Tactical Diversion-Driven Defense
Thomas Hegel
Incident Response and Security
Analytics Engineer
GCFE, CISSP, PIE ETR
Greg Foss
SecOps Lead / Sr. Researcher
OSCP, GAWN, GPEN, GWAPT, GCIH,
CEH, CYBER APT
Diversion & Deception in Warfare
Draw Attention Away From True Attack Point
Mislead With False Appearance
Gain Advantage Over Enemy
“All war is based on deception” -Sun Tzu
Success From Diversion/Deception
Operation Mincemeat - 1943
Operation Zeppelin - 1944
Battle of Megiddo - 1918
Operation Bodyguard - 1942
Operation Anadyr - 1962
..and many more
Operation Mincemeat - 1943
Germans find British corpse
from sunken enemy warship
1.
Operation Mincemeat - 1943
Corpse holds Plans to
upcoming attack in Greece
2.
Operation Mincemeat - 1943
Germans move defenses
from Sicily to Greece
3.
Apply this to InfoSec?
The Rules:
Sound Techniques
Adequate Secrecy
Feedback on Execution
Sufficient Time For Execution
Control All Information Chanels
Follows strategic and operational objectives
In Practice
Network
Data Human
Offense
Network Defense
Honeypots
Easy to configure, deploy, and maintain
Fly traps for anomalous activity
You will learn a ton about your adversaries.
Information that will help in the future…
Subtle Traps
Catch Internal Attackers
Observe Attack Trends
Decoy From Real Data
Waste Attackers Time
Honeypot Use Cases
Fake Web Applications
github.com/gfoss/phpmyadmin_honeypot
$any-web-app
Custom + Believable, with a Hidden Motive
DerbyCon 5 - Tactical Diversion-Driven Defense
Data Defense
Honey Tokens and Web Bugs
Zip Bombs
AdobeFlash.zip
42 bytes
4.5 petabytes
www.unforgettable.dk
Human Defense
Keys to Success
Real World Awareness Training
Use a Blended Approach to Exercises
Gather Metrics for Program Improvements
Note: Never Punish or Embarrass Users!
Scope Social Habits
Public Information
Username Correlation
Connection Capability
“Private” Information
Examine Network Usage
“Free” Coupons!
QR Destination as training or
phishing site
Print > Place on Cars in Lot
Rate of Connections
Rate Reported to Security
Spear Phishing
Open Attachment Rate
Open Message Rate
Martin Bos & Eric Milam
SkyDogCon 2012 - Advanced Phishing Tactics
Beyond User Awareness
Defense Success/Failures
Rogue Wi-Fi
Setup Wi-Fi Access
Provide Fake Landing Page
Get Credentials!
Connection Rate
Credential Submission Rate
Report to Security Rate
www.slideshare.net/heinzarelli/wifi-hotspot-attacks
https://youtu.be/v36gYY2Pt70
Red Teaming
Not Penetration Testing!
Not Limited in Scope
Outsider's Perspective
Intelligence on Weaknesses
Diversion and Deception
Based Offense
Offensive Honeypots
All of these tools have something in common…
● Configuration Management Systems
● Vulnerability Scanners
● System Health Checks
They tend to log in to remote hosts!
Simulate SSH service
Stand this up during internal penetration test
Catch Credentials...
#!/bin/bash
attempts=$(cat /opt/kippo/log/kippo.log | grep 'login attempt' | wc -l);
echo ""
echo $attempts" => login attempts"
echo "--------------------"
cat /opt/kippo/log/kippo.log | 
grep 'login attempt' | 
cut -d "," -f 3,4,5 | 
awk '{print "["$1" "$4}'
echo "--------------------"
echo ""
Social Engineering
Social Engineering
WYSINWYC
http://thejh.net/misc/website-terminal-copy-paste
DEMO
Post-Exploitation Tricks
Use Deception to:
Elevate Privileges
Access Protected Resources
Pivot and Move Laterally
Etc.
OS X - AppleScript
fuzzynop.blogspot.com/2014/10/osascript-for-local-phishing.html
DEMO
Windows - PowerShell
github.com/gfoss/misc/blob/master/PowerShell/popuppwn.ps1
DEMO
Attack Security Tools
● Generate False and/or Malformed Logs
● Spoof Port Scanning Origins
$ sudo nmap -sS -P0 -D sucker target(s)
● Block UDP Port 514 or disable logging service
● Capture Service Account Credentials
● Wear AV like a hat and backdoor 

legitimate programs on the shares…
https://www.shellterproject.com/
DerbyCon 5 - Tactical Diversion-Driven Defense
Target IT Staff…
It’s broken. :-(
I don’t know what
happened…
Can you fix it?
github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz
In Conclusion
Network
Data Human
Offense
Recommended Resources
Offensive Countermeasures: The Art of Active Defense
Paul Asadoorian and John Strand
Reverse Deception: Organized Cyber Threat Counter-exploitation.
Sean Bodmer
Second World War Deception: Lessons Learned from Today’s
Joint Planner
Major Donald J. Bacon, USAF
Thank you!
Questions?
Thomas Hegel
@Thomas_Hegel
thomas.hegel@logrhythm.com
Greg Foss
@Heinzarelli
greg.foss@logrhythm.com
@LogRhythmLabs
blog.logrhythm.com

More Related Content

PDF
SecureSet WarGames - Logging and Packet Capture Training
PDF
Deception Driven Defense - Infragard 2016
PDF
Advanced Threats and Lateral Movement Detection
PPTX
Lateral Movement by Default
PDF
Honeypots for Active Defense
PPTX
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
PDF
Break IT Down by Josh Smith
PPTX
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
SecureSet WarGames - Logging and Packet Capture Training
Deception Driven Defense - Infragard 2016
Advanced Threats and Lateral Movement Detection
Lateral Movement by Default
Honeypots for Active Defense
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Break IT Down by Josh Smith
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...

What's hot (20)

PDF
2019 FRecure CISSP Mentor Program: Session Two
PDF
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
PDF
Capture the Flag Exercise Using Active Deception Defense
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
PDF
2020 FRsecure CISSP Mentor Program - Class 1
PDF
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
PPTX
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
PDF
How secure are your systems
PDF
Hiding in Plain Sight: The Danger of Known Vulnerabilities
PDF
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
PPTX
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
PPTX
How to assign a CVE to yourself?
PPTX
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
PPTX
Jim Wojno: Incident Response - No Pain, No Gain!
PDF
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
PDF
CSF18 - Incident Response in the Cloud - Yuri Diogenes
PDF
Threat Hunting with Cyber Kill Chain
PDF
2018 CISSP Mentor Program- Session 6
PPTX
Defending Against 1,000,000 Cyber Attacks by Michael Banks
PPTX
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
2019 FRecure CISSP Mentor Program: Session Two
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
Capture the Flag Exercise Using Active Deception Defense
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
2020 FRsecure CISSP Mentor Program - Class 1
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
How secure are your systems
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to assign a CVE to yourself?
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Jim Wojno: Incident Response - No Pain, No Gain!
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
CSF18 - Incident Response in the Cloud - Yuri Diogenes
Threat Hunting with Cyber Kill Chain
2018 CISSP Mentor Program- Session 6
Defending Against 1,000,000 Cyber Attacks by Michael Banks
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Ad

Viewers also liked (10)

PDF
The Day After: Preparing to Respond to National Cyber Crises
PDF
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
PDF
Law w04-global cybersecurity-laws_regulations_and_liability
PDF
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
PDF
Threat Intelligence Field of Dreams
PDF
Attacking Drupal
PDF
CMS Hacking Tricks - DerbyCon 4 - 2014
PDF
Activated Charcoal - Making Sense of Endpoint Data
PDF
Wi-Fi Hotspot Attacks
PPT
Honeypots
The Day After: Preparing to Respond to National Cyber Crises
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Law w04-global cybersecurity-laws_regulations_and_liability
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
Threat Intelligence Field of Dreams
Attacking Drupal
CMS Hacking Tricks - DerbyCon 4 - 2014
Activated Charcoal - Making Sense of Endpoint Data
Wi-Fi Hotspot Attacks
Honeypots
Ad

Similar to DerbyCon 5 - Tactical Diversion-Driven Defense (20)

PPT
Hacker
PPTX
Security Operations in the Cloud
PPS
An introduction to Digital Security - Rishabh Dangwal
PDF
Offensive malware usage and defense
PPT
PDF
01_Metasploit - The Elixir of Network Security
PDF
Bsides NYC 2018 - Hunting for Lateral Movement
PPTX
Security Information Event Management - nullhyd
PPTX
Information security
PPTX
No More Fraud Cluecon2014
PPT
Hacking Tutorial in Telugu
PDF
Applying intelligent deception to detect sophisticated cyber attacks
PPT
Perimeter Defense in a World Without Walls
PDF
INTRODUCTION TO CYBER FORENSICS
PDF
Anti evasion and evader - klaus majewski
PDF
PaloAlto Enterprise Security Solution
PPT
Why Risk Management is Impossible
PPT
SoleraNetworks
PPTX
Network Security Chapter-2 Computer Science.pptx
PPTX
Threat hunting in cyber world
Hacker
Security Operations in the Cloud
An introduction to Digital Security - Rishabh Dangwal
Offensive malware usage and defense
01_Metasploit - The Elixir of Network Security
Bsides NYC 2018 - Hunting for Lateral Movement
Security Information Event Management - nullhyd
Information security
No More Fraud Cluecon2014
Hacking Tutorial in Telugu
Applying intelligent deception to detect sophisticated cyber attacks
Perimeter Defense in a World Without Walls
INTRODUCTION TO CYBER FORENSICS
Anti evasion and evader - klaus majewski
PaloAlto Enterprise Security Solution
Why Risk Management is Impossible
SoleraNetworks
Network Security Chapter-2 Computer Science.pptx
Threat hunting in cyber world

More from Greg Foss (6)

PPTX
Cloud Crime Ops
PPTX
Future of Destructive Malware
PDF
Crypto Hacks - Quit your Job and Become a Crypto Farmer
PDF
PIE - BSides Vancouver 2018
PDF
Phishing Intelligence Engine - BlueHat v17
PDF
Security Automation and Orchestration
Cloud Crime Ops
Future of Destructive Malware
Crypto Hacks - Quit your Job and Become a Crypto Farmer
PIE - BSides Vancouver 2018
Phishing Intelligence Engine - BlueHat v17
Security Automation and Orchestration

Recently uploaded (20)

PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Auditboard EB SOX Playbook 2023 edition.
PPTX
Internet of Everything -Basic concepts details
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
giants, standing on the shoulders of - by Daniel Stenberg
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Training Program for knowledge in solar cell and solar industry
Connector Corner: Transform Unstructured Documents with Agentic Automation
Auditboard EB SOX Playbook 2023 edition.
Internet of Everything -Basic concepts details
Microsoft User Copilot Training Slide Deck
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Lung cancer patients survival prediction using outlier detection and optimize...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Advancing precision in air quality forecasting through machine learning integ...
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
future_of_ai_comprehensive_20250822032121.pptx
giants, standing on the shoulders of - by Daniel Stenberg

DerbyCon 5 - Tactical Diversion-Driven Defense