Filip Chytrý
Everyone of you in here can help us improve online security....
Let's start with terminology.... Hacker The person who hack Cracker System intruder /destroyer
Why do people hack? To make security stronger ( Ethical Hacking ) Steal important information Destroy enemy’s computer network Just for fun!
Hackers need to know only one security hole to hack the system vs. Admin need to know all security holes to defend the system
9 steps of white hacking....
1. Preparation Identification of Targets Signing of Contract Specific attacks Time window Prior Knowledge of the systems Key people
2. Footprinting Collecting as much information about the target... Search engines Forums Databases – whois, ripe, arin, apnic Tools – PING, whois, Traceroute, DIG, nslookup
3. Enumeration & Fingerprinting Identification of Services / open ports Operating System Enumeration Banner grabbing Responses to various protocol (ICMP &TCP) commands Port / Service Scans – TCP Connect, TCP SYN, TCP FIN
4. Identification of Vulnerabilities Social engeneering Insecure Configuration Unpatched vulnerabilities Brute force
5. Attack – Exploit the Vulnerabilities Network Infrastructure Attacks Operating System Attacks Application Specific Attacks Exploits
6. Gaining access Enough data has been gathered at this point to make successful access/intrusion to the target Techniques Password eavesdropping Password file grab Buffer overflows
7. Escalating Privileges If only user-level access was obtained in the last step, the attacker will now seek to gain complete control of the system Techniques Password cracking Known exploits
8. Covering Tracks Once total ownership of the target is secured, hiding this fact from system administrators becomes priority. Otherwise there will be no long term fun! Techniques Clear logs Hide tools
9. Creating Back Doors Trap doors will be laid in various parts of the system to ensure that privileged access is easily gained Techniques Infect startup files Plant remote control services Replace apps with trojans
How many attacks you can expect in Czech republic within 24 hours?
MOBILE DIVECES IoT DEVICES (*source IDC) IoT DEVICES (*source Cisco) 212 B Connected devices by B 50 B 212 B 1.2 per person MOBILE DEVICES 6.6 per person IoT DEVICES 27.9 per person IoT DEVICES
90% of devices collecting one piece of personal information IoT Six out of ten devices are vulnerable to known attack 60% of devices using unencrypted network 50% of devices using unsecure way to storing data
It´s almost impossible for one solution to protect them all…
IoT vs IIoT
Seculu.com/sign
Filip Chytrý seculu.com