cloud security summit (boston) - live hack demo
TRANSCRIPT
![Page 1: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/1.jpg)
Live Hack Demo
Stephen Coty – Chief Security EvangelistPaul Fletcher – Cyber Security Evangelist
![Page 2: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/2.jpg)
Global Analysis
Malicious Actors (TeamXRat) are using the Yahoo breach data
to convince IPhone users to click on a txt or email that will load ransomware on your Internet connected
devices
![Page 3: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/3.jpg)
Social Recon
![Page 4: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/4.jpg)
Social Recon
GitrobSearch GitHub repositories for data
Social Recon
![Page 5: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/5.jpg)
The HarvesterOpen Source Intelligence Collection
NMAP/NESSUSFinding Open Ports and vulnerabilities
SQLMAPAttempting SQL Injection
![Page 6: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/6.jpg)
Incident Notification
![Page 7: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/7.jpg)
Threats by Customer Environment
Source: Alert Logic CSR 2016
![Page 8: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/8.jpg)
Threats by Customer Industry Vertical
Source: Alert Logic CSR 2016
![Page 9: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/9.jpg)
WPSCANFinding vulnerabilities and brute forcing
HydraPassword brute on any protocol
WEEVELYfile upload and command execution
![Page 10: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/10.jpg)
CiphixForensics tool
Virus TotalMalware Sandbox
AutomaterSee if your IP is being used maliciously
![Page 11: Cloud Security Summit (Boston) - Live Hack Demo](https://reader035.vdocuments.mx/reader035/viewer/2022062905/586fdf6c1a28ab18428b6fdd/html5/thumbnails/11.jpg)
Thank you.