Jarrod Frates
Inguardians
@jarrodfrates
“Skittering Through Networks”
Ms. Berlin in Germany - How’d it go?
TinkerSec’s story: https://threadreaderapp.com/thread/1063423110513418240.html
Takeaways
Blue Team:
- Least Privilege Model
- Least Access Model
“limited remote access to only a small number of IT personnel”
“This user didn't need Citrix, so her Citrix linked to NOTHING”
“They limited access EVEN TO LOCAL ADMINS!”
- Multi-Factor Authentication
- Simple Anomaly Rule Fires
“Finance doesn’t use Powershell”
- Defense in Depth
“moving from passwords to pass phrases…”
“Improper disposal of information assets”
Red Team:
- Keep Trying
- Never Assume
- Bring In Help
- Luck Favors the Prepared
- Adapt and Overcome
Before the Test
- Talk it over with stakeholders: Reasons, goals, schedules
- Report is the product: Get samples
- Who, what, when, where, why, how
- Talk to testers (and clients, if you can find them)
-
- Ask questions
- Look for past defensive experience and understanding of your needs
-
- Bonus points if they interview you as a client
- Red flags: Pwning is all they talk about, they set no-crash guarantees, send info in the clear
- Define the scope: Test type(s), inclusions, exclusions, permissions, accounts
- Test in ‘test/dev’, NOT PROD
- Social Engineering: DO THIS. Yes, you’re vulnerable. DO IT ANYWAY.
During the Test
- Comms: Keep in contact with the testers
-
- Status reports (if the engagement is long enough)
- Have an established method for escalation
- Have an open communication style --brbr (WeBrBrs)
- Ask questions, but let the testers do their jobs
- Be available and ready to address critical events
- Keep critical stakeholders informed
- Watch your network: things break, someone else may be getting in, capture packets(?)
After the Test
- Getting Results:
-
- Report delivered securely
- Initial summary: How far did they get?
- Actual report
-
- Written for multiple levels
- No obvious copy/paste
- Read, understand, provide feedback, and get revised version
- Next steps:
-
- Don’t blame anyone unnecessarily
- Start planning with stakeholders on fixes
- Contact vendors, educate staff
- Reacting to report
- Sabotaging your test
- Future testing
Ms. Berlin’s Legit business - Mental Health Hackers
CFP for Bsides Seattle (Deadline: 26 November 2018) http://www.securitybsides.com/w/page/129078930/BsidesSeattle2019
CFP for BsidesNash https://twitter.com/bsidesnash/status/1063084215749787649 Closes Dec 31
Teaching a class in Seattle for SANS (SEC504) - need some students! Reach out to me for more information. Looking to do this at the end of February through March
heck out our Store on Teepub! https://brakesec.com/store
Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com
#Brakesec Store!:https://www.teepublic.com/user/bdspodcast
#Spotify: https://brakesec.com/spotifyBDS
#RSS: https://brakesec.com/BrakesecRSS
#Youtube Channel: http://www.youtube.com/c/BDSPodcast
#iTunes Store Link: https://brakesec.com/BDSiTunes
#Google Play Store: https://brakesec.com/BDS-GooglePlay
Our main site: https://brakesec.com/bdswebsite
#iHeartRadio App: https://brakesec.com/iHeartBrakesec
#SoundCloud: https://brakesec.com/SoundcloudBrakesec
Comments, Questions, Feedback: bds.podcast@gmail.com
Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon
https://brakesec.com/BDSPatreon
#Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir
#Player.FM : https://brakesec.com/BDS-PlayerFM
#Stitcher Network: https://brakesec.com/BrakeSecStitcher
#TuneIn Radio App: https://brakesec.com/TuneInBrakesec
No comments:
Post a Comment