mehis hakkaja. kaip gali būti įsilaužta į jūsų kompiuterį?
DESCRIPTION
Realus įsilaužimo į kompiuterį atvejis: tikros įsilaužimo priemonės, kompiuterių sistemų spragos. Kaip tai vyksta? Pamatykite savo akimis. Pranešimo autorius – Mehis Hakkaja. Įmonės „Clarified Security OÜ“ generalinis direktorius ir įkūrėjas (Estija). Pranešimas skaitytas konferencijoje – INFORMACINIŲ SISTEMŲ SAUGUMAS, vykusioje 2013 m. balandžio 11d., skirtoje valstybės institucijų ir valstybinės reikšmės organizacijomsTRANSCRIPT
How you/your company will be hacked
Mehis Hakkaja, CEO and Founder
Clarified Security OÜlinkedin.com/in/mehishakkaja
Pentration testing"We break security to bring clarity"
Hands-on security trainings"We teach what we do and know the best"
Red Teaming for NATO CCDCoE large-scale Cyber Defence Exercises (CDX):
2010 May, CDX10 "Baltic Cyber Shield"– ~20 RT members against 6 Blue Teams
2012 Mar, CDX12 "Locked Shields" – ~40 RT members against 9 Blue Teams
2013 Apr, CDX13 "Locked Shields"– ~40 RT members against 10 Blue Teams
______________________________________________________________
"There can never be too much of clarity"Jani Kenttälä - Clarified Networks OY
Caught up in the mix?
* Your digital life lost in the cloud(social engineering, social media, cloud, authentication, devices, back-ups...)
www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking
* Stealing money from bank accounts with Facebook
* By a compromised computer in the IP range you wantkrebsonsecurity.com/2012/10/service-sells-access-to-fortune-500-firms
Are YOU keeping up?
Perimeter defense alone is long dead, networks are soft inside and attackers know it!
Patching cycles: MS "black tuesday", 3rd party soft, plugins (PDF reader, Java, Flash...)
Even if you stay on top of patching, there are 0-day vulnerabilites
Client-side attacks are the most likely ones to get your network compromised
You either already are or will be owned!
0wned via known vuln...(hacking demos)
Metasploit Framework, exploit-db.com, oldapps.com, Google..., en.wikipedia.org/wiki/Java_version_history
IE 7/8/9 0-day (MS12-063) (Sep '12) XP/Vista/Win7
http://www.exploit-db.com/exploits/21840/ (disc. 14.09, pub. 17.09, patch 21.09.2012)
Java 7 Update 0...6 0-day (Aug '12) any browser, Win/Linux (latest update 18.10.2012)
http://www.exploit-db.com/exploits/20865/ (vendor informed 02.04, pub 10.08, u7 30.08.2012)
<= Java 7u4, Java 6u32 (Jun '12) any browser, Win/Linux/OSX/Solaris
http://www.exploit-db.com/exploits/19717/ (disc./fix 12.06.2012, published 11.07.2012)
<= Java 7u2, Java 6u30 (Feb '12) any browser, Win/Linux/OSX/Solaris
http://www.exploit-db.com/exploits/18679/ (disc./fix 14.02.2012, published 28.03.2012)
< Adobe Flash 11.3.300.271 (Aug '12) XP/Vista/Win7 IE 6/7/8/9/
http://www.exploit-db.com/exploits/20624/ (disc./fix 14.08.2012, published 20.08.2012)
Apr 2012 Flashback trojan > 650 000 Apple Mac's infected via Java exploit
(used to spread as a fake Flash Player software before)
Live hacking demo
What if this is your company?
Do you have:
- security policies in place?
- security policy enforcement in place?
- defense in depth actually implemented?
- centralized logging & monitoring in place?
- incident response & mitigation capabilities?...
What can we break for you today?
www.clarifiedsecurity.com