survey of cyber moving targets second edition
play

Survey of Cyber Moving Targets Second Edition Authors: B.C. Ward - PowerPoint PPT Presentation

Survey of Cyber Moving Targets Second Edition Authors: B.C. Ward S.R. Gomez R.W. Skowyra D. Bigelow J.N. Martin J.W. Landry H. Okhravi Presenter: Jinghui Liao Outline Cyber Kill Chain Attack technique Moving-targets technique


  1. Survey of Cyber Moving Targets Second Edition Authors: B.C. Ward S.R. Gomez R.W. Skowyra D. Bigelow J.N. Martin J.W. Landry H. Okhravi Presenter: Jinghui Liao

  2. Outline ´ Cyber Kill Chain ´ Attack technique ´ Moving-targets technique ´ Weakness

  3. Cyber Kill Chain ´ Reconnaissance ´ Access ´ Exploit Development ´ Attack Launch ´ Persistence

  4. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  5. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  6. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Leakage of cryptographic keys from memory(WannaCry) ´ Side-channel attacks(spectre meltdown)

  7. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  8. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Exhaust or manipulate shared resources ´ Denial-of-service using CPU saturation

  9. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  10. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  11. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ buffer overflow ´ script injection ´ SQL injection

  12. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  13. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Timing ´ Ordering ´ Arguments ´ Return-oriented programming (ROP)

  14. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  15. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Fake identity ´ Man-in-the-middle ´ Phishing

  16. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  17. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Compromise authentication process ´ Cross-site scripting

  18. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  19. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  20. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  21. https://www.bloomberg.com/news/features/2018- 10-04/the-big-hack-how-china-used-a-tiny-chip-to- infiltrate-america-s-top-companies

  22. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  23. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  24. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Format ´ Syntax ´ Encoding ´ Encryption ´ Representation

  25. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  26. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Instructions ´ Order ´ Grouping ´ Format

  27. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  28. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  29. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Code ´ Libraries ´ Stack/heap ´ Functions

  30. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  31. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Interface presented by the operating system

  32. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  33. Moving-Targets ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ OS version ´ CPU architecture ´ OS instance ´ Platform data format

  34. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  35. Moving-Targets ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks ´ Protocols ´ Addresses

  36. WEAKNESSES ´ Overcome Movement ´ Predict Movement ´ Limit Movement ´ Disable Movement

  37. Thank you!

Recommend


More recommend