CYBER BREACH
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
1
CYBER BREACH Preventing Bodily Injury and Property Damage - - PowerPoint PPT Presentation
CYBER BREACH Preventing Bodily Injury and Property Damage info@tacnetsol.com Tactical Network Solutions LLC Proprietary Information 1 THE WORLD WE KNOW TODAY info@tacnetsol.com Tactical Network Solutions LLC Proprietary Information 2
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
1
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
2
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
3
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
4
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
5
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
6
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
7
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
8
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
9
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
10
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
11
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
12
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
13
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
14
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
15
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
16
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
17
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
18
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
19
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
20
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
21
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
22
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
23
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
24
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
25
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
26
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
27
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
28
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
29
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
Step 1 Unpack the Firmware Image Open source tool called binwalk can unpack most firmware images. Step 2 Analyze Executable Binaries and System Files Look for low-hanging fruit like insecure coding practices and hidden private crypto keys. Step 3 Fix, Compile, Repeat Replace insecure coding practices with secure methods. Remove all private crypto keys. Recompile code. Re-examine.
30
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
31
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
32
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
33
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
34
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
35
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
36
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
37
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
38
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
39
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
Step 1 Perform a Traditional Security Assessment Open source tools such as Nmap, Nessus, and Metasploit can help. Step 2 Perform Blackbox Testing with Fuzzing Open source tools: w3af, Wfuzz, Wapiti. Commercial tools: Defensics. Step 3 Perform a Firmware Evaluation Open source tool: binwalk, gdb, OllyDbg. Commercial tools: Centrifuge Security Platform.
40
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
41
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
42
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
Terry Dunlap, Founder & CEO National Security Agency - 7 years experience Computer Network Exploitation wireless tool development Acting Branch Chief Peter Eacmen, Co-Founder & CTO National Security Agency - 10+ years experience Computer Network Exploitation tool development Close access operation support Embedded directly with USSOCOM unit at NSA
43
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
10 Employees Former NSA Computer Network Exploitation specialists in firmware reverse engineering
44
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
45
Tactical Network Solutions LLC Proprietary Information info@tacnetsol.com
Terry Dunlap Partner tdunlap@tacnetsol.com 240-672-2945 (C) Peter Eacmen Partner peacmen@tacnetsol.com 617-548-5384 (C) Tactical Network Solutions LLC 8825 Stanford Blvd., Suite 308 Columbia, MD 21045 (443) 276-2990
46