or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Syncing
xxxxxxxxxx
Day 1 - 7/27 Mon.
Legal Matter - Information Security and Ethicality
👨🏫 Author Background & Other Info
Presenter(s)
Contact
Recent Trends in Infosec in Taiwan
Use of cryptocurrency in drug dealing or other illegal activities
Ransomware attacks in various governmental properties or departments
How does this relate to us?
Critical Infrastructure - Information Security of Industrial Control Systems (Part 1)
👨🏫 Author Background & Other Info
Presenter(s)
Slides
Overview of Industrial Control Systems Threats
History of Industrial Application
Threats in the Last Decade
Cybersecurity incidents among the industrial industry has been increasing gradually or even exponentially over the years.
Analysis of Attack Vectors in Industrial Control
Many insecure networks were and are exposed on the public network, and these services are often caught by services like shodan.io.
IT vs OT
Definition of ICS
What is SCADA?
Quick Overview of PLC
ISA 99 Industrial Automation and Control Systems Security
Automation ICS Internet Hierarchical Layout
Examples of Attacks
Industrial Control Systems Defense
ICS Operating Systems
Backup of ICS
Endpoint Protections
syslogd
, log aggregation via PowerShellIndustrial Control Systems Network Protection
ICS Communication Protocols
Ethernet in ICS
Defending Against ARP and DNS Attacks
Common ICS Protocols
Most of these protocols are not encrypted! This means these protocols are likely susceptible to MiTM attacks.
More modern and secure standards are being rolled out, such as
IEC 62351
.Lack of Security-layer Devices
Critical Infrastructure - Information Security of Industrial Control Systems (Part 2)
👨🏫 Author Background & Other Info
Presenter(s)
Contact
ICS Network Attack - Case Study
TSMC WannaCry Outbreak
ICS Network Attack - Pentesting
ICS Infrastructure
Attack Workflow
Recon
Command injection
Response injection
Denial-of-Service
ICS Network Attack - Tools
Digital Forensics - Investigation Report on Chimera APT
👨🏫 Author Background & Other Info
Presenter(s)
Contact
Materials
Network Threat Hunting
What is Threat Hunting?
Cyber threat hunting is the practice of searching iteratively through data to detect advanced threats that evade traditional security solutions.
Discover hidden attackers that your detection mechanism cannot find
Analytics-driven
Situational-awareness-driven
Intelligence-driven
Proactive Approach as opposed to Reactive Approach
Be very careful during incident response.
Challenge of Network Forensics
Network traffic is difficult to detect on gateway machine
Attacker may use a common service as C2
Encrypted traffic
Certs may not be trustworthy
Lack of abnormal user account
Investigation scope may be too large
Threat actor may compromise AD admin priv
Shouldn't rely on a single investigation to conclude the entire case; multiple investigations or a overview of each incidents may be required
Moloch
Moloch is an open-source, large-scale, full packet capturing, indexing, and database system.
Endpoint Threat Hunting
Tools
Machine Learning for Threat Hunting
Machine learning cannot do everything. It is the mapping of human's mind.
Case Study - APT Chimera
Security Incidents in Taiwan
Taiwan has the highest wafer production capacity. If a malware successfully bring down a production plant, it could wreak havoc for the entirety of Taiwan's economy.
Large-scale APT Attacks in Taiwan
APT "Chimera"
Victim Background
net user
/quser
attempts were detected via hacked VPN credentialsdumpert
andmimikatz
toolsDay 2 - 7/28 Tues.
Critical Infrastructure - Information Security of Industrial Control Systems and Production Systems
👨🏫 Author Background & Other Info
Presenter(s)
Contact
Slides
TeamT5 Quick Introduction
Focuses on advanced cyber threats:
:CN:
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →Cyberthreats in Taiwan
New IR case every 2 weeks
OT/ICS Security
Taiwan recent incidents
Lessons learned
Securing critical infrastructures
Availability is king!
Complicated environment
Patch is not allowed
Trust the supplier (not)
Silver bullet solution
Group Project
National Security - Manipulation of Public Opinion via Social Media
👨🏫 Author Background & Other Info
Presenter(s)
Importance of Public Opinions
Collection of public opinions
Web 2.0
Case study
Twitter 2019 Mass Account Removal
Facebook removed a number of Facebook Pages
COVID-19-related Public Opinion Manipulation
Day 3 - 7/29 Wed.
National Security - Data-driven Research on China's Information Manipulation
👨🏫 Author Background & Other Info
Presenter(s)
Contact
Slides
What is Information Warfare?
Data Parsing
Tools
Process
Fake News
Spread of fake news have been rampant over the last few years, especially China-related news
Case Study
2019/12 ~ 2019/02
Software Development Security - Development Security and Information Security Unit Testing
👨🏫 Author Background & Other Info
Presenter(s)
Automation = success!
DevOps & Security
Deployment pipeline? Software development lifecycle?
Fast development and release cycle
Solution
Security Testing
How to pentest a website?
Aside from XSS/SQLi…
What? - What are we protecting? Keys? Customer data?
Who? - Who might attack? Script kiddie?
Where? - From where? From site, feature, or individuals?
How? - How might the attack be launched? Open-source scanner? Social engineering?
Static analysis
Dynamic analysis
Information Gathering
Day 4 - 7/30 Thurs.
Web Security - Red Team
👨🏫 Author Background & Other Info
Presenter(s)
Contact
Slides
Introduction
Blue Team vs. Red Team
Blue Team
Red Team
target inurl:example -site:example.com
)amass intel -active -adder 140.118.31.99
amass enum -d example.com
masscan
1qaz2wsx#EDC
)index1.php
)National Security - War of Public Opinion: Offense, Defense, and the Challenge of Digital Forensics
👨🏫 Author Background & Other Info
Presenter(s)
Contact
Slides
China Propaganda 'Infodemic'
False information regarding the pandemic
How does China influence the global media?
How does online information warfare spread?
<missing a chunk here, will add later>
Prevention
Day 5 - 7/31 Fri.
National Security - The Impact of Forged Base Stations on 4G/5G Security
👨🏫 Author Background & Other Info
Presenter(s)
Contact
Slides
Cellular Network
5G Radio
Security Issues
Rogue Base Station Attacks
Implementation of Rogue Base Station Attacks
Classifications of Attacks
Conclusion
Rogue base station attack is possible for academic researchers and of course for the adversary
Detection and prevention or attack is necessary
Protocol in 5G is similar to 4G
Software Development Security - Head First Product Security
👨🏫 Author Background & Other Info
Presenter(s)
Contact
Slides
Synology PSIRT
Scale of Synology Inc.
What is PSIRT?
The Synology Product Security Incident Response Team (PSIRT) is dedicated to managing the receipt, investigation, coordination and public reporting of security vulnerability information related to Synology products.
Product Security
Security infra
Cryptography
Certification and compliance
Anti-piracy
Strategy
Discovery -> Triage -> Remediation -> Disclosure
The Phantom Menance (2013)
Attack of the Clones (2014-Q1-2)
Revenge of the Sith (2014-Q3-4)
A New Hope (2015)
The Empire Strikes Back (2016)
Return of the Jedi (2017)
The Force Awakens (2018)
The Rise of Skywalker (2019)
Community Engagement
Do not make getting a CVE of your own as a goal. It's about how you can help the community.
Vulnerability Response
MITRE Template
CPE
CAPEC
What counts as a CVE?
Inlcusion Decisions
Edge Cases
Update CVE Entries
Assumptions
Secure Coding
Code Review
TLP
TLP:RED
Cyber Kill Chain
Lessons learned
Analysis
Improvement
Lab