Become the Life of the Party, Learn Data Exfiltration Testing Today!

May 12, 2020 by Kyle Flaherty

Here's a confession to start this post off, I'm the life of the party (even those hosted on Zoom). It's pretty easy to see why from this transcript I pulled from a soiree the other day, and that's right, I transcribe all my social interactions.

Friend 1: Man, work has been really busy lately, lots of late nights on a big project, but really happy that today I got to get outside and go for a gorgeous hike with my kids. We even got a bit of fishing in. What have you been up to?

Me: Listen Friend 1, can I call you Friend 1? Nobody can beat the day I've had. I got up extra early, made a cup of coffee and spent the next nine hours manually finding and fixing configurations on one of our corporate firewalls. Hey, where are you going? 

Told you! Life of the party. And the truth is, when people talk about security it typically necessitates throwing out insane and incredible attack techniques, vulnerabilities, and exploits. What is often forgotten during these competitive diatribes is the fact that most attacks find their way through networks because of something much less exciting to talk about; firewall (mis)configurations. That's right my friends, nothing says "let's party" like talking misconfigurations within firewalls, IPS', or other security tools. Yet those who actually work in security know the truth, it's the misconfiguration that is the biggest threat and that these are happening simply through day-to-day activity.

Real-World Example: Data Exfiltration and Your Next-Gen Firewall

To show you what I mean we recently ran some live data exfiltration audits against a Palo Alto Networks NGFW, and please feel free to play this video at your next gathering. As you'll see by running these live simulations we quickly identify mis-configurations in our firewall, fix them, and validate we're again protected from sensitive data leaving our network. If you want to try it yourself sign up for our Threat Simulator free trial, you'll be up and running this and other audits in only a matter of minutes.

But Wait, There's More

The above is one example around data exfiltration, here's a longer form discussion on how to optimize security risk validation. Joined by my colleagues Andy Young and John Adams we talk about breach and attack simulation, how it works, how it compares to pen testing/red teaming, and a more in-depth demonstration of Threat Simulator. Big thanks to our partner Phoenix Datacom for giving us the time to talk to so many folks on this important topic, enjoy (oh, and putting this on a loop at your next party is a sure fire winner).

Fast forward to the demo? Here you go!