Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security



Similar documents
How We're Getting Creamed

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Marble & MobileIron Mobile App Risk Mitigation

TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT

Post-Access Cyber Defense

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Agenda , Palo Alto Networks. Confidential and Proprietary.

Ty Miller. Director, Threat Intelligence Pty Ltd

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Defending Against Attacks by Modeling Threat Behaviors

Security and Privacy

Penetration Testing - a way for improving our cyber security

Top Ten Cyber Threats

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Penetration Testing Using The Kill Chain Methodology

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

IBM Security Strategy

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Defending Against Data Beaches: Internal Controls for Cybersecurity

Ed Ferrara, MSIA, CISSP Fox School of Business

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

The Peak of Chaos Shane D. Shook, PhD 10/31/2012

September 20, 2013 Senior IT Examiner Gene Lilienthal

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

APT Advanced Persistent Threat Time to rethink?

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Information Security for the Rest of Us

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

Hunting for Indicators of Compromise

Secure Your Mobile Workplace

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Spear Phishing Attacks Why They are Successful and How to Stop Them

Protecting Your Organisation from Targeted Cyber Intrusion

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

After the Attack. The Transformation of EMC Security Operations

CYBERTRON NETWORK SOLUTIONS

24/7 Visibility into Advanced Malware on Networks and Endpoints

Protecting against cyber threats and security breaches

Fighting Advanced Threats

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Into the cybersecurity breach

7/23/2015. Tales of a Real-Life Hacker. Jon Miller. Vice President of Strategy Former ethical hacker of energy company operations.

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Collateral Effects of Cyberwar

Enterprise Cybersecurity: Building an Effective Defense

Information Security Services

Can We Become Resilient to Cyber Attacks?

Course Descriptions November 2014

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

CRYPTUS DIPLOMA IN IT SECURITY

Practical Steps To Securing Process Control Networks

Gregg Gerber. Strategic Engagement, Emerging Markets

Advanced Threat Protection with Dell SecureWorks Security Services

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

FORBIDDEN - Ethical Hacking Workshop Duration

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Presented by Evan Sylvester, CISSP

Cybersecurity Workshop

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Breaking the Cyber Attack Lifecycle

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Metasploit The Elixir of Network Security

IT Security Testing Services

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Software that provides secure access to technology, everywhere.

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Loophole+ with Ethical Hacking and Penetration Testing

Detailed Description about course module wise:

Developing National Frameworks & Engaging the Private Sector

RSA Security Anatomy of an Attack Lessons learned

Persistence Mechanisms as Indicators of Compromise

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Penetration Testing Report Client: Business Solutions June 15 th 2015

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

CYBER SECURITY THREAT REPORT Q1

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Penetration Testing Walkthrough

WHITEPAPER. Nessus Exploit Integration

Transcription:

Next-Generation Penetration Testing Benjamin Mossé, MD, Mossé Security

About Me Managing Director of Mossé Security Creator of an Mossé Cyber Security Institute - in Melbourne +30,000 machines compromised during penetration testing +300 penetration tests delivered +150 security advisories published Was the lead developer of the Browser Exploitation Framework As a team, Mossé Security has compromised +100,000 machines during engagements.

Traditional Penetration Testing Kill Chain Run Nessus Exploit MS08-067 On Weak Servers Run Responder.py Steal Domain Admin Hash Add New Domain Admin Write a Report

Breach: Target USA Kill Chain Attackers compromise a contractor with access into Target s network Attackers use the contractor credentials to access Target s network Attackers discover the Point of Sale systems Attackers install malware onto POS systems Attackers exfiltrate credit card numbers using FTP

Speed vs. Stealth Traditional penetration testing = hack clients as fast as possible. Real attackers want to get away with the crime.

Metasploit PSEXEC 70-80% of penetration testing tools are simple to detect. That s why real attackers don t use them. ** PSEXEC is one of the most common tools to remotely execute binaries on Windows machines.

Threat Actor: Desert Falcons Cyber mercenaries operating from the Middle East ~30 members working in three teams across multiple countries Spear phishing, social engineering and drive-by-download Bespoke backdoors and spyware for desktop and mobile OS Interested in personal data, audio recordings, SMS, passwords and keystrokes

Threat Actor: Hacking Team Zero day exploits in IE, Flash, and the Windows Kernel Spying software for Android, ios, Blackberry and Windows Mobile Rootkits and backdoors for all major operating systems Sophisticated C&C communication network across multiple channels

If you want to defend against APT-level actors, you need to use a Red Team that maintains and uses kits at least at Hacking Team s level. Dino A. Dai Zovi

Goal: Identify high-risk vulnerabilities Traditional Penetration Testing Philosophy: Obtain the broadest coverage of testing at minimum cost Methodology: Vulnerability Scanning Vulnerability Scanning + Validation using Metasploit Compromising the network using pentest tools Delivery: Mostly performed in silos as an assurance exercise Once or twice a year conducted against the entire network

Next Generation Penetration Testing Goal: Build the strongest case against an organisation s security plan Philosophy: Simulate realistic threat actors Methodology: Use similar techniques, processes and tools as they would Attempt to reach the same objectives they have Delivery: Any time, any where, against anything - so long as it fits the attack scenario(s)

Comparing Methodologies Traditional Penetration Testing Network Reconnaissance Vulnerability Scanning / Discovery External Exploitation Privilege Escalation Post-Exploitation VS. Next Generation Penetration Testing Threat Actor Profile Design Attack Scenario Design Threat Actor TTPs Design Attack Scenario Execution Actions on Objectives Metaphor: pop shells Metaphor: Realistic attack scenarios

Case Study: Corporate Espionage Hired private investigators Learnt of a court case settlement Obtained access to the client s legal strategy in emails Prepared report explaining how the stolen information could be used against the client

HOW TO MEASURE A RED TEAM S SUCCESS: Immediate business executive impact

Comparing Capabilities Advanced Red Team Moderate Red Team Entry-Level Red Team Traditional Penetration Testing OS Zero-days Custom Persistence Techniques & Spying Tools Windows Internals Rapid Malware Prototyping Empire PowerShell Tools Metasploit Responder Nessus

You must use a Red Team that can simulate the big breaches in your industry to defend your networks against the level of attacker that is after you.

Traditional vs. Next Generation Traditional Security architecture Find and fix vulnerabilities Focus on technology Justify ROI by de-risking IT assets Measure success by reducing the number of vulnerabilities in assets VS. Resilience Next Generation Detect, respond and retaliate against threat actors Focus on people and processes Justify ROI by demonstrating capability to counter threat actors Measure success by the speed of detecting and neutralizing attacks that matter

Next Generation Penetration Testing also allows organisations to safely test their retribution tactics and strategies

Retribution: Real consequences for hacking us. When do we call law enforcement? When do we reverse engineer all their malware and C2 and burn it to the ground? When do we find who they are and publish that information online? When do we hack back?

If the client can t survive a traditional corporate network penetration test, why bother with a Red Team? Traditional penetration testing does not generate sufficient C-Level involvement and it drives security investments in the wrong places i.e. Fixing vulnerabilities instead of adjusting the organisation s security plan.

Cost of purchasing Next Generation Penetration Testing Estimated cost of a breach Criminal Enterprise Espionage Campaign State-Sponsored APT 1 10M 10 100M < 100M Cost to simulate ~ $50,000 AUD ~ $100,000 AUD ~ $250,000 AUD Cost Breach vs. Simulation 4% 1% 0.25% ** Dollar figures presented are based on the professional experience and the opinion of the speaker.

The 50k minimum price point for Next Generation Penetration Testing is the main hold-up for most organisations. Automate attack scenarios with Python and/or Powershell to commoditize network and OS penetration testing

Summary Next Generation Penetration Testing is better at measuring the effectiveness of our security plan because it is more realistic and holistic. Next Generation Penetration Testing generates much greater business executive impact compared to traditional penetration testing. The greater the complexity to defend an organization, the greater the ROI on Next Generation Penetration Testing Exercises. Automate attack scenarios to test security technologies, and use Next Gen to test people and processes.

Questions? (benmosse@mosse-security.com)