Slide 1

Slide 1 text

A Game of Pwns An Exercise of Exploits & Dice

Slide 2

Slide 2 text

Me ✦ Incident Responder @ GitHub ✦ 10 years Incident Response & Threat Intel Experience ✦ Avid Gamer & GoT Fan….

Slide 3

Slide 3 text

Schedule ✦ Introduction ✦ Character & Team Setup ✦ Scenarios ✦ After Action ✦ Closing

Slide 4

Slide 4 text

Introduction

Slide 5

Slide 5 text

schedule ✦ Introduction ✦ IR Process ✦ Scenarios ✦ After Action ✦ Closing

Slide 6

Slide 6 text

Incident LIfeCycle

Slide 7

Slide 7 text

Preparation Detection & Analysis Containment, Eradication, & Recovery Post Incident Activity IR Cycle

Slide 8

Slide 8 text

• Reconissance • Weaponization • Delivery • Exploitation • LocaL & Network Persistence • Command & Control • Actions Over Target Kill Chain

Slide 9

Slide 9 text

Scenarios

Slide 10

Slide 10 text

Single Host Compromise Scenarios

Slide 11

Slide 11 text

Scenarios • Reconissance • Weaponization • Delivery • Exploitation • LocaL & Network Persistence • Command & Control • Actions Over Target

Slide 12

Slide 12 text

Volumetric DDoS Scenarios

Slide 13

Slide 13 text

Scenarios • Reconissance • Weaponization • Delivery • Exploitation • LocaL & Network Persistence • Command & Control • Actions Over Target

Slide 14

Slide 14 text

Social Network Compromise Scenarios

Slide 15

Slide 15 text

Scenarios • Reconissance • Weaponization • Delivery • Exploitation • LocaL & Network Persistence • Command & Control • Actions Over Target

Slide 16

Slide 16 text

“APT Style” attack Scenarios

Slide 17

Slide 17 text

Scenarios • Reconissance • Weaponization • Delivery • Exploitation • LocaL & Network Persistence • Command & Control • Actions Over Target

Slide 18

Slide 18 text

After Action Report

Slide 19

Slide 19 text

Thanks for playing!

Slide 20

Slide 20 text

@sroberts & [email protected]