the personal views of the speaker and do not necessarily reflect the views, policies or procedures of present or past employers. ! All information, tactics, techniques and procedures used or mentioned during this presentation are based solely on open and public accessible sources.
501c3 non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools to improve Internet security.
took attackers less than 24 hours to compromise. • In 75% of all data breaches it took longer than 24 hours for the blue team to detect the attack. Source: Verizon 2014 Data Breach Investigations Report (DBIR)
low-interaction ones. 3.4 Our taxonomy For the purposes of this document, we expand the basic taxonomy described in section 3.2. Definitions of criteria (classes) and their particular values are still valid, but we will add an extra class and values in order to improve the research and presentation of its results. Figure 2: Graphical representation of the classification scheme of taxonomy used in the report Source: Proactive Detection of Security Incidents (ENISA 2012)
RFI, etc. • Give the adversary what he wants. • Targets tools, not humans. • Dork bootstraping of virgin instances. • Lead developer: Lukas Rist. • https://github.com/glastopf/glastopf
with bait traffic. • GSoC 2013, Aniket Panse. • https://github.com/honeynet/beeswarm • Version 1.0 July 2014… Hopefully… • Lead developer: Johnny Vestergaard.