SlideShare ist ein Scribd-Unternehmen logo
1 von 27
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




                     Client-Side Security
                                    K. K. Mookhey
                            kkmookhey@niiconsulting.com




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




• Introduction

• Real-world case study
   •   The drop
   •   Malware analysis
   •   Delivery mechanisms


• Lessons learnt




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




 File name
 Loop Mobile Bill Statement Date 08.11.2011.pdf
 Services.doc     The injection attempt
 The Most wanted terrorist by Delhi police.doc




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




                                      Strings




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




                What heritage are they
                     protecting?
                                     Let’s find out




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                      The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                          http://www.owasp.org
http://www.owasp.in
./win7
./win7/exploit.html
./win7/Exploit.jar
./win7/Exploit.class
./moneytime
./moneytime/abc
./moneytime/abc/dsfd.pdf
./moneytime/report.php
./moneytime/aaaa
./moneytime/aaaa/decr.exe
./moneytime/Aminer
./moneytime/Aminer/Utility_installation_step_by_step.doc
./moneytime/Aminer/aMiner2.0.iso
./moneytime/Aminer/aMiner_Installation_Step_by_Step.doc
./moneytime/Aminer/utilities.iso
./moneytime/email list.txt
./moneytime/WinXpcr.py
./moneytime/main.png
./moneytime/demor
./moneytime/demor/application.doc
./moneytime/Appin
./moneytime/Appin/appin.doc
./moneytime/Appin/appin1.pdf
./moneytime/key
./moneytime/key/conhost.exe
./moneytime/key/smse.exe
                     OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




     WHAT IS AMINER.EXE?




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in

 ./chirag/drop/KAMAL0024BEBE0A80/KeyLog.txt
 ./chirag/drop/KAMAL0024BEBE0A80/ip.txt
 ./chirag/drop/INDIA00012E2598D3
 ./chirag/drop/INDIA00012E2598D3/KeyLog.txt
 ./chirag/drop/INDIA00012E2598D3/ip.txt
 ./chirag/drop/BLUE-INTRA-VM000C29D666CE
 ./chirag/drop/BLUE-INTRA-VM000C29D666CE/123.php                       Who is
 ./chirag/drop/GAMCA300248CC9EE30
 ./chirag/drop/GAMCA300248CC9EE30/KeyLog.txt                           Chirag?
 ./chirag/drop/GAMCA300248CC9EE30/ip.txt
 ./chirag/drop/ADMIN-PC005056C00008
 ./chirag/drop/ADMIN-PC005056C00008/KeyLog.txt
 ./chirag/drop/ADMIN-PC005056C00008/ip.txt
 ./chirag/drop/SABI-D00241D9A5C01
 ./chirag/drop/SABI-D00241D9A5C01/KeyLog.txt
 ./chirag/drop/SABI-D00241D9A5C01/ip.txt
 ./chirag/drop/DESIGN20CF309A9453
 ./chirag/drop/DESIGN20CF309A9453/KeyLog.txt
 ./chirag/drop/DESIGN20CF309A9453/ip.txt
 ./chirag/drop/KAMALC0F8DA7AF26C
 ./chirag/drop/KAMALC0F8DA7AF26C/KeyLog.txt
 ./chirag/drop/KAMALC0F8DA7AF26C/ip.txt
               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




         Typical Delivery Mechanisms




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




                                 Scenario 2
                  Un-authorized usage of USB Drives
                     We inserted USB drives on 8 systems
                          2 systems had USB blocked
              Only 1 person objected to us inserting the USB drive




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




                                    Phishing




               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
OWASP InfoSec India Conference 2012
August 24th – 25th, 2012                                 The OWASP Foundation
Hotel Crowne Plaza, Gurgaon                                     http://www.owasp.org
http://www.owasp.in




• APTs are real and here to stay
• It does not take a genius to evade AV
• We need newer solutions – and quick!
• Your end-point defences should be as strong or even
  stronger than the perimeter defences
• In the meanwhile…
    •   Patch all your end-point software
    •   Watch your AV status like a hawk
    •   Constantly propagate security news to your end-users
And
• Be careful, which security vendors you hire!


               OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)

Weitere ähnliche Inhalte

Andere mochten auch

Co-Working Presentation April 2016
Co-Working Presentation April 2016Co-Working Presentation April 2016
Co-Working Presentation April 2016Gary Marshall
 
Φθινόπωρο στα Τρίκαλα
Φθινόπωρο στα ΤρίκαλαΦθινόπωρο στα Τρίκαλα
Φθινόπωρο στα ΤρίκαλαPopi Magaliou
 
Ita b2 ms 02 12-15
Ita b2 ms 02 12-15Ita b2 ms 02 12-15
Ita b2 ms 02 12-15SpaanIt
 
La casa de los simpsons
La casa de los simpsonsLa casa de los simpsons
La casa de los simpsonsliandola
 
Herdeiros da Crus
Herdeiros da CrusHerdeiros da Crus
Herdeiros da CrusMarlou
 
30 días de bilingüismo: Episodio 1
30 días de bilingüismo: Episodio 130 días de bilingüismo: Episodio 1
30 días de bilingüismo: Episodio 1SpaanIt
 

Andere mochten auch (12)

Eca 14 (1)
Eca 14 (1)Eca 14 (1)
Eca 14 (1)
 
Co-Working Presentation April 2016
Co-Working Presentation April 2016Co-Working Presentation April 2016
Co-Working Presentation April 2016
 
Φθινόπωρο στα Τρίκαλα
Φθινόπωρο στα ΤρίκαλαΦθινόπωρο στα Τρίκαλα
Φθινόπωρο στα Τρίκαλα
 
Evaluación del aprendizaje leyva barajas
Evaluación del aprendizaje leyva barajasEvaluación del aprendizaje leyva barajas
Evaluación del aprendizaje leyva barajas
 
Ita b2 ms 02 12-15
Ita b2 ms 02 12-15Ita b2 ms 02 12-15
Ita b2 ms 02 12-15
 
Teoria macros
Teoria macrosTeoria macros
Teoria macros
 
La casa de los simpsons
La casa de los simpsonsLa casa de los simpsons
La casa de los simpsons
 
Herdeiros da Crus
Herdeiros da CrusHerdeiros da Crus
Herdeiros da Crus
 
Nmr Spwla Carbonates
Nmr  Spwla CarbonatesNmr  Spwla Carbonates
Nmr Spwla Carbonates
 
30 días de bilingüismo: Episodio 1
30 días de bilingüismo: Episodio 130 días de bilingüismo: Episodio 1
30 días de bilingüismo: Episodio 1
 
Juegos de Logica de Ingenio
Juegos de Logica de IngenioJuegos de Logica de Ingenio
Juegos de Logica de Ingenio
 
Formation Damage Test.
Formation Damage Test.Formation Damage Test.
Formation Damage Test.
 

Ähnlich wie Getting the end point security right! - k. k. mookhey

The magic of passive web vulnerability analysis lava kumar
The magic of passive web vulnerability analysis   lava kumarThe magic of passive web vulnerability analysis   lava kumar
The magic of passive web vulnerability analysis lava kumarowaspindia
 
Public exploit held private – penetration testing the researcher’s way tama...
Public exploit held private – penetration testing the researcher’s way   tama...Public exploit held private – penetration testing the researcher’s way   tama...
Public exploit held private – penetration testing the researcher’s way tama...owaspindia
 
Real time evaluation of national network exposure to emerging threats - fyodo...
Real time evaluation of national network exposure to emerging threats - fyodo...Real time evaluation of national network exposure to emerging threats - fyodo...
Real time evaluation of national network exposure to emerging threats - fyodo...owaspindia
 
Public exploit held private : Penetration Testing the researcher’s way
Public exploit held private : Penetration Testing the researcher’s wayPublic exploit held private : Penetration Testing the researcher’s way
Public exploit held private : Penetration Testing the researcher’s waytitanlambda
 
Pinkstar Events Agency [Delhi] Credentials 2016
Pinkstar Events  Agency [Delhi] Credentials 2016Pinkstar Events  Agency [Delhi] Credentials 2016
Pinkstar Events Agency [Delhi] Credentials 2016Anu tomar
 
Maral overseas pvt ltd,industry visit report by pooja
Maral overseas pvt ltd,industry visit report by poojaMaral overseas pvt ltd,industry visit report by pooja
Maral overseas pvt ltd,industry visit report by poojaAshu Rai
 
Best Event Management Company in Dhaka | Top Event Management Company in Bang...
Best Event Management Company in Dhaka | Top Event Management Company in Bang...Best Event Management Company in Dhaka | Top Event Management Company in Bang...
Best Event Management Company in Dhaka | Top Event Management Company in Bang...Ananta Events & Exhibition Ltd.
 
Promotion & branding
Promotion & brandingPromotion & branding
Promotion & brandingExevo Events
 
Mobile Trends and Innovations
Mobile Trends and InnovationsMobile Trends and Innovations
Mobile Trends and InnovationsMarta Rauch
 
Serge Ferrari - India projects
Serge Ferrari - India projectsSerge Ferrari - India projects
Serge Ferrari - India projectsRavindra Mehta
 
eScan National marketing
eScan National marketingeScan National marketing
eScan National marketingeScan
 
Agile Kolkata 2022 - Prashant M J | How to Plan your Agile Career
Agile Kolkata 2022 - Prashant M J | How to Plan your Agile CareerAgile Kolkata 2022 - Prashant M J | How to Plan your Agile Career
Agile Kolkata 2022 - Prashant M J | How to Plan your Agile CareerAgileNetwork
 
Newsletter of the November-December 2017
Newsletter of the November-December 2017Newsletter of the November-December 2017
Newsletter of the November-December 2017Nital Zaveri
 

Ähnlich wie Getting the end point security right! - k. k. mookhey (15)

The magic of passive web vulnerability analysis lava kumar
The magic of passive web vulnerability analysis   lava kumarThe magic of passive web vulnerability analysis   lava kumar
The magic of passive web vulnerability analysis lava kumar
 
Public exploit held private – penetration testing the researcher’s way tama...
Public exploit held private – penetration testing the researcher’s way   tama...Public exploit held private – penetration testing the researcher’s way   tama...
Public exploit held private – penetration testing the researcher’s way tama...
 
Real time evaluation of national network exposure to emerging threats - fyodo...
Real time evaluation of national network exposure to emerging threats - fyodo...Real time evaluation of national network exposure to emerging threats - fyodo...
Real time evaluation of national network exposure to emerging threats - fyodo...
 
Public exploit held private : Penetration Testing the researcher’s way
Public exploit held private : Penetration Testing the researcher’s wayPublic exploit held private : Penetration Testing the researcher’s way
Public exploit held private : Penetration Testing the researcher’s way
 
Pinkstar Events Agency [Delhi] Credentials 2016
Pinkstar Events  Agency [Delhi] Credentials 2016Pinkstar Events  Agency [Delhi] Credentials 2016
Pinkstar Events Agency [Delhi] Credentials 2016
 
Maral overseas pvt ltd,industry visit report by pooja
Maral overseas pvt ltd,industry visit report by poojaMaral overseas pvt ltd,industry visit report by pooja
Maral overseas pvt ltd,industry visit report by pooja
 
Best Event Management Company in Dhaka | Top Event Management Company in Bang...
Best Event Management Company in Dhaka | Top Event Management Company in Bang...Best Event Management Company in Dhaka | Top Event Management Company in Bang...
Best Event Management Company in Dhaka | Top Event Management Company in Bang...
 
Promotion & branding
Promotion & brandingPromotion & branding
Promotion & branding
 
2nd Annual Power & Transmission Summit 2015
2nd Annual Power & Transmission Summit 20152nd Annual Power & Transmission Summit 2015
2nd Annual Power & Transmission Summit 2015
 
Mobile Trends and Innovations
Mobile Trends and InnovationsMobile Trends and Innovations
Mobile Trends and Innovations
 
Serge Ferrari - India projects
Serge Ferrari - India projectsSerge Ferrari - India projects
Serge Ferrari - India projects
 
eScan National marketing
eScan National marketingeScan National marketing
eScan National marketing
 
Agile Kolkata 2022 - Prashant M J | How to Plan your Agile Career
Agile Kolkata 2022 - Prashant M J | How to Plan your Agile CareerAgile Kolkata 2022 - Prashant M J | How to Plan your Agile Career
Agile Kolkata 2022 - Prashant M J | How to Plan your Agile Career
 
Newsletter of the November-December 2017
Newsletter of the November-December 2017Newsletter of the November-December 2017
Newsletter of the November-December 2017
 
District Cooling & Tri-Generation Summit 2014
District Cooling & Tri-Generation Summit 2014District Cooling & Tri-Generation Summit 2014
District Cooling & Tri-Generation Summit 2014
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Getting the end point security right! - k. k. mookhey

  • 1. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in Client-Side Security K. K. Mookhey kkmookhey@niiconsulting.com OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 2. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in • Introduction • Real-world case study • The drop • Malware analysis • Delivery mechanisms • Lessons learnt OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 3. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 4. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in File name Loop Mobile Bill Statement Date 08.11.2011.pdf Services.doc The injection attempt The Most wanted terrorist by Delhi police.doc OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 5. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 6. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 7. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 8. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 9. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in Strings OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 10. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 11. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 12. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 13. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 14. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 15. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in What heritage are they protecting? Let’s find out OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 16. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in ./win7 ./win7/exploit.html ./win7/Exploit.jar ./win7/Exploit.class ./moneytime ./moneytime/abc ./moneytime/abc/dsfd.pdf ./moneytime/report.php ./moneytime/aaaa ./moneytime/aaaa/decr.exe ./moneytime/Aminer ./moneytime/Aminer/Utility_installation_step_by_step.doc ./moneytime/Aminer/aMiner2.0.iso ./moneytime/Aminer/aMiner_Installation_Step_by_Step.doc ./moneytime/Aminer/utilities.iso ./moneytime/email list.txt ./moneytime/WinXpcr.py ./moneytime/main.png ./moneytime/demor ./moneytime/demor/application.doc ./moneytime/Appin ./moneytime/Appin/appin.doc ./moneytime/Appin/appin1.pdf ./moneytime/key ./moneytime/key/conhost.exe ./moneytime/key/smse.exe OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 17. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 18. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 19. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 20. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in WHAT IS AMINER.EXE? OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 21. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in ./chirag/drop/KAMAL0024BEBE0A80/KeyLog.txt ./chirag/drop/KAMAL0024BEBE0A80/ip.txt ./chirag/drop/INDIA00012E2598D3 ./chirag/drop/INDIA00012E2598D3/KeyLog.txt ./chirag/drop/INDIA00012E2598D3/ip.txt ./chirag/drop/BLUE-INTRA-VM000C29D666CE ./chirag/drop/BLUE-INTRA-VM000C29D666CE/123.php Who is ./chirag/drop/GAMCA300248CC9EE30 ./chirag/drop/GAMCA300248CC9EE30/KeyLog.txt Chirag? ./chirag/drop/GAMCA300248CC9EE30/ip.txt ./chirag/drop/ADMIN-PC005056C00008 ./chirag/drop/ADMIN-PC005056C00008/KeyLog.txt ./chirag/drop/ADMIN-PC005056C00008/ip.txt ./chirag/drop/SABI-D00241D9A5C01 ./chirag/drop/SABI-D00241D9A5C01/KeyLog.txt ./chirag/drop/SABI-D00241D9A5C01/ip.txt ./chirag/drop/DESIGN20CF309A9453 ./chirag/drop/DESIGN20CF309A9453/KeyLog.txt ./chirag/drop/DESIGN20CF309A9453/ip.txt ./chirag/drop/KAMALC0F8DA7AF26C ./chirag/drop/KAMALC0F8DA7AF26C/KeyLog.txt ./chirag/drop/KAMALC0F8DA7AF26C/ip.txt OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 22. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 23. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 24. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in Typical Delivery Mechanisms OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 25. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in Scenario 2 Un-authorized usage of USB Drives We inserted USB drives on 8 systems 2 systems had USB blocked Only 1 person objected to us inserting the USB drive OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 26. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in Phishing OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)
  • 27. OWASP InfoSec India Conference 2012 August 24th – 25th, 2012 The OWASP Foundation Hotel Crowne Plaza, Gurgaon http://www.owasp.org http://www.owasp.in • APTs are real and here to stay • It does not take a genius to evade AV • We need newer solutions – and quick! • Your end-point defences should be as strong or even stronger than the perimeter defences • In the meanwhile… • Patch all your end-point software • Watch your AV status like a hawk • Constantly propagate security news to your end-users And • Be careful, which security vendors you hire! OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)