-
Notifications
You must be signed in to change notification settings - Fork 0
/
camp2023-57062-eng-Stories_from_the_Life_of_an_Incident_Responder_opus.srt
2348 lines (1761 loc) · 50.3 KB
/
camp2023-57062-eng-Stories_from_the_Life_of_an_Incident_Responder_opus.srt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1
00:00:00,000 --> 00:00:29,980
[ Music ]
2
00:00:29,980 --> 00:00:33,060
>> Hello and good evening on day two
3
00:00:33,060 --> 00:00:37,060
of the Chaos Communication Camp 2023.
4
00:00:37,060 --> 00:00:39,580
It's late in the evening.
5
00:00:39,580 --> 00:00:42,180
This is Millie Way stage, in case you're wondering.
6
00:00:42,180 --> 00:00:48,340
And the next talk is going to be about incident responses.
7
00:00:48,340 --> 00:00:52,400
So if you're curious about how do you even get there
8
00:00:52,400 --> 00:00:55,540
to have an incident response, how you could prepare
9
00:00:55,540 --> 00:00:58,500
for an incident response, and how you could support
10
00:00:58,500 --> 00:01:02,180
in your organization the incident response team
11
00:01:02,180 --> 00:01:06,700
in doing their job and trying to fix whatever broke.
12
00:01:06,700 --> 00:01:08,440
Let's put it that way.
13
00:01:08,440 --> 00:01:11,180
We have the right talk for you.
14
00:01:11,180 --> 00:01:14,200
This is stories from the life of an incident --
15
00:01:14,200 --> 00:01:17,120
from incident responders, Harry and Chris.
16
00:01:17,120 --> 00:01:19,020
Please, a very warm round of applause.
17
00:01:20,020 --> 00:01:28,380
[ Applause ]
18
00:01:28,380 --> 00:01:30,640
So good evening.
19
00:01:30,640 --> 00:01:32,740
Thank you for joining us today.
20
00:01:32,740 --> 00:01:38,300
We will tell you a little bit of our life as incident responders.
21
00:01:38,300 --> 00:01:40,980
And I'm Chris.
22
00:01:40,980 --> 00:01:45,040
I did my computer science studies at the University
23
00:01:45,040 --> 00:01:46,260
of Erlangen-Nuremberg.
24
00:01:46,260 --> 00:01:50,900
I do this security stuff for over 10 years now.
25
00:01:50,900 --> 00:01:54,540
So my CV is a little bit longer at the moment.
26
00:01:54,540 --> 00:01:55,960
I'm a detection engineer.
27
00:01:55,960 --> 00:02:00,580
Before that, I was a long time working in DFIR,
28
00:02:00,580 --> 00:02:02,420
so Digital Forensic Incident Response
29
00:02:02,420 --> 00:02:04,420
in different organizations.
30
00:02:04,420 --> 00:02:05,960
And --
31
00:02:05,960 --> 00:02:08,060
>> Yeah, I'm Harry.
32
00:02:08,060 --> 00:02:10,740
I studied electrical and computer engineering
33
00:02:10,740 --> 00:02:13,020
at RWTH Aachen University.
34
00:02:13,460 --> 00:02:16,860
And I played a lot of CTF and did some hacking stuff
35
00:02:16,860 --> 00:02:18,380
at Chaos Computer Club Aachen.
36
00:02:18,380 --> 00:02:23,100
During my master's, I worked at X41 DSEC doing pen testing
37
00:02:23,100 --> 00:02:24,460
and patch analysis.
38
00:02:24,460 --> 00:02:28,260
So I also have some kind of offensive security background.
39
00:02:28,260 --> 00:02:31,280
And for around one year now, I'm working
40
00:02:31,280 --> 00:02:34,660
at GData Advanced Analytics doing digital forensics
41
00:02:34,660 --> 00:02:36,000
and incident handling.
42
00:02:36,000 --> 00:02:40,600
First, Christian will give you a short introduction,
43
00:02:40,840 --> 00:02:44,780
and then he will tell you how a classical ransomware attack
44
00:02:44,780 --> 00:02:45,340
looks like.
45
00:02:45,340 --> 00:02:47,920
And in the second part of the talk,
46
00:02:47,920 --> 00:02:52,400
I will tell you how the incident responders work
47
00:02:52,400 --> 00:02:55,980
and what you can do in advance to make it go as smooth
48
00:02:55,980 --> 00:02:58,980
as possible and support the incident response team.
49
00:02:58,980 --> 00:03:04,840
>> So as Harry told you, I will probably --
50
00:03:04,840 --> 00:03:06,960
we'll talk about ransomware,
51
00:03:06,960 --> 00:03:12,420
because the customers we usually have are small
52
00:03:12,420 --> 00:03:15,640
and medium-sized businesses, universities, and hospitals.
53
00:03:15,640 --> 00:03:17,940
And those are regularly --
54
00:03:17,940 --> 00:03:25,020
unfortunately, regularly hit by ransomware gangs.
55
00:03:25,020 --> 00:03:28,420
The main reason for this -- and that's --
56
00:03:28,420 --> 00:03:35,400
if you heard the last talk, why they may be not that responsive
57
00:03:35,400 --> 00:03:40,100
and not so interested in -- they just lack the resources,
58
00:03:40,100 --> 00:03:45,420
so the manpower to do proper security measurements
59
00:03:45,420 --> 00:03:50,100
and to secure their systems, especially in situations
60
00:03:50,100 --> 00:03:53,500
where you are, for example, in a hospital, have medical devices
61
00:03:53,500 --> 00:03:59,020
where you cannot simply install an AV on or even patch the
62
00:03:59,020 --> 00:04:02,180
system, because you lose the certification
63
00:04:02,180 --> 00:04:03,920
as a medical device then.
64
00:04:04,480 --> 00:04:09,720
But also in companies, manufacturing companies,
65
00:04:09,720 --> 00:04:13,160
on the shop floor, we are talking about systems
66
00:04:13,160 --> 00:04:16,520
that have run times of 25-plus years.
67
00:04:16,520 --> 00:04:19,880
So if you look back now, 2023,
68
00:04:19,880 --> 00:04:23,780
we are talking about XP and older systems.
69
00:04:23,780 --> 00:04:29,220
Fun fact, I was in a ransomware case in a WannaCry in 2017
70
00:04:29,220 --> 00:04:34,320
when I got a call from a person from the shop floor
71
00:04:34,640 --> 00:04:41,000
asking me if we have an NT4 expert that can tell us
72
00:04:41,000 --> 00:04:46,160
if WannaCry is affecting NT4.
73
00:04:46,160 --> 00:04:50,800
Of course, you don't need to be an expert on NT4 in this.
74
00:04:50,800 --> 00:04:54,680
WannaCry is, of course, not affecting NT4 systems.
75
00:04:54,680 --> 00:05:01,000
So due to the time slot, we thought memes are the best way
76
00:05:01,000 --> 00:05:02,920
to tell you those stories.
77
00:05:03,720 --> 00:05:05,160
And we have a lot of them.
78
00:05:05,160 --> 00:05:10,760
So in the first section, I tell you a little bit
79
00:05:10,760 --> 00:05:12,360
about how an attack works.
80
00:05:12,360 --> 00:05:16,880
There are a lot of different possibilities how you can
81
00:05:16,880 --> 00:05:21,320
describe and how to structure how an attack works.
82
00:05:21,320 --> 00:05:24,640
There's the MITRE ATT&CK framework, for example.
83
00:05:24,640 --> 00:05:29,800
There was a talk yesterday by Meika Sauko here on the stage.
84
00:05:29,800 --> 00:05:33,520
There's the original cyber kill chain from Lockheed Martin.
85
00:05:34,200 --> 00:05:39,600
You have stuff from companies like Mandiant.
86
00:05:39,600 --> 00:05:41,600
They're targeting the tech lifecycle.
87
00:05:41,600 --> 00:05:45,880
But that's all, in my opinion, too fine-grained.
88
00:05:45,880 --> 00:05:50,760
That's the reason I just take three simple steps.
89
00:05:50,760 --> 00:05:55,880
Get a foothold in the door, look, move, play around,
90
00:05:55,880 --> 00:05:57,280
and cash out.
91
00:05:57,280 --> 00:06:00,920
Those three I will just go over.
92
00:06:03,160 --> 00:06:07,040
So start with get a foot in the door.
93
00:06:07,040 --> 00:06:11,640
So normally, we see three ways how attackers can get
94
00:06:11,640 --> 00:06:15,680
into the environment in ransomware cases.
95
00:06:15,680 --> 00:06:20,200
You have vulnerabilities in remote or internet-facing systems.
96
00:06:20,200 --> 00:06:23,320
You have the remote services itself.
97
00:06:23,320 --> 00:06:25,600
And you have malware.
98
00:06:25,600 --> 00:06:29,640
Starting with the vulnerabilities.
99
00:06:30,360 --> 00:06:36,480
And I just looked up the last four years.
100
00:06:36,480 --> 00:06:40,360
And maybe somebody remembers Netscaler,
101
00:06:40,360 --> 00:06:44,680
the so-called shit tricks vulnerability in December 2019.
102
00:06:44,680 --> 00:06:50,760
It was released mid of 2019, December 2019.
103
00:06:50,760 --> 00:06:54,840
The first POC, publicly available POC,
104
00:06:54,840 --> 00:06:56,560
was in the beginning of January.
105
00:06:56,560 --> 00:06:59,240
And the patch was available in mid of January.
106
00:06:59,240 --> 00:07:02,840
So there was around one week to one and a half weeks
107
00:07:02,840 --> 00:07:06,320
between a public proof of concept for the vulnerability
108
00:07:06,320 --> 00:07:08,640
and a patch for the vulnerability.
109
00:07:08,640 --> 00:07:15,520
And what we saw during 2020, a lot of companies patched,
110
00:07:15,520 --> 00:07:18,640
but the patch didn't remove the compromise.
111
00:07:18,640 --> 00:07:20,520
So they were already compromised.
112
00:07:20,520 --> 00:07:26,800
And yeah, with the patch, they didn't remove the compromise.
113
00:07:27,680 --> 00:07:31,960
So what we found, what we could provably see
114
00:07:31,960 --> 00:07:38,360
or prove evidence for was a nine-month customer
115
00:07:38,360 --> 00:07:42,320
was breached after nine months using this vulnerability.
116
00:07:42,320 --> 00:07:46,520
And we had other customers where we could see
117
00:07:46,520 --> 00:07:50,200
that the Netscaler was affected after two years.
118
00:07:50,200 --> 00:07:54,400
But we couldn't prove that this compromise
119
00:07:54,400 --> 00:07:59,320
was the reason for the actual ransomware case.
120
00:07:59,320 --> 00:08:03,200
And of course, such vulnerabilities
121
00:08:03,200 --> 00:08:05,160
happen not that often.
122
00:08:05,160 --> 00:08:14,120
Yeah, so 2021 gave us a Hafnium exchange vulnerability.
123
00:08:14,120 --> 00:08:19,400
Also, a similar situation, the patch appeared
124
00:08:19,400 --> 00:08:21,240
as an out-of-band patch from Microsoft
125
00:08:21,240 --> 00:08:24,760
on a Tuesday evening, 10 o'clock in German time.
126
00:08:24,760 --> 00:08:31,480
We saw during our incidents or the assessments we did
127
00:08:31,480 --> 00:08:37,680
that the first exploitation attempts
128
00:08:37,680 --> 00:08:42,720
were seen on Wednesday in the morning at 5 a.m.
129
00:08:42,720 --> 00:08:45,440
So around seven, eight hours later.
130
00:08:45,440 --> 00:08:50,600
I know one guy who could patch
131
00:08:50,600 --> 00:08:53,200
because he was online when the patch was released.
132
00:08:53,200 --> 00:08:57,080
Otherwise, Germany was unable to patch in time.
133
00:08:57,080 --> 00:09:02,760
And of course, we can go on with 2021.
134
00:09:02,760 --> 00:09:05,640
Proxy shell also exchanged vulnerability.
135
00:09:05,640 --> 00:09:08,800
Proxy not shell also exchanged vulnerability.
136
00:09:08,800 --> 00:09:13,400
We have in 2022 VMware Horizon,
137
00:09:13,400 --> 00:09:17,400
the virtual desktop infrastructure from VMware.
138
00:09:18,480 --> 00:09:21,160
Just to name also open source stuff,
139
00:09:21,160 --> 00:09:25,080
Zimbra, a collaboration platform including an email server,
140
00:09:25,080 --> 00:09:28,200
has had a vulnerability.
141
00:09:28,200 --> 00:09:32,640
Actually, the vulnerability was in CPIO from 2015, I think,
142
00:09:32,640 --> 00:09:39,000
which led to a compromise using via email.
143
00:09:39,000 --> 00:09:41,840
So you send an email with a CPIO,
144
00:09:41,840 --> 00:09:46,320
with a specially crafted archive file,
145
00:09:46,920 --> 00:09:50,760
and you could drop a web shell in one of the directories.
146
00:09:50,760 --> 00:09:55,320
Yeah, you have, of course, 40 OS,
147
00:09:55,320 --> 00:10:02,240
which is the 40 gate VPN and firewall operating system.
148
00:10:02,240 --> 00:10:08,600
And if you read the news, we started the beginning again.
149
00:10:08,600 --> 00:10:11,680
Netscaler had some issues several weeks ago.
150
00:10:12,600 --> 00:10:14,960
According to Fox IT, we have 1,900
151
00:10:14,960 --> 00:10:18,120
still unpatched Netscalers worldwide.
152
00:10:18,120 --> 00:10:23,880
How many patched Netscalers exist
153
00:10:23,880 --> 00:10:27,720
that have not been checked for compromise?
154
00:10:27,720 --> 00:10:28,840
We do not know, of course.
155
00:10:28,840 --> 00:10:32,280
So that will be a nice year, probably.
156
00:10:32,280 --> 00:10:38,400
So what can you do against this kind of attack vector?
157
00:10:38,400 --> 00:10:41,240
Patch your systems is one thing.
158
00:10:41,800 --> 00:10:45,400
As you see, that doesn't lead to the --
159
00:10:45,400 --> 00:10:51,080
or what you need to do afterwards in such cases,
160
00:10:51,080 --> 00:10:57,200
you need to check your systems for possible compromise.
161
00:10:57,200 --> 00:10:59,640
That is important.
162
00:10:59,640 --> 00:11:03,720
To reduce this, I highly suggest
163
00:11:03,720 --> 00:11:07,560
put your services behind some VPN
164
00:11:08,320 --> 00:11:12,880
so that only people who already have connection to the VPN
165
00:11:12,880 --> 00:11:17,480
can access your services or the services they need.
166
00:11:17,480 --> 00:11:22,880
And that would reduce the attack surface,
167
00:11:22,880 --> 00:11:24,760
at least to the VPN server.
168
00:11:24,760 --> 00:11:31,720
So, but of course, we can also think about remote services
169
00:11:31,720 --> 00:11:33,320
without vulnerabilities.
170
00:11:35,520 --> 00:11:38,960
There can be configuration mistakes,
171
00:11:38,960 --> 00:11:40,640
so the admin does something wrong.
172
00:11:40,640 --> 00:11:45,640
There can be insecure default configurations like this.
173
00:11:45,640 --> 00:11:51,480
I don't know if you know it, but the local admins
174
00:11:51,480 --> 00:11:53,840
or the administrators on a Windows system
175
00:11:53,840 --> 00:11:58,720
are automatically in the remote desktop users group.
176
00:11:58,720 --> 00:12:03,040
And so we had several cases,
177
00:12:03,040 --> 00:12:04,440
especially in the beginning of the pandemic
178
00:12:04,440 --> 00:12:08,280
when everybody moved to the home offices
179
00:12:08,280 --> 00:12:13,520
and they needed to put people fast in the position
180
00:12:13,520 --> 00:12:16,920
to access the internal systems again.
181
00:12:16,920 --> 00:12:20,080
They just put an RDP server on the internet
182
00:12:20,080 --> 00:12:22,280
and hoped for the best.
183
00:12:22,280 --> 00:12:28,120
Additionally, if you put services on the internet,
184
00:12:28,120 --> 00:12:30,960
of course, brute forcing and credential stuffing
185
00:12:30,960 --> 00:12:33,080
are attacks that are possible.
186
00:12:33,800 --> 00:12:35,320
So, brute forcing,
187
00:12:35,320 --> 00:12:38,680
just trying the username and password combinations,
188
00:12:38,680 --> 00:12:43,400
credential stuffing using already leaked passwords
189
00:12:43,400 --> 00:12:46,760
or credentials from leaks you find on the internet.
190
00:12:46,760 --> 00:12:52,000
What you can do about this kind of attack vector
191
00:12:52,000 --> 00:12:56,320
is just, as I said, use multi-factor authentication
192
00:12:56,320 --> 00:13:00,520
and reduce the attack surface,
193
00:13:00,520 --> 00:13:03,360
as in the vulnerabilities before,
194
00:13:03,360 --> 00:13:06,000
by moving the services behind a VPN
195
00:13:06,000 --> 00:13:09,400
and then use multi-factor authentication on a VPN,
196
00:13:09,400 --> 00:13:11,000
of course.
197
00:13:11,000 --> 00:13:15,360
The last vector that we see normally
198
00:13:15,360 --> 00:13:20,120
that attackers can get in the network is malware.
199
00:13:20,120 --> 00:13:26,400
We all know this about those funny emails
200
00:13:26,400 --> 00:13:28,600
you get with the attachments.
201
00:13:28,600 --> 00:13:35,840
Include that have either Word documents attached,
202
00:13:35,840 --> 00:13:40,640
either zip files with visual basic scripts,
203
00:13:40,640 --> 00:13:42,560
JavaScripts, and what you can get,
204
00:13:42,560 --> 00:13:46,720
ISOs you see a lot these days.
205
00:13:46,720 --> 00:13:51,040
Or what you can also have,
206
00:13:51,040 --> 00:13:54,000
that you can have just a link inside the email
207
00:13:54,000 --> 00:13:56,200
and you download the respective file
208
00:13:56,200 --> 00:14:01,120
from some shady file sharing website.
209
00:14:01,120 --> 00:14:09,600
What we saw over the last year was USB sticks again, funnily.
210
00:14:09,600 --> 00:14:14,000
I am not sure if you have heard about Raspberry Robin,
211
00:14:14,000 --> 00:14:19,640
which is a malware that warms via USB sticks.
212
00:14:21,840 --> 00:14:28,120
But I have not seen it as a vector for ransomware yet
213
00:14:28,120 --> 00:14:29,440
on my own.
214
00:14:29,440 --> 00:14:34,200
But there are people who said that it is an initial access
215
00:14:34,200 --> 00:14:36,480
broker for some of the ransomware gangs.
216
00:14:36,480 --> 00:14:40,480
What can you do about this?
217
00:14:40,480 --> 00:14:46,240
If you think you can, of course,
218
00:14:46,240 --> 00:14:51,520
ban simply some file extensions in your mail server
219
00:14:51,520 --> 00:14:55,640
or you change the file association types
220
00:14:55,640 --> 00:14:59,560
in your operating system,
221
00:14:59,560 --> 00:15:03,720
meaning that you do not open the JavaScript
222
00:15:03,720 --> 00:15:06,120
and visual basic script files using, for example,
223
00:15:06,120 --> 00:15:10,920
the Windows Scripting host, but open it with Notepad.
224
00:15:10,920 --> 00:15:14,760
And that will, of course, some people will be --
225
00:15:14,760 --> 00:15:21,400
some people will think about what this is then
226
00:15:21,400 --> 00:15:22,960
and ask the IT guys,
227
00:15:22,960 --> 00:15:26,160
but it is better than running the script itself.
228
00:15:26,160 --> 00:15:34,240
One thing I do not like to say, but keep your AD updated.
229
00:15:34,240 --> 00:15:40,040
This is one thing, keep it updated and read the logs.
230
00:15:40,040 --> 00:15:47,280
We see a lot of incidents where we see that already days
231
00:15:47,280 --> 00:15:48,840
or weeks before,
232
00:15:48,840 --> 00:15:51,720
we could have seen that there is something going on
233
00:15:51,720 --> 00:15:53,320
in your network.
234
00:15:53,320 --> 00:16:01,560
And if you see malware in your AV logs, then react to it.
235
00:16:01,560 --> 00:16:02,960
Just check it.
236
00:16:02,960 --> 00:16:07,160
You do not know how long this malware has been on your system.
237
00:16:07,160 --> 00:16:13,440
The thing is that just because your AV detected it now,
238
00:16:13,440 --> 00:16:18,160
it might have received an update for its signatures.
239
00:16:18,920 --> 00:16:22,560
And the malware was active for days or weeks before.
240
00:16:22,560 --> 00:16:28,000
When they are inside,
241
00:16:28,000 --> 00:16:33,440
then they usually look, move, and play around a little bit.
242
00:16:33,440 --> 00:16:43,840
When they look around, what they do is they enumerate AD.
243
00:16:44,440 --> 00:16:48,200
They do port scans. They search for vulnerabilities.
244
00:16:48,200 --> 00:16:55,400
They check how they can escalate their privileges.
245
00:16:55,400 --> 00:16:58,920
They try to find credentials.
246
00:16:58,920 --> 00:17:02,080
Kerberoasting, we heard in the talk before,
247
00:17:02,080 --> 00:17:03,680
for example, is this one thing.
248
00:17:03,680 --> 00:17:13,320
They try to identify accounts you have running on your systems.
249
00:17:13,320 --> 00:17:16,800
They can get the credentials from and reuse.
250
00:17:16,800 --> 00:17:22,200
For that reason, one of the most important things,