Locked Shields 2013. Kaur Kasak 24 Sept 2013



Similar documents
Where every interaction matters.

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

What is Penetration Testing?

Post-Access Cyber Defense

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Fighting Advanced Threats

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Agenda , Palo Alto Networks. Confidential and Proprietary.

Cyber Exercises, Small and Large

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud


CYBERTRON NETWORK SOLUTIONS

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Securing OS Legacy Systems Alexander Rau

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

InfoSec Academy Pen Testing & Hacking Track

Configuring WildFire. Version 1.0 PAN-OS Johan Loos.

Lab Testing Summary Report

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

8 Steps for Network Security Protection

8 Steps For Network Security Protection

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Getting a Secure Intranet

All Information is derived from Mandiant consulting in a non-classified environment.

5 Steps to Advanced Threat Protection

Protecting Your Organisation from Targeted Cyber Intrusion

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Secure Your Mobile Workplace

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Ty Miller. Director, Threat Intelligence Pty Ltd

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cloud Services Prevent Zero-day and Targeted Attacks

I Hunt Penetration Testers!

KYPO A Platform for Cyber Defence Exercises

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

The Open Cyber Challenge Platform *

ANDRA ZAHARIA MARCOM MANAGER

Top 20 Critical Security Controls

How We're Getting Creamed

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

Practical Threat Intelligence. with Bromium LAVA

FROM PRODUCT TO PLATFORM

How To Mitigate A Ddos Attack

Next Generation Enterprise Network Security Platform

Simple security is better security Or: How complexity became the biggest security threat

SPEAR PHISHING UNDERSTANDING THE THREAT

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Basic Security Considerations for and Web Browsing

National Cyber Security Month 2015: Daily Security Awareness Tips

Evolving Threat Landscape

Security Intelligence Services.

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Implementing Cisco IOS Network Security

Firewalls and Intrusion Detection

Active Learning with the CyberCIEGE Video Game

Zak Khan Director, Advanced Cyber Defence

Deep Security Vulnerability Protection Summary

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

IBM Security re-defines enterprise endpoint protection against advanced malware

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Penetration Testing with Kali Linux

Covert Operations: Kill Chain Actions using Security Analytics

Hacking Database for Owning your Data

You ll learn about our roadmap across the Symantec and gateway security offerings.

SecureCom Mobile s mission is to help people keep their private communication private.

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Radware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid

Targeted attacks: Tools and techniques

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Check Point submitted the SWG Secure Web Gateway for

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Common Cyber Threats. Common cyber threats include:

Security Whitepaper: ivvy Products

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Marble & MobileIron Mobile App Risk Mitigation

13 Ways Through A Firewall What you don t know will hurt you

Advanced Threat Protection with Dell SecureWorks Security Services

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Certified Ethical Hacker Exam Version Comparison. Version Comparison

VESZPROG ANTI-MALWARE TEST BATTERY

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

The Sophisticated Attack Myth: Hiding Unsophisticated Security Programs: The Irari Rules of Classifying Sophisticated Attacks

New Systems and Services Security Guidance

13 Ways Through A Firewall

Netsweeper Whitepaper

TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT

Persistence Mechanisms as Indicators of Compromise

Magento Security and Vulnerabilities. Roman Stepanov

What Do You Mean My Cloud Data Isn t Secure?

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

85% of business networks identified with bot infections 63% of business networks identified to have downloaded malware files 89% of business networks

Transcription:

Locked Shields 2013 Kaur Kasak 24 Sept 2013

Disclaimer: This briefing is a product of the CCD COE. It does not represent the opinions or policies of NATO and is designed to provide an independent position. 2

Introduction Main aspects of Locked Shields (LS) exercises: Live fire Technical Blue/Red Team Game: teams in fictional roles, lab networks Friendly competition Defence is the focus of training 3

Scale of LS13 10 Blue Teams vs. 1 Red Team 10 persons in each Blue Team accompanied by 1-2 legal advisors 120 + 20 persons in training audience 250 persons and 20+ organizations engaged altogether 4

Participants 5

High-Level Objectives Testing whether the defensive teams are ready to face fullspeed cyber attacks Similar experience cannot be gained during every day work Massive amount of events Lot of stress: teamwork, communication and leadership skills become essential Providing opportunity to compare the progress of your team with others Providing opportunity to test new tools and technologies 6

Technical Environment 7

Pre-built Vulnerabilities In the beginning, Blue Teams got a really crappy infra: Un-patched operating systems and application software Web applications with well-known security issues Configuration mistakes Backdoored binaries Backdoored web applications Pre-planted malware 8

Red Team Campaign Obj Description Target 1 Deface with BIT message and point to malware for distraction. counting.aidx.ex 2 Delete content, destroy the host as much possible to keep BT busy in AID_DMZ. Steal at this phase and destroy in next. Successful compromise can be proved by providing the hash from /etc/hash chat.aidx.ex 3 Change bank account numbers for donations. File where the bank account details are written is /var/www/app/templates/donate.tpl www.aidx.ex 4 Compromise and steal volunteers database: database www and table volunteers db.aidx.ex 20 Replace the video feed streamed from the TV tower. By default, the following file is streamed and therefore should be replaced: /var/www/stream/1.mp4 tv.milx.ex

Red Team Arsenal..and lots of different tools and scripts from BT5r3 and Kali Linux 10

Defensive Methods and Tactics In general, Blue Teams used standard security practices and some custom solutions useful in the context of the exercise The key factors of success: Preparation Having expertice to secure all components of the infrastructure Monitoring Teamwork, communication and division of roles 11

More Unique Actions Sandboxing applications especially web browsers (Sandboxie) Encrypting communication between servers (IPSEC) Encrypting and password protecting files considered sensitive Blondes perspective> suddenly, you find that all your important documents have been encrypted by IT department Custom scripts monitoring process execution and new connections, creating Inline own IPS 12

Inline IPS Only winning team deployed their own IPS inline to both segments (Palo Alto Networks) 13

Scoring System 35% 30% 25% 20% 15% 10% 5% 0% 14

15

Lessons: The Blues Blue Teams are getting better every year. Well-known free tools without customization do not work against them Custom coded malicious programs and payloads remain challenging to prevent and detect, as expected Fixing and securing custom web applications has not considerably improved over the years Most of the Blue Teams seemed to lack experience with WAN routing issues: BGP route hijacking attack was successfully mitigated only by one team Countermeasure would have been easy 16

Lessons: The Blues II Blue Teams failed to initiate proper information sharing A lot of very useful information was shared. However, it was done using a chat channel which got flooded with data teams could not follow. Backdoors or vulnerabilities reported to everyone in the beginning of the exercise still worked for many teams on Day2 Competition may have had a negative impact as well although teams get bonus for good information sharing 17

Lessons: The Reds Better trained and team-working Red Team is required Knowing each other skills Mastering AV and IDS/IPS evasion techniques Using customised or commercial versions of exploitation frameworks Ability to kill AV products More experts for network infra attacks Anyone interested in assembling a more permanent Red Team which could support several CDXes? 18

Issues and Challenges 1. Preparing challenging Red Team campaign - Simulating 0-days? 2. After action analysis and telling the offensive story 3. Providing interesting network to defend and attack - Smartphones, IPv6, industrial contr.ol system, weapon control systems and other military stuff,... 4. Legitimate traffic generation. User simulation 5. Bringing more Blue Teams to the game 6. Gaining situational awareness from infrastructure We are continuously looking for new partners 19