TEFO STUDERUS HACKING 4 FUN & PROFIT



Similar documents
Inside-Out Attacks. Security Event April 28, 2004 Page 1. Responses to the following questions

Inside-Out Attacks. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL

APT Detection using Splunk

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

Smart Card APDU Analysis

Security Evaluation CLX.Sentinel

Hacking for Fun and Profit

Cyber Essentials. Test Specification

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Networking: EC Council Network Security Administrator NSA

Networking for Caribbean Development

Hacking-Lab Remote Security Lab 15. April 2010

Proxies. Chapter 4. Network & Security Gildas Avoine

Who Moved My Firewall. Clinton Thomson Derivco (PTY) Ltd

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

General Network Security

INFORMATION SECURITY TRAINING CATALOG (2015)

APT Advanced Persistent Threat Time to rethink?

Network Security Fundamentals

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Citrix NetScaler Best Practices. Claudio Mascaro Senior Systems Engineer BCD-Sintrag AG

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Workshop Designed & Powered by TCIL IT, Chandigarh

Firewall Firewall August, 2003

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

Reducing Application Vulnerabilities by Security Engineering

Course Content: Session 1. Ethics & Hacking

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Detailed Description about course module wise:

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

Vulnerability Assessment and Penetration Testing

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Firewall VPN Router. Quick Installation Guide M73-APO09-380

UTT Technologies offers an effective solution to protect the network against 80 percent of internal attacks:

BotNets- Cyber Torrirism

CS5008: Internet Computing

Firewalls. Ahmad Almulhem March 10, 2012

Learn Ethical Hacking, Become a Pentester

Classification of Firewalls and Proxies

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Quarterly Report: Symantec Intelligence Quarterly

CYBER SECURITY: A REPORT FROM THE TRENCHES 2015 AGC NATIONAL & CHAPTER LEADERSHIP CONFERENCE MIKE.ZUSMAN@CARVESYSTEMS.COM

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Introduction to Computer Security Benoit Donnet Academic Year

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

AnyWeb AG / ITSM Practice Circle / Christof Madöry

Cyber Essentials PLUS. Common Test Specification

Hands-on Hacking Unlimited

PowerShell for Penetration Testers

Effective Methods to Detect Current Security Threats

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

AnyWeb AG

Certified Ethical Hacker Exam Version Comparison. Version Comparison

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

I N S T A L L A T I O N M A N U A L

Exam Questions SY0-401

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

How To Get A Computer With A Cell Phone And A Computer (For Free)

Information Security Threat Trends

Effective Methods to Detect Current Security Threats

Swiss Cyber Storm II Case: NFS Hacking

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

quick documentation Die Parameter der Installation sind in diesem Artikel zu finden:

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

INFORMATION SECURITY TRAINING CATALOG (2016)

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Ed Ferrara, MSIA, CISSP Fox School of Business

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

CRYPTUS DIPLOMA IN IT SECURITY

NETASQ MIGRATING FROM V8 TO V9

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Internet Security Firewalls

Cryptography and network security

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Transcription:

TEFO STUDERUS HACKING 4 FUN & PROFIT Ivan Bütler Compass Security AG, Switzerland ivan.buetler@csnc.ch Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41 61 team@csnc.ch www.csnc.ch

Ist die Dame reich? Scheinheirat??? Slide 2

Ivan Bütler, CEO Compass Security E1 ivan.buetler@csnc.ch blog.csnc.ch Twitter.com/ibuetler Xing LinkedIn ~ibuetler ~ibuetler Slide 3

Ethical Hacker / Penetration Tester Gründer & CEO Compass Security AG Lecturer @ University of Applied Science Rapperswil Lecturer @ University of Applied Science Lucerne Lecturer @ University of St.Gallen Speaker @ BlackHat Las Vegas 2008 SmartCard (In) Security Speaker @ IT Underground Warsaw 2009 Advanced Web Hacking Speaker @ Swiss IT Leadership Forum Nice 2009 Cyber Underground Gründer der Swiss Cyber Storm Konferenz Vorstandsmitglied von Information Security Society Switzerland (ISSS) Vorstandsmitglied von Cyber Tycoons Anti-Warfare Foundation Slide 4

Agenda Credit Card Fraud / Handel von illegalen Gütern Gezielte Attacken Mobile Security Nationale Cyber Defense Strategie Security Community Slide 5

Direkte Attacken Angriffe auf Server im Internet (Webseiten etc.) BLOCKED PASSED BLOCKED Slide 6

SQL Einleitung Protokoll HTTPS RMI SQL Slide 7

SQL Injection Angriff Protokoll HTTPS + SQL Hacker Code RMI SQL Slide 8

Demo 1: SQL Injection Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41 61 team@csnc.ch www.csnc.ch

Wie bereichert man sich? (1) Anonymer Handel von illegalen Gütern Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41 61 team@csnc.ch www.csnc.ch

Show: Video 1: Cyber Market Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41 61 team@csnc.ch www.csnc.ch

Handel von illegalen Gütern Dumps Carders Carding WU WMZ WU LR CVVs Drops Rippers Stolen Credit Cards Provider of Dumps Using Dumps Western Union Web Money Western Union Liberty Reserve Card Verification Value Remailing Location CVV verification service Slide 12

Zahlen über Liberty Reserve? Payment with Liberty Reserve Slide 13

Liberty Reserve? -> Internet Währung (anonym) Slide 14

Liberty Reserve als Internet Währung Verkäufer/Käufer brauchen ein LR Konto Das LR Konto bekommt man durch ein E-Mail (anonym) Anonym Anonym Slide 15

LR Wechselstuben Richtiges Geld wird in LR gewechselt Dazu braucht es sogenannte Exchanger Banken (Russland) Es gibt mehr als 100 Exchanger Banken Trust Slide 16

Wie bereichert man sich? (2) Anonymer Handel von illegalen Gütern Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41 61 team@csnc.ch www.csnc.ch

Trennung Hacking von Bereicherung Hacking Financial Benefit Slide 18

Agenda Credit Card Fraud / Handel von illegalen Gütern Gezielte Attacken Mobile Security Nationale Cyber Defense Strategie Security Community Slide 19

Gezielte Angriffe Umgehung der Perimeter Sicherheit PASSED Slide 20

USB Stick Attack Covert Channel Attacke Auslieferung über USB-Stick Start via Auto-Start Angreifer kontrolliert das *Opfer* aus der Ferne Company Network Internet Slide 21

Demo 2: Gezielte Attacken Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41 61 team@csnc.ch www.csnc.ch

Direkte Verbindungen nach Aussen Einfache Inside-Out Attacke Corporate LAN Internet Direkte Channels ACK tunnel TCP tunnel (pop, telnet, ssh) UDP tunnel (syslog, snmp) ICMP tunnel IPSEC, PPTP Slide 23

Proxifizierte Verbindungen nach Aussen Erweiterte Inside-Out Attacken LAN Proxy Corporate LAN Internet Proxified Channels Socks SSL tunnel HTTP/S tunnel (payload of http = tunnel) HTTP/S proxy CONNECT method tunnel DNS tunnel FTP tunnel Mail tunnel DMZ Proxy Slide 24

Spearphishing Malicious Mail Microsoft Office Word Document Slide 25

Hardware Bot Client Slide 26

PlugBot Konzept Slide 27

APT (Advanced Persistent Threat) Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41 61 team@csnc.ch www.csnc.ch

Advanced Persistent Threat Command & Control Communication (DNS Tunneling) Client DNS Server POLL POLL POLL Command File Commands Execute commands Slide 29

Statistik: Exploits vor Patch verfügbar Advisory is published Patch 54 days Exploit 6 days Slide 30

Advanced Persistent Threat 2007 2011 2009 Today Erst-Infektion (keine local admin rechte) Ausbau der Privilegen auf Local Admin C&C Slide 31

Advanced Persistent Threat Agent Agent Zombie Host Zombie Host C&C Server Agent Zombie Host Zombie Host Slide 32

Agenda Credit Card Fraud / Handel von illegalen Gütern Targeted Attacks Mobile Security National Cyber Defense Strategy Security Community Slide 33

Attacks & Interfaces Slide 34

Slide 35

Demo 3: SMS Spoofing Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41 61 team@csnc.ch www.csnc.ch

SMS-ID-Spoofing http://goo.gl/cwcmq Slide 37

Agenda Credit Card Fraud / Handel von illegalen Gütern Targeted Attacks Mobile Security Nationale Cyber Defense Strategie Security Community Slide 38

National Cyber Defense Strategy Schweiz Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41 61 team@csnc.ch www.csnc.ch

Nationale Cyber Defense Strategie Abschätzen von Technologien und Trends ANTIZIPATION PRÄVENTION Installation Firewalls, Anti-Virus, IDS/IPS, Penetration Testing Anti-Hacking Tools REAKTION Verfahren und Prozesse, Kompetenzen, Kommunikation Slide 40

Wir brauchen Cyber Spezialisten! Österreich sucht mit der Cyber Security Austria die besten Talente zwischen 14 und 22 Jahren. Slide 41

Risiken kennen und Verantwortung übernehmen! Slide 42

Ivan Bütler, Compass Security AG ivan.buetler@csnc.ch Fragen?! Slide 43