Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Defending the @home Like the Enterprise

Nico Smith
August 06, 2019
150

Defending the @home Like the Enterprise

This is a implementation of my MDM solution for the family

Nico Smith

August 06, 2019
Tweet

Transcript

  1. AGENDA • Introduction • How I got here (the why)

    • Mobile device management in the enterprise (the how) • What skills are necessary and how I stumbled into learning them • The family…your greatest treasure and persistent threat • Tools Required • I got a Domain, WordPress, I haz a google now what? • Calming the fears • Demo
  2. BRIEF INTRO DAD * lover of technology and evangelist of

    raspberry pi - CPT. In U.S. Army National Guard - Tech hobbyist for about 12 years - Part-time Pen tester and tinkerer. - Volunteered at both B Sides Las Vegas and B Sides DC - Taught intro to computing as an afterschool high school program within Chicago. - Worked as both a Defensive and Offensive analyst in the private sector and the military. 3 years leading Red Team engagements to support Blue Space Defenders.
  3. THE SKINNY • On Saturday 18 November at 9 am

    I picked up the kids for a birthday visit, during which Kiddos informed me that she wasn't able to access the games that she originally could access. Skype was not working and because of this I originally asked for the phone so that I could remedy the issue and if necessary take to the t- mobile store to get help with restoring the functionality. • At approx. 10:00 am I was told by my kiddos after seeing applications on the phone that I did not install that she installed them by accident. • Upon further inspection, there were some changes to the phone that I did not authorize or place on the phone. • when I returned home on Monday I looked at the email associated with the phone and the phone provided that the phone traveled, when I asked about the move she responded with the answer the phone has not traveled. • and upon refreshing the google site all of the map data was erased and the phone had been restored from a backup.
  4. THE SKINNY • Here are the locations the phone was

    taken: • 17:26:54 - 17:55:02 28 Minutes 8 Seconds xxx XXXXXXXXVVVVV St, xxx xxx, IL 60305, USA • • 17:24:51 Attacker XXXXX XSSS Ave, XXXXX, IL 60130, USA • 15:26:37 - 17:19:01 1 Hour 52 Minutes 24 Seconds XXX XXXXXXXXVVVVV St, XXXXXXXXVVVVV, IL 60305, USA • 15:24:33 Attacker Desplaines Ave, Somewhere, IL 60130, USA • 14:10:54 - 15:06:56 56 Minutes 2 Seconds 7768-7798 XXXXXXXXVVVVV St, Somewhere, IL 60130, USA • November 20, 2017 • 19:28:42 Attacker St, XXXXXXXXVVVVV, IL 60305, USA • • 19:26:38 Attacker Desplaines Ave, Somewhere, IL 60130, USA • • 18:23:03 - 19:19:05 56 Minutes 2 Seconds 7766 XXXXXXXXVVVVV St, XXXXXXXXVVVVV, IL 60305, USA • • November 21 , 2017 • • 19:28:42 7766 XXXXXXXXVVVVV St, XXXXXXXXVVVVV, IL 60305, USA
  5. HOW I GOT HERE ..TECHNICALLY ? • Pumping Station One

    – Chicago Hackerspace • Chicago Linux User Group [ChiLUG] • Side Jobs (freelancing) for peanuts • Meeting and working with other curious minds • Infecting my own system through use of LimeWire , Kazaa and poorness
  6. MOBILE DEVICE MANAGEMENT(MDM-BYOD) Why and what is MDM in the

    Enterprise How Can MDM Assist you with the family Mobile device management (MDM) is a type of security software used by an IT department to monitor, manage, and secure employees' mobile devices (laptops, smartphones, tablets, etc.) that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization. - https://www.continuum.net 2018
  7. MOBILE DEVICE MANAGEMENT(MDM-BYOD) Mobile Breaches - Tizi mobile breach via

    Google Play Store - Toast Amigos Spyware - Grabos legitimate app spam How Can MDM Assist you with the family Protect the Family Protect the Purchase Protect the Perimeter