{"id":100644,"date":"2019-08-05T03:59:47","date_gmt":"2019-08-05T10:59:47","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=100644"},"modified":"2019-08-05T04:04:39","modified_gmt":"2019-08-05T11:04:39","slug":"tips-for-surviving-black-hat","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/08\/tips-for-surviving-black-hat\/","title":{"rendered":"8 Tips for Surviving Black Hat and Other Hostile Networks"},"content":{"rendered":"<p><span style=\"font-weight: 400; font-family: georgia, palatino, serif; font-size: 12pt;\">For the third year in a row, Palo Alto Networks will collaborate with other top security vendors and experts who help run the Black Hat Network Operations Center (NOC). We help\u00a0provide stability, visibility and security in the NOC.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">If you're heading to Las Vegas this week for Black Hat, BSides or DEF CON,\u00a0 you should prepare yourself for connecting to some of the world\u2019s most hostile networks. Our consulting engineers and systems engineers have compiled the following survival tips based on our experience working in the Black Hat NOC:<\/span><\/p>\n<h6><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong><i>1. Update all systems and apply all patches before you arrive:\u00a0\u00a0<\/i><\/strong><span style=\"font-weight: 400;\">Make sure your equipment is protected by updates for all known vulnerabilities. The largest amount of data consumption at every Black Hat conference is generated by systems retrieving updates, with Microsoft and Apple splitting that traffic almost 50\/50.<\/span><\/span><\/h6>\n<h6><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>2. Run a personal firewall:\u00a0\u00a0<\/strong><span style=\"font-weight: 400;\">Make sure to enable firewalls that come with your operating system. This will help keep the undesirables from having their way with your system once connected to the network.<\/span><\/span><\/h6>\n<h6><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>3. Use a VPN:\u00a0\u00a0<\/strong><span style=\"font-weight: 400;\">Use a virtual private network to encrypt all communications back to a trusted network where it can be decrypted. This prevents eavesdroppers, the NOC and Internet Service Providers from snooping on you.\u00a0<\/span><i><span style=\"font-weight: 400;\">Ensure all authentication (email, web, etc.) is done using SSL or HTTPS .\u00a0<\/span><\/i><span style=\"font-weight: 400;\">When logging in to any service, make sure you use HTTPS or SSL. M<\/span><span style=\"font-weight: 400;\">ake sure that there are no certificate errors or warnings associated with the connection. There is an alarming amount of unencrypted authentication traffic at every Black Hat event.<\/span><\/span><\/h6>\n<h6><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong><i>4. Scan your system for malware:\u00a0 <\/i><\/strong><span style=\"font-weight: 400;\">Scan your system multiple times while you're at the conference. We see it at every show - someone connects their system to the network and immediately starts beaconing to malicious domains and\/or immediately a network scan kicks off without the user\u2019s consent or knowledge<\/span><\/span><\/h6>\n<h6><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><span style=\"font-weight: 400;\"><strong>5. Be mindful of what you are surfing:<\/strong>\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">This is not the time to check your bank balance. Think twice before connecting to any private content during the show - especially if you're not using a VPN.\u00a0<\/span><\/span><\/h6>\n<h6><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>6. Lock your system when you step away:\u00a0<\/strong><span style=\"font-weight: 400;\">How would you like to have an email sent from your device\u00a0 without your knowledge? This can easily be avoided by just making sure that you lock your system every time you walk away from it. Make sure it has an auto-lock enabled in the event that you forget - you can at least minimize the window of opportunity for an attacker.\u00a0 Also never leave your phone unattended.\u00a0<\/span><\/span><\/h6>\n<h6><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>7. Use privacy filters on all screens:\u00a0<\/strong><span style=\"font-weight: 400;\">Why hack your system when an attacker can just read everything you type by looking over your shoulder? Privacy filters won\u2019t prevent this entirely, but they do help.\u00a0<\/span><\/span><\/h6>\n<h6><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong><i>8. Self-Awareness and Social Engineering:\u00a0<\/i><\/strong><span style=\"font-weight: 400;\">Don\u2019t get conned at the \u2018con. \u2018! Things like conference badges, hotel key cards and even credit cards hold a decent amount of personal information via radio frequency identification (RFID) tags. These can be sniffed, read and cloned in passing (talk about a drive-by!). It\u2019s not a bad idea to have a RFID blocker sleeve or wallet. Better yet, stay analog and only carry cash. Be mindful of your surroundings and people not respecting your personal bubble.\u00a0<\/span><\/span><\/h6>\n<p><span style=\"font-weight: 400; font-family: georgia, palatino, serif; font-size: 12pt;\">While these precautions are necessary when stepping into hostile territory, they are also great tips to use every day. You never know when the person sipping a cappuccino next to you in a coffee shop is actually a hacker.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-family: georgia, palatino, serif; font-size: 12pt;\">If you have any questions, concerns, or just want to say \u201chi\u201d and see us in action, the NOC will be located in Surf E and F on level 2 of the Mandalay Bay Convention Center.\u00a0 We\u2019re open 10 a.m. to 4 p.m. during the conference<\/span><\/p>\n<p><span style=\"font-weight: 400; font-family: georgia, palatino, serif; font-size: 12pt;\">Stay safe out there!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the third year in a row, Palo Alto Networks will collaborate with other top security vendors and experts who help run the Black Hat Network Operations Center (NOC). We help\u00a0provide stability, &hellip;<\/p>\n","protected":false},"author":492,"featured_media":100659,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6765],"tags":[166,74,29],"coauthors":[5172,5178],"class_list":["post-100644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-enterprise","tag-black-hat","tag-malware","tag-threat-prevention"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/08\/corp-blog-threat-600x300-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/100644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/492"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=100644"}],"version-history":[{"count":10,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/100644\/revisions"}],"predecessor-version":[{"id":100680,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/100644\/revisions\/100680"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/100659"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=100644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=100644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=100644"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=100644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}