SlideShare una empresa de Scribd logo
1 de 22
Identify, prevent and secure against
       the unidentifiable attacks


Presented by:
Dr Steven Turner, VP of Optimisation, Intergence

Alan Cottom, CISSP, Solutions Architect, Stonesoft
Optimising your connected world.



Thank you for joining our webinar
•   Please note
     • During this webinar, we will be using Audio Broadcast. The small
       box in the right hand corner will need to remain open throughout
•   To chat to the host
     • click on the speech bubble in the top right hand corner, then type
       in the text box
•   To submit a question
     • click on the question mark in the top right hand corner and open the
       Q&A box
•   Experiencing technical difficulties?
     • please email news@intergence.com or speak to us directly through
       the chat bar
Optimising your connected world.



Agenda
The webinar has three parts

Alan Cottom; Advanced Evasion Techniques; are you
protected?

Steve Turner; Hyperglance live demo

Q&A section
Advanced Evasion
Techniques (AET)
Are you protected?



Alan Cottom – Solutions Architect, Stonesoft
Physical & Virtual Security Appliances
Evasion (definition)
 Evasion techniques are a means to          disguise and/or
   modify cyber attacks to avoid detection and blocking by
   information security systems. Evasions enable advanced and
   hostile cyber criminals to deliver any malicious content,
   exploit or attack to a vulnerable system without
    detection, that would normally be detected and stopped.
 Security systems are rendered ineffective against such
   evasion techniques. (In the same way a stealth fighter can attack without
   detection by radar and other defensive systems)
Evasion timeline
             • First papers appeared detailing attacks against or
               ways to bypass network intrusion detection.
   1997-98


             • Possibility to combine evasions suggested
    2004


             • 12 (or so) known “traditional” evasion methods
             • Stonesoft R&D begin research
    2007
Evasion timeline
           • Stonesoft share findings on new evasion threat
           • Stonesoft deliver 23 STACKABLE AETs to CERT
   2010

           • February – Stonesoft deliver 124 new AETs
           • October – Stonesoft deliver further 160 new AETs
   2011

           • Approx. 2^300 Advanced Evasion Techniques
   Today
Advanced Evasion Techniques (AET)
 What are they?
   Any technique used to implement network based attacks in order to
   evade and bypass security detection


 What makes them advanced?
   Combination of evasions working simultaneously on multiple protocol
   layers
   Combination of evasions that can change during the attack
   Carefully designed to evade inspection


 Typically, AETs are used as part of Advanced
 Persistent Threats (APT)
   APT = Motivation – i.e. we want to target you or your organisation
   AET = Method – i.e. the way in which we will attempt to gain entry
Surely my current IPS/IDS/NGFW
can stop them?
 Stonesoft have run tests against all of the highest ranked security devices
 from the Gartner Magic Quadrant

 It is possible to effortlessly evade most market-leading security solutions by
 using one or more advanced evasion techniques (AETs).

 All products are running the latest versions and updates.

 StoneGate products were originally vulnerable but now include
 comprehensive protection against AETs as standard.
AETs in action
                                  AET Test Environment


  Untrusted Network                   Security Device(s)   Protected Network




                [Exploit with AETs]




       Predator                                                  Target
     [AET Attack]                                             [Vulnerable]
         Tool                                                     Host

                                       Gartner Magic
                                        Quadrant
                                      IPS/IDS/NGFW
                                         Solutions
AETs in action…

     AET Demonstration
Protection Against AETs
Multi-layer Traffic Normalization
• StoneGate IPS decodes and normalizes traffic
  for inspection on all protocol layers.
• Fingerprints detect exploits in the normalized
  data stream.

Dynamic Protection
• StoneGate IPS software upgrades update the
  Layered Normalization on all protocol layers.
• When new Anti-Evasion updates are available,
  the StoneGate Management Center can
  upgrade IPS engines remotely.
Vertical Inspection of the data traffic
Packet, segment or pseudo -packet based inspection process


                               Maximum Inspection Space

Data Traffic


Application
Protocol layers                             3
(Streams)



                                            2

TCP level
Segments,
pseudo packets
                                            1


 IP level
 Packets



        Limited Protocol                        Partial or No Evasion Removal                 Detect and Block Exploits
1       decoding and inspection         2       Majority of the traffic is left without   3   Unreliable or impossible exploit detection
        capability to gain speed.               evasion removal and inspected with            when evasion are not removed on all layers.
                                                limited context information available.
Horizontal
Data stream based, full Stack normalization and inspection process




Data Traffic
                                                                  …Continuous Inspection Space…



Application
Protocol level
(Streams)                                  1                       2                       3                       4



TCP level
Segments,                                  1
pseudo packets




 IP level
 Packets                                    1

       Normalize traffic on all       Advanced Evasion                      Detect exploits from the fully       Alert and report
                                                                                                             4   Evasion attacks
1      protocol layers as a       2   removal process makes the        3    evasion free data stream.
       continious process.            traffic evasion free and                                                   through management
                                      exploits detectable.                                                       system
Stonesoft AET Differentiators
Stonesoft FW / IPS                         Description
Full-stack visibility                      Stonesoft decodes and normalizes traffic on all protocol layers

Normalization based evasion removal        Normalization process remove the evasions before the data
                                           stream inspection

Horizontal data stream-based inspection    Vulnerability based fingerprints detect exploits in the
                                           normalized data stream

Inhouse evasion research and tools         Evasion-proof product quality assured with automated evasion
                                           fuzzing tests (PREDATOR)

Built-in evasion recognition and logging   Anomaly and evasion information included into threat context



Dynamic updates & upgrades                 Antievasion technology automatically updated to Next-
                                           Generation IPS and Firewall engines
AERT - Advanced Evasion Readiness Test
AETs - Comment

“Advanced Evasion            “If the network security       “Recent research indicates
Techniques can evade         system misses any type of      that Advanced Evasion
many network security        evasion it means a hacker      Techniques are real and
systems. We were able to     can use an entire class of     credible – not to mention
validate Stonesoft’s         exploits to circumvent         growing –a growing threat
research and believe that    security products,             against the network security
these Advanced Evasion       rendering them virtually       infrastructure that protects
Techniques can result in     useless. Advanced Evasion      governments, commerce and
lost corporate assets with   Techniques increase the        information-sharing
potentially serious          potential of evasion success   worldwide. Network security
consequences for breached    against the IPS, which         vendors need to devote the
organizations.”              creates a serious concern      research and resources to
                             for today’s networks.”         finding a solution.“
– Jack Walsh, Program
Manager                      – Rick Moy, President          – Bob Walder, Research
                                                            Director
alan.cottom@stonesoft.com
www.stonesoft.com
Optimising your connected world.




DEMONSTRATION
Optimising your connected world.




Q&A


      Any Questions?
Optimising your connected world.




Thank You for attending!
If you require more information or would like to book
a one to one demo :

contact us at +44 (0)845 226 4167
or drop us an email at contact@intergence.com

Or come along to our Executive Seminars across the
UK! Visit our website for more information!

Más contenido relacionado

La actualidad más candente

Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsRahul Mohandas
 
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)sequi_inc
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
Evading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitEvading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitn|u - The Open Security Community
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюPositive Hack Days
 
eForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensicsMag
 
Some things about LAN device detection
Some things about LAN device detectionSome things about LAN device detection
Some things about LAN device detectionCanaan Kao
 
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS VillageMaster Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS VillageChris Sistrunk
 
Machine learning cybersecurity boon or boondoggle
Machine learning cybersecurity boon or boondoggleMachine learning cybersecurity boon or boondoggle
Machine learning cybersecurity boon or boondogglePriyanka Aash
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsRod Soto
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataJames Sirota
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS CommunicationsDigital Bond
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidFraunhofer AISEC
 
Recomended ip telephony architecture
Recomended ip telephony architectureRecomended ip telephony architecture
Recomended ip telephony architectureFeras Ajjawi
 
Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Byres Security Inc.
 
[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system운상 조
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSChris Sistrunk
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Digital Bond
 
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...Disha Bedi
 

La actualidad más candente (20)

Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
 
Day4
Day4Day4
Day4
 
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Evading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitEvading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploit
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
 
eForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teaser
 
Some things about LAN device detection
Some things about LAN device detectionSome things about LAN device detection
Some things about LAN device detection
 
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS VillageMaster Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS Village
 
Machine learning cybersecurity boon or boondoggle
Machine learning cybersecurity boon or boondoggleMachine learning cybersecurity boon or boondoggle
Machine learning cybersecurity boon or boondoggle
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
 
Recomended ip telephony architecture
Recomended ip telephony architectureRecomended ip telephony architecture
Recomended ip telephony architecture
 
Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2
 
[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
 

Destacado

IEC(МЭК). Разработка стандартов.
IEC(МЭК). Разработка стандартов.IEC(МЭК). Разработка стандартов.
IEC(МЭК). Разработка стандартов.Normdocs
 
The World This Week - 18th - 22nd April, 2016
The World This Week - 18th - 22nd April, 2016The World This Week - 18th - 22nd April, 2016
The World This Week - 18th - 22nd April, 2016Karvy Private Wealth
 
The World This Week - 14th to 18th March, 2016
The World This Week - 14th to 18th March, 2016The World This Week - 14th to 18th March, 2016
The World This Week - 14th to 18th March, 2016Karvy Private Wealth
 
Carol reid resume_medical
Carol reid resume_medicalCarol reid resume_medical
Carol reid resume_medicalCAROL REID
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSEOrange Business Services
 
Conceptualizacion de la Planificacion. monicaparra
Conceptualizacion de la Planificacion. monicaparraConceptualizacion de la Planificacion. monicaparra
Conceptualizacion de la Planificacion. monicaparramonicapc20
 
Escuela superior politécnica de chimborazo
Escuela superior politécnica de chimborazoEscuela superior politécnica de chimborazo
Escuela superior politécnica de chimborazoLiss Riwe
 
ResumeofJosephAmato.docx
ResumeofJosephAmato.docxResumeofJosephAmato.docx
ResumeofJosephAmato.docxJoseph Amato
 
ASTM. Вступление страны в ВТО с точки зрения организации, разрабатывающей ста...
ASTM. Вступление страны в ВТО с точки зрения организации, разрабатывающей ста...ASTM. Вступление страны в ВТО с точки зрения организации, разрабатывающей ста...
ASTM. Вступление страны в ВТО с точки зрения организации, разрабатывающей ста...Normdocs
 
DNV. Введение в PED 97/23/EC.
DNV. Введение в PED 97/23/EC.DNV. Введение в PED 97/23/EC.
DNV. Введение в PED 97/23/EC.Normdocs
 
Fortalecimiento y desarrollo rural integral de los Afrocolombianos: el caso d...
Fortalecimiento y desarrollo rural integral de los Afrocolombianos: el caso d...Fortalecimiento y desarrollo rural integral de los Afrocolombianos: el caso d...
Fortalecimiento y desarrollo rural integral de los Afrocolombianos: el caso d...Fundación Acua
 
Cloud Computing and Records Management
Cloud Computing and Records ManagementCloud Computing and Records Management
Cloud Computing and Records Managementgbroadbent67
 
Hướng dẫn lập trình quản lý c#
Hướng dẫn lập trình quản lý c#Hướng dẫn lập trình quản lý c#
Hướng dẫn lập trình quản lý c#An Nguyen
 
Responsive Design & Accessibility
Responsive Design & AccessibilityResponsive Design & Accessibility
Responsive Design & AccessibilityDesarae Veit
 
09.02.2012 Mongolian economic outlook, Dr. D. Khashchuluun
09.02.2012 Mongolian economic outlook, Dr. D. Khashchuluun09.02.2012 Mongolian economic outlook, Dr. D. Khashchuluun
09.02.2012 Mongolian economic outlook, Dr. D. KhashchuluunThe Business Council of Mongolia
 

Destacado (20)

IEC(МЭК). Разработка стандартов.
IEC(МЭК). Разработка стандартов.IEC(МЭК). Разработка стандартов.
IEC(МЭК). Разработка стандартов.
 
The World This Week - 18th - 22nd April, 2016
The World This Week - 18th - 22nd April, 2016The World This Week - 18th - 22nd April, 2016
The World This Week - 18th - 22nd April, 2016
 
The World This Week - 14th to 18th March, 2016
The World This Week - 14th to 18th March, 2016The World This Week - 14th to 18th March, 2016
The World This Week - 14th to 18th March, 2016
 
01 tec ufro
01 tec ufro01 tec ufro
01 tec ufro
 
vanderLaan
vanderLaanvanderLaan
vanderLaan
 
Sales Enablement Strategies
Sales Enablement StrategiesSales Enablement Strategies
Sales Enablement Strategies
 
Carol reid resume_medical
Carol reid resume_medicalCarol reid resume_medical
Carol reid resume_medical
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
 
Conceptualizacion de la Planificacion. monicaparra
Conceptualizacion de la Planificacion. monicaparraConceptualizacion de la Planificacion. monicaparra
Conceptualizacion de la Planificacion. monicaparra
 
Escuela superior politécnica de chimborazo
Escuela superior politécnica de chimborazoEscuela superior politécnica de chimborazo
Escuela superior politécnica de chimborazo
 
ResumeofJosephAmato.docx
ResumeofJosephAmato.docxResumeofJosephAmato.docx
ResumeofJosephAmato.docx
 
PgM ITTOs
PgM ITTOsPgM ITTOs
PgM ITTOs
 
Mark Perriam Profile
Mark Perriam ProfileMark Perriam Profile
Mark Perriam Profile
 
ASTM. Вступление страны в ВТО с точки зрения организации, разрабатывающей ста...
ASTM. Вступление страны в ВТО с точки зрения организации, разрабатывающей ста...ASTM. Вступление страны в ВТО с точки зрения организации, разрабатывающей ста...
ASTM. Вступление страны в ВТО с точки зрения организации, разрабатывающей ста...
 
DNV. Введение в PED 97/23/EC.
DNV. Введение в PED 97/23/EC.DNV. Введение в PED 97/23/EC.
DNV. Введение в PED 97/23/EC.
 
Fortalecimiento y desarrollo rural integral de los Afrocolombianos: el caso d...
Fortalecimiento y desarrollo rural integral de los Afrocolombianos: el caso d...Fortalecimiento y desarrollo rural integral de los Afrocolombianos: el caso d...
Fortalecimiento y desarrollo rural integral de los Afrocolombianos: el caso d...
 
Cloud Computing and Records Management
Cloud Computing and Records ManagementCloud Computing and Records Management
Cloud Computing and Records Management
 
Hướng dẫn lập trình quản lý c#
Hướng dẫn lập trình quản lý c#Hướng dẫn lập trình quản lý c#
Hướng dẫn lập trình quản lý c#
 
Responsive Design & Accessibility
Responsive Design & AccessibilityResponsive Design & Accessibility
Responsive Design & Accessibility
 
09.02.2012 Mongolian economic outlook, Dr. D. Khashchuluun
09.02.2012 Mongolian economic outlook, Dr. D. Khashchuluun09.02.2012 Mongolian economic outlook, Dr. D. Khashchuluun
09.02.2012 Mongolian economic outlook, Dr. D. Khashchuluun
 

Similar a Webinar on identifying, preventing and securing against the unidentifiable attacks

Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
 
SoleraNetworks
SoleraNetworksSoleraNetworks
SoleraNetworksJoe Levy
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics NetworkCollaborators
 
Malware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemMalware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemCyphort
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTLee Wei Yeong
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
Ansaldo STS at CPExpo 2013:  "Risks and Security Management in Logistics and ...Ansaldo STS at CPExpo 2013:  "Risks and Security Management in Logistics and ...
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...Leonardo
 
Cyber Security in Railways Systems, Ansaldo STS experience
Cyber Security in Railways Systems, Ansaldo STS  experienceCyber Security in Railways Systems, Ansaldo STS  experience
Cyber Security in Railways Systems, Ansaldo STS experienceCommunity Protection Forum
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacksdkaya
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Penetration testing, What’s this?
Penetration testing, What’s this?Penetration testing, What’s this?
Penetration testing, What’s this?Dmitry Evteev
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityIvanti
 
SIP Flooding Attack Detection Using Hybrid Detection Algorithm
SIP Flooding Attack Detection Using Hybrid Detection AlgorithmSIP Flooding Attack Detection Using Hybrid Detection Algorithm
SIP Flooding Attack Detection Using Hybrid Detection AlgorithmEditor IJMTER
 

Similar a Webinar on identifying, preventing and securing against the unidentifiable attacks (20)

Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 
SoleraNetworks
SoleraNetworksSoleraNetworks
SoleraNetworks
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Malware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemMalware Most Wanted: Security Ecosystem
Malware Most Wanted: Security Ecosystem
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APT
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
Ansaldo STS at CPExpo 2013:  "Risks and Security Management in Logistics and ...Ansaldo STS at CPExpo 2013:  "Risks and Security Management in Logistics and ...
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
 
Cyber Security in Railways Systems, Ansaldo STS experience
Cyber Security in Railways Systems, Ansaldo STS  experienceCyber Security in Railways Systems, Ansaldo STS  experience
Cyber Security in Railways Systems, Ansaldo STS experience
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
 
Regan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&akRegan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&ak
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
NetWitness
NetWitnessNetWitness
NetWitness
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Iscsp apt
Iscsp aptIscsp apt
Iscsp apt
 
Penetration testing, What’s this?
Penetration testing, What’s this?Penetration testing, What’s this?
Penetration testing, What’s this?
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
SIP Flooding Attack Detection Using Hybrid Detection Algorithm
SIP Flooding Attack Detection Using Hybrid Detection AlgorithmSIP Flooding Attack Detection Using Hybrid Detection Algorithm
SIP Flooding Attack Detection Using Hybrid Detection Algorithm
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Webinar on identifying, preventing and securing against the unidentifiable attacks

  • 1. Identify, prevent and secure against the unidentifiable attacks Presented by: Dr Steven Turner, VP of Optimisation, Intergence Alan Cottom, CISSP, Solutions Architect, Stonesoft
  • 2. Optimising your connected world. Thank you for joining our webinar • Please note • During this webinar, we will be using Audio Broadcast. The small box in the right hand corner will need to remain open throughout • To chat to the host • click on the speech bubble in the top right hand corner, then type in the text box • To submit a question • click on the question mark in the top right hand corner and open the Q&A box • Experiencing technical difficulties? • please email news@intergence.com or speak to us directly through the chat bar
  • 3. Optimising your connected world. Agenda The webinar has three parts Alan Cottom; Advanced Evasion Techniques; are you protected? Steve Turner; Hyperglance live demo Q&A section
  • 4. Advanced Evasion Techniques (AET) Are you protected? Alan Cottom – Solutions Architect, Stonesoft
  • 5. Physical & Virtual Security Appliances
  • 6. Evasion (definition) Evasion techniques are a means to disguise and/or modify cyber attacks to avoid detection and blocking by information security systems. Evasions enable advanced and hostile cyber criminals to deliver any malicious content, exploit or attack to a vulnerable system without detection, that would normally be detected and stopped. Security systems are rendered ineffective against such evasion techniques. (In the same way a stealth fighter can attack without detection by radar and other defensive systems)
  • 7. Evasion timeline • First papers appeared detailing attacks against or ways to bypass network intrusion detection. 1997-98 • Possibility to combine evasions suggested 2004 • 12 (or so) known “traditional” evasion methods • Stonesoft R&D begin research 2007
  • 8. Evasion timeline • Stonesoft share findings on new evasion threat • Stonesoft deliver 23 STACKABLE AETs to CERT 2010 • February – Stonesoft deliver 124 new AETs • October – Stonesoft deliver further 160 new AETs 2011 • Approx. 2^300 Advanced Evasion Techniques Today
  • 9. Advanced Evasion Techniques (AET) What are they? Any technique used to implement network based attacks in order to evade and bypass security detection What makes them advanced? Combination of evasions working simultaneously on multiple protocol layers Combination of evasions that can change during the attack Carefully designed to evade inspection Typically, AETs are used as part of Advanced Persistent Threats (APT) APT = Motivation – i.e. we want to target you or your organisation AET = Method – i.e. the way in which we will attempt to gain entry
  • 10. Surely my current IPS/IDS/NGFW can stop them? Stonesoft have run tests against all of the highest ranked security devices from the Gartner Magic Quadrant It is possible to effortlessly evade most market-leading security solutions by using one or more advanced evasion techniques (AETs). All products are running the latest versions and updates. StoneGate products were originally vulnerable but now include comprehensive protection against AETs as standard.
  • 11. AETs in action AET Test Environment Untrusted Network Security Device(s) Protected Network [Exploit with AETs] Predator Target [AET Attack] [Vulnerable] Tool Host Gartner Magic Quadrant IPS/IDS/NGFW Solutions
  • 12. AETs in action… AET Demonstration
  • 13. Protection Against AETs Multi-layer Traffic Normalization • StoneGate IPS decodes and normalizes traffic for inspection on all protocol layers. • Fingerprints detect exploits in the normalized data stream. Dynamic Protection • StoneGate IPS software upgrades update the Layered Normalization on all protocol layers. • When new Anti-Evasion updates are available, the StoneGate Management Center can upgrade IPS engines remotely.
  • 14. Vertical Inspection of the data traffic Packet, segment or pseudo -packet based inspection process Maximum Inspection Space Data Traffic Application Protocol layers 3 (Streams) 2 TCP level Segments, pseudo packets 1 IP level Packets Limited Protocol Partial or No Evasion Removal Detect and Block Exploits 1 decoding and inspection 2 Majority of the traffic is left without 3 Unreliable or impossible exploit detection capability to gain speed. evasion removal and inspected with when evasion are not removed on all layers. limited context information available.
  • 15. Horizontal Data stream based, full Stack normalization and inspection process Data Traffic …Continuous Inspection Space… Application Protocol level (Streams) 1 2 3 4 TCP level Segments, 1 pseudo packets IP level Packets 1 Normalize traffic on all Advanced Evasion Detect exploits from the fully Alert and report 4 Evasion attacks 1 protocol layers as a 2 removal process makes the 3 evasion free data stream. continious process. traffic evasion free and through management exploits detectable. system
  • 16. Stonesoft AET Differentiators Stonesoft FW / IPS Description Full-stack visibility Stonesoft decodes and normalizes traffic on all protocol layers Normalization based evasion removal Normalization process remove the evasions before the data stream inspection Horizontal data stream-based inspection Vulnerability based fingerprints detect exploits in the normalized data stream Inhouse evasion research and tools Evasion-proof product quality assured with automated evasion fuzzing tests (PREDATOR) Built-in evasion recognition and logging Anomaly and evasion information included into threat context Dynamic updates & upgrades Antievasion technology automatically updated to Next- Generation IPS and Firewall engines
  • 17. AERT - Advanced Evasion Readiness Test
  • 18. AETs - Comment “Advanced Evasion “If the network security “Recent research indicates Techniques can evade system misses any type of that Advanced Evasion many network security evasion it means a hacker Techniques are real and systems. We were able to can use an entire class of credible – not to mention validate Stonesoft’s exploits to circumvent growing –a growing threat research and believe that security products, against the network security these Advanced Evasion rendering them virtually infrastructure that protects Techniques can result in useless. Advanced Evasion governments, commerce and lost corporate assets with Techniques increase the information-sharing potentially serious potential of evasion success worldwide. Network security consequences for breached against the IPS, which vendors need to devote the organizations.” creates a serious concern research and resources to for today’s networks.” finding a solution.“ – Jack Walsh, Program Manager – Rick Moy, President – Bob Walder, Research Director
  • 20. Optimising your connected world. DEMONSTRATION
  • 21. Optimising your connected world. Q&A Any Questions?
  • 22. Optimising your connected world. Thank You for attending! If you require more information or would like to book a one to one demo : contact us at +44 (0)845 226 4167 or drop us an email at contact@intergence.com Or come along to our Executive Seminars across the UK! Visit our website for more information!

Notas del editor

  1. Thank you very much ladies and gentlemen for joining us today. My name is Robert Smith from Intergence Systems and I am delighted to welcome Stace Hipperson from Real-Status, who will present later in the Webinar. Hyperglancever 1.3 is the subject our webinar today.<click>
  2. Just some housekeeping to start with:During this webinar, we will be using Audio Broadcast. The small box in the right hand corner will need to remain open throughoutTo chat to the hostclick on the speech bubble in the top right hand corner, then type in the text boxTo submit a questionclick on the question mark in the top right hand corner and open the Q&A boxIf you are Experiencing technical difficultiesplease email news@intergence.com or speak to us directly through the chat bar<click>
  3. <click>We have a simple agenda today. It is split up in to 3 parts<click>I will be presenting a brief background on Intergence and some background on why Hyperglance was created<click>I will then hand over to Stace Hipperson who will be demonstrating ver 1.3 of Hyperglance<click>And finally there will be an interactive question and answer section<click>
  4. Application Protocol layers (http, SMB, Netbios etc.)
  5. IPSMBIt is possible to segment SMB write data (e.g. MSRPC) into arbitrary sized segments. It is also possible to multiplex SMB writes to different named pipes or files within a single TCP connection.Stonesoftapproach:SMB protocol decoding and validation performedMSRPCMSRPC support both little and big endian encoding of data. Little endian is normally used but implementations accept also big endian, which can be used as evasion in some cases. Stonesoftapproach:Fragmented RPC messages can be used as an obfuscation method to hide attacks. Stonesoft IPS defragments fragmented MSRPC requests. To apply the right fingerprints, Stonesoft IPS follows the protocol execution and provides the fingerprinting system the necessary service information (object UUID, opnum field, endianness) in addition to the request payload data. It also explicitly follows some evasion techniques, like changing the endiannessin the middle of a connection.
  6. I would now like to pass you over to Stace Hipperson, CTO of Real-Status
  7. <click>