Patches and Service Packs

• Advanced Update Notifications

• Microsoft Security Essentials

• Malicious Software Removal Tool

Page 16: Hey you... Stay away from my network - Techinsights 2011 SEA

What if Hackers are Faster ?!!

Security Vulnerability

Exploit

Security Patch

1 week

3 Days

Page 17: Hey you... Stay away from my network - Techinsights 2011 SEA

Enhanced Mitigation Experience Toolkit(EMET v 2.1)

• Uses Security Mitigation Technologies

• Makes it Difficult to Exploit the 0-Day Bugs on Systems

• Can Cover Security Bugs on any Softwares on the System

Page 18: Hey you... Stay away from my network - Techinsights 2011 SEA

DEMOEnhanced Mitigation Experience Toolkit

Page 19: Hey you... Stay away from my network - Techinsights 2011 SEA

Security Best Practices

Security and complexity are often inversely proportional.Begin your security design from the clients.

Be thorough.Your security is only as strong as your weakest link.

Page 20: Hey you... Stay away from my network - Techinsights 2011 SEA

Q&AQuestions & Answers

Page 21: Hey you... Stay away from my network - Techinsights 2011 SEA

Resources

Email: [email protected]

Blog: http://esihere.wordpress.com/

Useful websites: http://technet.microsoft.com/ http://www.insecuremag.com/http://technet.microsoft.com/en-us/edge/ff524488

Twitter: http://www.twitter.com/esmaeils

Page 22: Hey you... Stay away from my network - Techinsights 2011 SEA

Win Cool Prizes!!!Required slide

Complete the Tech Insights contests and stand a chance to win many cool prizes…

Look in your conference bags NOW!!

Page 23: Hey you... Stay away from my network - Techinsights 2011 SEA

We value your feedback!Required slide

Please remember to complete the overall conference evaluation form (in your bag) and return it to the Registration Counter on the last day in return for a Limited Edition Gift