×
Copy
Open
Link
Embed
Share
Beginning
This slide
Copy link URL
Copy link URL
Copy iframe embed code
Copy iframe embed code
Copy javascript embed code
Copy javascript embed code
Share
Tweet
Share
Tweet
Slide 1
Slide 1 text
A Game of Pwns An Exercise of Exploits & Dice
Slide 2
Slide 2 text
Me ✦ Incident Responder @ GitHub ✦ 10 years Incident Response & Threat Intel Experience ✦ Avid Gamer & GoT Fan….
Slide 3
Slide 3 text
Schedule ✦ Introduction ✦ Character & Team Setup ✦ Scenarios ✦ After Action ✦ Closing
Slide 4
Slide 4 text
Introduction
Slide 5
Slide 5 text
schedule ✦ Introduction ✦ IR Process ✦ Scenarios ✦ After Action ✦ Closing
Slide 6
Slide 6 text
Incident LIfeCycle
Slide 7
Slide 7 text
Preparation Detection & Analysis Containment, Eradication, & Recovery Post Incident Activity IR Cycle
Slide 8
Slide 8 text
• Reconissance • Weaponization • Delivery • Exploitation • LocaL & Network Persistence • Command & Control • Actions Over Target Kill Chain
Slide 9
Slide 9 text
Scenarios
Slide 10
Slide 10 text
Single Host Compromise Scenarios
Slide 11
Slide 11 text
Scenarios • Reconissance • Weaponization • Delivery • Exploitation • LocaL & Network Persistence • Command & Control • Actions Over Target
Slide 12
Slide 12 text
Volumetric DDoS Scenarios
Slide 13
Slide 13 text
Scenarios • Reconissance • Weaponization • Delivery • Exploitation • LocaL & Network Persistence • Command & Control • Actions Over Target
Slide 14
Slide 14 text
Social Network Compromise Scenarios
Slide 15
Slide 15 text
Scenarios • Reconissance • Weaponization • Delivery • Exploitation • LocaL & Network Persistence • Command & Control • Actions Over Target
Slide 16
Slide 16 text
“APT Style” attack Scenarios
Slide 17
Slide 17 text
Scenarios • Reconissance • Weaponization • Delivery • Exploitation • LocaL & Network Persistence • Command & Control • Actions Over Target
Slide 18
Slide 18 text
After Action Report
Slide 19
Slide 19 text
Thanks for playing!
Slide 20
Slide 20 text
@sroberts &
[email protected]