36

“White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Embed Size (px)

Citation preview

Page 1: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary
Page 2: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

“White Hat Anonymity”: Current challenges security researchers face preforming

actionable OSINT

Christopher R. Barber, CISSP, C|EHv7Threat Analyst Solutionary Inc.

Security Engineering Research Team (SERT)

Page 3: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Introduction

• Member of Solutionary’s Security Engineering Research Team (SERT) specializing in threat intelligence and analysis

• Research and discovery of emerging threats and vulnerabilities

• Use of Open-Source Intelligence Techniques(OSINT) for tracking threat actor activities

• Analysis of threat landscape trends monthly and high level analysis annually

Page 4: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Outline

• Challenges

• Establishing Anonymity

• OSINT Tools and Techniques

• Sources

• Information Sharing

Page 5: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Challenges

• Anonymity Challenges

• Source Information Challenges • Intelligence Sharing Challenges

Page 6: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Anonymity Challenges

• Security policy prohibits the use of 3rd party VPN providers and access to TOR network

• Lack of funds, resources and personnel for the development of secure anonymous channels.

Page 7: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Source Information Challenges• Large volumes of information from a diverse

collection of sources

• Being able to discern between valid information and injected disinformation

• Personnel and Resources

Page 8: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Intelligence Sharing Challenges• Conflicts between organizations due to

differences in security policies

• Lack of security from collaborating organization leads to pivot point for compromise

Page 9: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Establishing Anonymity

• Having an unknown or unacknowledged name

• Having an unknown or withheld authorship or agency

• Having no distinctive character or recognition factor

• Being able to gather information in a manner that does not reveal your personal, professional, or organizations identity

Page 10: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Digital Paper Trail: The bread crumbs left as we traverse the cyber domain.

• IP Address

• User Agent

• Cookies

• Behavioral habits

Page 11: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Anonymizing Service Providers• Private Internet Access• HideMyAss• BlackVPN• IVPN• AirVPN• TorGuard

Page 12: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Anonymizing Virtual Machines

• Whonix

• Tor Middlebox

• Tails VM

Page 13: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Whonix

Page 14: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Tor Middlebox

• Works as proxy between host machine and Virtualbox

• Routes all VM traffic through Tor proxy on host machine

Page 15: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Tails Virtual Machine

Page 16: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Open-Source Intelligence

• Collection and analysis of information gathered from publicly available sources

• Sources involve any form of electronic or printed material available in the public domain

• Intelligence is obtained through the statistical analysis of the occurrence and relationships between pieces of information

Page 17: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Tools and Techniques for OSINT

• Collection Tools

• Search Engines

• Social Media

• Intelligence sources

Page 18: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Collection Tools

• Paterva/Maltego

• Recorded Future

Page 19: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Maltego

Page 20: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Recorded Future

Page 21: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Search Engines

• Google Custom Searches

• Iseek

• Addic-to-matic

• Shodan

Page 22: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Google Custom Search

Page 23: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Google Custom Search

Page 24: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

iSeek

Page 25: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Addict-o-matic

Page 26: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Shodan

Page 27: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Social Media

• Facebook

• Twitter

• Google+

Page 28: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Dump Sites

• Pastebin• Reddit• AnonPaste• PirateBay• Zone-H• Pastie

Page 29: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Honey Pots and Nets• Provides automated method for distributed

traffic analysis.• Provides early signs of malware or botnet

activities.

Page 30: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Intelligence Sources

• Cyber War News• The Hacker News• Darkreading.com• FirstHackNews

Page 31: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Shared Intelligence

• Intelligence Sharing Organizations

• Intelligence Assimilation and Sharing Applications

Page 32: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Intelligence Sharing Organizations

Page 33: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Intelligence Assimilation and Sharing Applications

• Structure Threat Information eXpression (STIX)

• Trusted Automated eXchange of Indicator Information (TAXII)

• Common Attack Pattern Enumeration and Classification (CAPEC)

Page 34: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Intelligence in Depth• Intelligence research and analysis

should be practiced with the idea of “defense in depth”.

• Validity and actionable predictions can only be made with the collective analysis of multiple sources.

Page 35: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Solutionary’s 2013 Global Threat Intelligence Report

http://go.solutionary.com/GTIR.html

Solutionary Minds Bloghttp://www.solutionary.com/resource-

center/blog/

Page 36: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary

Thank You

Questions?