330 likes | 425 Views
Future Cyber Warriors. Why Network Forensics? . Encrypted Hard Disks Re-imaged Boxes USB Response Difficulty Increase in Number of Intrusions IP End Point Analysis Log Analysis Geolocation Proxies. How do they get in?. Spear Phish Links (Twitter) Vulnerabilities Applications OS
E N D
Why Network Forensics? • Encrypted Hard Disks • Re-imaged Boxes • USB Response Difficulty • Increase in Number of Intrusions • IP End Point Analysis • Log Analysis • Geolocation • Proxies
How do they get in? • Spear Phish • Links (Twitter) • Vulnerabilities • Applications • OS • Weak Passwords
And Let’s Not Forget • The Insider Threat
Can’t We be Quieter ? • Use tcpdump with no IP • Listen Passively
Zenmapcan be Indecisive • Accurate as the weather… • And noisy, so you will be noticed in Logs
Exploiting the Victim • Firewall and UAC Enabled…
Important Facts when you Hacks • Who are You? • How are you in? • Got PID? • Why no GUI?
Step Right Up – Get Your Malware • How do you get malware on the victim? • Meterpreter upload • FTP Answer File • Write a BAT FILE • Use DEBUG to Compile • TFTP (not likely) • wget or curl (if Linux)
You got caught doing bad things • At least rename your stuff
Summary • Hackers get in • Network Forensics may explain: • Who • How • What • When • At a minimum, endpoint analysis • Actions can help mitigate future attacks
Thank You! Questions and Comments