Jay Ferron The Hackers CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, - - PDF document

jay ferron
SMART_READER_LITE
LIVE PREVIEW

Jay Ferron The Hackers CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, - - PDF document

3/4/2020 Jay Ferron The Hackers CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, MCT, NSA-IAM Tool Kit jferron@interactivesecuritytraining.com blog.mir.net 1 Nation States China North Korea Who are the hackers Russia Iraq 2


slide-1
SLIDE 1

3/4/2020 1

The Hackers Tool Kit

Jay Ferron

CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, MCT, NSA-IAM…

jferron@interactivesecuritytraining.com

blog.mir.net

Who are the hackers

  • Nation States
  • China
  • North Korea
  • Russia
  • Iraq

1 2

slide-2
SLIDE 2

3/4/2020 2

What do hacker want

Your Data Your Money You Information

Who are the other hackers

  • Cyber warriors (Nation States)
  • Professional mercenary's (paid to hack)
  • Insiders
  • Principled Idealist (hacktivist)
  • Ex- employees
  • Other business who want your information

3 4

slide-3
SLIDE 3

3/4/2020 3

Ransomware

  • General Stats

Ransomware

  • Healthcare

5 6

slide-4
SLIDE 4

3/4/2020 4

Hundreds of millions Hundreds of millions Hundreds of millions Hundreds of millions

  • f cable modems are
  • f cable modems are
  • f cable modems are
  • f cable modems are

vulnerable to new vulnerable to new vulnerable to new vulnerable to new Cable Haunt Cable Haunt Cable Haunt Cable Haunt vulnerability vulnerability vulnerability vulnerability

  • A team of four Danish security researchers has disclosed this

week a security flaw that impacts cable modems that use Broadcom chips.

  • The vulnerability, codenamed Cable Haunt, is believed to

impact an estimated 200 million cable modems in Europe alone, the research team said today.

  • Using Cable Haunt, an attacker could:
  • Change default DNS server
  • Conduct remote man-in-the-middle attacks
  • Hot-swap code or even the entire firmware
  • Upload, flash, and upgrade firmware silently
  • Disable ISP firmware upgrade
  • Change every config file and settings
  • Get and Set SNMP OID values
  • Change all associated MAC Addresses
  • Change serial numbers
  • Be exploited in botnet

AND yes this effect your home router

Some of the methods of the hackers

  • Social Engineering
  • Ransomware
  • Physical Hacking
  • Network Hacking (outside building)
  • WIFI
  • Man in the middle
  • Denial of service
  • Sniffing traffic
  • Non patched systems (routers)
  • Cell phones
  • Internal attacks (all of the above plus)
  • Rubber Duck
  • Lan Taps
  • WIFI
  • Cameras
  • …..

7 8

slide-5
SLIDE 5

3/4/2020 5

Results

Your ID is lost or stolen

Demo Social engineering

Social engineering tool kit

9 10

slide-6
SLIDE 6

3/4/2020 6

What on your Site

Teleport Ultra

DNS, DNS, DNS

Tools.dnsstuff.com

11 12

slide-7
SLIDE 7

3/4/2020 7

Man in the Middle

Evil Foca

WIFI

Pineapple

13 14

slide-8
SLIDE 8

3/4/2020 8

Physical Security

Rubber duck

Network Scanning

Wireshark

15 16

slide-9
SLIDE 9

3/4/2020 9

WIFI Scanning

Wireshark or Flying Squirrel

Kali Linux

Lots of Tools

17 18

slide-10
SLIDE 10

3/4/2020 10

RF ID CARDS

Reader

USB NINJA

Cell Phone Charger

19 20

slide-11
SLIDE 11

3/4/2020 11

Cell Phones

Bluetooth

21