Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Intrusions and the Modern Web
Search
Benjamin Scott
November 23, 2015
Technology
1
130
Intrusions and the Modern Web
how and why bad guys break into servers
Benjamin Scott
November 23, 2015
Tweet
Share
More Decks by Benjamin Scott
See All by Benjamin Scott
Practical Cross-Side Request Forgery
benjaminxscott
0
53
Starting your Infosec Career
benjaminxscott
0
380
Lie To Me: Mitigating Intrusions using Deception
benjaminxscott
0
75
Internet Security for Everyone
benjaminxscott
1
63
Beneath the Radar: covert traffic on the web
benjaminxscott
0
84
Securing your company's networks
benjaminxscott
0
77
Internet Forensics 101
benjaminxscott
0
72
Intro to Binary Analysis
benjaminxscott
0
53
Analyzing Evil PDF Files with peepdf
benjaminxscott
0
200
Other Decks in Technology
See All in Technology
アジャイル社内普及ご近所さんマップを作ろう / Let's create an agile neighborhood map
psj59129
1
140
都市スケールAR制作で気をつけること
segur
0
140
現地速報!Microsoft Ignite 2025 M365 Copilotアップデートレポート
kasada
2
1.4k
新しい風。SolidFlutterで実現するシンプルな状態管理
zozotech
PRO
0
130
SRE視点で振り返るメルカリのアーキテクチャ変遷と普遍的な考え
foostan
2
360
なぜインフラコードのモジュール化は難しいのか - アプリケーションコードとの本質的な違いから考える
mizzy
60
21k
AIエージェントによるエンタープライズ向けスライド検索!
shibuiwilliam
4
610
不確実性に備える ABEMA の信頼性設計とオブザーバビリティ基盤
nagapad
3
3k
プロダクト負債と歩む持続可能なサービスを育てるための挑戦
sansantech
PRO
1
530
[CV勉強会@関東 ICCV2025 読み会] World4Drive: End-to-End Autonomous Driving via Intention-aware Physical Latent World Model (Zheng+, ICCV 2025)
abemii
0
230
社内外から"使ってもらえる"データ基盤を支えるアーキテクチャの秘訣/登壇資料(飯塚 大地・高橋 一貴)
hacobu
PRO
0
2.8k
『HOWはWHY WHATで判断せよ』 〜『ドメイン駆動設計をはじめよう』の読了報告と、本質への探求〜
panda728
PRO
5
2.2k
Featured
See All Featured
Done Done
chrislema
186
16k
What's in a price? How to price your products and services
michaelherold
246
12k
Bootstrapping a Software Product
garrettdimon
PRO
307
110k
Product Roadmaps are Hard
iamctodd
PRO
55
12k
Cheating the UX When There Is Nothing More to Optimize - PixelPioneers
stephaniewalter
285
14k
Save Time (by Creating Custom Rails Generators)
garrettdimon
PRO
32
1.8k
Site-Speed That Sticks
csswizardry
13
970
Building Adaptive Systems
keathley
44
2.8k
The Cult of Friendly URLs
andyhume
79
6.7k
Exploring the Power of Turbo Streams & Action Cable | RailsConf2023
kevinliebholz
36
6.1k
Git: the NoSQL Database
bkeepers
PRO
432
66k
The Art of Programming - Codeland 2020
erikaheidi
56
14k
Transcript
Intrusions and the Modern Web Benjamin Scott
[email protected]
The Modern Web Threat model high - organized e-crime /
espionage groups Risk profile high - web developers want features / uptime Defense budget low - until breach hits the news
Goal of Intrusions Liquid assets credit cards / incoming traffic
/ hosting Enterprise access non-segmented network / shared admin Great visibility build profile of visitors who trust the site
Intrusion Lifecycle Break In find and exploit websec / appsec
issue Dig In install persistent backdoor Spread Out rinse and repeat
Break In Choose target highly trafficked / VIPs of interest
Try bruteforce default admin / SQLi / file inclusion Use exploit vulnerable service / CMS
(really) Break In Steal creds phish admins / keylog home
machines Buy access hire mercenaries / logins from underground SIGINT Use active MITM to inject binaries
Dig In Install webshell e-crime - PHP shells CN: Shell
Crew - ASP shells RU: Crouching Yeti - JavaScript patchwork RU: APT28 - custom kit with analytics Keep access local privilege escalation / new accounts
Spread Out Identify victims profile visitors / validate VIPs Deliver
exploits serve up tailored exploit Relay traffic implant commands sent via covert channel
Mitigations Monitoring new referers / odd scripts / insecure configs
Agile response share tools between operations / security / IT Clean deploys test appsec for CI / hardened images / CSP Hygiene checks scan / honeyclient / red team your site
Thanks for listening Benjamin Scott
[email protected]
github.com/benjaminxscott about.me/benjaminxscott