Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Use of operational deceptions to divert cyber a...

Use of operational deceptions to divert cyber attacks

This talk was presented during the IBC euroforum conference "Oprustning af kritisk IT infrastruktur".

Johnny Vestergaard

June 09, 2015
Tweet

More Decks by Johnny Vestergaard

Other Decks in Research

Transcript

  1. Omfavn din modstanders angreb omsæt hans aktioner til forretningsværdi Johnny

    Vestergaard Oprustning af kritisk IT infrastruktur 2015
  2. To learn the tools, tactics and motives involved in computer

    and network attacks, and share the lessons learned.
  3. Traditionel lagdelt sikkerhed • Blue team • Reaktivt og statisk

    • Baseret på tidligere hændelser • Compliance • Hullet som en si • Skal virke 100%, 24/7/365
  4. Traditionel lagdelt sikkerhed • Red team • Målorienteret • Vælger

    tid og sted • Kender standard procedure • Least effort
  5. $ python kamstrup.py 10.4.1.254 Energy in 7183.3 kWh Energy in

    hi-res 7183.3212 kWh Voltage p1 228.0 V Voltage p2 229.0 V Current p1 5.11 A Current p2 4.22 A Power p1 1.0 kW Power p2 5.499 kW
  6. $ telnet 10.4.1.254 50100 Connected to 10.4.1.254. Escape character is

    '^]'. Welcome... Connected to [00:13:EA:00:00:00] ============================ Service Menu ============================ H: Help [cmd]. !AC: Access control. !GC: Get Config. !GV: Software version. !SA: Set KAP Server IP and port (*1). !RC: Request connect !SC: Set Config (*1). < - CUT -> ============================ Kamstrup (R)
  7. Hvem bruger Conpot? • Nuklear sikkerheds organisation • En større

    IDS producent • ICS producenter • Akademiske miljø