the other side of the fence. dealing with hackers and malware

25
The Other Side of the Fence . Dealing with Malware *Hackers Prasanna V http://vprasanna.com

Post on 18-Oct-2014

438 views

Category:

Technology


1 download

DESCRIPTION

A small talk I gave at Barcamp Bangalore on dealing with malwares and hackers from the perspective of an Information Security Manager.

TRANSCRIPT

Page 1: The Other Side Of The Fence. Dealing With Hackers And Malware

The Other Side of the Fence .Dealing with Malware *Hackers

Prasanna Vhttp://vprasanna.com

Page 2: The Other Side Of The Fence. Dealing With Hackers And Malware

We generally hear about hackers& malware, the damage they create,the money & data they steal.

How's it to be on The Other Side?

We generally hear about hackers& malware, the damage they create,the money & data they steal.

How's it to be on The Other Side?

Page 3: The Other Side Of The Fence. Dealing With Hackers And Malware

Episode 1: The Conficker Strikes

Page 4: The Other Side Of The Fence. Dealing With Hackers And Malware

Somewhere during November 2008, an enterprisehaving thousands of systems spread acrossthe world

Page 5: The Other Side Of The Fence. Dealing With Hackers And Malware

Holiday season, most of team were on leave

Page 6: The Other Side Of The Fence. Dealing With Hackers And Malware

Complaints of network congestion, Domain controller was slow

We saw unprecedented network traffic, within LAN & Outbound to unusual IP addresses!

Rapid replication of suspicious system behavior across the globe

Page 7: The Other Side Of The Fence. Dealing With Hackers And Malware

Antivirus on the systems were generally up-to-date with definitions

Page 8: The Other Side Of The Fence. Dealing With Hackers And Malware

Our Network IDS was detecting traffic destined to random global IP addresses on destination ports 445

Turns out that the infected machines were missing patches, most importantly MS08-67

Apparently, these systems were also missing OS hardening that was put in place

Page 9: The Other Side Of The Fence. Dealing With Hackers And Malware

We had Failed!

Page 10: The Other Side Of The Fence. Dealing With Hackers And Malware

Effective logging and monitoring are like

torchlight

Page 11: The Other Side Of The Fence. Dealing With Hackers And Malware

Layered defense mechanism andthe role of Security Information & Event Management (SIEM)

Page 12: The Other Side Of The Fence. Dealing With Hackers And Malware

Security information from hosts & network logs helped identify the infected machines

Patch the systems or disable network access

Pivot!Being good in spreadsheet helps the admins

Page 13: The Other Side Of The Fence. Dealing With Hackers And Malware

Anti-Virus and Firewall are not the ultimate solutionsto today’s sophisticated threats.

Foolproof security ?

Page 14: The Other Side Of The Fence. Dealing With Hackers And Malware

There is Reasonable Security

14

……And it is achieved in layers

Page 15: The Other Side Of The Fence. Dealing With Hackers And Malware

Episode DHCP Server Goes 2 -Rogue

An admin s worst nightmare’

Page 16: The Other Side Of The Fence. Dealing With Hackers And Malware

Catastrophe Strikes!

Page 17: The Other Side Of The Fence. Dealing With Hackers And Malware

1. Logged to gateway / router. Internet is fine.2. Logged into UTM, sessions have doubled.3. No malwares reported in the AV manager!

Page 18: The Other Side Of The Fence. Dealing With Hackers And Malware

Wireshark is an Admin’s best friend!

Page 19: The Other Side Of The Fence. Dealing With Hackers And Malware

“Documentation is your life savior”

Was able to identify the offending machine based on a list I had generated earlier

Page 20: The Other Side Of The Fence. Dealing With Hackers And Malware

Turns out that a user had set up a server and

did not know to disable DHCP functionality!

Page 21: The Other Side Of The Fence. Dealing With Hackers And Malware

People are the weakest link

Learning's:

• Internal users can cause as much trouble as hackers and malware

Page 22: The Other Side Of The Fence. Dealing With Hackers And Malware

22

Information Security is about People, Process & Technology

Prx

Page 23: The Other Side Of The Fence. Dealing With Hackers And Malware
Page 24: The Other Side Of The Fence. Dealing With Hackers And Malware

Disclaimer

All opinions mentioned here are my personal and not necessarily

of my employer, current or previous.

Page 25: The Other Side Of The Fence. Dealing With Hackers And Malware

Thank You

Prasanna V

Cofounder @PacketVerify

http://vprasanna.com

@terminalfix