Curiosity is not a crime
Duarte Monteiro - AET
-=[101 to infosec world]=-
~$Chantam_house_rule
TLP:Amber
My personal two rules:

> Everything is Broken

> POC||GTFO
"><svg/onload=The Infosec World

Defensive

Offensive

"><svg/onload=The Infosec World
"><svg/onload=The Infosec World
"><svg/onload=The Infosec World
"><svg/onload=The Infosec World
"><svg/onload=The Infosec World

This talk...

Understanding the players

We seek after knowledge... and you call us criminals.  We exist without skin color, without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.

Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me
for.

        I am a hacker, and this is my manifesto.  You may stop this individual,
but you can't stop us all... after all, we're all alike.

+++The Mentor+++

http://phrack.org/issues/7/3.html

~$ ./HACKER_101

  • Curious by default,
  • Self-taught,
  • feed on cafeine and moral ambiguity  (?)
  • Love for the virtual world.

Kevin Mitnick Wanted Poster

Blackhat

Greyhat

Whitehat

Mindset:

GID=0x31337

Threat Actors

Script Kiddies

Hackivist

Gary McKinnon - Hacked NASA and the US military

Threat Groups

Organised Crime

Nation States

GID=0x31337
GID=0xcafecafe 

Grey/White hat world

Conferences

Certifications

Job Offers :)

...

...

...

() { :; }; /Pentesting
DISCLOSURE' OR 1=1/*

https://googleprojectzero.blogspot.pt/

https://hackerone.com/pornhub

  Lei n.º 109/2009, de 15 de Setembro

Artigo 4.º (Dano relativo a programas ou outros dados informáticos)

Artigo 5.º (Sabotagem informática)

Artigo 6.º (Acesso ilegítimo)

Artigo 7.º (Intercepção ilegítima)

Artigo 8.º (Reprodução ilegítima de programa protegido)

Artigo 9.º (Responsabilidade penal das pessoas colectivas e entidades equiparadas)

DISCLOSURE' OR 1=1/*
MEDIA

Accurate

4phun

Just bad.

MEDIA
We are all sitting ducks.

Known/Unknown Old vulnerabilities in applications

Unknown in new vulnerabilities in applications

Some of them don't reach the world (...)

Vault 7

https://wikileaks.org/ciav7p1/cms/index.html

Meltdown / Spectre

Outch: http://www.securityweek.com/intel-halts-spectre-meltdown-cpu-patches-over-unstable-code

Meltdown / Spectre

Exploits Database

0DAYS

pwn2own

Security Threats
/../../../../../../threats
Social Engineering
Malware
Software-based
Network-based
Wireless
Physical

Humans are always the weakest link.

Spear phshing

  • Victims profile (What he wants? Needs?)
  • Targeted information (Spoofing real pages)
  • Attack vector (E-email, SMS, Social Networks)
  • Patience is a virtue ....
  • Collect and proceed.
/../../../../../../threats
Social Engineering
Malware
Software-based
Network-based
Wireless
Physical

Goldies

Ransomware

AV Evasion Artware by Кириакос Экономоу

/../../../../../../threats
Social Engineering
Malware
Software-based
Network-based
Wireless
Physical

Goldies

/../../../../../../threats
Social Engineering
Malware
Software-based
Network-based
Wireless
Physical
/../../../../../../threats
Social Engineering
Malware
Software-based
Network-based
Wireless
Physical
/../../../../../../threats
Social Engineering
Malware
Software-based
Network-based
Wireless
Physical

KRAKS - https://papers.mathyvanhoef.com/ccs2017.pdf

/../../../../../../threats
Social Engineering
Malware
Software-based
Network-based
Wireless
Physical

Recommended:

https://www.youtube.com/watch?v=4skSBwBBI-s

/../../../../../../threats
Social Engineering
Malware
Software-based
Network-based
Wireless
Physical
Tricks & Tips
<<defensive>>
Tricks &' | echo 'tips'
1. Dont' click sh1t. Rule of thumb: if you are not expecting it, it is suspicious.

 

 

Risky file types:

  • Any executable files: EXE, COM, CMD, BAT, PS1, SWF, JAR etc.
  • MS Office documents, especially with macros: DOC/DOCX/DOCM, XLS/XSLX/XLSM etc.
  • PDF documents: PDF.
  • Vector graphics with embedded code: SVG.
  • Archives of these files, especially password-protected.

=> Also, don't plug and play, unexpected USB or CD/DVD.

Tricks &' | echo 'tips'
Tricks &' | echo 'tips'
2. Set-up the basis.

Default FW ?

Freeware ?

Common Sense

File Write

Network Access

Also... FDE

3. Harden your browser.
Tricks &' | echo 'tips'
4. Authentication procedures hardened
Tricks &' | echo 'tips'

Always 2FA

Strong Passwords

Memory Problem?

4. Authentication procedures hardened
Tricks &' | echo 'tips'
5. 'use tor use signal'
Tricks &' | echo 'tips'

VPN

Sharing private info ?

1. Always HTTPS

2. Use CryptoBin

6. on the go
Tricks &' | echo 'tips'

1. FDE

2. PIN (fingerprints are not hashable)

3. Guest mode

4. Minimize the attack surface

5. Minimize data exposure (GPS Sharing apps, Social Networks,....)

7. Update sh1t.
Tricks &' | echo 'tips'
My personal two rules:

> Everything is Broken

> POC||GTFO

Hope you enjoyed,

stay safe & stay legal.

Don't let this happen to you or your site!

google > hacked site:.pt

Bonus!

Made with Slides.com