47
Hackers & Hacking a brief overview http://www.slideshare.net/gohsuket Gohsuke Takama / 高間 剛典, Meta Associates, May 2016

Hackers and Hacking a brief overview 5-26-2016

Embed Size (px)

Citation preview

Page 1: Hackers and Hacking a brief overview 5-26-2016

Hackers & Hacking a brief overview

http://www.slideshare.net/gohsuket

Gohsuke Takama / 高間 剛典, Meta Associates, May 2016

Page 2: Hackers and Hacking a brief overview 5-26-2016

about me…

✴Gohsuke Takama (https://www.linkedin.com/in/gohsuketakama)✴Meta Associates (http://www.meta-associates.com/)

✴ founder & president, connector, analyst, planner✴co-organizer of security conferences: BlackHat Japan, PacSec ✴ liaison of international security businesses: Patch Advisor, SecWest✴coordinator on network security testing & simulation exercises for corps:

Internet Services,Telecom, Infrastructure, Manufacturing, etc✴ lectures: CodeGate 2008, Japan Federation of Bar Association, etc✴ international research for Ministry of Internal Affairs & Communication,

Telecom corps, Infrastructure corps and others: ✴visited DHS, NIST, NERC, EPRI, Stanford Research, Sandia Lab, Bell

Lab, ISAC Council, John Arquilla (Naval Postgraduate School), Richard Clarke, John Tritak, Paul Kurtz (Good Harbor Consulting)

✴organizer of tech entrepreneur/startup support events✴ independent tech journalist for over 10 years ✴ security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/

✴Privacy International (London, UK http://www.privacyinternational.org/) ✴advisory board member

Page 3: Hackers and Hacking a brief overview 5-26-2016

what is hacker?

Page 4: Hackers and Hacking a brief overview 5-26-2016

what is hacker? Definition

Gohsuke Takamahttps://en.wikipedia.org/wiki/Hacker

Page 5: Hackers and Hacking a brief overview 5-26-2016

what is hacker? Hackers in 1980's

Gohsuke Takama

https://www.youtube.com/watch?v=-t0aHIXuFrchttps://en.wikipedia.org/wiki/Hackers:_Heroes_of_the_Computer_Revolution

Page 6: Hackers and Hacking a brief overview 5-26-2016

what is hacker? Hackers in 1980's

Gohsuke Takamahttps://en.wikipedia.org/wiki/The_Hackers_Conference

Page 7: Hackers and Hacking a brief overview 5-26-2016

what is hacker? Hackers in 1980's

Gohsuke Takamahttps://en.wikipedia.org/wiki/Hackers:_Heroes_of_the_Computer_Revolution

Page 8: Hackers and Hacking a brief overview 5-26-2016

what is hacker? "Information wants to be free"

Gohsuke Takamahttps://en.wikipedia.org/wiki/Information_wants_to_be_free

Page 9: Hackers and Hacking a brief overview 5-26-2016

what is hacker? "Free Software"

Gohsuke Takamahttps://en.wikipedia.org/wiki/Free_software

http://www.gnu.org/philosophy/free-sw.en.html

Page 10: Hackers and Hacking a brief overview 5-26-2016

what is hacker? "Copyleft"

Gohsuke Takamahttps://www.gnu.org/licenses/copyleft.en.html

Page 11: Hackers and Hacking a brief overview 5-26-2016

what is hacker? Free Software Foundation

Gohsuke Takamahttp://www.fsf.org/

Page 12: Hackers and Hacking a brief overview 5-26-2016

what is hacker? Cypherpunks

Gohsuke Takamahttps://www.cypherpunks.to/faq/cyphernomicron/chapter3.html

http://www.wired.com/1993/02/crypto-rebels/

Page 13: Hackers and Hacking a brief overview 5-26-2016

what is hacker? Hackers vs Cracker

Hacker (expert), any of several types of persons

vs Cracker = Criminal hacker

Page 14: Hackers and Hacking a brief overview 5-26-2016

what is hacker? Lifehacker...?

Gohsuke Takamahttp://lifehacker.com/

Page 15: Hackers and Hacking a brief overview 5-26-2016

what is hacker? Makers

Gohsuke Takamahttp://makerfaire.com/

Page 16: Hackers and Hacking a brief overview 5-26-2016

what is hacker? Makers

Gohsuke Takamahttp://makezine.com/make-45/

Page 17: Hackers and Hacking a brief overview 5-26-2016

who are hackers?

Page 18: Hackers and Hacking a brief overview 5-26-2016

who are hackers? what Color?

• Black Hat

• offender, bad guys, outlaws, criminal intent

• White Hat

• defender, security personnel, work under laws

• Grey Hat

• marginal

• "The World isn't just Black and White"

Page 19: Hackers and Hacking a brief overview 5-26-2016

who are hackers? how about Hacktivists?

Gohsuke Takamahttps://en.wikipedia.org/wiki/Anonymous_(group)

https://www.youtube.com/watch?v=_kJtvFUMELM

Page 20: Hackers and Hacking a brief overview 5-26-2016

who are hackers? Nation State backed Hackers

Gohsuke Takama http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls

http://www.telegraph.co.uk/news/worldnews/europe/germany/10407972/NSA-denies-Barack-Obama-was-informed-of-Angela-Merkel-phone-tapping.htmlhttp://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html

Page 21: Hackers and Hacking a brief overview 5-26-2016

who are hackers? Nation State backed Hackers

Gohsuke Takama

http://www.theguardian.com/world/interactive/2013/jun/07/obama-cyber-directive-full-text

Page 22: Hackers and Hacking a brief overview 5-26-2016

who are hackers? Nation State backed Hackers

Gohsuke Takama

http://www.theregister.co.uk/2015/04/10/china_great_cannon/http://blog.erratasec.com/2015/04/pin-pointing-chinas-attack-against.html#.VSvS4Rya1wd

Page 23: Hackers and Hacking a brief overview 5-26-2016

who are hackers? it's Complicated

• Technologists: technical curiosity

• Idealists: technical freedom

• Criminals: money

• Hacktivists: ideology

• Nation State: political power

• Patriot Hackers: nationalism

• Hackers for Hire: just business

Page 24: Hackers and Hacking a brief overview 5-26-2016

who are hackers? Motivation

Money

Political Power

Curiosity

Ideology

Dual Use Technology: - designed function- malfunction- legitimate use- criminal use

Criminals

Technologist Hacker

Nation StateIntelligence

ExtremistHacktivist

Patriot HackerHackers for Hire

Idealist Hacker

Page 25: Hackers and Hacking a brief overview 5-26-2016

who are hackers? Hackers for Hire

Gohsuke Takama

http://www.hackingteam.it/https://en.wikipedia.org/wiki/Hacking_Team

Page 26: Hackers and Hacking a brief overview 5-26-2016

who are hackers? Hackers for Hire

Gohsuke Takama

http://www.finfisher.com/FinFisher/en/index.phphttp://wikileaks.org/spyfiles/files/0/289_GAMMA-201110-FinSpy.pdf

Page 27: Hackers and Hacking a brief overview 5-26-2016

Gohsuke Takama

http://internet.gawker.com/investigators-think-this-uk-isis-defector-is-behind-the-1679699893

who are hackers? Patriot Hacker

http://en.wikipedia.org/wiki/TeaMp0isoN

Page 28: Hackers and Hacking a brief overview 5-26-2016

Gohsuke Takama

http://www.washingtonpost.com/world/foreign-fighters-flow-to-syria/2015/01/27/7fa56b70-a631-11e4-a7c2-03d37af98440_graphic.html

who are hackers? Patriot Hacker

Page 29: Hackers and Hacking a brief overview 5-26-2016

how hackers are recognized?

Page 30: Hackers and Hacking a brief overview 5-26-2016

how hackers are recognized? in books

• Hackers: Heroes of the Computer Revolution, 1984

• Cuckoo's Egg, 1989

• Cyberpunk, 1991

• Takedown, 1996

• Crypto, 2001

• Hacker Cracker, 2002

Page 31: Hackers and Hacking a brief overview 5-26-2016

how hackers are recognized? in movies

• WarGames, 1983• Brainstorm, 1983• Sneakers, 1992• Hackers, 1995• Pirates in Silicon Valley, 1999 (TV special)• Takedown, 2000• V for Vendetta, 2005• The Girl with the Dragon Tattoo, 2009, 2011• We are Legion, 2012• Fifth Estate, 2013• Citizenfour, 2014• Mr. Robot, 2015 (TV series)

Page 32: Hackers and Hacking a brief overview 5-26-2016

how hackers are recognized? in movies

Gohsuke Takamahttps://www.youtube.com/watch?v=Ug4fRXGyIak

http://www.hulu.com/mr-robot

Page 33: Hackers and Hacking a brief overview 5-26-2016

what is "hacking"?

Page 34: Hackers and Hacking a brief overview 5-26-2016

what is "hacking"? Bug, Vulnerability, Exploit

• Bug?

• mistakes

• Vulnerability?

• mistakes that have special weakness

• Exploit?

• program codes that exploit vulnerabilities

• Von Neumann machine

https://en.wikipedia.org/wiki/Von_Neumann_architecture

Page 35: Hackers and Hacking a brief overview 5-26-2016

what is "hacking"? Von Neumann machine

https://en.wikipedia.org/wiki/Von_Neumann_architecture

Page 36: Hackers and Hacking a brief overview 5-26-2016

"know your enemy: hacking techniques"

• phishing

• targeted phishing

• trojan (malware)

• spyware

• ransomeware

• key logger

• 0day expoit

• rootkit

• botnet DDoS

• botnet SPAM

• content altering

• website spoofing

• XSS

• XSRF

• code injection

• IP hijacking

• sniffer

• rogue WiFi AP

• shadow IoT

• attacks on SCADA

Page 37: Hackers and Hacking a brief overview 5-26-2016

Targeted Attacks & Phishings Primary Targets1次ターゲット

Spoofed Websites改変/偽装されたウェブサイト

Cyber Espionage, Cyber Criminal Orgサイバースパイ、サイバー犯罪組織

Higher Targets高次ターゲット

Major Corps 基幹企業

Financial Sector 金融機関

Gov / Military 政府/軍事機関

Attacks攻撃

Page 38: Hackers and Hacking a brief overview 5-26-2016

DDoS gets larger

Gohsuke Takama

http://www.techworld.com/news/security/worlds-largest-ddos-attack-reached-400gbps-says-arbor-networks-3595715/http://krebsonsecurity.com/2014/02/the-new-normal-200-400-gbps-ddos-attacks/

Page 39: Hackers and Hacking a brief overview 5-26-2016

malware attacks on SCADA

Gohsuke Takama

http://www.reuters.com/article/us-ukraine-cybersecurity-exclusive-idUSKCN0V51H1http://www.wired.com/2016/01/everything-we-know-about-ukraines-power-plant-hack/

Page 40: Hackers and Hacking a brief overview 5-26-2016

infrastructure attack: SCADA

Supervisory Control And Data Acquisition

Page 41: Hackers and Hacking a brief overview 5-26-2016

infrastructure attack: SCADA "Stuxnet" attack on Iran's nuclear plant

Page 42: Hackers and Hacking a brief overview 5-26-2016

"whom targeted, why"

http://www.hackmageddon.com/category/security/cyber-attacks-timeline/

Page 43: Hackers and Hacking a brief overview 5-26-2016

Money

Power

Curiosity

Ideology

Dual Technology: - designed function- malfunction- legitimate use- criminal use

OrganizedCriminals

Technologist Hacker

Nation StateCommand

ExtremistHacktivist

who are hackers? Motivation

APT

HacktivismTheftFraud

Ransom

InfrastructureDisruption

Lulz

DDoS

Surveillance

Page 44: Hackers and Hacking a brief overview 5-26-2016

4 Content

3 OS/Application

2 Device

1 Physical

5 Operation

6 Custom (Habit)

7 Psychological

Tangibles

Intangibles

Human Factor

cognition

behavior

rules

data

software

"a security layer model "

hardware

environment

Page 45: Hackers and Hacking a brief overview 5-26-2016

"attacks vs. counter measures "

Psychological APT, espionage, phishing, social engineering ?

Customspyware, spoofing,

phishing spam, XSS, XSRF, ID spoof/theft, pharming

accustomed best practice, awareness, CIRT, PKI, digital signature, IDM

Operation DoS, spam, ransomware, sabotage-ware

security policy, audit, routing, filtering, CIRT

Content sniffing, spyware, spam, alteration

encryption, filtering, digital signature, host

IDS, content-scan

OS/ Application

DoS, vuln exploit, 0day, rootkit, botnet

Firewall, network IDS, IPS, anti-virus, OS/app patch

Device direct access, tampering, alteration

perimeter guard, anti- tampering, hard seal

Physical lock pick, break in, vandalism

surveillance, perimeter alarm, armed guard

Attacks Counter Measures

Page 46: Hackers and Hacking a brief overview 5-26-2016
Page 47: Hackers and Hacking a brief overview 5-26-2016

about…

✴ Gohsuke Takama / 高間剛典, Meta Associates http://www.meta-associates.com/✴代表, ITセキュリティ・データプライバシー・コンサルタント

✴ Privacy International, London, UK アドバイザリー役員 http://www.privacyinternational.org/

✴国際プロジェクトコーディネート, 国際調査研究✴ セキュリティ国際会議/セミナーの日本側制作運営: Black Hat Japan, PacSec

✴ 海外専門家招聘によるセキュリティ監査運営 (ネット企業, エネルギーインフラ企業, 等)

✴ 緊急事態シミュレーション・テーブルトップ演習等の企画・実施運営 (電機メーカー等)

✴ 国際調査訪問: DHS, NIST, NERC, EPRI, Stanford Research, Sandia研, Bell研, ISAC Council, John Arquilla(NPS米海軍大学院), Richard Clarke, John Tritak, Paul Kurtz (Good Harbor Consulting)

✴ 調査報告書: 総務省「電子政府・電子自治体のプライバシーに関する調査研究報告書」「住民のプライバシーの保護に関する新しい考え方と電子自治体におけるそのシステム的な担保の仕組みについての研究会報告書」, エネルギーインフラ企業, テレコム企業, 他

✴ 海外セキュリティ企業の日本窓口: Patch Advisor(セキュリティ監査), SecWest (セミナー)

✴ ITセキュリティ, データプライバシーに関する戦略分析・ディレクション(電機メーカー等)

✴ レクチャー: CodeGate2008 (韓国), 日本弁護士連合会人権シンポジウム (2002, 2010), 他✴ セキュリティメディアでの執筆: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/

Gohsuke Takama