12
ISACA Scholarship Competition E-Squared Junho Lee Jongmin Lee Wookyung Youn Sol Han

ISACA Scholarship Competition.pptx

Embed Size (px)

Citation preview

Page 1: ISACA Scholarship Competition.pptx

ISACA Scholarship Competition

E-SquaredJunho Lee

Jongmin LeeWookyung Youn

Sol Han

Page 2: ISACA Scholarship Competition.pptx

Agenda

• Case Analysis 1 – Phishing Attack

• Case Analysis 2 – Metasploit Attack

• Recommendation

Page 3: ISACA Scholarship Competition.pptx

Case Analysis 1

• The hackers obtained ABC company’s Windows server’s Admin

Password by Phishing Attack (Possibility 1)

Page 4: ISACA Scholarship Competition.pptx

Problem & Suggestion

• Problem-Based on the security assessment report:

• Security awareness training for employees is outdated

• Suggestion-Updating Information Awareness Training (User education)

+ Additional Suggestion - SPF (Sender Policy Framework)

Page 5: ISACA Scholarship Competition.pptx

• Hackers gain an access to ABC company’s internal network using Airmon-ng

• Hackers scanned ABC company’s Windows server’s IP Address by nmap

• Hackers exploit Hash table in order to snatch Admin Password by Metasploit

• Hackers accessed ABC company’s admin user account through remote desktop

• Hackers exploit Hash table again in order to snatch SQL server’s password

• Hacked ABC company’s database to compromise information

Case Analysis 2

Page 6: ISACA Scholarship Competition.pptx

Proof

Hackers access internal network by using Airmon-ng

Page 7: ISACA Scholarship Competition.pptx

Proof

Hackers scan Window Server’s IP Address by using nmap

Page 8: ISACA Scholarship Competition.pptx

Proof

Hackers snatched Windows Server admin password by using Metasploit

Page 9: ISACA Scholarship Competition.pptx

Proof

Hackers access Admin user account through remote desktop

Page 10: ISACA Scholarship Competition.pptx

Problem & Suggestion• Problem

• The security assessment report indicates that the company does not keep eyes on the network for malicious activities

• Suggestion •Human Resource

The system administrators should be informed of the specific tasks which they should carry out.

• Vulnerability Testing• Back up Procedures• Configuration Documentation• Monitoring the systems

:

Page 11: ISACA Scholarship Competition.pptx

Problem & Suggestion

Additional Suggestion• Prevent Password Cracking

• Disable LM password hashes - Make the password at least 15 characters long

• Enable Account Lockouts - Set the account lockout threshold - Set the account lockout counter after - Set the account lockout duration

• Disable LAN Manager / NTLM authentication

Page 12: ISACA Scholarship Competition.pptx

Disaster Recovery Plan

• Based on the security assessment report:• Disaster recovery plan has been provided but not tested yet

• Solutions•Prepare contingency organization chart, showing the name of the contingency manager and coordinator

• Develop customized up-to-date recovery plan and test it• Provide security copies of vital records and store these off-site• Nurture the ability to restore critical information within acceptable time period