Transcript
Page 1: Cloud Security Summit (Boston) - Live Hack Demo

Live Hack Demo

Stephen Coty – Chief Security EvangelistPaul Fletcher – Cyber Security Evangelist

Page 2: Cloud Security Summit (Boston) - Live Hack Demo

Global Analysis

Malicious Actors (TeamXRat) are using the Yahoo breach data

to convince IPhone users to click on a txt or email that will load ransomware on your Internet connected

devices

Page 3: Cloud Security Summit (Boston) - Live Hack Demo

Social Recon

Page 4: Cloud Security Summit (Boston) - Live Hack Demo

Social Recon

GitrobSearch GitHub repositories for data

Social Recon

Page 5: Cloud Security Summit (Boston) - Live Hack Demo

The HarvesterOpen Source Intelligence Collection

NMAP/NESSUSFinding Open Ports and vulnerabilities

SQLMAPAttempting SQL Injection

Page 6: Cloud Security Summit (Boston) - Live Hack Demo

Incident Notification

Page 7: Cloud Security Summit (Boston) - Live Hack Demo

Threats by Customer Environment

Source: Alert Logic CSR 2016

Page 8: Cloud Security Summit (Boston) - Live Hack Demo

Threats by Customer Industry Vertical

Source: Alert Logic CSR 2016

Page 9: Cloud Security Summit (Boston) - Live Hack Demo

WPSCANFinding vulnerabilities and brute forcing

HydraPassword brute on any protocol

WEEVELYfile upload and command execution

Page 10: Cloud Security Summit (Boston) - Live Hack Demo

CiphixForensics tool

Virus TotalMalware Sandbox

AutomaterSee if your IP is being used maliciously

Page 11: Cloud Security Summit (Boston) - Live Hack Demo

Thank you.


Top Related