Download presentation
Published byGervase Ellis Modified over 7 years ago
1
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
Tarun Yadav & Rao Arvind Mallari DRDO, Ministry of Defense, INDIA Third International Symposium on Security in Computing and Communications (SSCC-2015), 11th August 2015, SCMS Kochi, India
2
Introduction Why Cyber Kill Chain? What is Cyber Kill Chain Model?
Attacker’s View and Actions APTs, Cyber Espionage Attack Attacker Reconnaissance Weaponize Delivery Target System Exploitation Installation Command & Control Interaction Act on Objective
3
Reconnaissance Methodologies: Target Identification and Selection
Target Profiling Target Validation Network & System Configuration Active Passive Types: Passive Reconnaissance Active Reconnaissance
4
Weponize Exploits for: PDF, DOC, PPT, MP3, Video Player Software Bugs
Vulnerabilities Exploits Exploits for: PDF, DOC, PPT, MP3, Video Player Attack Attacker Reconnaissance Weaponize Delivery Exploit Payload (RAT) Target System Exploitation Installation Command & Control Interaction Server Client Act on Objective File Download/Upload Keystrokes Capture Screen/Webcam Capture Propagation in network Standalone or Modular
5
Delivery Information from Reconnaissance is used to increase affinity
Delivery Methods Attachments Phishing Attacks Drive By Downloads USB/Removable Media DNS Cache Poisoning
6
Exploitation AV Run Time Detection Static Detection
IDS,IPS, Firewall Attack Attacker Reconnaissance Weaponize Delivery Static Detection Target System Exploitation Precondition to Exploit: Must use Vulnerable Software Software should not be Updated Software should not be Not Upgraded Installation Command & Control Interaction Act on Objective AV Run Time Detection (Heuristic and Behavioral Detection)
7
Installation Dropper Downloader
Persistent, Stealthy and Non Attributable Installation Anti-Debugger and Anti-Emulation Anti-AntiVirus Rootkit and Bootkits Targeted Delivery Host-Based Encrypted Data Exfiltration Dropper: The payload is already present at the system in some obfuscated form. Injector if the dropped binary is only done in memory. Downloader: 2 stage process with a stub that initially runs at the target. On successful execution of the stub, the stub contacts the server and downloads a piece of malware and runs it.
8
Command & Control Act on Objective
Centralized, Decentralized and Social Network based architectures Unobservable Communication Channel IRC, TCP, HTTP, FTP, TOR etc. Avoiding C&C server Detection DNS Fast Flux, DNS as Medium, Domain Generation Algorithms(DGA) Targeted Attack - Ex-filtrating secret information, Disruption of critical Infrastructure, State sponsored espionage Mass Attack – User Credentials, Financial Frauds, DDoS Attacks, BOTNets Act on Objective
9
Conclusion Presented Attacker’s Perspective
Trends of attackers in each level Seeing to the future, a defense in depth strategy based on cyber kill chain is to be envisioned. Reconnaissance Weaponize Delivery Target System Exploitation Installation Command & Control Interaction Act on Objective
10
Thank You Contact: arvindrao@hqr.drdo.in tarunyadav@hqr.drdo.in
Doubts or Questions?? Contact:
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.