Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Creative Ways To Get In Trouble: Distraction & Vengeance Techniques

Creative Ways To Get In Trouble: Distraction & Vengeance Techniques

Most attacks look to be "sneaky" and avoid setting off any alarms—but what if you don't care about getting caught?

This presentation given at 612Sides conference in Saint Paul, MN on 13 May 2014.

More Decks by Darren P Meyer (Veracode)

Other Decks in Technology

Transcript

  1. creative ways
    to get in trouble
    Distraction & Vengeance
    techniques
    @DarrenPMeyer
    Senior Security Researcher, Veracode

    View Slide

  2. disclaimer
    I work for Veracode, but I’m not speaking on their behalf
    here.
    This presentation is mine. There are many like it, but this
    one is mine. However, it is CreativeCommons licensed.

    View Slide

  3. warning
    this presentation describes “red team”
    activities; performing these on a system or
    network you don’t own without written
    permission of the owner could get you sued or
    arrested
    don’t be an idiot

    View Slide

  4. what does a “normal” attack look like?
    endpoint
    endpoint
    endpoint
    log
    collector
    IDS
    human

    View Slide

  5. what does a “normal” attack look like?
    endpoint
    endpoint
    endpoint
    log
    collector
    IDS
    human
    Research:
    what does the IDS see?
    what does the human see?
    what doesn’t trigger response?
    Attack & Escalate:
    sneak in
    drop payload/grab flag
    exfiltrate data
    Maintain:
    watch for signs of response

    View Slide

  6. what if I don’t care about getting caught?
    ● distraction
    ○ generate
    overwhelming noise
    ○ false flags
    ○ repeat until success
    ● vengeance
    ○ consume resources
    disproportionately
    ○ destroy or degrade
    ○ embarrass

    View Slide

  7. why does that even work?
    endpoint
    endpoint
    endpoint
    log
    collector
    IDS
    human
    endpoint
    mgmt
    SIEM SOC
    managers
    “magic”
    critical
    endpoints
    “we have a WAF”
    (S|I|P)aaS
    DLP

    View Slide

  8. recap
    ● scaling security is hard
    ● it costs way less to attack than defend
    ● not all attacks are reasonably defensible
    ● attacker motivation is important

    View Slide

  9. View Slide

  10. credits
    ● end screen by flickr user JF10 (CC-by)

    View Slide