HTB2.0_Playbook_091523_RELEASE

pdf

School

Northeastern University *

*We aren’t endorsed by this school

Course

2550

Subject

Health Science

Date

Dec 6, 2023

Type

pdf

Pages

62

Uploaded by ProfessorMosquitoPerson1001

Report
Version 1.0.091523
https://misi.tech Page 1 of 61 © MISI 2023 Who Invitation Only. Key Skills: (Programming/CTF/penetration testing experience encouraged) What Hack the Building 2.0 Hospital Edition Live Exercise Where MISI DreamPort Headquarters (7000 Columbia Gateway Dr. Columbia, MD 21046) When 18 - 22 September 2023 Participants need to be ready to engage onsite at DreamPort by 18 September 2023. Why Increase knowledge, skills and awareness of vulnerabilities in healthcare facilities (e.g., hospitals) and vulnerability of electronic health records stored and processed by Healthcare Information Systems. Understand HIPPA and electronic protected health information and risk of exposure of ePHI. Understand and demonstrate responsible coordinated vulnerability disclosure
https://misi.tech Page 1 of 61 © MISI 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 2 of 61 © MISI 2023 Introduction Sometimes a story is complex with interwoven sub-plots requiring you to pay attention to multiple character backstories and to recall subtle facts until the very end, and sometimes a story is simple. This story is about money pure and simple. Read the online headlines. Politico mentions it December 28, 2022 : The New York Times talks about it September 18 th , 2020 : PBS talked about it October 24 th , 2019 :
https://misi.tech Page 3 of 61 © MISI 2023 The computer can be used to save lives, protect, and defend and unfortunately, it can also be used to kill. There are thousands of headlines like this and there will be more in the future. We are trying to breath real-life into these headlines and tell a story about building cyber security and healthcare cyber security. On the surface it will seem that this is a story about defense and protection. It may seem like this is a story about what to look for, about what to do when you detect or suspect a cyber event is taking place. Remember, it’s really a story about money. John Carpenter’s movie Assault on Precinct 13 (1976) tells the story of four people from the most unlikely of backgrounds who are forced to band together to save Anderson police precinct in California from a collection of individuals who swore revenge for earlier events. Instead of a police precinct, this playbook focuses on our fictitious Nove Cerchi (pronounced ‘Nova Chair Key’) Medical facility. Just like in John Carpenter’s movie, our story requires two groups to play out One group to assault, and one group to defend. Just like past events from MISI, Nove Cerchi is a simulated real-life environment using several of the same systems you will find in the hospital closest to you at home. Please be aware, we want to put on best event possible. The actual scenarios we execute are subject to change. We will publish alerts if we change or substitute scenarios prior to the execution of this event. We will assume you may not be familiar with healthcare information systems, healthcare information system protocols and protected health information (also referred to as PHI) records as you read this story. This is ok. When we started, neither were we. We have conducted hundreds of hours of research to create this story using real-life systems, expert opinions, and approvals, and base our live environment on actual attacks that have taken place in the past. If you take the time to read this story to the end, it is our hope that you will learn at least one (1) thing about how much risk there is in a healthcare facility and its computer networks. For us, it’s absolutely frightening (more so than all other scenarios we have built to-date). The Cybersecurity & Infrastructure Security Agency (CISA) designates healthcare and public health as one of the sixteen critical infrastructure sectors in the United States. This means (as CISA writes) healthcare is a sector whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or
https://misi.tech Page 4 of 61 © MISI 2023 destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. [ CISA.gov ]. The fictitious Nove Cerchi facility described in this playbook falls under this sector. The Sector Specific Plan for healthcare and public health can be found on the CISA Website here: https://www.cisa.gov/sites/default/files/publications/nipp-ssp-healthcare- public-health-2015-508.pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 5 of 61 © MISI 2023
https://misi.tech Page 6 of 61 © MISI 2023 Prologue ** Beep, Beep, Beep ** The alarm clock shouted its incessant warning, startling Vanessa from her slumber. “God, what time is it?” she mumbled to herself turning over in bed and slamming her fist on the large button angry at being dragged from her slumber after only a few hours of sleep. It was only six AM and she lay still wondering to herself What would my life be like if I had three or four kids to wake me up in the morning? She knew she had to get back to work after her late Sunday night at the hospital. “Oh god, I need to get back to the hospital” she stated to herself as she recalled last night, and she jumped out of bed and headed immediately for the shower. “Alexa how is traffic?” she asked her smart speaker as she stepped into the shower. “There is a slow-down reported on Route 100 approaching Route 95” the speaker responded. Vanessa hurried through her shower and got dressed and jumped in her Camry. She thought about the night’s previous events as she began her drive. Are we really going to get into trouble after John’s HIPPA violation she wondered. She knew that if the hospital voluntarily disclosed Joseph’s accidental social media post about their VIP patient, they should be able to avoid any penalties. She just hoped that HHS OCR investigators would be professional. I am just glad John caught the issue even after him having to deal with Farinata’s repeated issues she thought. As she approached the Interstate 95 interchange in her Camry and traffic slowed to a standstill, her iPhone 14 dinged the familiar Hello Notification and she reached for it knowing that she was disobeying the hands-free law. She saw Pierre’s name in the notification, and she immediately put the phone back down. I don’t want to talk to him right now. I cannot believe he treated me like that she thought to herself. The rest of the drive was uneventful if not aggravating due to the stop and go traffic at only six forty-five on a Monday morning. She wasn’t looking forward to reading the HIPPA risk assessment report that was released on Friday for the hospital networks. As she pulled into her parking spot at Nove Cerchi Medical, she closed her eyes and said quietly, “It’s only the 18 th of September, I still have two months to go until vacation”. She got out of her car and headed into the building. Man, there are a lot of people in the waiting room today she thought to herself as she entered the facility. She turned to head for the nursery to stare at the new ‘visitor’ that arrived yesterday hoping to wish a congratulations to the parents before her day really got started.
https://misi.tech Page 7 of 61 © MISI 2023 Meanwhile , John looked at himself in the mirror. He couldn’t remember the last time he had been this angry. He tried to piece together the series of events that occurred since Sunday morning that pulled him to where he stood currently. First, he got a text message from the chief of medicine early Sunday morning that alerted him to Joseph’s social media post about their ‘supposedly’ secret patient Stephen Austin. He thought back to their mandatory health training. This post meant a HIPPA violation since HIPPA states that health information is created or received by a health care provider (us) and since the post relates to the past, present, or future physical or mental health or condition of an individual (the patient) his post included individually identifiable health information transmitted by electronic media, maintained in electronic media, or transmitted or maintained in any other form or medium ”. If this wasn’t bad enough, then the chief of medicine called an emergency Sunday meeting between him, Vanessa, Pierre and Joseph all of whom were supposed to have the day off. The chief seemed to enjoy the argument John had with Vanessa which annoyed John even more so than the argument itself. He replayed the last exchange he had with Vanessa as he tried to keep his heart rate under control: “Vanessa, I don’t care about intent”, John shouted, “This post was a huge deal! Not only did Dr. Virgil violate Mr. Austin’s safety, but HIPPA is going to fine our asses over this! His own government is very angry at us. They will never send another dignitary to us, and I bet State Department is probably angry too.” “John, I know it’s a big deal”, Vanessa responded with increasing anger as she slammed her palm on the board room table. “Joseph is the best surgeon we have! I bet a thousand people are alive today because of him alone!”, she responded angry at John’s narrow viewpoint. “Vanessa, I am the HIPPA disclosure and compliance officer and now I must file this report just as CRISP is breathing down my neck that their VPN accounts don’t work. The upgraded water and HVAC systems were just turned on, on Friday and this damn surgery is supposed to happen today or tomorrow. We don’t need this right now! The risk assessment was just completed, and it shows we have serious problems to fix. ”, John shouted. “Can we please fire him?”, John asked the chief of medicine. John rapidly shook his head to clear his thoughts. He knew he couldn’t put off the CRISP or HIPPA problems any longer and had to get going. He turned to leave his office and walked quickly out the door towards the neo-natal unit.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 8 of 61 © MISI 2023 At the exact same time as Vanessa’s alarm clock, Joseph sat at his kitchen table and wondered how much trouble he was in. He had been awake for hours by this point. What the hell was I thinking posting that he wondered. I can’t believe I ever thought it would be ok to post patient information on Instagram like that he continued thinking. He might have considered giving himself a break considering he was working on less than four hours of sleep after nearly back-to-back surgeries Friday into Saturday. Instead of sleeping he was browsing Instagram on his phone in the on-call lounge. He stood and stepped out the door of his residence at the Harbor East Ritz Carlton and looked at the water of the Baltimore Inner Harbor below. He closed his eyes and just listened for a moment. The symphony of noise from the street and water below combined with the gentle breeze that seemed if for a moment to try and pull the negative thoughts out of his head. He recalled words his father shouted at him so many years ago while practicing their Kenpo out in the front yard, “Stand still and face me. Do not back away from fear but do not face it unprepared. Fix your stance.” He recalled turning his left shoulder towards his father and pulling his right foot back into a fighting stance. “Good”, his father responded immediately, “I am going to hit now, you should be able to block me easily now that you are ready. I am going to put my full force behind it, you can do it”. He knew that by texting the chief of medicine and then deleting the post he had already taken steps to address the accidental violation, but he wondered how much further this would go. He had hoped that John wasn’t going to be too angry with him about the disclosure. I am honestly more afraid of Mr. Austin’s personal security than I am of John Smith or Vanessa he thought to himself. He knew that he had a transcervical thymectomy to perform at eleven o’clock today. He decided to focus on Myasthenia Gravis his next patient was facing as a distraction for yesterday’s events. He re-entered his condo and headed for the door to brave the President Street traffic to drive to the hospital. He paused for a moment and recalled, Oh shoot, I need to change my password don’t I? He recalled Pierre had bugged him about this Fri afternoon after his last surgery of the day, but he didn’t want to deal with it that at the time. As he locked the door, he said out loud, “Here we go”.
https://misi.tech Page 9 of 61 © MISI 2023
https://misi.tech Page 10 of 61 © MISI 2023 Background There are some concepts that are very important to understand prior to participation in this exercise. The reader is encouraged to perform research on these concepts on their own, but we will cover the most important concepts in this section providing some background on each prior to moving onto the story that sets up this competition. The concepts you should understand prior to participation in this exercise are: Protected Health Information (PHI)/Electronic Protected Health Information (ePHI) Department of Health and Human Services (HHS) Healthcare Information Portability and Accountability Act (HIPPA) PHI Protected Health Information (PHI) is described in detail in HIPPA and other regulations, but at MISI, we find that there is substantial confusion about what PHI really means. The following hippajournal.com article does a decent job attempting to explain PHI: https://www.hipaajournal.com/what-is-protected-health-information/ The author writes: “…it is necessary to review the definitions of ‘health information’ and ‘Individually identifiable health information’ as they appear in the General HIPAA Provisions ( §160.103 ).” This is an effective approach, try to understand the concept of health information first. The author writes that Health Information is: “Information, including genetic information, whether oral or recorded in any form or medium, that: is created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse; and relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual.” Let’s summarize: Health information is the information that captured by, created by or shared with your: doctor/nurse/school/job that describes you, your pre-existing conditions, sickness(es) and event health care you may require in the future.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 11 of 61 © MISI 2023 What then makes the health information (HI) protected? One final step before we can define protected health information is to ensure we understand what individually identifiable health information. The author writes: “individually identifiable health information […] is a subset of health information, including demographic information collected from an individual [that] is created or received by a health care provider, health plan, employer, or health care clearinghouse […] and that identifies the individual or […] can be used to identify the individual.” Finally, the author writes that protected health information (PHI) is: “Individually identifiable health information transmitted by electronic media, maintained in electronic media, or transmitted or maintained in any other form or medium”. One concept that the author writes about that we consider important is a designated record set. The author writes that: The key to understanding what is included in Protected Health Information is designated record sets. A designated record set (as defined in §164.501 ) is any group of medical and/or billing records maintained by or for a Covered Entity used in whole or part to make decisions about an individual. The definition includes a footnote that a designated record set can consist of a single item. Therefore, any individually identifiable health information created or received by a Covered Entity or a Business Associate providing a service to or on behalf of a Covered Entity is a designated record set and qualifies for the protections of the Privacy and Security Rules. Additionally, any item of individually identifiable non-health information maintained in the same designated record set that identifies – or be used to identify – the individual assumes the same protections. Finally, what makes PHI, ePHI? TechTarget.com defines ePHI as: Electronic protected health information (ePHI) is protected health information (PHI) that is produced, saved, transferred, or received in an electronic form . HHS The Department of Health and Human Services (HHS) is the agency responsible for enforcing HIPPA. The HHS website provides a timeline of significant events that have occurred throughout its history: https://www.hhs.gov/about/historical-highlights/index.html According to this timeline, the Department of Education Organization Act introduced by the 96th Congress on March 01 1979 was signed into law providing for a separate Department of Education. The Department of Health,
https://misi.tech Page 12 of 61 © MISI 2023 Education, and Welfare (HEW) became the Department of Health and Human Services (HHS) on May 4, 1980. The HHS Office for Civil Rights or OCR is responsible for enforcing the Privacy and Security Rules. Enforcement of the Privacy Rule began April 14, 2003 for most HIPAA covered entities. The website for HHS OCR is: https://www.hhs.gov/ocr/index.html On 09 February 2023, HHS released a retrospective titled: 2022 Healthcare Cybersecurity Year in Review, and a 2023 Look-Ahead . This presentation can be downloaded from the following URL: https://www.hhs.gov/sites/default/files/2022-retrospective-and-2023-look-ahead.pdf As we review this presentation, we find the same fact occurring over and over. Money is a substantial driving force behind the attacks on healthcare institutions. HIPPA The final concept to understand for this exercise is the Healthcare Information Portability and Accountability Act. This legislation was introduced 18 March 1996 and passed on 21 August 1996 as House Resolution 3103: https://www.congress.gov/bill/104th-congress/house-bill/3103 What’s interesting to us is that multiple changes or improvements have been made to HIPPA since 1996. Sections 261 through 264 of HIPAA as originally written require the Secretary of HHS to publicize standards for the electronic exchange, privacy and security of health. The first important term to learn is that these provisions are referred to as the Administrative Simplification provisions. The second important term to learn is Privacy Rule ( Standards for Privacy of Individually Identifiable Health Information ). The HHS website provides the following description of the Privacy rule: HIPAA required the [HHS] Secretary to issue privacy regulations governing individually identifiable health information if Congress did not enact privacy legislation within three years of the passage of HIPAA. Because Congress did not enact privacy legislation, HHS developed a proposed rule and released it for public comment on November 3, 1999. The Department received over 52,000 public comments. The final regulation, the Privacy Rule, was published December 28, 2000.
https://misi.tech Page 13 of 61 © MISI 2023 The reader can review the entire description from the following URL: https://www.hhs.gov/hipaa/for-professionals/privacy/laws- regulations/index.html This website writes: “The Privacy Rule, as well as all the Administrative Simplification rules, apply to health plans, health care clearinghouses, and to any health care provider who transmits health information in electronic form in connection with transactions for which the Secretary of HHS has adopted standards under HIPAA (the ‘covered entities’).” This is our next important term, covered entities . The National Institutes of Health writes: Covered entities are defined in the HIPAA rules as (1) health plans, (2) health care clearinghouses, and (3) health care providers who electronically transmit any health information in connection with transactions for which HHS has adopted standards. Generally, these transactions concern billing and payment for services or insurance coverage. For example, hospitals, academic medical centers, physicians, and other health care providers who electronically transmit claims transaction information directly or through an intermediary to a health plan are covered entities. Covered entities can be institutions, organizations, or persons. In the context of our story, Nove Cerchi is a covered entity under HIPPA. The reader can continue this article on the following NIH URL: https://privacyruleandresearch.nih.gov/pr_06.asp There are two (2) other HIPPA rules to understand as summarized in the following table: Rule Description Security Rule HHS writes that The Security Standards for the Protection of Electronic Protected Health Information (the Security Rule) establish a national set of security standards for protecting certain health information that is held or transferred in electronic form. The Security Rule operationalizes the protections contained in the Privacy Rule by addressing the technical and non-technical safeguards that organizations called "covered entities" must put in place to secure individuals' "electronic protected health information" (e-PHI). In the context of our
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 14 of 61 © MISI 2023 Rule Description exercise, the security rule describes how a facility such as Nove Cerchi should protect their network. Breach Notification Rule HHS writes that The HIPAA Breach Notification Rule, 45 CFR §§ 164.400-414, requires HIPAA covered entities and their business associates to provide notification following a breach of unsecured protected health information. A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information. In the context of this exercise this means that Nove Cerchi would be obligated to report any breaches to their computer network(s) or disclosure(s) of ePHI. The next term to understand comes from HippaJournal.com : The Healthcare Insurance Portability and Accountability Act requires that a person (or persons) within a Covered Entity or Business Associate is assigned the duties of a HIPAA Compliance Officer . This may be an existing employee, or a new position can be created to meet the requirement. It is even possible to outsource the duties of a HIPAA compliance officer on a temporary or permanent basis. As you read in the prologue, John is the compliance officer for Nove Cerchi Medical. The final concept to understand is a HIPPA Violation . Andrew Magnusson from StrongDM.com writes that HIPAA violations occur when an organization runs afoul of the standards defined by this 1996 U.S. Federal legislation. Many HIPAA violations are related to accessing or sharing patients’ protected health information (PHI). In the context of our story, you will find employees stepping away from exposed computer screens or leaving paper records visible on your desk risks a greater chance of unauthorized third parties viewing PHI. It’s also common to leave physical charts in hospital rooms after a patient has moved. The reader is encouraged to review the following websites for more information: - https://www.hhs.gov/hipaa/for-professionals/index.html - https://www.hipaaguide.net/history-of-hipaa/ - https://www.totalhipaa.com/history-hipaa-8-things-know/ - https://www.ncbi.nlm.nih.gov/books/NBK9576/
https://misi.tech Page 15 of 61 © MISI 2023
https://misi.tech Page 16 of 61 © MISI 2023 Nove Cerchi Medical Nove Cerchi Medical is a 35-year-old medical facility in Columbia, Maryland. It occupies nine-floors with intensive care, laboratories, patient exam, and operating rooms. Over its history, it has treated ten- thousand patients, and their medical records are currently on file within the Nove Cerchi electronic health records system(s). The hospital recently has undergone a six-figure upgrade to information systems, medical gear and building automation for providing better services to their patients. Public records show that more than one-hundred employees work for the Nove Cerchi Medical facility. At admission, patients and visitors are greeted by nursing staff ready to respond to requests for help. Visitors can either request admittance or visit a family member or loved previously admitted. Visitors to the hospital are required to always display a visitor badge. There are three triage (or ‘exam’) rooms available for seeing patients. A typical visit to the hospital takes no more than thirty minutes during which time a patient may spend twenty-five minutes waiting to see a doctor. Admissions sits outside of the Information Technology server rooms that are for all intents and purposes in-accessible to the public. The security office sits adjacent to admissions where surveillance footage can be reviewed, and security badges are issued to employees. In addition, employees who work in hospital security can monitor the air quality of the entire floor from the monitoring system that runs from security workstations. There are believed to be at least two separate surveillance systems running that monitor hospital activities. Just down from Admission is the newly completed neo-natal intensive care unit (NICU) boasting the most secure features of any hospital in the United States. New parents Thomas and Nichole welcomed a beautiful baby girl Pearl into the world not two months ago. Due to a case of bronchiolitis, the beautiful newborn girl had to spend the first six days of her life in the neonatal intensive care unit. Sadly, she was stricken with late-onset pneumonia on the sixth day in the neo-natal unit and had to stay for seven more weeks of intensive round-
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 17 of 61 © MISI 2023 the-clock care. She is still currently in NICU care currently. Thankfully, the new security tracking system from Centrak has been installed to provide added security for newborn safety. Patient exam or triage rooms are found next on the floor across from the NICU. This area of the hospital has three (3) rooms that can serve separate patients simultaneously. Each exam room has medical staff connectivity to the electronic medical records systems from the thin clients found on Rubbermaid carts. Medical personnel use these stations to lookup, update record care details in the electronic medical records systems used with Nove Cerchi. In addition to these processing stations, you will find network- connected systems such as sonograms, vital sign monitors and even network-connected infusion pumps and the newly upgraded Cisco IP Phone System courtesy of Cykor and Cisco Systems. Down the hall past the EXIT sign, you will find the Operating Room (OR). There are multiple connected devices in this room such as the ventilator, additional vital sign monitors and even the medical safe. Admittance to the OR is strictly forbidden without a proper access badge. This rough floorplan is show in the following map developed sometime in the summer of 2023 for the ninth floor of the facility:
https://misi.tech Page 18 of 61 © MISI 2023 The newly upgraded water treatment system can be found on the floor but access to this system is restricted as water is a vital resource for a hospital. This system receives water from the street supply and pressurizes the system before integrating a treatment processor and feeds into a hot water supply system. The flow rate and temperature of the water is closely monitored to ensure the supply stays in motion and the temperature does not lower to create a breeding ground for legionella bacteria. Interested readers can watch the following YouTube video for more real-life details: https://www.youtube.com/watch?v=7RY5GXxiBTc Next, the integrated HVAC system can be found near the OR on the ninth floor. This integrated system can monitor the temperature of the entire floor and the OR to activate the air conditioner and vent controls when the environment reaches critical levels. Systems such as the portable x-ray machines must be kept at specific temperatures or risk damage due to overheating. Finally, the central nurse station is found between the third triage room and the OR where nurses can be found monitoring vital signs from all patients on the floor. Visitors to Nove Cerchi are offered free, open WIFI to help pass the time while waiting for loved ones. This WIFI is only accessible from the waiting areas and the parking lots.
https://misi.tech Page 19 of 61 © MISI 2023 It was recently publicly disclosed that foreign dignitary Stephen Austin was admitted to Nove Cerchi Medical sometime in August of 2023 for undisclosed reasons. Social Media accounts for one of the surgeons at Nove Cerchi recently but accidentally revealed that sometime early on the morning of September 19 th 2023, a critical surgery is scheduled for Stephen Austin to address a potentially life- threatening ailment. Mr. Austin is featured in this recently released press photo (shown on the left here) for his home country press corps. Open-Source Intelligence (OSINT) A typical initial task for a RED team member during a penetration test is to learn about their target using publicly available information. This type of information is commonly referred to as open-source intelligence or OSINT. The MITRE ATT&CK framework will call this reconnaissance ( TA0043 ). OSINT can be leveraged to identify physical locations and assets to target, or even employees that are possible targets for phishing or USB device drops. We are certainly not going to tell the RED team what to look for, but we will reveal that Nove Cerchi Medical will have several employees with valid email addresses and will operate a website that may or may not reveal important details for RED team members. We believe the Nove Cerchi Medical website will be hosted in AWS and the employees may utilize cloud services for file sharing and communication. BLUE team be careful. You may want to consider reviewing the same public resources to learn what the RED teams may know about! MITRE ATT&CK Throughout this playbook we will refer to the MITRE ATT&CK knowledge base as we did in the previous section. We consider this an extremely valuable resource for describing cyber-attacks, but the reader should note that we may be using ATT&CK to reveal a hint or two for our RED teams. If you are
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 20 of 61 © MISI 2023 interested in participating in Hack the Building 2.0 and this event, you are urged to familiarize yourself with the ATT&CK Matrices found here: - https://attack.mitre.org/ - https://collaborate.mitre.org/attackics/index.php/Main_Page Website Interested parties will find the Nove Cerchi Medical Facility at the following URL: https://novecerchimedical.com As with all online content used in a MISI exercise, the content of a website should not be a single-instance review. You should take care to review this content at least once when you read this playbook and again when the exercise is in-progress. Participants should realize that review of this content will result in the implicit execution of one of the sub-techniques of the following MITRE ATT&CK Technique: https://attack.mitre.org/techniques/T1589/ Employees Regardless of your ‘team’ (attackers, or defenders), you should understand that an attacker will (and should) conduct reconnaissance of employees or members of their target prior to launching any initial access attempts. An employee is usually the weakest link in any business when it comes Let’s meet the following employees that work for Nove Cerchi Medical. This information may or may not prove useful for the execution of this story: The following images are randomly produced faces via Generative Adversarial Network (GAN) technology. These are not real-life people.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 21 of 61 © MISI 2023 Picture Employee Biography Vanessa Jahat is the hospital administrator for Nove Cerchi. She is well respected for her accomplishments earning the position of administrator at only 36 years of age. She is currently single stating she prefers to focus on her career and not any personal life. She believes she may want one kid someday but not today. She attended Towson University and studied Business Administration and was an intern at Nove Cerchi for all six years of schooling. She is credited with helping achieve a balanced budget for the FY22 year after dealing with the burdens of the COVID19 surge in patients. Vanessa is not a cyber security expert but has fought hard for all of the budget requests that the director of information technology (IT) has requested. John Smith is the director of information technology for Nove Cerchi Medical. He has twenty-five (25) years of experience in network engineering and cyber security for healthcare organizations. He follows extremely effective cyber security practices and has repeatedly needed to request resend emails from outside parties since he will block many email messages that are not from known senders. John is a strong Microsoft Windows and Linux user and prefers to use a Windows endpoint primarily. John graduated locally from the University of Maryland Baltimore County in 2000 with a degree in Computer Science. He has worked at Nove Cerchi Medical for only four (4) years. It is believed he is looking for new employment, but he has not advertised this to any of his colleagues. John is believed to have two children.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 22 of 61 © MISI 2023 Picture Employee Biography Dr. Farinata Styx is renowned Urologist for Nove Cerchi Medical. She emigrated to the United States on an H1-B visa from Italy only five (5) years ago and plans to apply for citizenship. She attended medical school at the University of Milan in Italy and performed her residency at Ospedale Luigi Sac. Farinata is extremely nice but has been cited on more than 1 occasion for lapses in proper cyber security practices while at work at the Nove Cerchi facility. Farinata is known to be close friends with the nursing staff at Nove Cerchi and is currently not married. Dr. Joseph Virgil is the premier Cardio Thoracic surgeon for Nove Cerchi Medical. He has performed 1865 surgeries for Nove Cerchi with a 73% success rate of patients. Joseph is known to be good friends with John Smith and attempts to follow Joseph’s example of good cyber security practices. Unfortunately, it is known that Joseph is currently being sued for medical malpractice for a recent surgery conducted in 2023. The outcome of this surgery is not known. Joseph is scheduled for a surgery of an extremely sensitive patient on September 19 th , 2023. Joseph is a graduate of Harvard Medical School where he graduated in the top 20% of his class. Attackers should know that a social media account for Dr. Virgil revealed that he is scheduled to perform a surgery on a very important person Stephen Austin sometime during the week of 18 September. This was an accidental reveal as this is a HIPPA violation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 23 of 61 © MISI 2023 Picture Employee Biography Dr. Francesca Rimini is the head of obstetrics for Nove Cerchi Medical. She has delivered five hundred thirty-six babies during her tenure at Nove Cerchi. Francesca attended Duke Med and graduated in 1999. Francesca has repeatedly posted on social media how proud she is of the new highly secure Neo-Natal ward that Nove Cerchi has opened on the newly upgraded ninth floor of the facility. She is currently unmarried. Pierre Bodo is the deputy director of Information Technology for Nove Cerchi medical. He has worked in this position for one (1) year and 2 months since his last position at a maritime facility. Pierre is a very talented worker with experience in Windows, Virtualization, and network defense platforms such as Cisco Cyber Vision, Nozomi Guardian and is Elastic Security certified. Pierre is the person who has setup many of the upgraded systems within Nove Cerchi network(s) but is frequently accused of using and re-using poor passwords for his host- side accounts of boxes that he has configured. Pierre is the author of the recent plan of action and milestones (POAM) report detailing the risks identified within the Nove Cerchi facility during the recent HIPPA required Risk Assessment. John Smith is upset at having to repeatedly ask Pierre for the master copy of the POAM and Risk Assessment results as they contain sensitive information. Scenario Difficulty When we present a scenario in our playbooks, we provide an estimated level of difficulty associated with it. This difficulty is meant for a Red Team participant only. We use five (5) levels to describe the difficulty of each scenario and we present a description of each level here for your review. Remember, this is our interpretation of the difficulty required to be
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 24 of 61 © MISI 2023 successful. We have learned to encourage people with no pre-existing skills in Industrial Control Systems and protocols if they are willing to learn on the fly. This is one of the best marks of a successful red or blue team operator. If you can adapt, you will be successful. The difficulties we use to describe our scenarios are: Difficulty Description None A scenario rated as ‘None’ difficulty means that we consider the answers or actions required as obvious. Usually only one action is required to be successful. Enter a default password, make a single HTTP POST/GET, sniff a value from the network. Crack a key or password which is on a wordlist returning in seconds. We don’t expect any coding for scenarios rated as ‘None’ in difficulty. Scenarios rated as ‘None’ in terms of difficulty are considered trivial for a blue team defender to identify including the source addresses of the attackers. Trainee A scenario rated as ‘Trainee’ means that someone with less than 1 year of experience should be able to be successful. This will require more than 1 action but examples or descriptions of all the actions required are either provided or can be found with simple Google Searches. These scenarios also will almost never require you to infer a command line argument or determine which tools to use but we may require single line changes to code and scripts for these to be successful (typically changing hard-coded arguments or values that cannot be specified on the command line). We do give hints for scenarios rated as ‘Trainee’ level of difficulty. Scenarios rated as ‘Trainee’ in difficulty will be easier for a blue team defender to spot but not as trivial as those rated as ‘None’. Intermediate A scenario rated as ‘Intermediate’ may require more than 1 year of experience to complete successfully. This will require multiple steps to achieve success and very few of the follow- on steps or actions will be described in advance. The key with Intermediate Difficulty is the demonstration of applied knowledge. If you are told to achieve an outcome on a target, you first must solve the issue of access to the network, then recon to identify the target followed creation of payloads to achieve your desired outcome. You will have to write code to achieve your goals for a scenario rated ‘Intermediate’. This is the first level of difficulty where we consider it equally difficult for a Blue Team member to spot the attack as it is for the Red Team to perpetrate.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 25 of 61 © MISI 2023 Difficulty Description Advanced A scenario rated as ‘Advanced’ is considered a direct extension of one rated as ‘Intermediate’. Here you will have to write more code, work harder for initial access, even perform reverse engineering or use of tools non-standard tools such as software defined radios, programming embedded systems and using programming languages such as C and C++. One concrete example of the difference between an intermediate and advanced scenario will be the injection of industrial control traffic to perform basic functions such as turning off power to an output versus specific traffic to turn off power to some inputs while enabling power to others which means you must understand the input and output states of your target PLC or medical device. Expert The most difficult scenarios we will ever execute. A scenario rated as ‘Expert’ will require assistance or input from someone with multiple years of experience, more than 5 years and usually more than 10. This will require performing 1 or potentially more actions completely from scratch such as reverse engineering a sample file or constructing your own tool that executes multiple functions. An expert scenario will require difficult work to remain undetected. NOTE that there is an implicit assumption of existing skill you will bring to this and any MISI competition. The ideal participant in this event has some prior exposure to penetration testing, network security assessments, or vulnerability and reconnaissance scanning. On the opposite site, the ideal participant will have some degree of experience in running cyber security tools for network defense. If you come to this event understanding industrial protocols such as MODBUS, BACNet or EtherNet/IP and healthcare specific protocols such as HL7, you will have advantages over your competitors. While we want all interested parties to be involved, you will require some skills to compete. We will use a simple graphic gauge (like what is shown here) to indicate our assigned difficulty level for a scenario as follows where an arrow will indicate the difficulty level whose description can be found above in this section. Training Scenarios We are releasing our newly developed training scenarios for this event and plan to make this a regular occurrence at future MISI exercises. These training
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 26 of 61 © MISI 2023 scenario(s) will be a requirement for student attackers (RED) team and will be optional for professional or government/military participants where you may have already been required to take classroom training or have multiple years of experience under your belt when you participate in this exercise. A MISI training scenario is a fully functional, self-contained demonstration of a small number of protocols or technology that are involved in the exercise where the scenario is featured. The scenario will be physically disconnected from the exercise environment and may or may not have Internet connectivity. The purpose of a training scenario is to provide practice point where a participant can identify targets and potentially exploit devices using the same type of packages and protocols that will be found in the exercise network. You will be invited 1 team at a time to connect to the training scenario where a MISI engineer will guide you in the following actions: Identify ALL required target devices on the network (Including IP address/MAC Address information) Identify the protocol(s) or technology being used in the process (including port numbers and protocol names) Interrupt the process under execution using custom crafted code or an existing tool (no physical interruption allowed) The benefit of the ‘training’ is that a MISI engineer will work with each team to achieve the previously stated goals. If a team requires assistance, we will reserve the right to ask them to return to the training scenario after others have had a chance to visit. Participants should pay attention during initial briefings to determine what type of connectivity is required for each training scenario. Your participation in a scenario will be exclusive to your team only and it will take place away from view of other participating teams. We strongly urge you to bring Linux and Python 3 to a MISI trainer. If you choose to use a Microsoft Windows environment, you are advised to have the following items available: nMap 7.94 (with Zenmap) Wireshark Python 3.11.x Visual Studio Code
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 27 of 61 © MISI 2023 Trainer 1 We will be featuring the first MISI Trainer (we are calling Trainer 1) in this exercise. This trainer will feature at least 1 cyber-physical process that can be controlled and interrupted remotely. The participant should be aware that there may or may not be Internet access available to this self-contained environment. This featured in the following picture shown below: A participating team will be invited to interact with this scenario and is expected to bring a laptop computer to connect to the switch on the lower-left corner of the display, ethernet cables will be provided. Once connected you are expected to answer the following questions: 1. What are the components of this process? 2. What are their addresses? 3. What protocol(s) are being used If you can answer all these questions, we require a participant to develop a payload to interrupt the process over the network. This will be simple. The fact that this is a trainer means we will guide the participant through this construction. Registration This event is ‘invite-only’ so there is no registration. As we plan to re-run this story, this will change in the future, and we will release an updated story to account for registration details at that time. Execution We are working on details for the actual execution of this event. We strongly encourage you to check-back each week as we establish more details on how the execution of the event will occur. What we can describe now is the following:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 28 of 61 © MISI 2023 - All on-site RED Teams will be positioned in the same physical space at separate tables. - BLUE Teams will be in visual sight of RED Teams but out of earshot. - The operating hours of each day of this exercise will be: 0800 – 1600. - If a BLUE Team member catches a RED Team, they will be able to affect network access for increasing periods of time. - BLUE Teams will always have visual sight of all stations of this event whereas RED Teams may not be able to see all stations. Schedule Currently this event is scheduled for execution on the following dates: 18 - 21 September 2023 We have identified an estimated end time of: 1400 EST, Thursday September 21, 2023. We do plan to reserve a brief window of no more than two (2) hours Friday September 22 for any participating party to re-attempt a scenario without intervention so long as each team understands this will NOT count towards any performance evaluations or final ‘place’ in this exercise. Stay tuned to real-time chat for more information. Controlling Team Access We reserve the right to schedule each RED team to access specific scenarios or systems that run within this competition space. When this occurs, each competing team will receive the same amount of access time to the restricted scenario or system(s) without negotiation. We will communicate access restrictions during initial briefings for RED teams as the event draws closer, but we reserve the right to adjust access during live execution in response to adverse network or social conditions. Exclusion List We will use an exclusion list (also referred to as a blacklist) during execution of this event to indicate assets which are expressly prohibited from attack or interaction. An asset may represent an IP address, CIDR address, website or even a specific URL on a target on the network. All participants must abide by this list and will receive only 1 warning if they interact with an asset that has been excluded from interaction. Repeated interaction with restricted or excluded assets will result in removal from the event. Participants will need to learn that they must exercise caution when interacting with a control system
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 29 of 61 © MISI 2023 (e.g., programmable logic controller) or the device may hang or become corrupted. Awards We are planning to release a small trophy to the three top performing teams during execution of this event. We will release further details about trophies during the initial briefings for the RED and BLUE teams for this event prior to exercise start. Communication We will utilize a Discord Server for this event. We will release an invitation link to all registered participant email addresses as the event date comes closer. As with previous events, each team will be separated into different channels. You are strongly encouraged to monitor the Discord Server during normal business hours in the event we need to reach you. If you do not respond to three (3) attempts to contact you, your access will be immediately terminated until we can discuss whatever issue caused us to reach out to you in the first place. Video We do plan on recording video during the execution of this event This video will be streamed to a companion conference taking place at the same as this event via Twitch and YouTube Due to the unique nature of this event, participants will be permitted to ‘enter’ the hospital facility section of the event space in person a limited number of times. When this happens you will be on camera recorded by the surveillance systems that are active on the network and the simulcast stream of the proceedings to the conference taking place at the same time. Exercise Updates In the past we have needed to issue on-the-spot information to participants such as temporary pauses due to equipment failure(s) or system resets. These messages will be communicated to participants audibly and via the Discord server. This may include re-releasing this playbook with updated information. Because of this, we strongly encourage participants to join Discord to be alerted to these updates.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 30 of 61 © MISI 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 31 of 61 © MISI 2023 Teams We discuss the roles you can fill when you participate in the Hack-The-Building 2.0 challenge in this section. We need two (2) types of participants in our story: RED, and BLUE. We will discuss each team type separately next. Remote Participation There will not be any remote access participation for RED teams during this event. MISI is not responsible for how a RED team may choose to collaborate with offsite personnel for research and prototyping, but we will not offer any RED teams a VPN access account as we may have done in the past. Since there are online resources involved in an exercise, they are typically only released with strict firewall rules controlling who can access. We will make every attempt possible to accommodate offsite personnel to allow access to these online sites and resources but please be patient. You are required to communicate such requests over Discord only. We will not be able to respond to requests from email. Coordinated Disclosure This exercise is bound by the coordinated vulnerability disclosure process adopted by MISI. Any information discovered during this event will be disclosed in a responsible manner and this means you cannot publish details on social media of any kind. Failure to abide by this rule will result in immediate banning from any future MISI exercise. The reader is encouraged to review the CISA website discussing the coordinated vulnerability disclosure process: https://www.cisa.gov/coordinated-vulnerability-disclosure-process Team Rules MISI has several rules you are expected to abide by to participate in this event: On-site teams can be no larger than five (5) participants. Absolutely NO party may execute any action against Nove Cerchi Medical resources until they are given an official start via Discord. Each participating organization can field a team five (5) on-site RED team participants. RED Teams must sign and submit an electronic rules of engagement (ROE) PDF prior to the cyber exercise. No ROE, no admittance. RED Teams agree that they will NOT publish any results of any discoveries made during this event PERIOD.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 32 of 61 © MISI 2023 RED and BLUE Teams agree to leave each other alone, no snooping or spying of screens will be permitted. Teams agree to NEVER perform any denial-of-service activities (WIFI actions will be permitted only after collaboration with MISI personnel via Discord) Teams agree to report all activities executed and to not engage in any dishonest, illegal or immoral actions up to and during execution of this event. Visiting Attackers must abide by the two-finger tap rule if they are asked to leave the hospital area(s). No BLUE team personnel may touch or interact with any physical resource of a RED team participant. The exception being any battery- powered computing device that lacks a keyboard and is not under the direct physical control of a RED team member. In this case, the BLUE team participant may handle said device(s) with care ensuring not to drop them and may either power them off or place them in RF shielded containers or pouches. (e.g., you cannot cut the Ethernet wire of an attacker with scissors, it has happened in the past) No participant shall change any password for any device without reporting to MISI exercise control (EXCON). Doing so will result in an immediate exercise stop which may require extended down-time. No participant shall modify protected accounts on any exercise system (this includes the ‘Ansible’ account on all assets). Modifying this account in any way will result in an immediate exercise stop. NO BLUE team personnel may attempt to connect to any network port(s) on ANY RED team participant laptop. No participant may utilize a WIFI pineapple (or the equivalent PineAP or EvilTwin open-source software) without consulting with MISI Exercise Control We cannot stress this enough, if you stray from the approved target list, you will be removed from the competition. RED Offensive or RED teams are being asked to carry a specific mission for each or ‘scheme’ in this Hack the Building 2.0 Event. We strongly urge on-site teams to bring at least three (3) participants for this event, but you may have up to five (5) on a single RED Team. Each mission may require the creation of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 33 of 61 © MISI 2023 prototype code to inject, replay or alter traffic to achieve a specific effect. You should be ready to write code (e.g., Python, C or JavaScript), capture network traffic (PCAP), perform network reconnaissance, crack passwords, reverse engineer files and PCAP, and operate remote access programs such as Metasploit , PowerShell Empire , Veil , BEEF , Pupy , and others. Hospital Visits This is a unique exercise that tries to follow real-life practices. In a hospital, people are admitted as visitors and patients every hour of every day and in this exercise, RED team members can admit themselves for examination to Nove Cerchi. We will be able to accommodate three (3) patients at a time and RED teams must follow these rules for admittance: A single RED team member may not admit themselves more than 3 times in a single day of exercise. A RED team cannot admit the same person twice in a row. RED teams can only admit someone if an exam room is empty. An admitted patient must stop at reception first before accessing the hospital. An admitted person must display whatever badge or identifier they are given at reception. A patient may be asked to leave electronic devices in their car or back in the waiting room. An admitted patient may be left alone in an exam or ‘triage’ room for some period. They are not permitted to leave this room without displaying a security badge that will successfully scan on a badge reader at security. A patient may be asked to leave the facility by a BLUE team member. If asked or ‘two-finger tapped’ on shoulder or arm (only), they must leave immediately. If you do not follow these rules, you will be removed immediately. Rules of Engagement RED Team members are required to submit a signed rules of engagement (ROE) for all teams to be considered for participation. This is an important document for several reasons: 1. As we wrote earlier, we are firm believers in responsible vulnerability discovery or what CISA calls the ‘Coordinated Vulnerability Disclosure Process’. We are fortunate to have vendors work during exercises with us to demonstrate their technology and to publicly disclose any
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 34 of 61 © MISI 2023 vulnerability that you discover without letting the vendor address the problem first is irresponsible and potentially dangerous. Disrespecting this process will result in your immediate dismissal from all future MISI events and we will work with our customers to ensure you face additional consequences. 2. An ROE is a required legal document that should be signed by all participating parties before you conduct any type of offensive operation against a target should you chose to make this you career (and we hope you do). It is important for you to learn this lesson early. Here are some helpful articles that go into more detail: https://www.sans.org/posters/pen-test-rules-of-engagement- worksheet/ https://www.cisa.gov/resources-tools/services/penetration-testing-0 Expected Skills We suggest the following skills are required to be a successful RED Team: - Python (requests, scapy, pymodbus,, pyshark, BACpypes) - Network Recon (nmap, masscan, snmp, BACNet) - Wireless Surveys (Kismet, airodump-ng, hcitool) - Payload Building (msfvenom, empire, veil) - Host Exploitation (Metasploit Framework) - PCAP Analysis (Wireshark, tcpdump) - Vulnerability Scanning (OpenVAS, Nessus, nmap NSE Scripts, openscap, lynis) What to bring We provide suggestions on what tools a RED team should bring but be forewarned: part of the execution of cyberspace operations is pre-planning. You must think through what tools are required. At a minimum, you are highly encouraged to bring the following items: o Laptop(s) & Charger(s) o External USB WIFI (802.11ac or 802.11ax support) o External Bluetooth Radio o Virtualization Software (we only support VMWare virtualization; you can get 30-day trials) o Offensive Linux Distribution o USB Flash Memory o RFID Badge Scanning and Exploitation o RJ-45 Ethernet Cord (3-6 feet)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 35 of 61 © MISI 2023 Scoring Remember, this is a story of money. Traditionally, MISI will use CTFd for tracking RED team performance and would normally release a specific site for scoring closer to the event date. If we choose to use CTFd for this event, RED Team personnel will be issued an invite to CTFd through the Discord Server. At While we use a CTFd system to measure traditional performance, we will be adding additional metric of performance to this event, money. As a RED team member, you should be carefully watching everything to see if there are flags you can supply to gain points or types of fictitious PHI you can gather to earn more money. Flags and PHI will be found almost anywhere inside the Nove Cerchi networks. PHI and Cold Hard Cash Since this is an exercise about money instead of executing scenarios, we are asking RED Teams to disrupt processes and gather PHI both of which will earn you money. The first type of PHI you will find on the Nove Cerchi servers is a prescription record PDF. This is a record of a physician prescribing medicine to a past patient. An example of this is shown below on the left. The second type of PHI you will find is a diagnosis report from a past visit to a patient exam room at the Nove Cerchi facility. This is shown in the images below alongside a record of a drug prescription (remember its ‘fake’) issued to a past patient. For each record type you will see below, we assign a dollar value to the record that you will earn if you are able to ransom the data away from Nove Cerchi employees. You will earn this amount for each file you ransom provided you are able to show proof of the ransom. For the record, the ‘money’ discussed in this section is purely imaginary. You will not earn actual money from gathering PHI in this event. In addition, the information contained in these files is 100% fictitious. No personal data is used at any time.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 36 of 61 © MISI 2023 Worth $50.00 USD Worth $100.00 USD In addition to these types of PHI files shown previously, as this is a teaching exercise, we will be using X-Ray imagery from the research website https://radiopedia.org and proper citation of images used will be available. An example image to be on the lookout for is shown next including the corresponding citation. The citations for any x-ray imagery used will be found in the root directory of the primary location within our competition network where the imagery will be found. Any subsequent images used throughout the remainder of the network will be copies of those found in this root or Worth $10.00 USD NOVE CERCHI MEDICAL 7000 Columbia Gateway Dr. Columbia, MD 2104 __________________________________________________________________ Physician’s Signature: ____________________________________________________ www.novecerchimedical.com Name: Dorothy Davis DOB: 11/28/1947 Today's Date: 7-13-2007 Physician: Joseph Virgil MD Refills: 0 Dosage: 16 mg Medication: Nitroglycerin Instructions: Take as needed for cheset pain relief. Do not exceed three doses per day. NOVE CERCHI MEDICAL 7000 Columbia Gateway Dr. Columbia, MD 2104 Attending Physician: Filippo Argenti MD SSN: 122-26-3423 Medical Diagnosis Patient Name: Edward Lopez Date of Diagnosis: August 27, 2023 Age: 81 Chief Complaint: Complaining of leg pain after prolonged sitting or standing, along with symptoms of warmth and redness in the legs. Medical Diagnosis: Based on the presented symptoms and patient history, the medical diagnosis for Edward Lopez is as follows: 1. Peripheral Arterial Disease (PAD): Peripheral Arterial Disease is a condition characterized by the narrowing or blockage of blood vessels that carry blood from the heart to the extremities, particularly the legs. The symptoms of warmth, redness, and leg pain after prolonged sitting or standing are commonly associated with PAD. These symptoms are typically experienced due to reduced blood flow and oxygen supply to the leg muscles. Proposed Treatment Plan: Upon diagnosing Edward Lopez with Peripheral Arterial Disease, the following treatment plan is recommended: 1. Lifestyle Modifications: - Encourage regular exercise, such as walking, cycling, or swimming, to improve blood circulation. - Promote a healthy diet low in saturated and trans fats, with an emphasis on fruits, vegetables, whole grains, and lean proteins. - Encourage smoking cessation to improve vascular health. 2. Medications: - Prescribe medications, such as antiplatelet agents (aspirin, clopidogrel), cholesterol-lowering drugs (statins), and medications for managing blood pressure and diabetes as per the patient's medical history. 3. Surgical Intervention (if necessary): - In more severe cases, revascularization procedures such as angioplasty or bypass graft surgery may be recommended to restore blood flow to the affected leg(s). 4. Symptom Management:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 37 of 61 © MISI 2023 top-level location. X-RAY image case courtesy of Ian Bickle, Radiopaedia.org, rID: 171278 The final type of file available on this network is a DICOM image result from a sonogram. Readers may associate the sonogram to an expectant mother, but the sonogram is used for a variety of purposes including blood flow, studying newly discovered lumps in the body and even guiding needles for biopsy and tumor treatments. Worth $15.00 USD Participants should understand that the list of possible PHI data files and numbers of each type that are available for this exercise is subject to change. We will publish any changes or additions to this list on Discord during the exercise.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 38 of 61 © MISI 2023 Proof We touch on the concept of proof in this section. As a RED team operator, we highly advise you to learn the value of collecting evidence of actions taken during an operation. This can help you diagnose if something goes wrong, it can help prove your success at steps within your operational plan. In a MISI exercise, you are strongly advised to capture proof of your success. The most common form of proof is a screenshot showing outputs of tools you execute. You can enable timestamps in your shell history to ensure that timestamps are also captured but the screenshots are the simplest and most effective method of ensuring you can prove. The other type of proof we commonly encounter is source code that executes actions on objectives such as injecting traffic targeting a PLC or server. This is perfectly acceptable but as a secondary proof vector to a screenshot showing successful execution of your action(s). Ideally you should be capturing both types of proof of success. Command and Control We want to pause for a second and discuss usage of remote command and control (C2) assets during this event. You can assume the Nove Cerchi Medical network is connected to the Internet. If you successfully expand access off initial access network(s) where you start, you may find the need to control Nove Cerchi Medical assets via remote cloud-connected servers. We will not stand up any cloud-connected asset for you during this event. You are responsible for all cloud assets you require for successful operations during this event. You will be required to report on IP addresses used for cloud assets during exploit attempts. BLUE We are not only looking for RED teams for our Event. We want to find the group of participants who are eager to defend the facilities of Nove Cerchi Medical during our event operation. This is commonly referred to as a BLUE team. You will be granted administrator access to the networks and systems, and if you successfully spot an attacker, you will be granted permission to execute what we call defensive cyberspace operation response actions upon approval from MISI. The center piece of the BLUE team arsenal will be Elasticsearch. BLUE Teams will be granted access to a full Elastic Security Stack for this event that will include: - Syslog - Windows Log(s)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 39 of 61 © MISI 2023 How will BLUE teams compete? A BLUE team member’s job is to spot an attack in progress or that has completed and attempt to determine things such as: - What was the source address of the attack? - When did it start? When did it stop? - What was attacked? - Is it on-going? - What is the potential impact of the attack? - What are the TTPs that are being used in this attack? - Are there any Indicators of Compromise (IoC) that we can capture and share? - Can we mitigate this attack? - Can we prevent it from happening again? As we stated previously, we are using a Discord Server for communication and your job as a BLUE team defender will be to publish a Significant Action or SIGACT alert within the BLUE team channel if you discover an attack. You can then request a DCO-RA to respond which we will discuss shortly. Expected Skills The following skills are required to be a successful BLUE Team: Kibana Search/Query Kibana Visualization Syslog Log File Analysis PCAP Analysis Netflow Analysis Filesystem analysis Windows Registry Analysis PHP Vulnerability Analysis Intrusion Detection System Operation Windows Event Log Analysis DCO-RA A Blue Team can execute defensive cyber operation response actions or DCO- RA to defend a network. We are challenging BLUE Teams to plan to execute DCO-RA for this Event. While we have multiple DCO-RA actions planned, we will reveal now that BLUE team personnel will be permitted to request any of the following actions: - Block MAC address from Nove Cerchi WIFI
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 40 of 61 © MISI 2023 - Kick MAC address from Nove Cerchi WIFI - Change WIFI passwords on Nove Cerchi WIFI - Change User Passwords - Revert/Reboot Hosts - Kill processes. - Lock user Accounts - Disable Network Ports - QoS Network Ports Team members will be permitted to request these actions through Discord, and we will rule on the action and assist in the execution if sufficient evidence is provided. We will not inform RED teams of any DCO-RA actions that are executed against them. Ubiquiti Cloud-Key Removing actors from the Nove Cerchi networks in this exercise will be accomplished through the Ubiquiti Cloud Key web interface. MISI may offer BLUE teams the ability to login to the Cloud Key to block a competitor from the network. We will notify teams via Discord if we offer this option during execution. Mission Critical The BLUE Teams should understand that a hospital network like Nove Cerchi will contain systems that are essential to saving lives. As such, some actions they may request will be denied as they may have adverse impact on other systems functioning in the network. For example, in a past event a BLUE team altered the security settings of a network switch on a remote subnet of the competition network, and this resulted in the entire network no longer being accessible from the rest of the environment. If this was done in a real- life environment this could have extremely negative outcomes for patients in the hospital. Attack Reporting System We have created a system for BLUE team personnel to report suspected attacks. This will be a web-based form for capturing details about an attack in progress. This link will be available only during the actual exercise and each reported attack will automatically notify Discord channels. We can use this detail to understand BLUE team performance and ability to identify attacker TTP. The attack reporting form URL for this exercise can be found at: https://ybztcgbr3j.execute-api.us-east-1.amazonaws.com/default/attackreporting
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 41 of 61 © MISI 2023 All participants should know the following fact. The attack reporting system resource is ABSOLUTELY off limits to RED teams. This is owned by Amazon. DO NOT Touch this form if you are an attacker. We have summaries of the data gathered by this form that we can make available to BLUE team personnel. Vendor Interaction One of the most interesting aspects of the BLUE team is that you will be able to interact with vendors of advanced cyber security technology who are donating their solutions for this event. We already have multiple vendor commitments, and you should leverage this opportunity as free training on some of the most advanced ICS and healthcare information security platforms in the marketplace. We can confirm the following advanced technology for defensive cyber operations including control systems will be present at this event: Asimily Secure Cisco Cyber Vision Forescout Platform Elasticsearch with Kibana Keysight Packet Broker Nozomi Networks Guardian Ascom Healthcare SecureXperts Initial Story As this exercise starts, Nove Cerchi will be open for business just like any other normal day. This means that without customers, the hospital will not survive. The reader is strongly encouraged to read the prologue to ensure all the human and social details of our story are identified. As you read in the prologue, the Nove Cerchi Medical facility just recently completed their required Risk Analysis as stipulated by the HIPPA Security Rule. The RED team participants should be on the lookout for this internally produced report as it can clearly identify the vulnerabilities that the hospital should be planning to fix in the short term. RED team participants will be positioned in the waiting room area of the floor plan shown earlier and may remain ‘all day’. During this time, RED teams are allowed to enter the hospital facility as customers or patients, but they must
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 42 of 61 © MISI 2023 understand that there are a limited number of exam rooms that will be available during working hours. These teams will be found in the waiting room areas of the facility as described on the floor plan map shown previously. Any patient or visitor granted entrance to the facility will be required to display either an access sticker or a wristband. Anyone not in possession of either item will be assumed to be a hospital employee but there will be consequences to this claim. RED teams should be aware that the Nove Cerchi facility is protected by an access control system. In the photo on the right, you can see the access control reader found at admissions in addition to the access control panel itself. Each critical area in the rest of hospital will have a badge reader and any participant attempting to interact with a station may be questioned by hospital security prompting you to show your badge. There will be internet access available in the waiting room for any visitors, but a RED team will not be able to talk across the waiting room to any team member that has entered the facility as a patient. BLUE team members will be found in the access restricted area of the facility for security personnel but are permitted to roam anywhere on the floor including the waiting rooms. RED teams must find a way to expand access beyond the initial starting point of the NOVECERCHI-PUBLIC WIFI network to those networks that will allow them to attempt to locate any potential flags and ‘pull-off’ the money-making schemes described in the next section. The prologue mentions a specific HIPPA related item that may assist RED teams in determining how to expand access by describing cyber risks that the target healthcare facility currently suffers. They are encouraged to attempt to locate this item. There may be direct paths from public WIFI to the internal networks and there very well could be ‘longer’ paths requiring multiple steps of persistence and pivoting. As
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 43 of 61 © MISI 2023 always, should the story stall, the ‘storyteller’ may move it along unexpectedly requiring both sides to react quickly to new threats. Another unique aspect to this exercise is that barring any scheduling team access that may occur, there will be no set time windows for any activities during execution. Teams are encouraged to review the money-making schemes in the next section and determine their own order of execution. If you find you are having issues with one scheme, move onto the next while you still have time. All participants should be aware of the electronic medical records (EMR) system used by Nove Cerchi. Currently the Nove Cerchi Medical facility uses the OpenEMR platform for storage and processing of patient protected health information. Any patient who wishes to enter the Nove Cerchi facility during this exercise must self-register with this platform using the link shown in the following image: The link above for those who cannot see it in the image is: https://openemr.novecerchimedical.com/portal/ This link will only be accessible during the exercise operating hours and is not accessible remotely due to the risks of exploitation. Participants should remember that the OpenEMR platform does not respond to email addresses
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 44 of 61 © MISI 2023 that end in non-standard Top-Level Domains (TLD) such as .tech so make sure to use a suffix like .com, .net or .edu when supplying an email address for registration. Participants are strongly advised to remember that they should not supply real personal information during registration. In short, your email address and your first name should be real, nothing else matters. All participant registered information is purged at the completion of this exercise.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 45 of 61 © MISI 2023 We discuss the specific money-making schemes which will count overall scoring in this section. Each scheme will have a stated goal that you should attempt to achieve without detection by the blue team. Just a reminder, RED teams are not ‘actually’ making money during this event, you are simply trying to gain value over your teammates to claim success .
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 46 of 61 © MISI 2023 Scheme Ransom Nove Cerchi PHI Difficulty Suggestions - PowerShell - C# - Python Technologies Faced - Windows File Shares - Web Application - Active Directory - PDF - Adobe Acrobat PDF - DiCOM - OpenEMR - MySQL Description In this scheme, you must identify and ransom the electronic health records of past patients within the Nove Cerchi Medical facility. Do not delete records, just ransom them. You must gain access to the Nove Cerchi MEDSTAFF network and identify the files that contain this data. Once identified you must maintain access and develop a payload that will prevent normal hospital employees from accessing the data. There are multiple sources of ePHI within the Nove Cerchi network. At least one of these should be a file share instead of an application. If upon gaining access, you discover that the records area already ransomed, you must wait until the previous attacker is paid and the records are unlocked to proceed. This means you must successfully
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 47 of 61 © MISI 2023 open 1 record to check and see if the files are already ransomed. This means you won’t have a chance to earn any money from this event until this is completed and could result in your loss of access first thus losing your chance to perform your own ransom. Once you have identified access and developed your own ransom method, you must notify a Nove Cerchi employee either through Discord or an email to an employee. The technique must ensure that an employee cannot open the files you consider ransomed through normal means. You won’t have to write your own ransomware and you are NOT permitted to use any samples that have been reported to VirusTotal or other sources to accomplish your feat. The following article describes the collection of MITRE ATT&CK techniques used in this approach by previous attackers: https://media.defense.gov/2023/May/24/2003229517/-1/- 1/0/CSA_Living_off_the_Land.PDF It is important for your payday that you record every file that you ransom as this is the only way we can ensure that you are ‘paid’ properly for your efforts. No real exchange of money will take place, but MISI will track the number of files and their type to maintain a status of which team makes the most money during the exercise. It is also important to understand that the BLUE team can decide that you are not going to get paid but there is a cost associated with this. Participants should know that they will only get one opportunity to perform this feat, Vectors used to gain access may be closed by the BLUE team as the exercise continues. The values assigned to PHI found in files are described previously in the section titled PHI and Cold Hard Cash. If you believe you locate PHI data elsewhere on the network that has not already been mentioned, you are obliged to report this on Discord in the event you could receive on-the-spot additional rewards. HOWEVER, the BLUE team members could also locate said data and request its removal, so you have been warned.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 48 of 61 © MISI 2023 Scheme Disrupt & Disable Nove Cerchi Water Supply Difficulty Suggestions - nMap - Python3 Technologies Faced - Phoenix Contact - VT SCADA Lite - Windows 11 - IFM MODBUS Description In this scenario, RED team attackers should be attempting to disrupt or disable the Nove Cerchi Medical facility. This system was upgraded prior to the start of this exercise and can be completely controlled from the MEDSTAFF, FACILITIES, SECURITY and SERVICES networks. There is at least one flag to identify during the process of expanding access across Nove Cerchi networks when hunting the water treatment systems but there may be more. Be sure to review CTFd to determine which flags to look for this money-making scheme. Once you believe you have access to the appropriate subnet that contains the water treatment systems, you should attempt to understand this cyber physical system to setup potential destructive payloads you can launch. None Intermediate Advanced Expert Trainee
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 49 of 61 © MISI 2023 We have come up with the following table that describes how much money your actions can make if you can successfully demonstrate them: Step Monetary Value Shutoff initial water pump $500.00 Shutoff water pressurization $500.00 Activate Water treatment $1000.00 De-activate water flow rate monitors $1000.00 Demonstrate RFID badge access $1000.00 Disable water heater $2000.00 The RED teams should understand that each time they attempt to earn this money, they raise their risk of being detected by the BLUE team. The BLUE team may eventually identify the vectors that teams are using but as we wrote earlier, this system is considered mission critical and as such, they will not be able to close every path they request. RED Teams should also understand that since the water treatment plant of Nove Cerchi is considered protected, they must possess a valid access control badge to physically interact with the station. There are a variety of ways to obtain an access badge and if they are creative, they should be able obtain blank or even programmed badges during the event. The access control system uses proximity access cards in the 26-bit Weigand format. This format is described in detail on this link: https://getsafeandsound.com/blog/26-bit-wiegand-format/ To qualify for the RFID ransom money, they must demonstrate successful badge access on the water station badge reader. No other reader will count towards this reward. There may be badges used throughout the hospital that are universal which means they will be able to swipe at the HVAC reader successfully.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 50 of 61 © MISI 2023 Scheme Disrupt & Disable Nove Cerchi HVAC Difficulty Suggestions - Python - YABE - Bacpypes - nMap Technologies Faced - Windows 11 - BACNet - SNMP - Niagra Description In this money-making scheme, RED team attackers should be attempting to identify the HVAC network subnet of the Nove Cerchi facility. Once they identify this subnet, they should attempt to disrupt the HVAC control system to show they maintain control. The system will be used throughout the exercise in a normal fashion. This system is the most complex in all Nove Cerchi and there are five (5) separate parts of this HVAC system. During the process of identifying this subnet and expanding access to the appropriate subnets, there will be at least one flag that can be discovered. Teams should ensure to review CTFd to understand which challenges they should be locating flags to solve. None Intermediate Advanced Expert Trainee
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 51 of 61 © MISI 2023 We have come up with the following table that describes how much money your actions can make if you can successfully demonstrate them: Step Monetary Value Alteration of Temperature Display $500.00 Direct deactivation of Air Conditioner $1000.00 Demonstrate RFID badge access $1000.00 BACNet deactivation of Air Conditioner $2000.00 Closing cooling vent $2000.00 RED Teams should also understand that since the HVAC plant of Nove Cerchi is considered protected, they must possess a valid access control badge to physically interact with the station. There are a variety of ways to obtain an access badge and if they are creative, they should be able obtain blank or even programmed badges during the event. The access control system uses proximity access cards in the 26-bit Weigand format. This format is described in detail on this link: https://getsafeandsound.com/blog/26-bit-wiegand-format/ To qualify for the RFID ransom money, they must demonstrate successful badge access on the HVAC badge reader. No other reader will count towards this reward. There may be badges used throughout the hospital that are universal which means they will be able to swipe at the HVAC reader successfully. Due to the complexity of this money-making scheme, we will allot extra time to a team attempting to exploit this scheme provided they can prove they have exploitable access to the stations that comprise this cyber physical process. Also due to the complexity of this station, we will reward the ransom money described in the table above if a team can activate stations instead of ‘deactivating’ them. For example, if you can turn on the cold air when it is not currently active, this proves you understand this cyber physical process enough to be rewarded. Teams should understand that if they attempt to reprogram an industrial device and fail mid-process this may result in a STOPEX situation which requires the entire exercise to pause while the stations are reprogrammed.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 52 of 61 © MISI 2023 NOTE: This scenario in no way condones the illegal abduction, removal, or separation of children from their parents. MISI aims only to teach about the risk of child abduction from a hospital and the role of cyber security in preventing this awful situation. We are fortunate to have this scenario donated by the team at the National Cryptologic Foundation. Any attempts to physically damage this scenario will result in an immediate removal from the competition. Your success is achievable without causing physical damage to this station. Scheme Kidnap Baby From NICU Difficulty Suggestions - Hacker tool kits are not always electronic. - Eyes are always on in the NICU Technologies Faced - Access Control - Key Control - Access Control Card - Smart Card Login - Video Surveillance None Intermediate Advanced Expert Trainee
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 53 of 61 © MISI 2023 Description In this scenario, you are attempting to kidnap the baby Pearl (did you read the prologue?) for ransom. You are here to test the security of the National Cryptologic Foundation Digital Asset Defense Environment (DADE) room (we will miss you Scott). To enter the NICU, there are very strict procedures that if not followed will alert security and put the facility in lock-down mode and alert the hospital security and the police. The NICU has an observation area where the baby can be always seen. It has a motion detection, glass break, carbon monoxide and water detection sensor, so physical attacks are not recommended. This scenario will involve limited interaction with coaches from the National Cryptologic Foundation team, but each participating team will receive the same help as all others. We have come up with the following table that describes how much money your actions can make if you can successfully demonstrate them: Step Monetary Value Gain unauthorized access to the NICU $10,000.00 Disabling the Alarm System $1000.00 Remove baby Pearl from Room $60,000.00 Covering up video camera $10,000.00 The NICU has a motion detection, glass break, carbon monoxide and water detection sensor, so physical attacks are not permitted. To enter the NICU you must have a card and PIN code and to open the front door and disarm the NICU security alarm. Once inside, you must completely close the door and re-arm the security alarm within 30 seconds of entering the room. Video is always on at the NICU with often a 1:10 ratio of nurses to babies. There is no “snatch and grab”. The Infant protection system is attached to the baby and if detached will set off the alarm. You must remove the alarm bracelet before you leave the room. The infant monitoring system must be disabled from the computer system, which does not have a username password combination.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 54 of 61 © MISI 2023 NOTE: This scenario in no way condones the illegal abduction, removal, or separation of children from their parents. MISI aims only to teach about the risk of child abduction from a hospital and the role of cyber security in preventing this awful situation. Scheme Escape with Baby Pearl Difficulty Suggestions - HTTP - MSSQL - PowerShell - C#/Python - DNS Zones Technologies Faced - Asset Tracking - Web Application - 915MHz Radio Frequency None Intermediate Advanced Expert Trainee
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 55 of 61 © MISI 2023 Description In this scenario, you are attempting to bypass the asset tracking system being used at Nove Cerchi to provide infant and newborn security. This is a multi-homed application that interfaces in real- time with radios in the exercise area which can track the asset tags that are affixed to the newborn baby as we discussed in the previous scenario. In this chapter of our story, you and your team must ‘snatch’ baby Pearl after she has been removed from the NICU as discussed in the previous scenario and is being walked up and down the hallway of Nove Cerchi. You will need to coordinate with offsite team members to both grab the poor child and interact with the asset tracking system attempting to disrupt communication between the asset tag and the radio systems tracking location. You are required to coordinate your attempts to snatch the innocent baby Pearl when she is out of the NICU with a parent or guardian within the boundaries of Nove Cerchi. This means you can approach the parent and snatch the baby (calmly), but you must obey the two- finger tap rule to stop attempting to reach the door if security is nearby. You are advised to watch for the security patrols to understand how they work. It is almost a certainty this will require coordinated assault between onsite personnel and offsite team members. As you can probably imagine, the asset system security will be configured to attempt to prevent unauthorized usage or modifications so it will not be a simple affair to exploit and attack. We have come up with the following table that describes how much money your actions can make if you can successfully demonstrate them: Step Monetary Value Prevent security lockdown and exit door with baby Pearl $100,000.00
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 56 of 61 © MISI 2023 Scheme Disrupting Medical Device Data Transfer Difficulty Suggestions - Python - tcpdump/Wireshark Technologies Faced - HL7 - DiCOM - PACS - MirthConnect - Orthanc Description In this scenario, you are attempting to prevent the transfer of medical device data from the source device in a triage bay (or exam room) to its server-side storage system. You will receive a ransom reward for each device that you can prevent from communicating with its server component. You must wait until the start of the exercise to be informed which devices are online as possible targets for this scenario. You will not be given address details of these devices; you are responsible for finding out this information on your own. As a reminder, an ARP poison ( T1557.002 ) or DNS Cache poison. ( T1584.002 ) are not considered successful disruption by MISI standards. While proper execution of these techniques shows knowledge of offensive cyber operation TTP, there are more sophisticated ways to perform this action . None Intermediate Advanced Expert Trainee
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 57 of 61 © MISI 2023 You will receive a single one-time reward for each device you can affect, but if you are able to affect the server-side component through traditional mission effects, you will be awarded the combined sum of all devices that communicate through that server component. You must understand that you are to exercise all possible caution to not destroy any device(s) within the exercise network. You are not permitted to change the passwords of any device(s) you interact with. Manual interaction with a device while inside the hospital as a patient does not count as disrupting device transfer unless you can prove you are able to utilize a laptop or portable computing device connection to said device to stop the transfer. To say this plainly, you won’t get a ‘ransom’ reward by simply turning off a device in person. You are also not permitted to change any password or PIN of any of these devices. We have come up with the following table that describes how much money your actions can make if you can successfully demonstrate them: Step Monetary Value Disrupt HL7 Information Flow $10,000.00 Disrrupt DiCOM information flow. $10,000.00
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 58 of 61 © MISI 2023 Under no circumstances are participants permitted to physically interact with the infusion pumps used in this exercise. While the pumps only utilize saline solution, you are nonetheless NOT permitted to touch them or place them on your person at any time. Scheme Infusion Confusion Abusin Difficulty Suggestions - Python - nMap Description In this scenario, you are attempting to interact with and control infusion pumps from across the network. There are two different brands of infusion pumps used within Nove Cerchi. If you can locate these pumps and activate their delivery functions or intercept communications between the pump and any control server software from across the network, you will receive a ransom reward for this function. The reward for this scheme be $2000 per pump. A participating team will ONLY be able to get this reward once. Participants are reminded to request permission to attempt to affect these devices if located. We are withholding the names of the pumps used in this exercise due to the sensitivity of the models and actual danger involved in delivery of an improper drug or amount of drug to an affected patient. Any RED team participant that enters None Intermediate Advanced Expert Trainee
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 59 of 61 © MISI 2023 the hospital area as a patient will be able to identify the model and perform research on-the-spot during the event. Participants should know that the infusion pumps are considered ‘mission critical’ to Nove Cerchi and thus are not able to be shut-off by network defenders (BLUE). Also due to the extreme complexity of an infusion pump and the corresponding server software, we will award ransom money to any team that can demonstrate a Man in The Middle attack and intercept communication between the pump and upstream simulated server components without needing to prove any further control. This will be awarded so long as the team does NOT rely on a low complexity ARP Poison attack for the interception and said team provides evidence of the payload(s) used and shows screenshots demonstrating control.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
https://misi.tech Page 60 of 61 © MISI 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help