Download presentation
Presentation is loading. Please wait.
Published byBeatrix Curtis Modified over 8 years ago
1
September 19, 2016 Steve Konecny CFE, CIRA, CEH, CRISC Hands on Hacking
2
Who Has Been Hacked Lately? 2 650,000 145 Million 128 Million 6.5 Million
3
Who Else Has Been Hacked? 3 CPA firms hacked MAJOR FOUR 1 Hacker by
4
What Makes You So Special? Who would want to hack me? Too Small Low Profile Little Financial Gain 4
5
5
6
Top Cyber Crimes 1.Tax-Refund / Payment Fraud 2.Account Takeover 3.Identity Theft 4.Theft of Sensitive Data 5.Theft of Intellectual Property 6.Ran omware 6 $
7
Attack Cycle 7 Identify key individuals & create profiles Gather public info Google search data Scan Attack & Access Complete Mission Target Maintain & Escalate Cover Tracks
8
Attack Cycle 8 Assess, research, build tools Network scanning tools nmap/zmap Scan Nessus Scan Maltego Develop network profiles OS versions, models, etc Scan Attack & Access Complete Mission Target Maintain & Escalate Cover Tracks
9
Attack Cycle 9 Scan Attack & Access Complete Mission Target Maintain & Escalate Cover Tracks Phishing Database & password exploits Social engineering & networking Weak controls Default accounts & passwords Dated software & patch exploits APTs & zero-day
10
Attack Cycle 10 Backdoors, tunnels Remote admin software Modify registry Application exploitation User enumeration New processes when booting Scan Attack & Access Complete Mission Target Maintain & Escalate Cover Tracks
11
Attack Cycle 11 Compress data Download/exfiltrate data from system Encrypt/ransomware Zombie/bot Scan Attack & Access Complete Mission Target Maintain & Escalate Cover Tracks
12
Attack Cycle 12 Modify or delete logs Change file names Change process names Change file modification & creation time Delete artifacts Scan Attack & Access Complete Mission Target Maintain & Escalate Cover Tracks
13
Video 13
14
Internal vs. External Threats 14 2016 Data Breach Investigations Report. Verizon. http://www.verizonenterprise.com/DBIR/2016 Percent of breaches per threat actor over time Partner Internal Collusion External (n=8,158)
15
Detection of Breaches 15 2016 Data Breach Investigations Report. Verizon. http://www.verizonenterprise.com/DBIR/2016 (n=6,133) Breach discovery methods over time Law Enforcement Fraud Detection Third Party Internal
16
Dated Software & Patch Exploits Some Methods 16 Phishing Social Engineering & Networking Database & Password Exploits Weak Controls Default Accounts & Passwords Advanced Persistent Threat & Zero-Day
17
17
18
18
19
Phishing 19 30% Open messages 12% Open attachments PayPal, eBay, Battle.net, AOL, and Runescape are the most common phishing sites. 2016 Data Breach Investigations Report. Verizon. http://www.verizonenterprise.com/DBIR/2016
20
20 Spear Phishing Fake CEO asks Finance Dept “Send Me the Money” Change Payment Method Mid-Project HR Dept Sends Out 1,000+ W2s of Employees Fool me once, shame on you. Fool me twice, shame on me. Fool me thrice? Right Method – Wrong Account No need to file taxes this year – someone did it for you!
21
Example CEO Fraud 21
22
Some Methods 22 Phishing Social Engineering & Networking Database & Password Exploits Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day
23
23
24
Top 25 Passwords | 2014 & 2015 24 (new) 91% of passwords are Top 1,000 95-98% of passwords are Top 10,000 Data Splash Most Popular Passwords of 2014, 2015 Datasplash.com 1. 123456 2. password 3. 12345678 4. qwerty 5. 12345 6. 123456789 7. football 8. 1234 9. 1234567 10. baseball 11. welcome 12. 1234567890 13. abc123 14. 111111 15. 1qaz2wsx 16. dragon 17. master 18. monkey 19. letmein 20. login 21. princess 22. qwertyuiop 23. solo 24. password 25. starwars 1. 123456 2. password 3. 12345 4. 12345678 5. qwerty 6. 123456789 7. 1234 8. baseball 9. dragon 10. football 11. 1234567 12. monkey 13. letmein 14. abc123 15. 111111 16. mustang 17. access 18. shadow 19. master 20. michael 21. superman 22. 696969 23. 123123 24. batman 25. trustno1
25
Passwords 25 Circumvent Reset Attack, brute force 2O ACCOUNTS MINUTES HACKED 1O in under
26
Encryption 26 Encrypt Outlook Files No need for passwords Backdoor opens all encrypted messages Encrypt Application Files Word, Excel, Compressed Files, etc Many have backdoors May 2012 Flash drive AND encryption code 27, 000 records lost in the mail
27
27
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.