Topic Presentation

advertisement
October 2011
Twitter: #cybergamut
I’m a Suit in a
Cyber World!
1
Employment History
Financial
Services
2
Employment History
Financial
Services
3
Employment History
Ski Bum
4
Employment History
Ski Bum
5
Employment History
USAF
Officer
6
Employment History
USAF
Officer
7
Employment History
SAIC
8
Employment History
SAIC Program
Manager
9
Employment History
SAIC Program
Manager
10
Employment History
SAIC Division
Manager
11
Employment History
SAIC Division
Manager
12
Employment History
SAIC Capture
Manager
13
Employment History
SAIC Capture
Manager
14
Education History
King College
BA Economics & Business
Administration
15
Education History
King College
BA Economics & Business
Administration
16
Education History
Chartered Life
Underwriter
17
Education History
Chartered Life
Underwriter
18
Education History
UMD Europe
Bowie State University
MS Management
Information Systems
19
Education History
UMD Europe
Bowie State University
MS Management
Information Systems
20
Education History
PMP
21
Education History
PMP
22
Education History
GCIH
23
Education History
GCIH
24
Large Cyber Procurements
SAIC Capture
Manager
25
Large Cyber Procurements
> $250,000,000
26
Introduction to
cybergamut
29
History and Why Change
• In 2008 SAIC established cybernexus
– Coming together or “nexus” of cyber analysts
– Central Maryland
• In 2011 cybernexus renamed cybergamut
– Runs the “gamut” of cyber disciplines
– Global organization
• cybergamut nodes
–
–
–
–
Socorro, New Mexico
Sioux Falls, South Dakota
San Antonio, Texas
Northern Virginia (Tysons Corner and Herndon)
30
Mission Statement
cybergamut is a worldwide community of
practice for cyber professionals across
industry, academia, and government providing
ongoing education, training, and certification
opportunities throughout all phases of a cyber
professional’s career, utilizing traditional
methods as well as non-traditional techniques
like puzzles, Easter Eggs, and problem solving.
31
Easter Eggs
32
Easter Eggs (eeggs.com)
33
Challenge Cards
34
Challenge Coin
35
Technical Tuesday
• What it is
– a technical exchange
• What it is not
– A sales presentation
– A product endorsement
– For discussion of procurements
– For discussion of procurement related issues
36
PDU and CPE
• PMI PDU’s
– PMI Baltimore approved most Technical Tuesday
events as eligible for PMI PDU’s under Category B,
Continuing Education
• CPE’s for CISSP
– Self certification
• Other certifications
– What do you need?
37
Previous Topics
•
•
•
•
•
•
•
•
•
•
Defending a Large Network
•
–
–
Brian Rexroad of AT&T
2 Dec 2008
–
–
Paul Schnegelberger of SAIC and John Sanders of
Northrop Grumman TASC
Nov/Dec 2008
–
–
Jim Jaeger of General Dynamics
13 Jan 2009
–
–
Aaron Wilson of SAIC
13 Jan 2009
•
–
–
Greg Virgin of RedJack
27 Jan 2009
•
–
–
Peiter “Mudge” Zatko of BBN
27 Jan 2009
•
–
–
David Harris of SAIC
10 Feb 2009
•
–
–
Darryl Ackley of New Mexico Tech
24 Feb 2009
–
–
Clift Briscoe and Nat Cooper of Edge
24 Mar 2009
–
–
George Economou of Akamai
24 Mar 2009
DNI Essentials
Digital Forensics
Case Studies in Cyber Attacks
Trickler
Security Tools
IPv6
•
•
Exploitation Prediction
Analytic and IO Tools
Distributed Systems Technologies and Internet
Intelligence
•
•
Exploring the Social World of the Russian
Hacker Community
–
–
Tom Holt of Michigan State University
10 Mar 2009
–
–
Amber Schroader of Paraben
10 Mar 2009
–
–
Earl Zmijewski of Renesys
14 Apr 2009
–
–
Nico Lacchini of TDI
26 May 2009
–
–
Johnny Long
11 Jun 2009
–
–
Bruce Potter of Ponte Technologies
14 Jul 2009
–
–
Rob Lee of MANDIANT and the SANS Institute
18 Aug 2009
–
–
Sean Bodmer of Savid Corporation
22 Sep 2009
–
–
Stuart McLeod of Global Knowledge
3 Nov 2009
Modern Forensic Investigative Techniques
Defending Against BGP Man-In-The-Middle
Attacks
Examining the Storm Worm
No-Tech Hacking
Dirty Secrets of the Security Industry
Windows Forensic Analysis: Dissecting the
Windows Registry
Silence of the RAM
VoIP Security - Attacks, Threats and
Countermeasures
38
Previous Topics cont.
•
•
•
•
•
•
•
•
A Tale of Two Departments – How Commerce
and State Dealt With Chinese Intrusions:
Lessons Learned Plus: Security Heroes and the
20 Critical Controls
–
–
Alan Paller of the SANS Institute
9 Mar 2010
–
–
Aaron Barr of HBGary Federal
27 Apr 2010
–
–
Paul Frank of ITT
25 May 2010
•
•
Aurora
Malware reverse engineering at ITT
Advanced Cyber Collection Techniques;
Extracting and Analyzing Information from the
Domain Name System
•
•
•
–
–
Tim Cague of The CYAN Group
10 Aug 2010
–
–
Aaron Barr of HBGary Federal
5 Oct 2010
•
–
–
Gene Bransfield of Tenacity Solutions
9 Nov 2010
•
–
•
–
Presented by Michael Collins & Greg Virgin of
RedJack along with Jim Downey of DISA PEO-MA
30 Nov 2010
–
–
Josh Goldfarb of 21st Century Technologies
4 Jan 2011
The Rise of the Social Web
Why Security People S#ck
Insider Threat and Real-World Incident Study
Network Monitoring
•
Network Device Exploitation with Universal
Plug & Play
–
–
Terry Dunlap of Tactical Network Solutions
8 Feb 2011
–
–
Jeff Kuhn of Pangia Technologies
29 Mar 2011
–
–
Tom Parker of Securicon
19 Apr 2011
–
10 May 2011
–
–
Rob Lee of MANDIANT and The SANS Institute
24 May 2011
–
–
Peder Jungck of Cloudshield and SAIC
28 Jun 2011
–
–
Brian Snow
19 Jul 2011
–
–
Jason MacLulich of Endace
9 Aug 2011
–
30 Aug 2011
Deep Packet Inspection for Cybersecurity
ASW&R
Stuxnet Redux: Malware Attribution & Lessons
Learned
Special Technical Tuesday and renaming
APT Intrusion Remediation: The Top Do's and
Don'ts
Deep Packet Inspection
Our Security Status is Grim
Cellular Security
Government Cyber Technical Directors’ Panel
39
Upcoming Technical Tuesdays
• Hacking Windows 7 and defending against physical attacks
– 18 Oct 2011
– Jesse Varsalone
• Looking for more speakers and topics such as:
–
–
–
–
–
–
–
–
–
–
–
–
Tor routing
Malware reverse engineering
Cyber situational awareness
Splunk
Cloud computing and cloud forensics
Geolocation of IP addresses and mobile devices
Digital forensics
E-discovery
Attack attribution
Deep packet inspection
Fuzzing
Writing secure code
To suggest topics, volunteer to speak, or to receive an invitation, please contact: scott.w.sheldon@saic.com
40
Interesting Topics from the
Chief 5uit’s Perspective
41
Remember!
42
Dash
43
Foreign Language
• 1337 = LEET = short for elite (maybe)
– 5uit = Suit
• Pwn = Own
– Your computer has been pwned
• Teh = the
– Accidents become purposeful
– This was before spell checkers – hard to do now
• Texting
– LOL
– ROFL
–  - OMG Powerpoint translated : and ) to this
44
Different Culture
•
•
•
•
•
•
•
•
95% male
Black T-shirts
Interesting facial hair
Body art
Add alcohol and mix vigorously
Stickers everywhere
Lock picking for fun (lock sport)
Hackers aren’t all Bad
– I Hack Charities
• As a 5uit, I’m counter-counter-culture
45
Pure evil
• Wireless diabetes pump exploit
49
Pure evil – or is it?
• Wireless diabetes pump exploit
• Exploit released by a pump user
• Wants manufacturer to fix the problem
• This is typical of many of the things released
50
Bot in a Botnet
• What’s a Bot and what’s a Botnet?
– Computers that have been taken over
– Used for distribution of Spam and Malware
– Used for other nefarious deeds
51
Bot in a Botnet
• What’s a Bot and what’s a Botnet?
– Computers that have been taken over
– Used for distribution of Spam and Malware
– Used for other nefarious deeds
• Does your Mom care?
52
Bot in a Botnet
• What’s a Bot and what’s a Botnet?
– Computers that have been taken over
– Used for distribution of Spam and Malware
– Used for other nefarious deeds
• Does your Mom care?
• Do you care?
53
Digital Hygiene
You can’t Patch
Stupid!!!
You can’t Patch
Stupid!!!
Don’t be “Stupid”
Don’t use Reply
All in a Mail
Storm!!!
You can’t Patch
Stupid!!!
Social Engineering
• Extremely effective
• DEFCON Social Engineering Contest
– Amazing what people will give away
– Help desks were overly helpful
76
Click OK to
Continue
Should I proceed?
79
Should I proceed? I did!!!
80
Phishing and Spearphishing
• E-mails and targeted e-mails
– Usually with a link
– Watch for typo’s and misspelllings
• V1AGRA
• [Insert company name here] has been sold!
81
Classic Phishing – not Nigeria
82
Phishing maybe???
83
Phishing from GA – Bot??
84
Spearphishing
85
Corporate Response
86
Another One!
87
Phishing and Spearphishing
• E-mails and targeted e-mails
– Usually with a link
– Watch for typo’s and misspelllings
• V1AGRA
• [Insert company name here] has been sold!
• DEFCON Skybox Demo
– Trend tracking via Twitter
– Tracking an individual via Social Media
– Tiny urls and Bit.ly
88
GPS and other evil devices
• GPS, iPhones, etc remember everything
• iPhones sync EVERYTHING with their host
• Windows 7 Registry saves things a long time
• Forensics examiner’s dream
• Car thieves “Go Home”
– You’re not home and now you’re stranded
89
GPS and other evil devices
• GPS, iPhones, etc remember everything
• iPhones sync EVERYTHING with their host
• Windows 7 Registry saves things a long time
• Forensics examiner’s dream
• Car thieves “Go Home”
– You’re not home and now you’re stranded
90
Supply Chain
• Where was your code written?
• Where was your hardware produced?
• How did it get to you?
• Thumb drives
• Hard drives
91
X begets Y begets Z…
• Needs beget innovation
• Innovation begets technology
• Policy and strategy follow
•
•
•
•
– aren’t necessarily “begotten”
Lack of policy begets ineffective or non-strategy
Doctrine is the military word for policy
Tactics are the refinement of military strategy
difference between responsibility and authority
– DHS has responsibilities
– DoD has many clearly defined authorities
• National Cyber Policy is challenging
– AFCEA story
92
Steganography
• Stuff hidden in pictures
• Stuff hidden in other non-obvious places
93
Who votes for #1?
94
Who votes for #2?
95
Who votes for #3?
96
Who votes for #4?
97
Steganography
• Let’s check your votes . . .
98
#1 Malamute???; not Malware
99
#2
100
#2 is Malodorous; not Malware
101
#3 is Mal-wear; not Malware
102
#4 is Malicious; not Malware
103
Steganography
• None of those pictures
– I don’t think anyway…
• Very hard to detect in a single picture
– Potential detection if you have both pictures
50 KB
450 KB
104
Other Scary/Cool Concepts
• Segmented polymorphic malware
– Bad stuff that changes its looks, delivered in parts
• Metamorphic malware
– Bad stuff that changes what it does
• Cloud Computing – distributed virtualization
– Which denomination?
• Hadoop – son’s toy elephant
– Cloud Security
– Cloud Forensics
• Zero-day
– Brand new malware or exploits
105
Should I click?
106
Social Networking
• “On the Internet, nobody knows you’re a dog”
– New Yorker Magazine, 1993
– Still true today
• Do you really know who your Friends are?
– Would you cross the street to see them in person?
– What are you revealing in your posts?
107
Fake Profile???
108
Social Networking
• “On the Internet, nobody knows you’re a dog”
– New Yorker Magazine, 1993
– Still true today
• Do you really know who your Friends are?
– Would you cross the street to see them in person?
– What are you revealing in your posts?
• “My Daddy’s dating…”
• Twitter - #cybergamut
– Spontaneous and quick
– No filter
– No retraction after re-tweet
109
Need
this
button
Location-based Services
• Facebook Places and Foursquare
• Preparation for Travel
– Set up light timers
– Make your home look lived in
•
•
•
•
“Check in” at out of state locations
Photo metadata
Okay for my Friends to know
What about Friends of Friends?
– What about Mafia Wars Friends of Friends?
112
Facebook Places
113
Clearly Out of Town
114
• Photo metadata
• Photo metadata
• Facebook actually
removes the
location information
User Names and Passwords
• Anonymous and LULZ Sony Attacks
– 77 million users affected
• Other large data thefts
• User Name and Password combinations
– How many do you use?
– Remember the Bots?!?
– This got my attention!
117
What do we do?
•I don’t know…
•I think education helps…
118
Cyber Increases
• Volume
• Variety
• Velocity
119
Cyber Increases
• Volume = 123 slides
• Variety
• Velocity
120
Cyber Increases
• Volume = 123 slides
• Variety = 25 topics
• Velocity
121
Cyber Increases
• Volume = 123 slides
• Variety = 25 topics
• Velocity = 1 hour = ~29 sec per slide
122
That’s all we’ve got!
123
Download