SlideShare a Scribd company logo
1 of 14
Braden Preston, Product Manager
Worst Case Scenario: Being detected
without knowing you are detected
Agenda
Confidential and Proprietary2
 What is Stealth?
 Why Stealth?
 The Hunting Ground: Pre- & Post-Compromise
 Hunt Cycle
Confidential and Proprietary3
Stealth
stelTH/
noun
1.cautious and surreptitious action or movement.
Advanced adversaries are discovering and evading traditional defense.
Key is to avoid detection from the sentient adversary.
Confidential and Proprietary4
How do you avoid detection from the adversary?
 No obvious and repeatable signatures
 Hide your presence from the adversary
 Covert operations and communications to avoid tipping your hand
 Low level access to the system
Stealth: Does It Matter?
Confidential &
5
For years attackers have looked for the defender
 Anti-debugging techniques
 Virtual machine detection
 Anti-virus detection
 Checking running processes on compromised systems
New classes of malware specifically look for endpoint vendors
 Common red team tactics to easily detect host based detection and
disable
 Many host agents are not hardened against a simple ‘net stop’ command
Stealth: What does it accomplish?
Pre-Compromise
• Make Detection Cost Prohibitive
– Increase the difficulty of automated
detection
– Force adversaries to employ their own
manual hunt process
• Find Indicators to Detect and
Prevent
– When the adversary feels undetected
they conduct operations and expose
indicators
Post-Compromise
• Get a Foothold on an Infected
Device
6
The Hunting Ground: Critical assets protected
Confidential &
7
The hunting ground reality:
 The hunting ground is compromised
 The hunting ground is a mix of mission critical assets
 You will be hunting on pre- and post-compromised systems
Confidential and Proprietary8
Deploying Pre-Compromise
Attacker can easily identify traditional security
 Automated checks for service names, hashes, etc.
 AV, VM, EDR all susceptible
 Manual check of the system
 Running processes and services
 Open network connection
Confidential and Proprietary9
Deploying Pre-Compromise
Attacker changes the attack plan
 Modify TTPs
 Disable protection
 Modify system to change the reported data (root kit)
Confidential and Proprietary10
Deploying Post Compromise
Attacker can easily see traditional security installation
 Detect admin login
 Detect executable on disk
 Detect execution
Follow-on attacker actions
 Stop the installation
 Pivot to another system (or many)
 Burn and run
The Endgame Hunt Cycle
Confidential &
11
Confidential and Proprietary12
Summary
Be Stealthy:
Avoid discovery by the adversary
Confidential and Proprietary13
Questions?
Confidential and Proprietary14
Thank You!
bpreston@endgame.com
@simpleprodmgr

More Related Content

What's hot

How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMAlienVault
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverAlienVault
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
 
Maturing your threat hunting program
Maturing your threat hunting programMaturing your threat hunting program
Maturing your threat hunting programCybereason
 
The attack lifecycle. Cybereason can help you answer: Are you under attack?
The attack lifecycle. Cybereason can help you answer: Are you under attack?The attack lifecycle. Cybereason can help you answer: Are you under attack?
The attack lifecycle. Cybereason can help you answer: Are you under attack?Cybereason
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...PaloAltoNetworks
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
How Malware Works
How Malware WorksHow Malware Works
How Malware WorksAlienVault
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMAlienVault
 
SecArmour Security Group
SecArmour Security GroupSecArmour Security Group
SecArmour Security GroupSec Armour
 
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Incident Response Checklist - 9 Steps Your Current Plan LacksThe Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Incident Response Checklist - 9 Steps Your Current Plan LacksCybereason
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunityamiable_indian
 
Intrusion detection system IDS
Intrusion detection system IDSIntrusion detection system IDS
Intrusion detection system IDSMAURICE NTAHOBARI
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmAlienVault
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides finalAlienVault
 

What's hot (20)

How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
 
Checkpoint hack
Checkpoint hackCheckpoint hack
Checkpoint hack
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Maturing your threat hunting program
Maturing your threat hunting programMaturing your threat hunting program
Maturing your threat hunting program
 
The attack lifecycle. Cybereason can help you answer: Are you under attack?
The attack lifecycle. Cybereason can help you answer: Are you under attack?The attack lifecycle. Cybereason can help you answer: Are you under attack?
The attack lifecycle. Cybereason can help you answer: Are you under attack?
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
 
SecArmour Security Group
SecArmour Security GroupSecArmour Security Group
SecArmour Security Group
 
IDS
IDSIDS
IDS
 
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Incident Response Checklist - 9 Steps Your Current Plan LacksThe Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
 
IDS n IPS
IDS n IPSIDS n IPS
IDS n IPS
 
Intrusion detection system IDS
Intrusion detection system IDSIntrusion detection system IDS
Intrusion detection system IDS
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
 

Viewers also liked

Cultural Heritage Information Dashboards
Cultural Heritage Information DashboardsCultural Heritage Information Dashboards
Cultural Heritage Information DashboardsRichard Urban
 
The Wilderness Theology of John Muir B Anthony MA Thesis
The Wilderness Theology of John Muir B Anthony MA ThesisThe Wilderness Theology of John Muir B Anthony MA Thesis
The Wilderness Theology of John Muir B Anthony MA ThesisBrian Anthony
 
How to do things with metadata: From rights statements to speech acts.
How to do things with metadata: From rights statements to speech acts.How to do things with metadata: From rights statements to speech acts.
How to do things with metadata: From rights statements to speech acts.Richard Urban
 
Blood amps poster_090210
Blood amps poster_090210Blood amps poster_090210
Blood amps poster_090210Jervin22000
 
EMERGENCY ALERT: The Anatomy of a Campus Crisis
EMERGENCY ALERT: The Anatomy of a Campus CrisisEMERGENCY ALERT: The Anatomy of a Campus Crisis
EMERGENCY ALERT: The Anatomy of a Campus CrisisWest Virginia University
 
Diagnosis and treatment of amphetamine abuse
Diagnosis and treatment of amphetamine abuseDiagnosis and treatment of amphetamine abuse
Diagnosis and treatment of amphetamine abuseAsra Hameed
 

Viewers also liked (12)

Cultural Heritage Information Dashboards
Cultural Heritage Information DashboardsCultural Heritage Information Dashboards
Cultural Heritage Information Dashboards
 
The Wilderness Theology of John Muir B Anthony MA Thesis
The Wilderness Theology of John Muir B Anthony MA ThesisThe Wilderness Theology of John Muir B Anthony MA Thesis
The Wilderness Theology of John Muir B Anthony MA Thesis
 
Cloud wrap
Cloud wrapCloud wrap
Cloud wrap
 
How to do things with metadata: From rights statements to speech acts.
How to do things with metadata: From rights statements to speech acts.How to do things with metadata: From rights statements to speech acts.
How to do things with metadata: From rights statements to speech acts.
 
Boots
BootsBoots
Boots
 
Blood amps poster_090210
Blood amps poster_090210Blood amps poster_090210
Blood amps poster_090210
 
EMERGENCY ALERT: The Anatomy of a Campus Crisis
EMERGENCY ALERT: The Anatomy of a Campus CrisisEMERGENCY ALERT: The Anatomy of a Campus Crisis
EMERGENCY ALERT: The Anatomy of a Campus Crisis
 
Raport "Przemysł spotkań i wydarzeń w Polsce 2016" / Poland Meetings and Even...
Raport "Przemysł spotkań i wydarzeń w Polsce 2016" / Poland Meetings and Even...Raport "Przemysł spotkań i wydarzeń w Polsce 2016" / Poland Meetings and Even...
Raport "Przemysł spotkań i wydarzeń w Polsce 2016" / Poland Meetings and Even...
 
Les5e ppt 01
Les5e ppt 01Les5e ppt 01
Les5e ppt 01
 
Przemysł spotkań - od gigantów po perełki
Przemysł spotkań - od gigantów po perełki Przemysł spotkań - od gigantów po perełki
Przemysł spotkań - od gigantów po perełki
 
Raport "Przemysł spotkań i wydarzeń w Polsce 2016" / Poland Meetings and Even...
Raport "Przemysł spotkań i wydarzeń w Polsce 2016" / Poland Meetings and Even...Raport "Przemysł spotkań i wydarzeń w Polsce 2016" / Poland Meetings and Even...
Raport "Przemysł spotkań i wydarzeń w Polsce 2016" / Poland Meetings and Even...
 
Diagnosis and treatment of amphetamine abuse
Diagnosis and treatment of amphetamine abuseDiagnosis and treatment of amphetamine abuse
Diagnosis and treatment of amphetamine abuse
 

Similar to Worst-Case Scenario: Being Detected without Knowing You are Detected

Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshellYahia Kandeel
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatMike Saunders
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1Ankit Gupta
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion DetectionAPNIC
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection PresentationMustafash79
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Huntsman Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingRohan Raj
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITSMike Saunders
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
Three Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramThree Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramMorphick
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewRobert Herjavec
 
Information security
Information securityInformation security
Information securityRohit Gir
 
M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS        Lecture-Mid Term.pptxM.Tech. IDS        Lecture-Mid Term.pptx
M.Tech. IDS Lecture-Mid Term.pptxpawandeoli1
 
M.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universityM.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universitypheonix4
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2Education
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 

Similar to Worst-Case Scenario: Being Detected without Knowing You are Detected (20)

Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web attacks
Web attacksWeb attacks
Web attacks
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITS
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Presentation1
Presentation1Presentation1
Presentation1
 
Network Security
Network SecurityNetwork Security
Network Security
 
Three Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramThree Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response Program
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Information security
Information securityInformation security
Information security
 
M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS        Lecture-Mid Term.pptxM.Tech. IDS        Lecture-Mid Term.pptx
M.Tech. IDS Lecture-Mid Term.pptx
 
M.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universityM.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era university
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Worst-Case Scenario: Being Detected without Knowing You are Detected

  • 1. Braden Preston, Product Manager Worst Case Scenario: Being detected without knowing you are detected
  • 2. Agenda Confidential and Proprietary2  What is Stealth?  Why Stealth?  The Hunting Ground: Pre- & Post-Compromise  Hunt Cycle
  • 3. Confidential and Proprietary3 Stealth stelTH/ noun 1.cautious and surreptitious action or movement. Advanced adversaries are discovering and evading traditional defense. Key is to avoid detection from the sentient adversary.
  • 4. Confidential and Proprietary4 How do you avoid detection from the adversary?  No obvious and repeatable signatures  Hide your presence from the adversary  Covert operations and communications to avoid tipping your hand  Low level access to the system
  • 5. Stealth: Does It Matter? Confidential & 5 For years attackers have looked for the defender  Anti-debugging techniques  Virtual machine detection  Anti-virus detection  Checking running processes on compromised systems New classes of malware specifically look for endpoint vendors  Common red team tactics to easily detect host based detection and disable  Many host agents are not hardened against a simple ‘net stop’ command
  • 6. Stealth: What does it accomplish? Pre-Compromise • Make Detection Cost Prohibitive – Increase the difficulty of automated detection – Force adversaries to employ their own manual hunt process • Find Indicators to Detect and Prevent – When the adversary feels undetected they conduct operations and expose indicators Post-Compromise • Get a Foothold on an Infected Device 6
  • 7. The Hunting Ground: Critical assets protected Confidential & 7 The hunting ground reality:  The hunting ground is compromised  The hunting ground is a mix of mission critical assets  You will be hunting on pre- and post-compromised systems
  • 8. Confidential and Proprietary8 Deploying Pre-Compromise Attacker can easily identify traditional security  Automated checks for service names, hashes, etc.  AV, VM, EDR all susceptible  Manual check of the system  Running processes and services  Open network connection
  • 9. Confidential and Proprietary9 Deploying Pre-Compromise Attacker changes the attack plan  Modify TTPs  Disable protection  Modify system to change the reported data (root kit)
  • 10. Confidential and Proprietary10 Deploying Post Compromise Attacker can easily see traditional security installation  Detect admin login  Detect executable on disk  Detect execution Follow-on attacker actions  Stop the installation  Pivot to another system (or many)  Burn and run
  • 11. The Endgame Hunt Cycle Confidential & 11
  • 12. Confidential and Proprietary12 Summary Be Stealthy: Avoid discovery by the adversary
  • 14. Confidential and Proprietary14 Thank You! bpreston@endgame.com @simpleprodmgr

Editor's Notes

  1. We’re an up and coming, VC backed, high impact cyber company. Funded by the leading investors in cyber security. Traditional defense technology has become ineffective against cyberattacks. We believe Offense is essential to eliminate adversaries from enterprise critical infrastructure. We believe it is better for our customers to be the hunter than the hunted, and so unlike any other company, Endgame Hunts. We are pioneering this strategy with methods and technologies developed for the IC/DOD to support their hunt for adversaries to our national interests in hostile cyber environments. We have adapted these technologies to automate the hunt for adversaries in government and enterprise networks. Segue Here are a few key facts that make Endgame the leader in offensive approach to protecting enterprise critical infrastructure.
  2. HUNT CYCLE Survey  – Identify and monitor key valuable assets critical to business operations The first step is to asses the organization to identify critical assets that the adversary would target within the enterprise network. Once you have identified the critical assets, deploy stealth sensors to monitor the key valuable systems.. The stealth operations enables evasion and tampering from the adversary, allowing you to remain hidden.  At the end of this step, the security operator is equipped with a hunt map of the key critical assets and their current and historical network, process behaviors to get a holistic view of the environment.   Secure – Secure the hunting ground to stop adversary movement within the enterprise network The next step is to secure the hunting ground. Once you begin monitoring the critical assets  it is important to lock them down before you begin hunting. The key is to stop any lateral movement of the adversary to prevent them from accessing any other endpoints with the network. Once the hunting ground is secured, you can employ techniques to detect the sentient adversary. Detect – Pursue the advanced adversary by discovering attacker techniques   Step 3 is to detect the adversary in the enterprise network In the detect step you are detecting . It is crucial to not just rely on known indicators of compromise but also detect never-before-seen malware. This can be achieved by focusing on advanced attacker techniques employed in the environment to gain access to critical infrastructure. Fast and automated detection of these techniques significantly reduces the dwell time of the adversary within the network from days to just hours.    Respond – Develop an intelligent  response strategy to eradicate the adversary. Once the adversary techniques are detected, the security operator needs to craft an appropriate and precise response strategy to eradicate their presence in the network. The response actions can vary from observing the adversary and learning their tactics to suspending them to prevent further damage and loss. This intelligent response needs to enabled in a scalable fashion to address all critical assets infected and minimize business disruption.
  3. .
  4. .
  5. .
  6. HUNT CYCLE Survey  – Identify and monitor key valuable assets critical to business operations The first step is to asses the organization to identify critical assets that the adversary would target within the enterprise network. Once you have identified the critical assets, deploy stealth sensors to monitor the key valuable systems.. The stealth operations enables evasion and tampering from the adversary, allowing you to remain hidden.  At the end of this step, the security operator is equipped with a hunt map of the key critical assets and their current and historical network, process behaviors to get a holistic view of the environment.   Secure – Secure the hunting ground to stop adversary movement within the enterprise network The next step is to secure the hunting ground. Once you begin monitoring the critical assets  it is important to lock them down before you begin hunting. The key is to stop any lateral movement of the adversary to prevent them from accessing any other endpoints with the network. Once the hunting ground is secured, you can employ techniques to detect the sentient adversary. Detect – Pursue the advanced adversary by discovering attacker techniques   Step 3 is to detect the adversary in the enterprise network In the detect step you are detecting . It is crucial to not just rely on known indicators of compromise but also detect never-before-seen malware. This can be achieved by focusing on advanced attacker techniques employed in the environment to gain access to critical infrastructure. Fast and automated detection of these techniques significantly reduces the dwell time of the adversary within the network from days to just hours.    Respond – Develop an intelligent  response strategy to eradicate the adversary. Once the adversary techniques are detected, the security operator needs to craft an appropriate and precise response strategy to eradicate their presence in the network. The response actions can vary from observing the adversary and learning their tactics to suspending them to prevent further damage and loss. This intelligent response needs to enabled in a scalable fashion to address all critical assets infected and minimize business disruption.
  7. .