SlideShare a Scribd company logo
©2014 Check Point Software Technologies Ltd.
Physical (In)Security:
It’s not all about Cyber
Inbar Raz
Malware & Security Research Manager
Check Point Software Technologies
2©2014 Check Point Software Technologies Ltd.
Vulnerability Disclosure
!  Responsible Disclosure:
– Contact the vendor only and inform them of the vulnerability
– Offer to work with the vendor
– After a grace period, proceed to Full Disclosure
–  Web vulnerability: 1-4 weeks
–  Software: 1-3 months
–  Firmware: 3-6 months
–  But: no actual standard, players make the rules
!  Full Disclosure:
– Publish all information, including POC
– Sometimes – only a video of POC
3©2014 Check Point Software Technologies Ltd.
Example #1: Movie Ticket Kiosk
!  On-site Kiosk
!  Touch Screen
!  Credit Card
Reader
!  Ticket Printer
!  No peripherals,
No interfaces
4©2014 Check Point Software Technologies Ltd.
The Attack
!  Improper interface settings
allow the opening of menu
options.
!  Menus can be used to
browse for a new printer.

Recommended for you

CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist

Cybersecurity is a difficult and serious endeavor which over time strives to find a balance in managing the security of computing capabilities to protect the technology which connects and enriches the lives of everyone. Peering into the future of cybersecurity provides valuable insights around the challenges and opportunities. The industry is changing rapidly and attackers seem to always be one step ahead. Presented by Matthew Rosenquist at the 2016 Connected Security Expo (CSE) @ ISC West http://www.connectedsecurityexpo.com/

cybersecurityinformation securitysecurity
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security

The document provides a vision for cyber security in 2021, including emerging technologies, threats, and practices. It predicts that technologies like mobile computing, quantum computing, cloud computing, predictive semantics, and dynamic networks will impact cyber security. Threats will become more sophisticated through cyber warfare, crime, and activism. Cyber security practice will evolve to be more multi-dimensional and holistic through practices like cyber architecture and lifecycle management. A new lexicon for cyber security terms is also envisioned.

cyber securityteksouthit
Aerohive Configuration guide.
Aerohive Configuration guide. Aerohive Configuration guide.
Aerohive Configuration guide.

This document provides an overview of the infrastructure used for Aerohive networking hands-on labs: - Students connect wirelessly to Aerohive access points from their laptops to perform configuration exercises. - Access points connect via Ethernet cables to Aerohive switches, which provide PoE and support VLAN trunking. - A firewall with routing supports NAT, multiple virtual routers, and virtual clients for testing configurations. - A console server allows SSH access to access point serial consoles for troubleshooting.

aerohive
5©2014 Check Point Software Technologies Ltd.
!  A limited Windows Explorer
is not restricted enough.
!  A right-click can be used…
!  To open a full, unrestricted
Windows Explorer.
The Attack
6©2014 Check Point Software Technologies Ltd.
The Attack
!  Browsing through the
file system reveals
interesting directory names…
!  And even more interesting
file names.
7©2014 Check Point Software Technologies Ltd.
The Attack
!  Bingo: Credit Card Data
(Unencrypted!)
Tools of the trade: Notepad
!  We can use the ticket
printer to take it home ☺
8©2014 Check Point Software Technologies Ltd.
The Attack
!  But that’s not all:
RSA Keys and Certificates
are also found on the drive!
!  Which we can print, take
home and then use a
free OCR software to read…

Recommended for you

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College

This document provides an overview of information technology security awareness training at Northern Virginia Community College. It aims to assist faculty and staff in safely using computing systems and data by understanding security threats and taking reasonable steps to prevent them. Everyone who uses a computer is responsible for security. New employees must complete training within 30 days, and refresher training is required annually. Users have personal responsibilities around reporting violations, securing devices and data, and safe email practices. Security violations can result in consequences like data loss, costs, and disciplinary action. Training must be documented and various delivery methods are outlined.

it awarenessinformation technologyinformation technology awareness
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2

This document outlines an agenda for a security awareness seminar on ISO27k standards and compliance regulations. It discusses the causes of security incidents, defines risk as a vulnerability that could be exploited by a threat, and examines threat agents like humans, machines, and nature. It also summarizes objectives of compliance programs to reduce risks and meet standards, provides an overview of regulations like Sarbanes-Oxley (SOX) and Basel II, and notes SOX applies to public companies in the US and internationally.

iso27001software outsourcing company in india
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)

This document discusses building a cyber security operations center (CSOC). It covers the need for a CSOC, its core components including security information and event management (SIEM), and integrating components like monitoring, alerting, and reporting. Key aspects that are important for a successful CSOC are people, processes, and technology. The roles and skills required for people in the CSOC and training needs are outlined. Developing standardized processes, procedures and workflows that align with frameworks like ISO are also discussed.

building security operations center
9©2014 Check Point Software Technologies Ltd.
The Attack
!  The result:
RSA Keys used to
bill credit cards.
10©2014 Check Point Software Technologies Ltd.
Example #1: Summary
!  Device purpose: Print purchased Movie Tickets
!  Data on device: Credit Card data and Encryption Keys
!  Method used to hack: 1 finger
11©2014 Check Point Software Technologies Ltd.
Example #2: Point-of-Sale Device
!  Point-Of-Sale devices
are all around you.
12©2014 Check Point Software Technologies Ltd.
The Attack
!  PoS Device located outside business during the day
!  At the end of the day, it is locked inside

Recommended for you

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University

This document provides an information security awareness training. It discusses why information security is important for businesses due to the value of information and increasing information crimes. It then provides dos and don'ts for secure practices like using licensed software, keeping anti-virus tools up to date, using strong passwords, and not sharing login information. Additional tips include locking screens when unattended, backing up documents, and not disabling security applications. Social engineering tactics are described as tricks to acquire sensitive information by building inappropriate trust. Suggestions are given to verify caller identities before providing information and to be suspicious of requests for passwords from technicians.

information securityinformaton awareness trainingsecurity awareness
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet

This document provides an overview of network security concepts. It discusses the importance of protecting information assets as the most valuable company assets. It then covers key network security topics like the CIA triad of confidentiality, integrity and availability. It defines threats at both the network and application levels, and discusses how to overcome threats through policies, user awareness training, and security technologies like firewalls, IDS/IPS, antivirus software, VPNs, spam filters and web content filtering. The document aims to educate about network threats and appropriate security controls and protections.

security safetysecurity awarenesssecurity training
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...

Learn about Sogeti’s journey of creating a new Security Operation Center, and how and why we leveraged QRadar solutions. We explore the full program lifecycle, from strategic choices to technical analysis and benchmarking on the product. We explain how QRadar accelerates the go-to-market of the SOC, and how we embed IBM Security Intelligence offerings in our solution. Having a strong collaboration between different IBM stakeholders such as Software Group, Global Technology Services, as well as the Labs, was key to client satisfaction and operational effectiveness. We also show the value of integrating new QRadar features in our SOC roadmap, in order to constantly stay ahead in the cyber security game.

security operation centeribm qradarsecurity intelligence
13©2014 Check Point Software Technologies Ltd.
The Attack
!  But one thing is left outside, on the street:
14©2014 Check Point Software Technologies Ltd.
The Attack
!  Intelligence Gathering: Listen to the network, discover
who’s talking, what language they’re speaking, and what
they’re saying in that language
15©2014 Check Point Software Technologies Ltd.
The Attack
!  Intelligence Gathering: Listen to the network, discover
who’s talking, what language they’re speaking, and what
they’re saying in that language
!  Detected IP addresses:
– 192.168.0.1
– 192.168.0.2
– 192.168.0.4
– 192.168.0.250
– 192.168.0.254
16©2014 Check Point Software Technologies Ltd.
The Attack
!  Evidence of SMB (plus prior knowledge) leads to the next
step:
!  And the response:

Recommended for you

ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1

This document provides an overview of information security and introduces ISO27k. It defines information security as preserving the confidentiality, integrity and availability of information. The document outlines that information exists in many forms and goes through various stages of its lifecycle. It also discusses the importance of security for people, processes, and technology in protecting the valuable information assets of an organization.

iso27001isosoftware outsourcing company in india
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...

I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.

securitycybercybersecurity
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center

Presentation I used to give on the topic of using a SIM/SIEM to unify the information stream flowing into the SOC. This piece of collateral was used to help close the largest SIEM deal (Product and services) that my employer achieved with this product line.

semsocsiem
17©2014 Check Point Software Technologies Ltd.
Things to do with an open share
!  #1: Look around
– Establish possible attack vectors
18©2014 Check Point Software Technologies Ltd.
Things to do with an open share
19©2014 Check Point Software Technologies Ltd.
Things to do with an open share
!  #1: Look around
– Establish possible attack vectors
!  #2: Create a file list
– Not like stealing data, but very helpful
– Go home, analyze, come back later
20©2014 Check Point Software Technologies Ltd.
!  Answers a ping, but no SMB.
!  First guess: Switch/Router/ADSL Modem.
!  Try to access the Web-UI:
The mystery of 192.168.0.250

Recommended for you

Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy

This presentation presentated by Mohd Shamir B Hasyim, Vice President Government and Multilateral Engagement, Cyber Security Malaysia, 10th September 2013 on #IISF2013 An Integrated Approach For Cyber Security And Critical Information Infrastructure Protection

information securityiisf2013
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3

Information security and ISO 27001-2013 standards and its importance. http://www.ifour-consultancy.com

software outsourcing company in indiaiso27001iso
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017

F-Secure fait le point sur L'état de la cybersécurité en 2017. 2017, F-SECURE state of cybersecurity.

 
by NRC
f-securemalwarecomputer
21©2014 Check Point Software Technologies Ltd.
The mystery of 192.168.0.250
!  Use the full URL:
22©2014 Check Point Software Technologies Ltd.
!  Reminder: We actually had this information.
Going for the ADSL Modem/Router
23©2014 Check Point Software Technologies Ltd.
Going for the ADSL Modem/Router
!  Naturally, there is access control:
!  Want to guess?
24©2014 Check Point Software Technologies Ltd.
Example #2: Summary
!  Device purpose: Cash Register and Local Server
!  Data on device: Credit Card data, Customer Database
!  Method used to hack: MacBook Pro, Free Software

Recommended for you

CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing

This document provides an overview of IP addressing concepts including: - The structure of IP addresses including classes, subnet masking, and CIDR - Techniques for subnetting networks and creating more subnets and hosts including VLSM - The transition from IPv4 to IPv6 to address the limited address space of IPv4

Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build

Summarize the design and build approach for SOC (Security Operation Center) for both end user company and service providers. Defines the approach flow for SOC building and various components and phases involved. Defines design thumb rules and parameters for SOC Design.

socrimincident response team
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014

The document discusses cybersecurity threats and attacks. It describes how attacks often begin by finding vulnerabilities in popular applications like Adobe Reader or Java. It also discusses the Target credit card breach where over 40 million cards were stolen. The document emphasizes that a multi-layered security approach is needed to address both known and unknown threats, including firewalls, network segmentation, application control, and integrated malware sandboxing and prevention techniques.

25©2014 Check Point Software Technologies Ltd.
Other opportunities
!  A Medical Clinic in Tel-Aviv
– Complete disregard for
attendance systems
26©2014 Check Point Software Technologies Ltd.
Other opportunities
!  A Hospital in Tel-Aviv
27©2014 Check Point Software Technologies Ltd.
Other opportunities
!  An ATM at a shopping mall
28©2014 Check Point Software Technologies Ltd.
Example #3: Hospital Smart TV
!  Features
– Watch TV
– Listen to music
– VOD
– Browse the Internet
!  Peripherals:
– Touch Screen
– Credit Card Reader
– Earphones
And…
– USB…

Recommended for you

Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security

This document provides a summary of an IoT security presentation. It discusses what IoT devices are, why they pose security risks, and how others have been affected by IoT compromises. The presentation then outlines a basic IoT security checklist and covers common attack vectors like weak passwords, lack of encryption and patching, and physical security issues. It emphasizes the importance of inventory, segmentation, strong unique passwords, logging, and engagement with device vendors on security responsibilities and practices.

internetiotcybersecurity
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7

The Internet of Fails - Where IoT (the Internet of Things) has gone wrong and how we’re making it right. By Mark Stanislav @mstanislav, Senior Security Consultant, Rapid7

internet of thingsinfosecconnected devices
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments

The Hardcore Stuff I Hack: This talk is going to give a run through of some of the technical challenges paul and his team have overcome over the years - in as much hardcore detail as possible

29©2014 Check Point Software Technologies Ltd.
The Attack
!  Start with a USB Keyboard
– Num-Lock works
– Nothing else does
!  Power off,
Power on,
F11
30©2014 Check Point Software Technologies Ltd.
Our options are opening up
!  Let’s boot something else
!  BackTrack (kali):
Never leave home
without it
31©2014 Check Point Software Technologies Ltd.
!  Even though I’m set to DHCP, I have no IP address.
!  An examination of the config files reveals the problem:
But I’m facing a problem
# The loopback interface, this is the default configuration:
auto lo
iface lo inet loopback
pre-up /usr/sbin/ethtool -s eth0 speed 100 duplex full autoneg off
pre-up /usr/sbin/ethtool -s eth0 speed 100 duplex full autoneg off
# The first network interface.
# In this case we want to receive an IP-address through DHCP:
auto eth0
iface eth0 inet dhcp
# In this case we have a wired network:
wpa-driver wired
# Tell the system we want to use WPA-Supplicant
# with our configuration file:
wpa-conf /etc/wpa_supplicant.conf
pre-up /usr/sbin/ethtool -s eth0 speed 100 duplex full autoneg off
32©2014 Check Point Software Technologies Ltd.
!  Even though I’m set to DHCP, I have no IP address.
!  An examination of the config files reveals the problem.
!  But this is linux, everything is in text files ☺
But I’m facing a problem
network={
key_mgmt=IEEE8021X
eap=TTLS MD5
identity="a*****c“
anonymous_identity="a*****c“
password=“*****“
phase1="auth=MD5“
phase2="auth=PAP password=*****“
eapol_flags=0
}

Recommended for you

Holland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_video

This document discusses hacking tools and techniques that could enable man-in-the-middle attacks on wireless networks. It describes how a wireless penetration testing device could intercept probe requests from a device looking to connect to a wireless network, and respond posing as the legitimate network to establish a connection. Once connected, the device could monitor and manipulate web traffic using tools like Cain & Abel, ARP poisoning, and DNS spoofing. Rainbow tables are also mentioned as a tool for cracking Windows passwords using hashed values within a few minutes. Throughout, the document emphasizes these techniques should only be used for legitimate security testing and not illegal hacking.

#seminar#byod#eindhoven #roygray
Tech Presentation 2
Tech Presentation 2Tech Presentation 2
Tech Presentation 2

This is a PowerPoint Presentation I updated for the VP of I.T. Most of the copy is his, however the format itself is all new. Due to the fact I downgraded this to a PDF for this site's purposes, the movement and sound has been compromised. With that in mind, I've been told it's quite a zippy slideshow for such a dry subject! I have also deleted several slides which had pictures of employees and changed their names elsewhere.

Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012

This document summarizes an Internet census conducted in 2012 that involved port scanning the entire IPv4 address space using insecure embedded devices accessed with default or empty credentials. Over 420,000 devices were accessed to build a distributed port scanner network. Various scanning methods were used including ICMP ping, reverse DNS, Nmap scans, service probes, and traceroutes to gather data on open ports, network services, and network topology. The data gathered is being released publicly to further the study of Internet infrastructure and device security.

securitynetvulnerability
33©2014 Check Point Software Technologies Ltd.
!  Even though I’m set to DHCP, I have no IP address.
!  An examination of the config files reveals the problem.
!  But this is linux, everything is in text files ☺
!  I copy the files, and try again.
But I’m facing a problem
34©2014 Check Point Software Technologies Ltd.
What next?
!  Find out where we are (external IP)
!  Proof-of-Concept: Open reverse shell
35©2014 Check Point Software Technologies Ltd.
!  Further analysis of files reveals a lead:
http://192.168.0.250/client/
!  This is the actual User Interface:
But it’s not enough…
36©2014 Check Point Software Technologies Ltd.
So the next logical step is…

Recommended for you

Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd

Presentation on topics beyond the conventional ethical hacking , discusses job factors and scope in the security field :) this was presented in LPU (Lovely Professional University) as a Seminar with attendees over 200. Meet m e at FB if u want it fb/nipun.jaswal

hackingbeyond ethical hackingjob for hackers
The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...

This talk was given at the PKF (Payment Knowledge Forum) in London on September 30th as part of the 2014 summit. For details about PKF see http://www.thepkf.org, for details about the 2014 summit see http://www.thepkf.org/lon_2014eventinfo.php. It was, once more, a very good event - highly recommended. This presentation has three pieces: (1) How was the attack against Target executed and how could it have been stopped (2) Has the attacked changed the security landscape and if so how (3) Recommendations for going about securing computer systems

target attackhp nonstopcomputer security
Operating systems
Operating systemsOperating systems
Operating systems

This document provides instructions on how to set up and configure a home network including necessary components, installation steps, and basic troubleshooting. It discusses the needed network interface cards, cables, router, computers, printer, and switch. It then explains how to configure each computer with an IP address and change the computer name. Basic commands like Ping and IPConfig are demonstrated for checking network connectivity. Potential problems like viruses are addressed, along with solutions like system restore and using different antivirus software. The document aims to comprehensively guide a user through establishing a basic home network.

computerstudiesnetworkcomputer
37©2014 Check Point Software Technologies Ltd.
So what’s next?
!  We lost access to the devices
– At least easy access
!  Complete the report and go for disclosure
However…
!  Turns out other hospitals have the same device
– So now we wait for someone to get sick…
38©2014 Check Point Software Technologies Ltd.
Example #3: Summary
!  Device purpose: Smart TV for Hospital Patients
!  Data on device: Network Encryption Keys,
Possible access to other networks
!  Method used to hack: USB Drive, Free Software,
Keyboard, Mouse
39©2014 Check Point Software Technologies Ltd.
Example #4: Airport Entertainment
40©2014 Check Point Software Technologies Ltd.
Escaping the Box

Recommended for you

Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010

This document provides an overview of computer forensics, including what it involves, the tools and techniques used, and why someone may want to pursue a career in this field. It discusses how computer forensics investigations differ from their portrayal on television and focuses on accuracy over speed. Key aspects covered include the forensic process, types of evidence examined, hardware and software tools used, and challenges like hidden data and encryption.

ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docxASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx

ASSIGNMENT2: Computer Architecture and Imaging “So you’re telling me an exact replica of ZeroBit’s concept drawing has shown up on the cover of Apex’s product development brochure? What are the chances of that? … Unless somebody here at ZeroBit is leaking information….  I’ll get my best investigator on it.” “Thanks for coming by. I wanted to talk with you face to face. I just spoke with our VP for External Relations, and it looks like we may have a major security breach on our hands. How quickly can you image this USB stick?” “Our suspect has access to a live system here at Headquarters, as well as a networked computer at our remote location.  We’ll need to examine both of them.  You should be able to slip into his office and acquire his RAM and swap space while he's at training this afternoon. But while you’re waiting, check your email for a message from Legal.” When you open the message from the ZeroBit Counsel, you see four questions that need to be answered in preparation for any possible legal challenge. As you’re answering the fourth one, a notification pops up reminding you that the suspect’s training session is about to start...that’s your cue that it will soon be safe to log in to the suspect’s computer. You run your program, acquiring the RAM and swap space from the live system. Then you log out, leaving the suspect’s office and computer as you found them. Your colleagues have left for the day, but you’ve stayed behind to image the suspect’s remote computer after hours.  You log on to the system and have no problem using netcat to transfer a copy of his remote hard drive to your workstation at Headquarters. You lean back in your chair and smile.  You’ve imaged all of the suspect’s known devices. Tomorrow you’ll compile your analyses into a final forensic report. Who knows?  You may even be asked to present your report in court! Digital forensics involves processing data from many different types of devices, ranging from desktops to laptops, tablets to smartphones, servers to cloud storage, and even devices embedded in automobiles, aircraft, and other technologies. In this project you will focus on the architecture and imaging of desktop and laptop computers. You will be working in the VM to image and verify the contents of the following: 1. a USB stick 2. the RAM and swap space of a live computer 3. a networked computer hard drive \ In the final step, you compile all of the previous lab notes and reports into one comprehensive report. The final assignment in this project is a forensic imaging lab report that can be presented in a court of law. Before you can begin imaging the USB drive provided by your supervisor, you need to review your technical manual in order to prepare a statement of work to give to your company's legal team. Are you ready to get started? When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. · 1.1: Or.

Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime

Financial services organizations are prime targets for cyber criminals. They must take extreme care to protect customer data, while also ensuring high levels of network availability to allow for 24/7 access to critical financial information. Additionally, industry consolidation has created large, heterogeneous network environments within large financial institutions, making it difficult to ensure that networks have the necessary visibility and protection to prevent a devastating security breach. By leveraging NetFlow from existing network infrastructure, financial services organizations can achieve comprehensive visibility across even the largest, most complex networks. The ability to quickly detect a wide range of potentially malicious activity helps prevent damaging data breaches and network disruptions. Attend this informational webinar, conducted by Lancope’s Director of Security Research, Tom Cross, to learn: How NetFlow can help quickly uncover both internal and external threats How pervasive network insight can accelerate incident response and forensic investigations How to substantially decrease enterprise risks

network securitycyber threatsnetwork visibility
41©2014 Check Point Software Technologies Ltd.
Collecting Valuable Information
42©2014 Check Point Software Technologies Ltd.
Example #4: Summary
!  Device purpose: Airport Entertainment and Shopping
!  Data on device: VNC Encryption Keys,
Possible access to other networks,
Potential Botnet
!  Method used to hack: USB Keyboard and Drive
43©2014 Check Point Software Technologies Ltd.
Conclusion
!  Local Networks are rarely as monitored and as protected
as the Internet Gateway.
!  Many devices that are publicly accessible do not get
hardened against unauthorized access.
!  Compromising a device on an internal network can easily
be leveraged in a network proliferation operation.
!  Best practice: Ask yourself: “Would I trust Inbar here?”
!  It’s not all about Cyber.
44©2014 Check Point Software Technologies Ltd.
Thank You!

Recommended for you

Some things about LAN device detection
Some things about LAN device detectionSome things about LAN device detection
Some things about LAN device detection

The document discusses methods for identifying devices on a local area network (LAN). It explains that traditional intrusion detection and prevention systems assumed all LAN devices were PCs, but with the rise of IoT, devices now include appliances, sensors, and more. The document then outlines several passive methods for detecting LAN devices, including checking: (1) the device MAC address' organizationally unique identifier to determine brand, (2) DHCP options like client identifier for fingerprints, (3) HTTP user-agent strings for clues, and (4) common applications used. Identifying LAN devices provides benefits for monitoring, access control, and generating threat intelligence.

threat intelligencehome routeriot device detection
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016

This document discusses how IoT devices can potentially be weaponized if not properly secured. It provides examples of vulnerabilities found in various IoT devices like kettles, coffee machines, thermostats, and CCTV DVRs that could allow attackers to compromise user accounts, ransom devices, or launch large-scale attacks. The document emphasizes that manufacturers must implement strong security in devices' wireless protocols, firmware, and provisioning processes to prevent attacks.

Ochrana pred modernými malware útokmi
Ochrana pred modernými malware útokmiOchrana pred modernými malware útokmi
Ochrana pred modernými malware útokmi

This document discusses cybersecurity threats and Check Point's solutions. It summarizes recent cyber attacks, vulnerabilities exploited in 2014 like Heartbleed and Shellshock, and growing threats from zero-day exploits and unknown malware. It shows how existing antivirus and firewalls have gaps that allow some attacks through. Check Point promotes its threat extraction and emulation technology, which can analyze files and detect malware before it can execute or be evaded. Test results are presented showing it can detect unknown malware faster than alternatives. The document argues Check Point provides automated, consolidated protection against both known and unknown threats.

check point

More Related Content

Viewers also liked

Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Shekh Md Mehedi Hasan
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
ernestlithur
 
US Pmp Overview 2008
US Pmp Overview 2008US Pmp Overview 2008
US Pmp Overview 2008
Jaydeep Adhikari
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Matthew Rosenquist
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
Aerohive Configuration guide.
Aerohive Configuration guide. Aerohive Configuration guide.
Aerohive Configuration guide.
armaan7139
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
Atlantic Training, LLC.
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
Tanmay Shinde
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
Directorate of Information Security | Ditjen Aptika
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
NRC
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
Sameer Paradia
 

Viewers also liked (20)

Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
US Pmp Overview 2008
US Pmp Overview 2008US Pmp Overview 2008
US Pmp Overview 2008
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Aerohive Configuration guide.
Aerohive Configuration guide. Aerohive Configuration guide.
Aerohive Configuration guide.
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 

Similar to CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz

Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
David Berkelmans
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
Rapid7
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
n|u - The Open Security Community
 
Holland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_video
robbuddingh
 
Tech Presentation 2
Tech Presentation 2Tech Presentation 2
Tech Presentation 2
guest2bdea
 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
Giuliano Tavaroli
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Nipun Jaswal
 
The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...
Thomas Burg
 
Operating systems
Operating systemsOperating systems
Operating systems
sandrahezro
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
Tiago Henriques
 
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docxASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
edmondpburgess27164
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
Lancope, Inc.
 
Some things about LAN device detection
Some things about LAN device detectionSome things about LAN device detection
Some things about LAN device detection
Canaan Kao
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
joebursell
 
Ochrana pred modernými malware útokmi
Ochrana pred modernými malware útokmiOchrana pred modernými malware útokmi
Ochrana pred modernými malware útokmi
MarketingArrowECS_CZ
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Lancope, Inc.
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
Asep Sopyan
 
Introduction to Computer basics for students
Introduction to Computer basics for studentsIntroduction to Computer basics for students
Introduction to Computer basics for students
Akhil Nadh PC
 
Fixing security by fixing software development
Fixing security by fixing software developmentFixing security by fixing software development
Fixing security by fixing software development
Nick Galbreath
 

Similar to CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz (20)

Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
 
Holland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_video
 
Tech Presentation 2
Tech Presentation 2Tech Presentation 2
Tech Presentation 2
 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
 
The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docxASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
Some things about LAN device detection
Some things about LAN device detectionSome things about LAN device detection
Some things about LAN device detection
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 
Ochrana pred modernými malware útokmi
Ochrana pred modernými malware útokmiOchrana pred modernými malware útokmi
Ochrana pred modernými malware útokmi
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
 
Introduction to Computer basics for students
Introduction to Computer basics for studentsIntroduction to Computer basics for students
Introduction to Computer basics for students
 
Fixing security by fixing software development
Fixing security by fixing software developmentFixing security by fixing software development
Fixing security by fixing software development
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
CODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
��
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 

Recently uploaded (20)

Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 

CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz

  • 1. ©2014 Check Point Software Technologies Ltd. Physical (In)Security: It’s not all about Cyber Inbar Raz Malware & Security Research Manager Check Point Software Technologies
  • 2. 2©2014 Check Point Software Technologies Ltd. Vulnerability Disclosure !  Responsible Disclosure: – Contact the vendor only and inform them of the vulnerability – Offer to work with the vendor – After a grace period, proceed to Full Disclosure –  Web vulnerability: 1-4 weeks –  Software: 1-3 months –  Firmware: 3-6 months –  But: no actual standard, players make the rules !  Full Disclosure: – Publish all information, including POC – Sometimes – only a video of POC
  • 3. 3©2014 Check Point Software Technologies Ltd. Example #1: Movie Ticket Kiosk !  On-site Kiosk !  Touch Screen !  Credit Card Reader !  Ticket Printer !  No peripherals, No interfaces
  • 4. 4©2014 Check Point Software Technologies Ltd. The Attack !  Improper interface settings allow the opening of menu options. !  Menus can be used to browse for a new printer.
  • 5. 5©2014 Check Point Software Technologies Ltd. !  A limited Windows Explorer is not restricted enough. !  A right-click can be used… !  To open a full, unrestricted Windows Explorer. The Attack
  • 6. 6©2014 Check Point Software Technologies Ltd. The Attack !  Browsing through the file system reveals interesting directory names… !  And even more interesting file names.
  • 7. 7©2014 Check Point Software Technologies Ltd. The Attack !  Bingo: Credit Card Data (Unencrypted!) Tools of the trade: Notepad !  We can use the ticket printer to take it home ☺
  • 8. 8©2014 Check Point Software Technologies Ltd. The Attack !  But that’s not all: RSA Keys and Certificates are also found on the drive! !  Which we can print, take home and then use a free OCR software to read…
  • 9. 9©2014 Check Point Software Technologies Ltd. The Attack !  The result: RSA Keys used to bill credit cards.
  • 10. 10©2014 Check Point Software Technologies Ltd. Example #1: Summary !  Device purpose: Print purchased Movie Tickets !  Data on device: Credit Card data and Encryption Keys !  Method used to hack: 1 finger
  • 11. 11©2014 Check Point Software Technologies Ltd. Example #2: Point-of-Sale Device !  Point-Of-Sale devices are all around you.
  • 12. 12©2014 Check Point Software Technologies Ltd. The Attack !  PoS Device located outside business during the day !  At the end of the day, it is locked inside
  • 13. 13©2014 Check Point Software Technologies Ltd. The Attack !  But one thing is left outside, on the street:
  • 14. 14©2014 Check Point Software Technologies Ltd. The Attack !  Intelligence Gathering: Listen to the network, discover who’s talking, what language they’re speaking, and what they’re saying in that language
  • 15. 15©2014 Check Point Software Technologies Ltd. The Attack !  Intelligence Gathering: Listen to the network, discover who’s talking, what language they’re speaking, and what they’re saying in that language !  Detected IP addresses: – 192.168.0.1 – 192.168.0.2 – 192.168.0.4 – 192.168.0.250 – 192.168.0.254
  • 16. 16©2014 Check Point Software Technologies Ltd. The Attack !  Evidence of SMB (plus prior knowledge) leads to the next step: !  And the response:
  • 17. 17©2014 Check Point Software Technologies Ltd. Things to do with an open share !  #1: Look around – Establish possible attack vectors
  • 18. 18©2014 Check Point Software Technologies Ltd. Things to do with an open share
  • 19. 19©2014 Check Point Software Technologies Ltd. Things to do with an open share !  #1: Look around – Establish possible attack vectors !  #2: Create a file list – Not like stealing data, but very helpful – Go home, analyze, come back later
  • 20. 20©2014 Check Point Software Technologies Ltd. !  Answers a ping, but no SMB. !  First guess: Switch/Router/ADSL Modem. !  Try to access the Web-UI: The mystery of 192.168.0.250
  • 21. 21©2014 Check Point Software Technologies Ltd. The mystery of 192.168.0.250 !  Use the full URL:
  • 22. 22©2014 Check Point Software Technologies Ltd. !  Reminder: We actually had this information. Going for the ADSL Modem/Router
  • 23. 23©2014 Check Point Software Technologies Ltd. Going for the ADSL Modem/Router !  Naturally, there is access control: !  Want to guess?
  • 24. 24©2014 Check Point Software Technologies Ltd. Example #2: Summary !  Device purpose: Cash Register and Local Server !  Data on device: Credit Card data, Customer Database !  Method used to hack: MacBook Pro, Free Software
  • 25. 25©2014 Check Point Software Technologies Ltd. Other opportunities !  A Medical Clinic in Tel-Aviv – Complete disregard for attendance systems
  • 26. 26©2014 Check Point Software Technologies Ltd. Other opportunities !  A Hospital in Tel-Aviv
  • 27. 27©2014 Check Point Software Technologies Ltd. Other opportunities !  An ATM at a shopping mall
  • 28. 28©2014 Check Point Software Technologies Ltd. Example #3: Hospital Smart TV !  Features – Watch TV – Listen to music – VOD – Browse the Internet !  Peripherals: – Touch Screen – Credit Card Reader – Earphones And… – USB…
  • 29. 29©2014 Check Point Software Technologies Ltd. The Attack !  Start with a USB Keyboard – Num-Lock works – Nothing else does !  Power off, Power on, F11
  • 30. 30©2014 Check Point Software Technologies Ltd. Our options are opening up !  Let’s boot something else !  BackTrack (kali): Never leave home without it
  • 31. 31©2014 Check Point Software Technologies Ltd. !  Even though I’m set to DHCP, I have no IP address. !  An examination of the config files reveals the problem: But I’m facing a problem # The loopback interface, this is the default configuration: auto lo iface lo inet loopback pre-up /usr/sbin/ethtool -s eth0 speed 100 duplex full autoneg off pre-up /usr/sbin/ethtool -s eth0 speed 100 duplex full autoneg off # The first network interface. # In this case we want to receive an IP-address through DHCP: auto eth0 iface eth0 inet dhcp # In this case we have a wired network: wpa-driver wired # Tell the system we want to use WPA-Supplicant # with our configuration file: wpa-conf /etc/wpa_supplicant.conf pre-up /usr/sbin/ethtool -s eth0 speed 100 duplex full autoneg off
  • 32. 32©2014 Check Point Software Technologies Ltd. !  Even though I’m set to DHCP, I have no IP address. !  An examination of the config files reveals the problem. !  But this is linux, everything is in text files ☺ But I’m facing a problem network={ key_mgmt=IEEE8021X eap=TTLS MD5 identity="a*****c“ anonymous_identity="a*****c“ password=“*****“ phase1="auth=MD5“ phase2="auth=PAP password=*****“ eapol_flags=0 }
  • 33. 33©2014 Check Point Software Technologies Ltd. !  Even though I’m set to DHCP, I have no IP address. !  An examination of the config files reveals the problem. !  But this is linux, everything is in text files ☺ !  I copy the files, and try again. But I’m facing a problem
  • 34. 34©2014 Check Point Software Technologies Ltd. What next? !  Find out where we are (external IP) !  Proof-of-Concept: Open reverse shell
  • 35. 35©2014 Check Point Software Technologies Ltd. !  Further analysis of files reveals a lead: http://192.168.0.250/client/ !  This is the actual User Interface: But it’s not enough…
  • 36. 36©2014 Check Point Software Technologies Ltd. So the next logical step is…
  • 37. 37©2014 Check Point Software Technologies Ltd. So what’s next? !  We lost access to the devices – At least easy access !  Complete the report and go for disclosure However… !  Turns out other hospitals have the same device – So now we wait for someone to get sick…
  • 38. 38©2014 Check Point Software Technologies Ltd. Example #3: Summary !  Device purpose: Smart TV for Hospital Patients !  Data on device: Network Encryption Keys, Possible access to other networks !  Method used to hack: USB Drive, Free Software, Keyboard, Mouse
  • 39. 39©2014 Check Point Software Technologies Ltd. Example #4: Airport Entertainment
  • 40. 40©2014 Check Point Software Technologies Ltd. Escaping the Box
  • 41. 41©2014 Check Point Software Technologies Ltd. Collecting Valuable Information
  • 42. 42©2014 Check Point Software Technologies Ltd. Example #4: Summary !  Device purpose: Airport Entertainment and Shopping !  Data on device: VNC Encryption Keys, Possible access to other networks, Potential Botnet !  Method used to hack: USB Keyboard and Drive
  • 43. 43©2014 Check Point Software Technologies Ltd. Conclusion !  Local Networks are rarely as monitored and as protected as the Internet Gateway. !  Many devices that are publicly accessible do not get hardened against unauthorized access. !  Compromising a device on an internal network can easily be leveraged in a network proliferation operation. !  Best practice: Ask yourself: “Would I trust Inbar here?” !  It’s not all about Cyber.
  • 44. 44©2014 Check Point Software Technologies Ltd. Thank You!