Skip to content

Latest commit

 

History

History
executable file
·
148 lines (91 loc) · 4.83 KB

File metadata and controls

executable file
·
148 lines (91 loc) · 4.83 KB

BlackHills: Active Defense & Cyber Deception Training 4/9/20

This was a 4 hour training

https://blackhillsinfosec.com/training/active-defense-cyber-deception-training/

Background

Active Defense

  • Active Defense - limited offensive action and counteracttacks to deny a contested area
  • Passive Defense- Measures taken to reduce probbability of and to minimize the efefects of damage caused by hostile action without the intention of taking the initiative. Aka "Hope for the best"
  • Prevent => Detect => Respond - "Prevention is ideal, but detection is a must"

Offensive Countermeasures

  • offensive techniques as aggressors attack, but with a defensive posture
  • Think poison, not venom
  • Make sure you have a solid legal footing

Cyber Deception

  • Deliberate and calculated process of deceiving attackers in an effort to wage a better defense....make them work harder
  • Deception_time + Reaction_time < Attack_time

OODA_Loop

Disrupting_OODA

Commerical Cyber Deception (HoneyPots)

  • Javelin networks - bought by Symantec
  • Cymeetria
  • Illusive networks
  • Attivo networks
  • TrapX
  • Acalvio

Warning Banners

  • illegal to set up lethal traps for trespassers
    • Telnet banner court case (Reddit)

Current Strategies aren't working

var curr=(Patch, strong passwords, AV, Firewalls and proxies, etc..)
var next-gen="Next-Gen${curr[@]}"

Legal Cases

  • Susan v Absolute - Violating Wire Taping Laws
    • IP and Geolocation are okay, even if it is stolen.
    • However, if you start taking pictures of the computer, going through internet history, etc.. this is NOT okay.
    • "Even bad people that steal computers have rights"
    • So don't do this Defcon vid
    • Court Case Src
  • Callbacks
    • Note illegal: Software Updates, Check License Keys, phone tracking,

Reality Check

  • Hacking back is illegal (Current Legislation that has NOT passed)

  • So instead, annoy, attribution, and attack (with warrant).

  • "Hallmarks of Legality" (Ben somehting SANS instructor)

    • Discuss, document, plan, consult others
    • Do not hide - hidiing might be interpreted as what you knew/thought was wrong/illegal
    • Don't be evil
  • Poison vs Venom

    • Poisin is the baddies getting hurt by touching your stuff
    • Venom is your stuff touching the baddies

Detecting Attacks (Lab)

  • Log on Windows

  • HoneyPots should be monitored

  • HoneyPorts (Go to Lab) - as soon as an attacker accesses the port, it will block the attacker for any computer at all.

    • More info from Legal But Frowned Upon
    • Blackhills video on this topic
    • nmap's syn scan won't trip it
    • Syn inital sequence number packet is 32 bits
      • Responds with syn ack - thanks Networking class
    • Don't set up on port already in use, make exceptions for vulnerability/red team's software
    • Many vendor products actually have this (E.g. Palo Alto)
  • Use CanaryTokens

Check Out Later

Obfuscation Techniques