SlideShare una empresa de Scribd logo
1 de 43
Abhinav Biswas Alapati Sarath


• APTs (Advanced Persistent Threats)

• Virtualization & Cloud Security
• Security vs Privacy vs Anonymity

• People - Process - Product (Era of ‘Smart’ Things)
• Cloud - M2M - Sensors

• From Virtualization to Containerization
• Shift in DevOps – Demo of Web hosting through containers

• TOR – Being Anonymous on Internet
• Demo of TOR hidden service

100 TB Data Stolen & Exposed, Twitter Profiles Defaced, State-Sponsored
 Personal Info of Employees,
 Corporate E-mails & Source Codes
 VPN security tokens & private keys
 Box Office Projections
 Copies of Unreleased Films
 GBs of Data Destroyed & Deleted
Initial Allegations on China & disgruntled Ex-employees of Sony.
US claims it’s by Hacktivists of North Korea
Privacy fears over 'smart' Barbie that can listen to your kids
 World’s First Interactive Doll
 Uses Voice Recognition technology
 Plays interactive games, tells jokes
 Tailors conversations based on history
– November 2015
 Users' account information,
 Home Wi-Fi networks, and
 Audio MP3 files recorded by the doll
Identity Theft – The Next Big Issue, Almost 157,000 People affected
3 employees of Wipro Call Centre, Kolkata got Arrested
 Personal Info of Employees & Families,
 Thousands of Bank account details, Credit Card numbers
 Telecom Usage Data & Statistics
Demonstrated at Black Hat USA 2015,
Chrysler Recalled 1.4M Vehicles for Bug Fix
Reverse Engineered Car Firmware & Communications Protocol,
taking over Dashboard functions, Steering, Transmission and Brakes
Yeah even it happened….
 An Italian Company,
founded in 2003
 Offensive Intrusion &
Surveillance Technologies
 Clients across a dozen of countries
in 6 different continents
 Spy as a Service
A Torrent file with 400GB of
internal documents, source code & email communications Leaked…
Advanced Persistent Threats (APT)
Lure Redirect Exploit
Kit
Dropper
File
Call
Home
Data
Theft
Recon
To protect our Systems, Networks & Data Centers
Let’s reconsider the technology behind security products
3 FORWARD FACING ONLY,
LACK OUTBOUND PROTECTION
No contextual analysis of Internal Threats.
2 LACK OF REAL-TIME
INLINE CONTENT ANALYSIS
No Byte-Range Data Packet Analysis for
Data Loss/ Theft Detection
Lame Firewall Policies
4 LACK OF ADVANCED ANALYTICS
& ANOMALY DETECTION
No Analytics in existing UTMs, NGFWs.
No SSL packet inspection.
1 PRIMARILY BASED ON
SIGNATURE & REPUTATION
Signature history cannot keep up with the
dynamic future of threats, No Sandboxing
What security researchers & companies are doing?

• Concept of the network perimeter evaporates (Co-located VMs)
- No Physical Segregation across VMs
• Lack of Persistence, Tougher Forensics

• Multi-Tenant Instance Isolation in SDDCs
• Randomized Memory mapping in Cloud Instances
• Homomorphic Encryption
SECURITY PRIVACY ANONYMITY
With the Era of ‘Smart’ Things.…
What is IOT Exactly?
 Refers to the ever-growing network of physical objects with
connectivity, communication and cognizance.
 What is “Things” in IoT ?
 By things it’s Smart Tablets Phones PC, Medical devices, POS
Terminals, ATM, Handheld Scanners, blah blah blah….
 But it’s much more
 Cloud & Network Enabled Infrastructure, Supply Chain Things,
Transactional Data, ERP Data, CRM Data, PLC Data, Public Data,
Social Data
IoT automates life, allows to connect with
people, machines and bots.
Things are getting ’Smart’er….
 Cheap Hardware costs
 Highly Available Data centers and Cloud Services
 Improved Data Analytics
 Manufacturing of Smart Devices
 Improved protocols and easy communication
 Sensors
• Proximity , accelerometer, Moisture , Gyroscope,
Ambient Light, heartbeat sensor, pedometer
• You are under continuous surveillance
 Connectivity
• WiFi, Bluetooth, ZigBee, Z-Wave
• 6LowPAN, Thread, Sigfox, Neul , LoRaWAN
 People & Process
• Cloud services, Micro services
• One-tap Remote management
“A person employed in a port
to load and unload ships.”
 Open platform to Build, Ship, Run distributed applications for
developers and sysadmins.
 Allows you to package an application with all of its dependencies
into a standardized unit for software development.
 You can separate your applications from your infrastructure &
treat your infrastructure like a managed application.
 Helps you ship code faster, test faster, deploy faster, and shorten
the cycle between writing code and running code.
 To run different applications on a
single machine, we installed virtual
machines.
 Virtualization allowed us to
• Run multiple operating systems on one
physical machine
• Move and copy virtual machines by saving
the entire state of a virtual machine to files
 An application along with
necessary binaries and libraries
and an entire guest operating
system installed all of which may
be tens of GBs in size.
A program that allocates the host hardware's
processor, memory & resources to each of VM or
Guest OS to be able to run its own programs.
 Native hypervisors (Type-1) run on the host's hardware
to control it as well as manage the virtual machines on it.
• E.g. Microsoft Hyper-V hypervisor, VMware ESX/ESXi, Oracle VM Server for
x86, KVM, or Citrix XenServer.
 Hosted hypervisors (Type-2) run as a software on top of
an OS such as Windows, Linux or FreeBSD
• E.g. Virtage hypervisor, VirtualBox and VMWare Workstation
 Containers have similar resource
isolation and allocation benefits
as VMs but a different
architectural approach allows
them to be much more portable
and efficient.
 Docker allows us to
i. Run applications without installing
entire guest operating systems.
ii. Deploy ready-to-run, portable
software, easier migration, and
faster restarts.
 Containers wrap up a piece of
software in a complete filesystem
that contains everything it needs
to run: code, runtime, system
tools, system libraries.
 But share the kernel with other
containers.
 They run as an isolated process in
userspace on the host operating
system.
 They’re also not tied to any
specific infrastructure – Docker
containers run on any computer,
on any infrastructure and in any
cloud.
 Docker Engine handles virtualization parameters
such as allocation of the file system when
launched. whereas the hypervisor needs to first
import the virtual machine,then power it up.
 A system administrator needs to maintain the
hypervisor for VM. However, the Docker engine is
lightweight container running on host OS.
 Accelerate Developer Onboarding, dynamically
change your application from adding new
capabilities to quickly changing problem areas.
 Eliminate Environment Inconsistencies
(“it works on my system”)
 Microsoft Azure
 Amazon web services
 Google Cloud platform
 Oracle Cloud
 RedHat Enterprise Linux
 IBM Bluemix
 Docker uses a client-server architecture.
 Docker client: The primary user interface to Docker.
- It accepts commands from the user and communicates
back & forth with a Docker daemon.
 Docker daemon: Runs on a host machine & does building,
running, and distributing Docker containers.
 Other Docker Resources
• Docker images: read-only templates from which Docker containers
are launched.(e.g. Ubuntu operating system with Apache server)
• Docker registries: public or private stores from which you upload or
download images
• Docker containers: everything that is needed for an application to
run.
 Installation of Docker
 Web Hosting through Containers
Smart Dust
I I
Deep Web & Dark Web
WikiLeaks
The Onion Router – Gateway to Anonymity
A free software and an open network that
simply makes you anonymous online.
 Conceals its users’ identity and their online activity from
surveillance and traffic analysis.
 Used by Activists, Whistle Blowers, Journalists, Sensitive
Businesses, Bloggers, Military
 Illicit Uses: Selling Drugs and Weapons, Silk Route, Child
Pornography
So to hide your privacy, hide behind a Onion
The Onion Router
 Layers of Encryption,
Peeled of at every subsequent node
 Each relay node knows only which
node gave it data & which node it is
giving data to
 Separate set of encryption keys for
each node along the complete circuit
No observer at any single point can tell
where the data came from or where it's going
The .onion domain
 Tor Browser
 Orbot
 Using Tor Browser to Connect to Internet
 Hosting Tor Hidden Service in 3 minutes
(https://xxxxyyyyzzzz.onion)
We tend to Over-estimate the effect of a technology in the short run
and Under-estimate the effect in the long run.
- Amara’s Law
“It ain't what you don't know that gets you into trouble.
It's what you know for sure that just ain't so.”
AbhinavBiswas@ecil.gov.in
@Abhinav_BIswas

Más contenido relacionado

La actualidad más candente

Linux Security Quick Reference Guide
Linux Security Quick Reference GuideLinux Security Quick Reference Guide
Linux Security Quick Reference Guide
wensheng wei
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 
iOS and BlackBerry Forensics
iOS and BlackBerry ForensicsiOS and BlackBerry Forensics
iOS and BlackBerry Forensics
Andrey Belenko
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
Nicholas Davis
 
iOS Forensics: Overcoming iPhone Data Protection
iOS Forensics: Overcoming iPhone Data ProtectioniOS Forensics: Overcoming iPhone Data Protection
iOS Forensics: Overcoming iPhone Data Protection
Andrey Belenko
 

La actualidad más candente (20)

Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]
 
Presentation
PresentationPresentation
Presentation
 
Beginners guide on how to start exploring IoT 2nd session
Beginners  guide on how to start exploring IoT 2nd sessionBeginners  guide on how to start exploring IoT 2nd session
Beginners guide on how to start exploring IoT 2nd session
 
Linux Security Quick Reference Guide
Linux Security Quick Reference GuideLinux Security Quick Reference Guide
Linux Security Quick Reference Guide
 
Lec 1 apln security(4pd)
Lec  1 apln security(4pd)Lec  1 apln security(4pd)
Lec 1 apln security(4pd)
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligenceOrder vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
OMG Data-Distribution Service Security
OMG Data-Distribution Service SecurityOMG Data-Distribution Service Security
OMG Data-Distribution Service Security
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
Icmis
IcmisIcmis
Icmis
 
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
 
CarolinaCon 2008 Rootkits Then and Now
CarolinaCon 2008 Rootkits Then and NowCarolinaCon 2008 Rootkits Then and Now
CarolinaCon 2008 Rootkits Then and Now
 
iOS and BlackBerry Forensics
iOS and BlackBerry ForensicsiOS and BlackBerry Forensics
iOS and BlackBerry Forensics
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 
iOS Forensics: Overcoming iPhone Data Protection
iOS Forensics: Overcoming iPhone Data ProtectioniOS Forensics: Overcoming iPhone Data Protection
iOS Forensics: Overcoming iPhone Data Protection
 
iPhone Data Protection in Depth
 iPhone Data Protection in Depth iPhone Data Protection in Depth
iPhone Data Protection in Depth
 

Destacado

Early renaissance masaccio pic6
Early renaissance masaccio pic6Early renaissance masaccio pic6
Early renaissance masaccio pic6
awparker
 
High renaissance michelangelol pic4
High renaissance michelangelol pic4High renaissance michelangelol pic4
High renaissance michelangelol pic4
awparker
 
Pre r pic2
Pre r pic2Pre r pic2
Pre r pic2
awparker
 
RCGSIDM_TnP_Brochure
RCGSIDM_TnP_BrochureRCGSIDM_TnP_Brochure
RCGSIDM_TnP_Brochure
Rajdip Das
 

Destacado (13)

Depression in dogs
Depression in dogsDepression in dogs
Depression in dogs
 
Early renaissance masaccio pic6
Early renaissance masaccio pic6Early renaissance masaccio pic6
Early renaissance masaccio pic6
 
High renaissance michelangelol pic4
High renaissance michelangelol pic4High renaissance michelangelol pic4
High renaissance michelangelol pic4
 
Studi Islam Paradigma Komprehensif
Studi Islam Paradigma KomprehensifStudi Islam Paradigma Komprehensif
Studi Islam Paradigma Komprehensif
 
Article Propiedad Industrial (14)
Article   Propiedad Industrial (14)Article   Propiedad Industrial (14)
Article Propiedad Industrial (14)
 
Pre r pic2
Pre r pic2Pre r pic2
Pre r pic2
 
Diversidades culturais
Diversidades culturaisDiversidades culturais
Diversidades culturais
 
CSB - DIPLOMA
CSB - DIPLOMACSB - DIPLOMA
CSB - DIPLOMA
 
RCGSIDM_TnP_Brochure
RCGSIDM_TnP_BrochureRCGSIDM_TnP_Brochure
RCGSIDM_TnP_Brochure
 
HIPERTENSION ARTERIAL FISIOPATOLOGIA
HIPERTENSION ARTERIAL FISIOPATOLOGIA HIPERTENSION ARTERIAL FISIOPATOLOGIA
HIPERTENSION ARTERIAL FISIOPATOLOGIA
 
Nifedipine (procardia)
Nifedipine (procardia)Nifedipine (procardia)
Nifedipine (procardia)
 
Sleep Apnea y Riesgo Cardiovascular.
Sleep Apnea y Riesgo Cardiovascular.Sleep Apnea y Riesgo Cardiovascular.
Sleep Apnea y Riesgo Cardiovascular.
 
Diureticos
DiureticosDiureticos
Diureticos
 

Similar a Geek Night 15.0 - Touring the Dark-Side of the Internet

Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
mohammadirfan136964
 

Similar a Geek Night 15.0 - Touring the Dark-Side of the Internet (20)

Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Immutable Infrastructure Security
Immutable Infrastructure SecurityImmutable Infrastructure Security
Immutable Infrastructure Security
 
Talk28oct14
Talk28oct14Talk28oct14
Talk28oct14
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmware
 
Security events in 2014
Security events in 2014Security events in 2014
Security events in 2014
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
Open source building blocks for the Internet of Things - Jfokus 2013
Open source building blocks for the Internet of Things - Jfokus 2013Open source building blocks for the Internet of Things - Jfokus 2013
Open source building blocks for the Internet of Things - Jfokus 2013
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Packet Forging over LAN
Packet Forging over LANPacket Forging over LAN
Packet Forging over LAN
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
 
VMI based malware detection in virtual environment
VMI based malware detection in virtual environmentVMI based malware detection in virtual environment
VMI based malware detection in virtual environment
 

Más de GeekNightHyderabad

Más de GeekNightHyderabad (20)

Testing strategies in microservices
Testing strategies in microservicesTesting strategies in microservices
Testing strategies in microservices
 
Metaprogramming ruby
Metaprogramming rubyMetaprogramming ruby
Metaprogramming ruby
 
Scaling enterprise digital platforms with kubernetes
Scaling enterprise digital platforms with kubernetesScaling enterprise digital platforms with kubernetes
Scaling enterprise digital platforms with kubernetes
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
 
Rendezvous with aucovei (autonomous connected car)
Rendezvous with aucovei (autonomous connected car)Rendezvous with aucovei (autonomous connected car)
Rendezvous with aucovei (autonomous connected car)
 
Role of AI & ML in beauty care industry
Role of AI & ML in beauty care industryRole of AI & ML in beauty care industry
Role of AI & ML in beauty care industry
 
Breaking down a monolith
Breaking down a monolithBreaking down a monolith
Breaking down a monolith
 
Design lean agile_thinking presentation
Design lean agile_thinking presentationDesign lean agile_thinking presentation
Design lean agile_thinking presentation
 
Scaling pipelines
Scaling pipelinesScaling pipelines
Scaling pipelines
 
Blockchain beyond bitcoin
Blockchain beyond bitcoinBlockchain beyond bitcoin
Blockchain beyond bitcoin
 
Http/2
Http/2Http/2
Http/2
 
Hardware hacking and internet of things
Hardware hacking and internet of thingsHardware hacking and internet of things
Hardware hacking and internet of things
 
Spring to Cloud - REST To Microservices
Spring to Cloud - REST To MicroservicesSpring to Cloud - REST To Microservices
Spring to Cloud - REST To Microservices
 
Serverless
ServerlessServerless
Serverless
 
Building Cloud Native Applications Using Spring Boot and Spring Cloud
Building Cloud Native Applications Using Spring Boot and Spring CloudBuilding Cloud Native Applications Using Spring Boot and Spring Cloud
Building Cloud Native Applications Using Spring Boot and Spring Cloud
 
Progressive Web Applications - The Next Gen Web Technologies
Progressive Web Applications - The Next Gen Web TechnologiesProgressive Web Applications - The Next Gen Web Technologies
Progressive Web Applications - The Next Gen Web Technologies
 
Scaling a Game Server: From 500 to 100,000 Users
Scaling a Game Server: From 500 to 100,000 UsersScaling a Game Server: From 500 to 100,000 Users
Scaling a Game Server: From 500 to 100,000 Users
 
Big Data - Need of Converged Data Platform
Big Data - Need of Converged Data PlatformBig Data - Need of Converged Data Platform
Big Data - Need of Converged Data Platform
 
Building a Data Lake - An App Dev's Perspective
Building a Data Lake - An App Dev's PerspectiveBuilding a Data Lake - An App Dev's Perspective
Building a Data Lake - An App Dev's Perspective
 
Understanding the Intelligent Cloud
Understanding the Intelligent CloudUnderstanding the Intelligent Cloud
Understanding the Intelligent Cloud
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Geek Night 15.0 - Touring the Dark-Side of the Internet

  • 2.   • APTs (Advanced Persistent Threats)  • Virtualization & Cloud Security • Security vs Privacy vs Anonymity  • People - Process - Product (Era of ‘Smart’ Things) • Cloud - M2M - Sensors  • From Virtualization to Containerization • Shift in DevOps – Demo of Web hosting through containers  • TOR – Being Anonymous on Internet • Demo of TOR hidden service 
  • 3.
  • 4. 100 TB Data Stolen & Exposed, Twitter Profiles Defaced, State-Sponsored  Personal Info of Employees,  Corporate E-mails & Source Codes  VPN security tokens & private keys  Box Office Projections  Copies of Unreleased Films  GBs of Data Destroyed & Deleted Initial Allegations on China & disgruntled Ex-employees of Sony. US claims it’s by Hacktivists of North Korea
  • 5. Privacy fears over 'smart' Barbie that can listen to your kids  World’s First Interactive Doll  Uses Voice Recognition technology  Plays interactive games, tells jokes  Tailors conversations based on history – November 2015  Users' account information,  Home Wi-Fi networks, and  Audio MP3 files recorded by the doll
  • 6. Identity Theft – The Next Big Issue, Almost 157,000 People affected 3 employees of Wipro Call Centre, Kolkata got Arrested  Personal Info of Employees & Families,  Thousands of Bank account details, Credit Card numbers  Telecom Usage Data & Statistics
  • 7. Demonstrated at Black Hat USA 2015, Chrysler Recalled 1.4M Vehicles for Bug Fix Reverse Engineered Car Firmware & Communications Protocol, taking over Dashboard functions, Steering, Transmission and Brakes
  • 8. Yeah even it happened….  An Italian Company, founded in 2003  Offensive Intrusion & Surveillance Technologies  Clients across a dozen of countries in 6 different continents  Spy as a Service A Torrent file with 400GB of internal documents, source code & email communications Leaked…
  • 9. Advanced Persistent Threats (APT) Lure Redirect Exploit Kit Dropper File Call Home Data Theft Recon
  • 10. To protect our Systems, Networks & Data Centers
  • 11. Let’s reconsider the technology behind security products 3 FORWARD FACING ONLY, LACK OUTBOUND PROTECTION No contextual analysis of Internal Threats. 2 LACK OF REAL-TIME INLINE CONTENT ANALYSIS No Byte-Range Data Packet Analysis for Data Loss/ Theft Detection Lame Firewall Policies 4 LACK OF ADVANCED ANALYTICS & ANOMALY DETECTION No Analytics in existing UTMs, NGFWs. No SSL packet inspection. 1 PRIMARILY BASED ON SIGNATURE & REPUTATION Signature history cannot keep up with the dynamic future of threats, No Sandboxing
  • 12. What security researchers & companies are doing?  • Concept of the network perimeter evaporates (Co-located VMs) - No Physical Segregation across VMs • Lack of Persistence, Tougher Forensics  • Multi-Tenant Instance Isolation in SDDCs • Randomized Memory mapping in Cloud Instances • Homomorphic Encryption SECURITY PRIVACY ANONYMITY
  • 13. With the Era of ‘Smart’ Things.…
  • 14. What is IOT Exactly?
  • 15.  Refers to the ever-growing network of physical objects with connectivity, communication and cognizance.  What is “Things” in IoT ?  By things it’s Smart Tablets Phones PC, Medical devices, POS Terminals, ATM, Handheld Scanners, blah blah blah….  But it’s much more  Cloud & Network Enabled Infrastructure, Supply Chain Things, Transactional Data, ERP Data, CRM Data, PLC Data, Public Data, Social Data IoT automates life, allows to connect with people, machines and bots.
  • 16. Things are getting ’Smart’er….  Cheap Hardware costs  Highly Available Data centers and Cloud Services  Improved Data Analytics  Manufacturing of Smart Devices  Improved protocols and easy communication
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.  Sensors • Proximity , accelerometer, Moisture , Gyroscope, Ambient Light, heartbeat sensor, pedometer • You are under continuous surveillance  Connectivity • WiFi, Bluetooth, ZigBee, Z-Wave • 6LowPAN, Thread, Sigfox, Neul , LoRaWAN  People & Process • Cloud services, Micro services • One-tap Remote management
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. “A person employed in a port to load and unload ships.”  Open platform to Build, Ship, Run distributed applications for developers and sysadmins.  Allows you to package an application with all of its dependencies into a standardized unit for software development.  You can separate your applications from your infrastructure & treat your infrastructure like a managed application.  Helps you ship code faster, test faster, deploy faster, and shorten the cycle between writing code and running code.
  • 27.  To run different applications on a single machine, we installed virtual machines.  Virtualization allowed us to • Run multiple operating systems on one physical machine • Move and copy virtual machines by saving the entire state of a virtual machine to files  An application along with necessary binaries and libraries and an entire guest operating system installed all of which may be tens of GBs in size.
  • 28. A program that allocates the host hardware's processor, memory & resources to each of VM or Guest OS to be able to run its own programs.  Native hypervisors (Type-1) run on the host's hardware to control it as well as manage the virtual machines on it. • E.g. Microsoft Hyper-V hypervisor, VMware ESX/ESXi, Oracle VM Server for x86, KVM, or Citrix XenServer.  Hosted hypervisors (Type-2) run as a software on top of an OS such as Windows, Linux or FreeBSD • E.g. Virtage hypervisor, VirtualBox and VMWare Workstation
  • 29.  Containers have similar resource isolation and allocation benefits as VMs but a different architectural approach allows them to be much more portable and efficient.  Docker allows us to i. Run applications without installing entire guest operating systems. ii. Deploy ready-to-run, portable software, easier migration, and faster restarts.
  • 30.  Containers wrap up a piece of software in a complete filesystem that contains everything it needs to run: code, runtime, system tools, system libraries.  But share the kernel with other containers.  They run as an isolated process in userspace on the host operating system.  They’re also not tied to any specific infrastructure – Docker containers run on any computer, on any infrastructure and in any cloud.
  • 31.  Docker Engine handles virtualization parameters such as allocation of the file system when launched. whereas the hypervisor needs to first import the virtual machine,then power it up.  A system administrator needs to maintain the hypervisor for VM. However, the Docker engine is lightweight container running on host OS.  Accelerate Developer Onboarding, dynamically change your application from adding new capabilities to quickly changing problem areas.  Eliminate Environment Inconsistencies (“it works on my system”)
  • 32.  Microsoft Azure  Amazon web services  Google Cloud platform  Oracle Cloud  RedHat Enterprise Linux  IBM Bluemix
  • 33.  Docker uses a client-server architecture.  Docker client: The primary user interface to Docker. - It accepts commands from the user and communicates back & forth with a Docker daemon.  Docker daemon: Runs on a host machine & does building, running, and distributing Docker containers.  Other Docker Resources • Docker images: read-only templates from which Docker containers are launched.(e.g. Ubuntu operating system with Apache server) • Docker registries: public or private stores from which you upload or download images • Docker containers: everything that is needed for an application to run.
  • 34.  Installation of Docker  Web Hosting through Containers
  • 36. I I Deep Web & Dark Web WikiLeaks
  • 37.
  • 38. The Onion Router – Gateway to Anonymity A free software and an open network that simply makes you anonymous online.  Conceals its users’ identity and their online activity from surveillance and traffic analysis.  Used by Activists, Whistle Blowers, Journalists, Sensitive Businesses, Bloggers, Military  Illicit Uses: Selling Drugs and Weapons, Silk Route, Child Pornography So to hide your privacy, hide behind a Onion
  • 39. The Onion Router  Layers of Encryption, Peeled of at every subsequent node  Each relay node knows only which node gave it data & which node it is giving data to  Separate set of encryption keys for each node along the complete circuit No observer at any single point can tell where the data came from or where it's going
  • 40. The .onion domain  Tor Browser  Orbot
  • 41.  Using Tor Browser to Connect to Internet  Hosting Tor Hidden Service in 3 minutes (https://xxxxyyyyzzzz.onion)
  • 42. We tend to Over-estimate the effect of a technology in the short run and Under-estimate the effect in the long run. - Amara’s Law
  • 43. “It ain't what you don't know that gets you into trouble. It's what you know for sure that just ain't so.” AbhinavBiswas@ecil.gov.in @Abhinav_BIswas

Notas del editor

  1. Disclaimer: Not representing the Employer
  2. The Skull Splash Page on Japan Office – Guardians of Peace Twitter Account – CEO Go to Hell Administrators shut down its worldwide network and disabled VPN connections and Wi-Fi access to control the intrusion. Malware called Wiper, specifically designed for Sony networks, Ranswomware State-sponsored attacks, Stuxnet 2010 Consider Impact, Loss of Brand Image etc. 7 lawsuits were filed against Sony. Still being hacked…!!!
  3. Company Mattel - 2015 Progressive Machine Learning Features Digital Assistants like Apple’s Siri, Google’s Now, Microsoft’s Cortana Failed to validate SSL Certificates. MITM Just imagine, what can happen if this doll teaches offensive things to your kid. It is connected to AI Engine that allows the doll to have cognitive conversations with your kid This seems a very interesting proposition Note intelligence is not put into the doll….it’s connected to those massive computers of digital world. Progressive Machine Learning Features Digital Assistants like Apple’s Siri, Google’s Now, Microsoft’s Cortana This was hacked. The doll failed to validate SSL Certificates and hence the hacker quite cunningly used MITM Attacks to get control over the doll. He got access to the all audio files recorded by the doll. He could penetrate into the home wifi network and was able to sniff user credentials for regular internet traffic. Bt is this the only threat. Just imagine, what can happen if this doll teaches offensive things to your kid. What if someone is eavesdropping on our children without our knowledge. Now, Eavesdropping can also happen through other smart devices.. Like smart TVs..
  4. Broadband & Telecom Company, Ransom asked, but ignored. Classic case of Idetity Theft, which is raising concerns for Privacy Think About Vodafone Fraudsters can easily create a fake bank account in ur name & take loans
  5. Consider this car by Chrysler…The Jeep Cherokee An awesome SUV with smart features like hands-free voice command control for dashboard funtions, smart infotainment system with capabilities of integration with your icloud & google drive. You can easily create a wifi hotspot for the fellow passengers using 4G LTE embedded into the car. So a pretty nice car with cool smart features…bt it was hacked. It was demonstated in Blackhat Conf last year. These guys Reverse Engineered Car Firmware & Communications Protocol, And took over Dashboard functions, Steering, Transmission and Brakes They Remotely controlled the car & showed how they can crash the car without the knowledge of the driver.
  6. Founders are the developers of Open Source Security Pentesting Tool EtterCap  Small Company of 40 employees Clients are Governments, Law enforcement agencies, Fortune 100 companies across a dozen of countries in 6 different continents. Consultancy to Interpol. from Bahrain to Uzbekistan, Ethiopia to Sudan – to spy on spy on journalists, activists, political opposition etc. Nobody knows how they were hacked. Two types of companies – One who are hacked & they know about it & Others who are hacked & they don’t know it.
  7. All 5 attacks were innovative in their own way, state-sponsored, ransomware, Identity theft, Privacy problems. Recon- Social Engineering Lure- Weakest Link Redirect- C&C Servers. Exploit kit- Will scan & move across network. Dropper- Payload. Meterpreter Session, Remote shell. Call Home. - ECIL
  8. But Is this enough? Nasscom - 1 million cyber security professionals needed by 2020
  9. I can’t imagine a data centre without virtualization these days., BYOD, Blue Pill Attack. Apple vs FBI.. Whatsapp now encrypted. Banking Transaction Example So, there’s a lot of challenges that we are facing in the cyber space…
  10. We started with smart phones, smart watches…then moving on to smart TVs, smart refrigerators, smart bulbs, smart electric meters, and Combining them all together we have smart home. We are also talking about smart traffic management, smart retail, smart healthcare, smart energy, smart industries, smart agriculture, and finally we are building a smart planet I suppose.... With the advent of Iot, we are drifting into an era of smart things.
  11. But why is every ‘thing’ getting smarter? Is it just a marketing gimmick. Or the things are really getting smarter. If yes, what is making things smart… Call upon Sarath
  12. Time for break…
  13. Fully autonomous computing system… Smaller than the size of a grain of rice. Less than a half a centimeter Small computers have sensors, a processor and a radio in it to transmit data. Solar cells power the battery with ambient light Sensing temperature, pressure, and taking images. Collective Swarm…Fog Computing – Micro Cloud....Putting it into soil for smart Agricultures..But dark side.. These device have no security built-in. All collected sensor data is published in open air using radio waves. Now, We are not able to secure one Iot device...Imagine how difficult it would be to secure a cluster of these small small devices.
  14. Identity Thefts – Cloning of Smart Cards. Don’t care from where the data is coming…Let the data come.
  15. Google is tracking everything Keeping your online activities away from prying eyes of governments, advertisers, stalkers and even your boss. 26/11 Attacks – C&C through TOR.
  16. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination.
  17. Silk Route
  18. I believe in Amara’s law, We tend to Overstimate technology in the short run and Understimate the impact of it on the long run.