The document provides an overview of Windows event analysis for security investigation and auditing purposes. It discusses important event IDs related to logins, logouts, and object access, along with the key fields in these events that allow correlation of activities. Examples of event descriptions and search queries are also provided to help identify users, objects, and activities of interest during an investigation.
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
?
Printer has become one of the essential devices in the corporate intranet for the past few years, and its functionalities have also increased significantly. Not only print or fax, cloud printing services like AirPrint are also being supported as well to make it easier to use. Direct printing from mobile devices is now a basic requirement in the IoT era. We also use it to print some internal business documents of the company, which makes it even more important to keep the printer safe.
Nowadays, most of the printers on the market do not have to be connected with USB or traditional cable. As long as you are using a LAN cable connected to the intranet, the computer can find and use the printer immediately. Most of them are based on protocols such as SLP and LLMNR. But is it really safe when vendors adopt those protocols? Furthermore, many printers do not use traditional Linux systems, but use RTOS(Real-Time Operating System) instead, how will this affect the attacker?
In this talk, we will use Canon ImageCLASS MF644Cdw and HP Color LaserJet Pro MFP M283fdw as case study, showing how to analyze and gain control access to the printer. We will also demonstrate how to use the vulnerabilities to achieve RCE in RTOS in unauthenticated situations.
Open-source intelligence (OSINT) refers to information gathered from publicly available sources including social media sites, traditional media, maps, government reports, and academic papers. OSINT tools are used to gather intelligence from these sources through activities like searching metadata, websites, and databases. Common OSINT tools mentioned are Maltego for relationships, Google Hacking Database for search operators, Metagoofil for document metadata, Shodan for devices, Spiderfoot for automation, TheHarvester for online profiles, and FOCA for hidden information. While useful, OSINT has limitations like information overload and potential false positives.
This document describes OWASP Dependency-Track, a tool for continuous component analysis to reduce open source risk. It integrates with vulnerability databases and monitors applications to identify vulnerabilities. Dependency-Track is designed for automated DevOps environments to accelerate development while monitoring component usage and risk. It supports ingesting software bills of materials during CI/CD to analyze components continuously and provide notifications.
The document provides biographies and background information on two cyber threat hunters, Teymur Kheirkhabarov and Sergey Soldatov. It then discusses the process of cyber threat hunting, including collecting log and system event data from endpoints, analyzing that data using tools like Yara and Cuckoo Sandbox, and manually investigating anomalies through iterative hypothesis testing to detect advanced threats. Examples are given of how threat hunters traced back the steps of an attacker who compromised a system by injecting code into the LSASS process and establishing persistence via a scheduled task. The document emphasizes that threat hunting requires both machine analysis of large datasets as well as human reasoning to uncover sophisticated threats that evade other security solutions.
The document discusses the FIDO Alliance, which aims to address password problems and vulnerabilities by developing open authentication standards called FIDO. FIDO uses public key cryptography during authentication to securely verify users to online services from any device. The Alliance has over 250 members developing FIDO specifications and certification programs to advance adoption. Several large companies have implemented FIDO standards to strengthen authentication for their users and services.
Talk on Kaspersky lab's CoLaboratory: Industrial Cybersecurity Meetup #5 with @HeirhabarovT about several ATT&CK practical use cases.
Video (in Russian): https://www.youtube.com/watch?v=ulUF9Sw2T7s&t=3078
Many thanks to Teymur for great tech dive
The document summarizes FireEye's cybersecurity products and services. It discusses how the evolving threat landscape is dissolving security perimeters and creating skills shortages. It then outlines FireEye's network security, email security, endpoint security, and Helix security operations platform products. It also describes FireEye's threat intelligence, managed defense services, and Mandiant consulting services for incident response and strategic advisory work.
Building a Security Operations Center (SOC).pdfTapOffice
?
Ben Rothke presented on building a Security Operations Center (SOC). He discussed the need for a SOC due to the large amounts of security data organizations face. A SOC provides continuous monitoring, protection, detection and response against threats. It is the nucleus of security operations. Rothke outlined the components and functions of an effective SOC, and discussed deciding whether to build an internal SOC or outsource to a managed security service provider. He provided questions to consider for each approach to help organizations determine the best option.
This document outlines a presentation on threat hunting with Splunk. It discusses threat hunting basics, data sources for threat hunting, understanding endpoints, and the cyber kill chain model. The agenda includes a hands-on walkthrough of attacking scenario detection using Splunk. Advanced threat hunting techniques, enterprise security investigations, and applying machine learning to security are also covered.
Presented at GSMA Mobile Connect + FIDO Alliance: The Future of Strong Authentication
By: Rolf Lindemann, Senior Director of Technology and Products, Nok Nok Labs
Threat hunting involves proactively searching networks to detect threats like advanced persistent threats that evade existing security systems. It is done through a hunting loop of forming hypotheses based on analytics, intelligence, or situational awareness, investigating through tools and data, uncovering patterns and indicators, and informing analytics. Various methods can be used for hunting like DNS fuzzing to find malicious domains, analyzing passive DNS data, web server logs, emails, and Windows logs. Open source tools used include Maeltego CE, YARA, and AIEngine, while commercial tools are Sqrrl, Exabeam, Infocyte HUNT, Mantix4, and AI Hunter.
The document provides biographies and background information on two cyber threat hunters, Teymur Kheirkhabarov and Sergey Soldatov. It then discusses the process of cyber threat hunting, including collecting log and system event data from endpoints, analyzing that data using tools like Yara and Cuckoo Sandbox, and manually investigating anomalies through iterative hypothesis testing to detect advanced threats. Examples are given of how threat hunters traced back the steps of an attacker who compromised a system by injecting code into the LSASS process and establishing persistence via a scheduled task. The document emphasizes that threat hunting requires both machine analysis of large datasets as well as human reasoning to uncover sophisticated threats that evade other security solutions.
The document discusses the FIDO Alliance, which aims to address password problems and vulnerabilities by developing open authentication standards called FIDO. FIDO uses public key cryptography during authentication to securely verify users to online services from any device. The Alliance has over 250 members developing FIDO specifications and certification programs to advance adoption. Several large companies have implemented FIDO standards to strengthen authentication for their users and services.
Talk on Kaspersky lab's CoLaboratory: Industrial Cybersecurity Meetup #5 with @HeirhabarovT about several ATT&CK practical use cases.
Video (in Russian): https://www.youtube.com/watch?v=ulUF9Sw2T7s&t=3078
Many thanks to Teymur for great tech dive
The document summarizes FireEye's cybersecurity products and services. It discusses how the evolving threat landscape is dissolving security perimeters and creating skills shortages. It then outlines FireEye's network security, email security, endpoint security, and Helix security operations platform products. It also describes FireEye's threat intelligence, managed defense services, and Mandiant consulting services for incident response and strategic advisory work.
Building a Security Operations Center (SOC).pdfTapOffice
?
Ben Rothke presented on building a Security Operations Center (SOC). He discussed the need for a SOC due to the large amounts of security data organizations face. A SOC provides continuous monitoring, protection, detection and response against threats. It is the nucleus of security operations. Rothke outlined the components and functions of an effective SOC, and discussed deciding whether to build an internal SOC or outsource to a managed security service provider. He provided questions to consider for each approach to help organizations determine the best option.
This document outlines a presentation on threat hunting with Splunk. It discusses threat hunting basics, data sources for threat hunting, understanding endpoints, and the cyber kill chain model. The agenda includes a hands-on walkthrough of attacking scenario detection using Splunk. Advanced threat hunting techniques, enterprise security investigations, and applying machine learning to security are also covered.
Presented at GSMA Mobile Connect + FIDO Alliance: The Future of Strong Authentication
By: Rolf Lindemann, Senior Director of Technology and Products, Nok Nok Labs
Threat hunting involves proactively searching networks to detect threats like advanced persistent threats that evade existing security systems. It is done through a hunting loop of forming hypotheses based on analytics, intelligence, or situational awareness, investigating through tools and data, uncovering patterns and indicators, and informing analytics. Various methods can be used for hunting like DNS fuzzing to find malicious domains, analyzing passive DNS data, web server logs, emails, and Windows logs. Open source tools used include Maeltego CE, YARA, and AIEngine, while commercial tools are Sqrrl, Exabeam, Infocyte HUNT, Mantix4, and AI Hunter.
38. IoT エコシステム全体を保護しましょう
Microsoft Azure は ゼロトラスト を
IoT セキュリティ対策の基礎とするために
必要な製品、サービスを提供します
Microsoft の IoT セキュリティをより深く知る
Learn more about Microsoft and Zero Trust
Learn more about Azure IoT security solutions