SlideShare a Scribd company logo
1 of 36
Download to read offline
Why Pentesting
is Vital to the
Modern DoD
Workforce
Presented by James Stanger, PhD
Chief Technology Evangelist - CompTIA
A+, Network+, Security+, MCSE, LPI LPIC 1
Works with IT pros, managers and executives
worldwide. Over 20 years of experience in:
• Penetration testing
• Security analytics
• Risk assessment
• Intrusion detection
• Linux and open source
• Network administration
• Virtualization
• Web technologies
• Certification development
• Courseware creation
© Global Knowledge Training LLC. All rights reserved. Page 2
Agenda
1. How the IT environment has changed radically
in the last five years
2. Pen testing challenges that DoD agencies face
today
3. Responsible pen testing and the hacker
lifecycle: Why does the pen tester even exist?
4. Understanding the “hacker’s dilemma”
5. The “hacker’s dilemma” and the hacker lifecycle
6. Mapping IoCs to steps in the hacker process
7. Responsible pen testing: A demo
How the IT environment
has changed radically in
the last five years
© Global Knowledge Training LLC. All rights reserved. Page 4
How the IT environment has changed
NEED FOR NETWORK
SEGMENTATION /
TRAFFIC
ISOLATION
CLOUD PROLIFERATION
• Automation
• Orchestration
DISSOLVED
PERIMETER
EVOLVING
ENDPOINT
• IoT / Mobile
• Sanctioned,
and otherwise
• Formal and
informal
tracking
• Data leakage
• Greater connectivity
GLOBAL MILITARY OPERATIONS
COMMAND AND CONTROL
INFRASTRUCTURE
• Modern equipment
• Legacy equipment
SECURITY
POSTURE
INCREASED NEED FOR
“POP-UP” NETWORKS
WORLDWIDE
ATTACK
SURFACE
Pen testing challenges
that DoD agencies face
today
© Global Knowledge Training LLC. All rights reserved. Page 6
Social engineering
• Most attacks are
perpetrated against
individuals
• Not misconfigured
systems
• Not software flaws
• Millions of potential
victims just waiting to be:
• Exploited
• Tracked
• Stolen from
© Global Knowledge Training LLC. All rights reserved. Page 7
Credential harvesting
• Stealing authentication
information
• User names
• Passwords
• Associated information
• The third most popular attack
• Involves
• Social engineering using
a “pretext”
• Phishing, spear phishing,
whaling
• Obtaining physical access
• Tricking individuals and groups of
users
© Global Knowledge Training LLC. All rights reserved. Page 8
Legacy devices and myriad platforms
• They are legion!
• Not just PCs, either
• Examples:
• Servers from 1990s to
now
• Mainframes
• Old notebook / tablet
• Communications
equipment (e.g., radio)
• Drone software
• Industrial
Control
System (ICS) / SCADA
© Global Knowledge Training LLC. All rights reserved. Page 9
Suspect implementations and platforms
• Domain Name System
(DNS) servers
• Recent auditing initiative
• Why?
• Talented teams tend to
get broken up and re-
deployed
© Global Knowledge Training LLC. All rights reserved. Page 10
Emerging technology
• The DoD uses emerging tech,
as well
• Examples
• Drones (not a contradiction
from the previous slide)
• Weapon guidance systems
• Communications
• Augmented Reality
• Infrastructure
• Robotics
• 3D printing
• Pumping, filtration, power
© Global Knowledge Training LLC. All rights reserved. Page 11
Increasing reliance on tech
• What isn’t on the network
or a computing device?
• Unprecedented reliance on
a relatively brittle set of
technologies
• How impact resistant is the
average PC?
• How much can be done to
affordably / reliably harden
something?
• Physically
• Logically
Therefore, increased risk
© Global Knowledge Training LLC. All rights reserved. Page 12
Lack of context
• “Situational awareness” is
paramount
• Commanders need to:
• Be aware
• Take proper action
• Need for:
• Ability to turn data into
actionable information
• Trend analysis
• Correlation
• Big data
• Cybersecurity perspective
© Global Knowledge Training LLC. All rights reserved. Page 13
Personnel upskilling
• Typical profiles
• They know how to use tech
• They don’t know how to
produce real-life solutions
with it
• Ages
• 18 – 22
• 23 – 28
• 30-something
• Issues
• Implications of actions and
decisions
• Older tech
• Generational issues
© Global Knowledge Training LLC. All rights reserved. Page 14
DevOps / DevSecOps / SOAR
 Intelligence platform
 Automation
 Orchestration
 Security Orchestration
Automation and Response
(SOAR)
– More than incident response
– Coordinates at multiple levels
 Contextualization
 Threat analysis
 IDS
 SIEM
Responsible pen testing
and the hacker lifecycle:
Why does the pen tester
even exist today?
© Global Knowledge Training LLC. All rights reserved. Page 16
Teamwork: red team / blue team
Courts
 To improve the blue team
 To create Indicators of Compromise
(IoC)
 Then, the blue team creates the
right thresholds and
metrics
 Responsible pen testing
– Why else would you
have these teams?
– Adjust tactics / strategy
Penetration
Testing / Vulnerability
managers
Security
Analysts
Blue team Red team
These teams work together with
management to create – and act upon –
useful metrics
This approach helps avoid the “whack-a-mole” approach to security
© Global Knowledge Training LLC. All rights reserved. Page 17
Searching for gaps - interstices
• “Space” where one technology connects with another
• The “hard to reach” places
 Where “meat space” and “cyber space”
converge
 ICS / SCADA systems
 Physical access to a building
 SMS/mobile and Web technologies
 SQL and Web servers (SQL injection)
 Domain Name Service (DNS)
 Networking systems, including 5g!
 Blockchain implementations!
© Global Knowledge Training LLC. All rights reserved. Page 18
The hacker lifecycle
Related to pen tester lifecycle
Many models Planning and scoping
Information gathering
Investigation
Clean up
Reporting
1
2
3
4
5
6
7
© Global Knowledge Training LLC. All rights reserved. Page 19
Models (attack, and security)
1. Lockheed cyber kill chain (https://www.lockheedmartin.com/en-
us/capabilities/cyber/cyber-kill-chain.html)
 Threat-based
 How to stop attacks
2. ATT&CK (https://attack.mitre.org
/wiki/Main_Page)
 Not just preventing threats
 How to find them once they’re in
3. NIST 800 blah, blah, blah
4. Carnegie Mellon CMMI
© Global Knowledge Training LLC. All rights reserved. Page 20
Tool overview (pen tester)
• Don’t
get lost in the
“tool parade”
• Know when to
use them, and
why
• Many other
tools available
for pursuing the
hacker lifecycle
Tools and job roles
Discovery
(e.g., OSINT tools, Shodan, Nmap, Maltego)
Penetration / persistence / action on objectives
(e.g., Metasploit, BeEF, peach, AirCrack-ng, Netcat, Burp Suite)
Crackers
(John the Ripper, THC Hydra)
Kali Linux or Parrot
(Debian/Ubuntu Linux – includes many tools)
The hacker’s dilemma
and the hacker lifecycle:
Mapping Indicators of
Compromise (IoC)
© Global Knowledge Training LLC. All rights reserved. Page 22
Look for indicators of compromise (IoC)
Locard’s exchange principle
 The perpetrator of a crime will:
– Bring something to the crime scene
– Leave something at the crime scene
 Essential for success
 Also for metrics
What does this mean for IT security?
 Map controls to indicators of
compromise
 Essential resources
– Servers (application layer)
– End users
– End points
 Processes
© Global Knowledge Training LLC. All rights reserved. Page 23
The hacker’s dilemma and security frameworks
DMV
Corrections
Municipal
County
State
Federal
Law Enforcement
Message Switch
 It’s vital to focus on identifying the hacker lifecycle
 Mitigation involves inhibiting the hacker as well as
detection and response
Copyright (c) 2017 Target
You can use any framework. It could be the NIST Cybersecurity
Framework,
or NIST 800-53 or COSO or ISO whatever.
Regardless of framework, the key is to create – and use – a matrix that
helps you focus your security activities as a company.
© Global Knowledge Training LLC. All rights reserved. Page 24
Activity Description Pen testing tool Security analyst tool
Discovery /
Reconnaissance
Use active and passive scanning
techniques to identify vulnerable
people, processes, and systems.
Whois, Shodan, Nmap, Metagoofil Phone call logs, End point log
files (e.g., Windows / mobile
phone logs)
Penetration Use social engineering to deliver attack
vector
End user / Metasploit, shell
commands
Antivirus, centralized logging
tools for end point and firewall
Pen / escalation /
lateral movement
Transfer the Windows SAM, or the
Linux /etc./shadow file.
Metasploit (includes Meterpreter),
BeEF
Active Directory / Keberos /
LDAP logs, SGUIL
Pen / Persistence Decrypt the accounts database file/info John the Ripper / Online password
cracking resources
Tripwire, Splunk
Persistence Insert a specific registry key to open a
port or activate a service such as the
Remote Desktop Protocol (RDP)
Meterpreter / BeEF, scripts Regshot, WinMerge,
RegistryChangesView
Action on objectives
/ Data egress
Obtain or change sensitive information Native tools on victim system Process Explorer, Snort, Sagan,
Bro, any SIEM tool
Lateral movement Identify pre-existing shares and stored
credentials
Native tools / Meterpreter AlienVault, Suricata
Responsible pen testing:
A demo
© Global Knowledge Training LLC. All rights reserved. Page 26
Discovery / Reconnaissance nmap -O 10.0.2.20
• Types
• Passive
• Active
• nmap – (active)
• Whois (passive)
• Maltego (passive)
• Shodan (passive_
• Web site
• Command line
• Used with
other applications
© Global Knowledge Training LLC. All rights reserved. Page 27
Nmap (active)
nmap -Pn -sS 10.0.2.20
nmap –O -sV -iL targets.txt
nmap -T3 -d 10.0.2.20 -oX stanger.xml
OS fingerprint, deep ports target file
Timing, debugging, output (XML)
Disable ping, SYN only
nmap -Pn -sT -D 192.168.0.2,193.5.6.7 10.0.2.20
Disable ping, full connect, decoy
© Global Knowledge Training LLC. All rights reserved. Page 28
Shodan (passive)
• Search engine –
passive scanning
• Spider service
reads banners
• Provides searchable
results
• The Google for
pen testers
• Three modes
• Web site
• API
• Application (Python)
© Global Knowledge Training LLC. All rights reserved. Page 29
Maltego – providing more (passive) context
• Information gathering
 Accurate
 Quick
• Visual representation
of how information
flows between
systems
• Interconnections
• Search
• Context-specific
• Helps find indicators
of compromise
© Global Knowledge Training LLC. All rights reserved. Page 30
Penetration / password dumping
© Global Knowledge Training LLC. All rights reserved. Page 31
When it goes wrong
 Not every attack
is successful at
first
 Sometimes, the
exploit goes too far
 Consider the IoCs
– System reboots
– Memory dump files
© Global Knowledge Training LLC. All rights reserved. Page 32
Overview of the hack – Using an online password
cracker
© Global Knowledge Training LLC. All rights reserved. Page 33
Persistence / upgrading
© Global Knowledge Training LLC. All rights reserved. Page 34
Courses
Security+
Certification Prep
Course
CASP+ CompTIA
Advanced Security
Practitioner Prep
Course
CySA+
Cybersecurity
Analyst+ Prep
Course
© Global Knowledge Training LLC. All rights reserved. Page 35
Learning More
GlobalKnowledge.com
For additional on-demand and live webinars,
white papers, courses, special offers and
more, visit us at…
James Stanger, PhD
jstanger@comptia.org
+1 (360) 970-5357
Twitter: @jamesstanger
Skype: stangernet
Thank you!
My CompTIA hub:
https://certification.comptia.org/it-
career-news/hub/James-Stanger
Latest articles and blog entries:
Two sides of the same coin: Pen testing and security analytics
Penetration, persistence, and future attacks (forthcoming, Admin Magazine)
What’s hot in network certifications (NetworkWorld)
Escaping the Cybersecurity Metrics Matrix (CompTIA)
Private Eye: Open source tools for automated pen testing Admin Magazine
Thoughts about the help desk (YouTube)
The Hunt for the Meaning of the Red team (CompTIA)
The IT security disconnect (HP Enterprise)
A blockchain manifesto? A report from the RSA 2018 Blockchain Focus Group
Cloud Orchestration with Chef – Admin Magazine
No more close shaves: Talking end user security
How CIOs can optimize ITSM software (SearchCIO)
Vulnerability management: How to target bug bounty programs (TechTarget)
My career change journey: The importance of networking
The role of the service desk in the cybersecurity kill chain (HDI)
How to prevent insiders from breaching your data (Forbes)
Threat Hunting with Yara – Admin Magazine
10 critical security skills every IT team needs (interview, CIO Magazine)
How AI can help you stay ahead of cybersecurity threats (CSO Magazine)
Don’t hack me, bro! (Admin Magazine)
At the hop: Security testing with hping3 (Linux Magazine)

More Related Content

What's hot

Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingFRSecure
 
Adversary Emulation - DerpCon
Adversary Emulation - DerpConAdversary Emulation - DerpCon
Adversary Emulation - DerpConJorge Orchilles
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent ThreatsESET
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 MatrixJorge Orchilles
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017FRSecure
 
Narrative Mind Week 2 H4D Stanford 2016
Narrative Mind Week 2 H4D Stanford 2016Narrative Mind Week 2 H4D Stanford 2016
Narrative Mind Week 2 H4D Stanford 2016Stanford University
 
2018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 22018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 2FRSecure
 
Narrative Mind Week 4 H4D Stanford 2016
Narrative Mind Week 4 H4D Stanford 2016Narrative Mind Week 4 H4D Stanford 2016
Narrative Mind Week 4 H4D Stanford 2016Stanford University
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEJorge Orchilles
 
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...Jorge Orchilles
 
Owasp ottawa training-day_2012-secure_design-final
Owasp ottawa training-day_2012-secure_design-finalOwasp ottawa training-day_2012-secure_design-final
Owasp ottawa training-day_2012-secure_design-finalAntonio Fontes
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Hykeos
 
XBOSoft Mobile Security Webinar with Jon D. Hagar
XBOSoft Mobile Security Webinar with Jon D. HagarXBOSoft Mobile Security Webinar with Jon D. Hagar
XBOSoft Mobile Security Webinar with Jon D. HagarXBOSoft
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class OneFRSecure
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityCore Security
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
михаил дударев
михаил дударевмихаил дударев
михаил дударевapps4allru
 

What's hot (20)

Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration Testing
 
Adversary Emulation - DerpCon
Adversary Emulation - DerpConAdversary Emulation - DerpCon
Adversary Emulation - DerpCon
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
Narrative Mind Week 2 H4D Stanford 2016
Narrative Mind Week 2 H4D Stanford 2016Narrative Mind Week 2 H4D Stanford 2016
Narrative Mind Week 2 H4D Stanford 2016
 
2018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 22018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 2
 
Penetration Testing
Penetration TestingPenetration Testing
Penetration Testing
 
Narrative Mind Week 4 H4D Stanford 2016
Narrative Mind Week 4 H4D Stanford 2016Narrative Mind Week 4 H4D Stanford 2016
Narrative Mind Week 4 H4D Stanford 2016
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
 
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
 
Owasp ottawa training-day_2012-secure_design-final
Owasp ottawa training-day_2012-secure_design-finalOwasp ottawa training-day_2012-secure_design-final
Owasp ottawa training-day_2012-secure_design-final
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
XBOSoft Mobile Security Webinar with Jon D. Hagar
XBOSoft Mobile Security Webinar with Jon D. HagarXBOSoft Mobile Security Webinar with Jon D. Hagar
XBOSoft Mobile Security Webinar with Jon D. Hagar
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
Skynet Week 4 H4D Stanford 2016
Skynet Week 4 H4D Stanford 2016Skynet Week 4 H4D Stanford 2016
Skynet Week 4 H4D Stanford 2016
 
What is pentest
What is pentestWhat is pentest
What is pentest
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
михаил дударев
михаил дударевмихаил дударев
михаил дударев
 

Similar to Why Pentesting is Vital to the Modern DoD Workforce

How to Manage the Risk of your Polyglot Environments
How to Manage the Risk of your Polyglot EnvironmentsHow to Manage the Risk of your Polyglot Environments
How to Manage the Risk of your Polyglot EnvironmentsDevOps.com
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022lior mazor
 
The differing ways to monitor and instrument
The differing ways to monitor and instrumentThe differing ways to monitor and instrument
The differing ways to monitor and instrumentJonah Kowall
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion DetectionAPNIC
 
Opensource Presentation
Opensource PresentationOpensource Presentation
Opensource PresentationSarah Cortes
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16AppDynamics
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposPriyanka Aash
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsRod Soto
 
zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]Alex Pruden
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZeditsRod Soto
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinAnton Chuvakin
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security AnalyticsDemetrio Milea
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 

Similar to Why Pentesting is Vital to the Modern DoD Workforce (20)

How to Manage the Risk of your Polyglot Environments
How to Manage the Risk of your Polyglot EnvironmentsHow to Manage the Risk of your Polyglot Environments
How to Manage the Risk of your Polyglot Environments
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
 
The differing ways to monitor and instrument
The differing ways to monitor and instrumentThe differing ways to monitor and instrument
The differing ways to monitor and instrument
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Opensource Presentation
Opensource PresentationOpensource Presentation
Opensource Presentation
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gpos
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
 
zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton Chuvakin
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security Analytics
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 

More from Global Knowledge Training

PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywhereGlobal Knowledge Training
 
How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10Global Knowledge Training
 
Develop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningDevelop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningGlobal Knowledge Training
 
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Global Knowledge Training
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyGlobal Knowledge Training
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksGlobal Knowledge Training
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationGlobal Knowledge Training
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationGlobal Knowledge Training
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?Global Knowledge Training
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success Global Knowledge Training
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementGlobal Knowledge Training
 

More from Global Knowledge Training (20)

Taking Advantage of Microsoft PowerShell
Taking Advantage of Microsoft PowerShell Taking Advantage of Microsoft PowerShell
Taking Advantage of Microsoft PowerShell
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention Everywhere
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10
 
Accelerating with Ansible
Accelerating with AnsibleAccelerating with Ansible
Accelerating with Ansible
 
How to Maximize Your Training Budget
How to Maximize Your Training BudgetHow to Maximize Your Training Budget
How to Maximize Your Training Budget
 
Develop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningDevelop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online Learning
 
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification Journey
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
How to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS LambdaHow to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS Lambda
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your Organization
 
How to Migrate a Web App to AWS
How to Migrate a Web App to AWSHow to Migrate a Web App to AWS
How to Migrate a Web App to AWS
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your Organization
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People Management
 

Recently uploaded

Item # 4&5 - 415 & 423 Evans Ave. Replat
Item # 4&5 - 415 & 423 Evans Ave. ReplatItem # 4&5 - 415 & 423 Evans Ave. Replat
Item # 4&5 - 415 & 423 Evans Ave. Replatahcitycouncil
 
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.Cristal Montañéz
 
PPT Item # 2 -- Announcements Powerpoint
PPT Item # 2 -- Announcements PowerpointPPT Item # 2 -- Announcements Powerpoint
PPT Item # 2 -- Announcements Powerpointahcitycouncil
 
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdfCristal Montañéz
 
Digital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical ImplicationsDigital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical ImplicationsBeat Estermann
 
ISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, IndiaISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, IndiaTrinity Care Foundation
 
PPT Item # 4&5 - 415 & 423 Evans Ave. Replat.pdf
PPT Item # 4&5 - 415 & 423 Evans Ave. Replat.pdfPPT Item # 4&5 - 415 & 423 Evans Ave. Replat.pdf
PPT Item # 4&5 - 415 & 423 Evans Ave. Replat.pdfahcitycouncil
 
World Health Day 2024 - Zero Discrimination, Affordable treatments, Respectfu...
World Health Day 2024 - Zero Discrimination, Affordable treatments, Respectfu...World Health Day 2024 - Zero Discrimination, Affordable treatments, Respectfu...
World Health Day 2024 - Zero Discrimination, Affordable treatments, Respectfu...Christina Parmionova
 
UN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportUN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportEnergy for One World
 
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATIONGOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATIONShivamShukla147857
 
Focusing on the rights of women and girls
Focusing on the rights of women and girlsFocusing on the rights of women and girls
Focusing on the rights of women and girlsChristina Parmionova
 
2024 ECOSOC YOUTH FORUM -logistical information - United Nations Economic an...
2024 ECOSOC YOUTH FORUM -logistical information -  United Nations Economic an...2024 ECOSOC YOUTH FORUM -logistical information -  United Nations Economic an...
2024 ECOSOC YOUTH FORUM -logistical information - United Nations Economic an...Christina Parmionova
 
Health rights correspond to a checklisk.
Health rights correspond to a checklisk.Health rights correspond to a checklisk.
Health rights correspond to a checklisk.Christina Parmionova
 
Everyone, everywhere has the right to good mental health.
Everyone, everywhere has the right to good mental health.Everyone, everywhere has the right to good mental health.
Everyone, everywhere has the right to good mental health.Christina Parmionova
 
In War and conflict, health workers, facilities and supplies are off limits.
In War and conflict, health workers, facilities and supplies are off limits.In War and conflict, health workers, facilities and supplies are off limits.
In War and conflict, health workers, facilities and supplies are off limits.Christina Parmionova
 
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...Energy for One World
 
2024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 242024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 24JSchaus & Associates
 
Actions to take at the global, national and local levels to realize the right...
Actions to take at the global, national and local levels to realize the right...Actions to take at the global, national and local levels to realize the right...
Actions to take at the global, national and local levels to realize the right...Christina Parmionova
 
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.Christina Parmionova
 

Recently uploaded (20)

Housing For All - Fair Housing Choice Report
Housing For All - Fair Housing Choice ReportHousing For All - Fair Housing Choice Report
Housing For All - Fair Housing Choice Report
 
Item # 4&5 - 415 & 423 Evans Ave. Replat
Item # 4&5 - 415 & 423 Evans Ave. ReplatItem # 4&5 - 415 & 423 Evans Ave. Replat
Item # 4&5 - 415 & 423 Evans Ave. Replat
 
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.
 
PPT Item # 2 -- Announcements Powerpoint
PPT Item # 2 -- Announcements PowerpointPPT Item # 2 -- Announcements Powerpoint
PPT Item # 2 -- Announcements Powerpoint
 
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf
 
Digital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical ImplicationsDigital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical Implications
 
ISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, IndiaISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, India
 
PPT Item # 4&5 - 415 & 423 Evans Ave. Replat.pdf
PPT Item # 4&5 - 415 & 423 Evans Ave. Replat.pdfPPT Item # 4&5 - 415 & 423 Evans Ave. Replat.pdf
PPT Item # 4&5 - 415 & 423 Evans Ave. Replat.pdf
 
World Health Day 2024 - Zero Discrimination, Affordable treatments, Respectfu...
World Health Day 2024 - Zero Discrimination, Affordable treatments, Respectfu...World Health Day 2024 - Zero Discrimination, Affordable treatments, Respectfu...
World Health Day 2024 - Zero Discrimination, Affordable treatments, Respectfu...
 
UN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportUN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 Report
 
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATIONGOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
 
Focusing on the rights of women and girls
Focusing on the rights of women and girlsFocusing on the rights of women and girls
Focusing on the rights of women and girls
 
2024 ECOSOC YOUTH FORUM -logistical information - United Nations Economic an...
2024 ECOSOC YOUTH FORUM -logistical information -  United Nations Economic an...2024 ECOSOC YOUTH FORUM -logistical information -  United Nations Economic an...
2024 ECOSOC YOUTH FORUM -logistical information - United Nations Economic an...
 
Health rights correspond to a checklisk.
Health rights correspond to a checklisk.Health rights correspond to a checklisk.
Health rights correspond to a checklisk.
 
Everyone, everywhere has the right to good mental health.
Everyone, everywhere has the right to good mental health.Everyone, everywhere has the right to good mental health.
Everyone, everywhere has the right to good mental health.
 
In War and conflict, health workers, facilities and supplies are off limits.
In War and conflict, health workers, facilities and supplies are off limits.In War and conflict, health workers, facilities and supplies are off limits.
In War and conflict, health workers, facilities and supplies are off limits.
 
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
 
2024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 242024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 24
 
Actions to take at the global, national and local levels to realize the right...
Actions to take at the global, national and local levels to realize the right...Actions to take at the global, national and local levels to realize the right...
Actions to take at the global, national and local levels to realize the right...
 
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
 

Why Pentesting is Vital to the Modern DoD Workforce

  • 1. Why Pentesting is Vital to the Modern DoD Workforce Presented by James Stanger, PhD Chief Technology Evangelist - CompTIA A+, Network+, Security+, MCSE, LPI LPIC 1 Works with IT pros, managers and executives worldwide. Over 20 years of experience in: • Penetration testing • Security analytics • Risk assessment • Intrusion detection • Linux and open source • Network administration • Virtualization • Web technologies • Certification development • Courseware creation
  • 2. © Global Knowledge Training LLC. All rights reserved. Page 2 Agenda 1. How the IT environment has changed radically in the last five years 2. Pen testing challenges that DoD agencies face today 3. Responsible pen testing and the hacker lifecycle: Why does the pen tester even exist? 4. Understanding the “hacker’s dilemma” 5. The “hacker’s dilemma” and the hacker lifecycle 6. Mapping IoCs to steps in the hacker process 7. Responsible pen testing: A demo
  • 3. How the IT environment has changed radically in the last five years
  • 4. © Global Knowledge Training LLC. All rights reserved. Page 4 How the IT environment has changed NEED FOR NETWORK SEGMENTATION / TRAFFIC ISOLATION CLOUD PROLIFERATION • Automation • Orchestration DISSOLVED PERIMETER EVOLVING ENDPOINT • IoT / Mobile • Sanctioned, and otherwise • Formal and informal tracking • Data leakage • Greater connectivity GLOBAL MILITARY OPERATIONS COMMAND AND CONTROL INFRASTRUCTURE • Modern equipment • Legacy equipment SECURITY POSTURE INCREASED NEED FOR “POP-UP” NETWORKS WORLDWIDE ATTACK SURFACE
  • 5. Pen testing challenges that DoD agencies face today
  • 6. © Global Knowledge Training LLC. All rights reserved. Page 6 Social engineering • Most attacks are perpetrated against individuals • Not misconfigured systems • Not software flaws • Millions of potential victims just waiting to be: • Exploited • Tracked • Stolen from
  • 7. © Global Knowledge Training LLC. All rights reserved. Page 7 Credential harvesting • Stealing authentication information • User names • Passwords • Associated information • The third most popular attack • Involves • Social engineering using a “pretext” • Phishing, spear phishing, whaling • Obtaining physical access • Tricking individuals and groups of users
  • 8. © Global Knowledge Training LLC. All rights reserved. Page 8 Legacy devices and myriad platforms • They are legion! • Not just PCs, either • Examples: • Servers from 1990s to now • Mainframes • Old notebook / tablet • Communications equipment (e.g., radio) • Drone software • Industrial Control System (ICS) / SCADA
  • 9. © Global Knowledge Training LLC. All rights reserved. Page 9 Suspect implementations and platforms • Domain Name System (DNS) servers • Recent auditing initiative • Why? • Talented teams tend to get broken up and re- deployed
  • 10. © Global Knowledge Training LLC. All rights reserved. Page 10 Emerging technology • The DoD uses emerging tech, as well • Examples • Drones (not a contradiction from the previous slide) • Weapon guidance systems • Communications • Augmented Reality • Infrastructure • Robotics • 3D printing • Pumping, filtration, power
  • 11. © Global Knowledge Training LLC. All rights reserved. Page 11 Increasing reliance on tech • What isn’t on the network or a computing device? • Unprecedented reliance on a relatively brittle set of technologies • How impact resistant is the average PC? • How much can be done to affordably / reliably harden something? • Physically • Logically Therefore, increased risk
  • 12. © Global Knowledge Training LLC. All rights reserved. Page 12 Lack of context • “Situational awareness” is paramount • Commanders need to: • Be aware • Take proper action • Need for: • Ability to turn data into actionable information • Trend analysis • Correlation • Big data • Cybersecurity perspective
  • 13. © Global Knowledge Training LLC. All rights reserved. Page 13 Personnel upskilling • Typical profiles • They know how to use tech • They don’t know how to produce real-life solutions with it • Ages • 18 – 22 • 23 – 28 • 30-something • Issues • Implications of actions and decisions • Older tech • Generational issues
  • 14. © Global Knowledge Training LLC. All rights reserved. Page 14 DevOps / DevSecOps / SOAR  Intelligence platform  Automation  Orchestration  Security Orchestration Automation and Response (SOAR) – More than incident response – Coordinates at multiple levels  Contextualization  Threat analysis  IDS  SIEM
  • 15. Responsible pen testing and the hacker lifecycle: Why does the pen tester even exist today?
  • 16. © Global Knowledge Training LLC. All rights reserved. Page 16 Teamwork: red team / blue team Courts  To improve the blue team  To create Indicators of Compromise (IoC)  Then, the blue team creates the right thresholds and metrics  Responsible pen testing – Why else would you have these teams? – Adjust tactics / strategy Penetration Testing / Vulnerability managers Security Analysts Blue team Red team These teams work together with management to create – and act upon – useful metrics This approach helps avoid the “whack-a-mole” approach to security
  • 17. © Global Knowledge Training LLC. All rights reserved. Page 17 Searching for gaps - interstices • “Space” where one technology connects with another • The “hard to reach” places  Where “meat space” and “cyber space” converge  ICS / SCADA systems  Physical access to a building  SMS/mobile and Web technologies  SQL and Web servers (SQL injection)  Domain Name Service (DNS)  Networking systems, including 5g!  Blockchain implementations!
  • 18. © Global Knowledge Training LLC. All rights reserved. Page 18 The hacker lifecycle Related to pen tester lifecycle Many models Planning and scoping Information gathering Investigation Clean up Reporting 1 2 3 4 5 6 7
  • 19. © Global Knowledge Training LLC. All rights reserved. Page 19 Models (attack, and security) 1. Lockheed cyber kill chain (https://www.lockheedmartin.com/en- us/capabilities/cyber/cyber-kill-chain.html)  Threat-based  How to stop attacks 2. ATT&CK (https://attack.mitre.org /wiki/Main_Page)  Not just preventing threats  How to find them once they’re in 3. NIST 800 blah, blah, blah 4. Carnegie Mellon CMMI
  • 20. © Global Knowledge Training LLC. All rights reserved. Page 20 Tool overview (pen tester) • Don’t get lost in the “tool parade” • Know when to use them, and why • Many other tools available for pursuing the hacker lifecycle Tools and job roles Discovery (e.g., OSINT tools, Shodan, Nmap, Maltego) Penetration / persistence / action on objectives (e.g., Metasploit, BeEF, peach, AirCrack-ng, Netcat, Burp Suite) Crackers (John the Ripper, THC Hydra) Kali Linux or Parrot (Debian/Ubuntu Linux – includes many tools)
  • 21. The hacker’s dilemma and the hacker lifecycle: Mapping Indicators of Compromise (IoC)
  • 22. © Global Knowledge Training LLC. All rights reserved. Page 22 Look for indicators of compromise (IoC) Locard’s exchange principle  The perpetrator of a crime will: – Bring something to the crime scene – Leave something at the crime scene  Essential for success  Also for metrics What does this mean for IT security?  Map controls to indicators of compromise  Essential resources – Servers (application layer) – End users – End points  Processes
  • 23. © Global Knowledge Training LLC. All rights reserved. Page 23 The hacker’s dilemma and security frameworks DMV Corrections Municipal County State Federal Law Enforcement Message Switch  It’s vital to focus on identifying the hacker lifecycle  Mitigation involves inhibiting the hacker as well as detection and response Copyright (c) 2017 Target You can use any framework. It could be the NIST Cybersecurity Framework, or NIST 800-53 or COSO or ISO whatever. Regardless of framework, the key is to create – and use – a matrix that helps you focus your security activities as a company.
  • 24. © Global Knowledge Training LLC. All rights reserved. Page 24 Activity Description Pen testing tool Security analyst tool Discovery / Reconnaissance Use active and passive scanning techniques to identify vulnerable people, processes, and systems. Whois, Shodan, Nmap, Metagoofil Phone call logs, End point log files (e.g., Windows / mobile phone logs) Penetration Use social engineering to deliver attack vector End user / Metasploit, shell commands Antivirus, centralized logging tools for end point and firewall Pen / escalation / lateral movement Transfer the Windows SAM, or the Linux /etc./shadow file. Metasploit (includes Meterpreter), BeEF Active Directory / Keberos / LDAP logs, SGUIL Pen / Persistence Decrypt the accounts database file/info John the Ripper / Online password cracking resources Tripwire, Splunk Persistence Insert a specific registry key to open a port or activate a service such as the Remote Desktop Protocol (RDP) Meterpreter / BeEF, scripts Regshot, WinMerge, RegistryChangesView Action on objectives / Data egress Obtain or change sensitive information Native tools on victim system Process Explorer, Snort, Sagan, Bro, any SIEM tool Lateral movement Identify pre-existing shares and stored credentials Native tools / Meterpreter AlienVault, Suricata
  • 26. © Global Knowledge Training LLC. All rights reserved. Page 26 Discovery / Reconnaissance nmap -O 10.0.2.20 • Types • Passive • Active • nmap – (active) • Whois (passive) • Maltego (passive) • Shodan (passive_ • Web site • Command line • Used with other applications
  • 27. © Global Knowledge Training LLC. All rights reserved. Page 27 Nmap (active) nmap -Pn -sS 10.0.2.20 nmap –O -sV -iL targets.txt nmap -T3 -d 10.0.2.20 -oX stanger.xml OS fingerprint, deep ports target file Timing, debugging, output (XML) Disable ping, SYN only nmap -Pn -sT -D 192.168.0.2,193.5.6.7 10.0.2.20 Disable ping, full connect, decoy
  • 28. © Global Knowledge Training LLC. All rights reserved. Page 28 Shodan (passive) • Search engine – passive scanning • Spider service reads banners • Provides searchable results • The Google for pen testers • Three modes • Web site • API • Application (Python)
  • 29. © Global Knowledge Training LLC. All rights reserved. Page 29 Maltego – providing more (passive) context • Information gathering  Accurate  Quick • Visual representation of how information flows between systems • Interconnections • Search • Context-specific • Helps find indicators of compromise
  • 30. © Global Knowledge Training LLC. All rights reserved. Page 30 Penetration / password dumping
  • 31. © Global Knowledge Training LLC. All rights reserved. Page 31 When it goes wrong  Not every attack is successful at first  Sometimes, the exploit goes too far  Consider the IoCs – System reboots – Memory dump files
  • 32. © Global Knowledge Training LLC. All rights reserved. Page 32 Overview of the hack – Using an online password cracker
  • 33. © Global Knowledge Training LLC. All rights reserved. Page 33 Persistence / upgrading
  • 34. © Global Knowledge Training LLC. All rights reserved. Page 34 Courses Security+ Certification Prep Course CASP+ CompTIA Advanced Security Practitioner Prep Course CySA+ Cybersecurity Analyst+ Prep Course
  • 35. © Global Knowledge Training LLC. All rights reserved. Page 35 Learning More GlobalKnowledge.com For additional on-demand and live webinars, white papers, courses, special offers and more, visit us at…
  • 36. James Stanger, PhD jstanger@comptia.org +1 (360) 970-5357 Twitter: @jamesstanger Skype: stangernet Thank you! My CompTIA hub: https://certification.comptia.org/it- career-news/hub/James-Stanger Latest articles and blog entries: Two sides of the same coin: Pen testing and security analytics Penetration, persistence, and future attacks (forthcoming, Admin Magazine) What’s hot in network certifications (NetworkWorld) Escaping the Cybersecurity Metrics Matrix (CompTIA) Private Eye: Open source tools for automated pen testing Admin Magazine Thoughts about the help desk (YouTube) The Hunt for the Meaning of the Red team (CompTIA) The IT security disconnect (HP Enterprise) A blockchain manifesto? A report from the RSA 2018 Blockchain Focus Group Cloud Orchestration with Chef – Admin Magazine No more close shaves: Talking end user security How CIOs can optimize ITSM software (SearchCIO) Vulnerability management: How to target bug bounty programs (TechTarget) My career change journey: The importance of networking The role of the service desk in the cybersecurity kill chain (HDI) How to prevent insiders from breaching your data (Forbes) Threat Hunting with Yara – Admin Magazine 10 critical security skills every IT team needs (interview, CIO Magazine) How AI can help you stay ahead of cybersecurity threats (CSO Magazine) Don’t hack me, bro! (Admin Magazine) At the hop: Security testing with hping3 (Linux Magazine)

Editor's Notes

  1. Typically, pen testing challenges depend upon the environment that you are investigating. Some of the challenges are technical. Many are personnel-based.
  2. To create a fake page, you can: Edit the hosts file or lmhosts file on a local system.
  3. Typically, pen testing challenges depend upon the environment that you are investigating. Some of the challenges are technical. Many are personnel-based.
  4. Typically, pen testing challenges depend upon the environment that you are investigating. Some of the challenges are technical. Many are personnel-based.
  5. We’ve seen in both recent times and in ancient times that if real leaders don’t take action, counterfeits will.
  6. The specific developers: Eric M. Hutchins, Michael J. Cloppert, and Rohan M. Amin
  7. http://www.forensicsciencesimplified.org/trace/principles.html Edmond Locard (France) – 1877 - 1966 In forensic science, Locard's exchange principle holds that the perpetrator of a crime will bring something into the crime scene and leave with something from it, and that both can be used as forensic evidence.
  8. Companies have adopted models similar to the “kill chain concept.” This model is from Target.
  9. We’ve seen in both recent times and in ancient times that if real leaders don’t take action, counterfeits will.
  10. URL: https://help.ubuntu.com/lts/serverguide/dhcp.html
  11. URL: https://help.ubuntu.com/lts/serverguide/dhcp.html
  12. URL: https://help.ubuntu.com/lts/serverguide/dhcp.html
  13. We’ve seen in both recent times and in ancient times that if real leaders don’t take action, counterfeits will.
  14. We’ve seen in both recent times and in ancient times that if real leaders don’t take action, counterfeits will.
  15. We’ve seen in both recent times and in ancient times that if real leaders don’t take action, counterfeits will.
  16. We’ve seen in both recent times and in ancient times that if real leaders don’t take action, counterfeits will.