Slide 1

Slide 1 text

DEFENDING @HOME LIKE THE ENTERPRISE @NICOLAISMITH1 SOCKIEWOXIE@GMAIL.COM @773PROCESS312@GITHUB

Slide 2

Slide 2 text

AGENDA • Introduction • How I got here (the why) • Mobile device management in the enterprise (the how) • What skills are necessary and how I stumbled into learning them • The family…your greatest treasure and persistent threat • Tools Required • I got a Domain, WordPress, I haz a google now what? • Calming the fears • Demo

Slide 3

Slide 3 text

BRIEF INTRO DAD * lover of technology and evangelist of raspberry pi - CPT. In U.S. Army National Guard - Tech hobbyist for about 12 years - Part-time Pen tester and tinkerer. - Volunteered at both B Sides Las Vegas and B Sides DC - Taught intro to computing as an afterschool high school program within Chicago. - Worked as both a Defensive and Offensive analyst in the private sector and the military. 3 years leading Red Team engagements to support Blue Space Defenders.

Slide 4

Slide 4 text

HOW I GOT HERE

Slide 5

Slide 5 text

THE SKINNY • On Saturday 18 November at 9 am I picked up the kids for a birthday visit, during which Kiddos informed me that she wasn't able to access the games that she originally could access. Skype was not working and because of this I originally asked for the phone so that I could remedy the issue and if necessary take to the t- mobile store to get help with restoring the functionality. • At approx. 10:00 am I was told by my kiddos after seeing applications on the phone that I did not install that she installed them by accident. • Upon further inspection, there were some changes to the phone that I did not authorize or place on the phone. • when I returned home on Monday I looked at the email associated with the phone and the phone provided that the phone traveled, when I asked about the move she responded with the answer the phone has not traveled. • and upon refreshing the google site all of the map data was erased and the phone had been restored from a backup.

Slide 6

Slide 6 text

THE SKINNY • Here are the locations the phone was taken: • 17:26:54 - 17:55:02 28 Minutes 8 Seconds xxx XXXXXXXXVVVVV St, xxx xxx, IL 60305, USA • • 17:24:51 Attacker XXXXX XSSS Ave, XXXXX, IL 60130, USA • 15:26:37 - 17:19:01 1 Hour 52 Minutes 24 Seconds XXX XXXXXXXXVVVVV St, XXXXXXXXVVVVV, IL 60305, USA • 15:24:33 Attacker Desplaines Ave, Somewhere, IL 60130, USA • 14:10:54 - 15:06:56 56 Minutes 2 Seconds 7768-7798 XXXXXXXXVVVVV St, Somewhere, IL 60130, USA • November 20, 2017 • 19:28:42 Attacker St, XXXXXXXXVVVVV, IL 60305, USA • • 19:26:38 Attacker Desplaines Ave, Somewhere, IL 60130, USA • • 18:23:03 - 19:19:05 56 Minutes 2 Seconds 7766 XXXXXXXXVVVVV St, XXXXXXXXVVVVV, IL 60305, USA • • November 21 , 2017 • • 19:28:42 7766 XXXXXXXXVVVVV St, XXXXXXXXVVVVV, IL 60305, USA

Slide 7

Slide 7 text

HOW I GOT HERE ..TECHNICALLY ? • Pumping Station One – Chicago Hackerspace • Chicago Linux User Group [ChiLUG] • Side Jobs (freelancing) for peanuts • Meeting and working with other curious minds • Infecting my own system through use of LimeWire , Kazaa and poorness

Slide 8

Slide 8 text

MOBILE DEVICE MANAGEMENT(MDM-BYOD) Why and what is MDM in the Enterprise How Can MDM Assist you with the family Mobile device management (MDM) is a type of security software used by an IT department to monitor, manage, and secure employees' mobile devices (laptops, smartphones, tablets, etc.) that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization. - https://www.continuum.net 2018

Slide 9

Slide 9 text

MOBILE DEVICE MANAGEMENT(MDM-BYOD) Mobile Breaches - Tizi mobile breach via Google Play Store - Toast Amigos Spyware - Grabos legitimate app spam How Can MDM Assist you with the family Protect the Family Protect the Purchase Protect the Perimeter

Slide 10

Slide 10 text

WHAT SKILLS ARE NECESSARY AND HOW I STUMBLED INTO LEARNING THEM

Slide 11

Slide 11 text

THE FAMILY…YOUR GREATEST TREASURE AND PERSISTENT THREAT

Slide 12

Slide 12 text

TOOLS REQUIRED : Google Web Hosting Service + Domain Patience

Slide 13

Slide 13 text

CALMING THE FEARS

Slide 14

Slide 14 text

DEMO TIME