SlideShare a Scribd company logo
1 of 23
How to Hug a Hacker
(Lessons from Manufacturing)
Holly Turner, Xerox
Information Security Manager
CISSP, PMP, Six Sigma Black Belt
"My father taught me many things here —
he taught me in this room. He taught me —
keep your friends close but your enemies
closer.“
"Michael Corleone" in The Godfather Part II
(1974)
• Mike Lynn, age 24, presented vulnerabilities in
Cisco IOS at Black Hat in Vegas
https://www.blackhat.com/html/bh-blackpage/bh-blackpage-11092005.html
https://www.schneier.com/blog/archives/2005/07/cisco_harasses.html
• Resigned from ISS, after being asked to ‘edit’
presentation content
• Lawsuit filed by Cisco, ISS
2005 “Ciscogate”
"No one really thought this …was possible, until Wednesday, so no
one really looked to defend against it," [Mike]Lynn said. "A router is
like any computer in that, when it has a vulnerability, you can hack
it.“
Blowback - 1 http://www.securityfocus.com/news/11260
"The whole attempt at security through obscurity is amazing,
especially when a big company like Cisco tries to keep a researcher
quiet“
“ People are definitely going to want to find more vulnerabilities ...
and now people aren't going to care to report things to Cisco.”
Marc Maiffret, chief hacking officer for network protection firm
eEye Digital Security
Blowback - 2 http://www.securityfocus.com/news/11260
"You have EULAs that tell people they can't reverse engineer and
companies who are ready to levy the most severe penalties for
anyone who breaks those agreements,“[Jennifer] Granick said. "It is
time to begin to worry about the rights that companies are trying
to take away from us.”
Blowback- 3 http://www.securityfocus.com/news/11260
EULA
• Processor
• RAM, ROM, SDRAM
• HD
• NIC
• Analog Fax Modem
• Linux OS
• Apache, Open SSL, Open LDAP, Samba,
Kerberos, PHP, Netsnmp
Say hello to my little friend.
• Brendan O’Connor, undergrad intern, presents
“Vulnerabilities in embedded systems”
https://www.blackhat.com/presentations/bh-usa-06/BH-US-06-OConnor.pdf
Black Hat 2006
XRX06-001, XRX06-003
https://www.xerox.com/download/security/security-bulletin/95dc-49fa773808540/cert_XRX06_001.pdf
https://www.xerox.com/download/security/security-bulletin/390bd-49fa772c96a40/cert_XRX06_007_v1.pdf
• Senior Security Advisor at Leviathan Security
Group
• Juris Doctor, Law, University of Wisconsin,
MSE Computer Science, Johns Hopkins
• CIPP/US, CIPP/G, CISSP, Certificate of Cloud
Security Knowledge https://www.linkedin.com/in/ussjoin
Where is he now?
• Researchers at Columbia School of
Engineering and Applied Science reverse
engineer printer
• Software updates are not digitally signed and
checked for authenticity
• Malware can replace OS
http://www.nbcnews.com/business/consumer/exclusive-millions-printers-open-
devastating-hack-attack-researchers-say-f118851
Printers on Fire? 2012
• Dr. Ang Cui, CEO and chief scientist
• Dr. Salvatore Stolfo, co-founder
• Red Balloon Security
https://www.redballoonsecurity.com/
• Project Symbiote – software to defend
embedded devices, in HP devices
Where are they now?
• Andrei Costin, presentation on “Embedded
Devices Security and Firmware Reverse
Engineering”
https://www.blackhat.com/us-13/briefings.html#Costin
Black Hat 2013
More Security Bulletins
https://www.xerox.com/download/security/security-bulletin/2e639-4d7bcb40a048e/cert_XRX12-003_v1.13.pdf
• Co-founder at Firmware.RE
• PhD from EURECOM/Telecom ParisTech
• Google Security Hall of Fame
• 12/29/2015 presentation on “(In)Security of
Embedded Devices' Firmware - Fast and Furious
at Large Scale “
https://www.youtube.com/watch?v=Rum1e8ZJlys
Where is he now?
• Andrew Auernheimer, Weev, hacktivist claims
‘mass printer trolling’ sending an
unauthorized document to printers on open,
unsecured Internet connections.
• http://www.nytimes.com/2016/03/29/nyregion/hacker-weev-says-he-printed-anti-
semitic-and-racist-fliers-at-colleges-across-us.html?_r=0
Fast forward, March 2016
• Self-Employed
• Seeking Crowdfunding on Liberapay
• Twitter – “Tons of Soviet bureaucracy. Submitted
my request for a 15 year residency. If you don't
travel to Eastern Europe I'll see you when I'm 45”
https://www.linkedin.com/in/rabite
Where is he now?
How hugging works
1. Contact
– Dedicated webpage.com/security
– Technical Support, phone or email
2. Publication Pause
– Negotiated time period for manufacturer to develop
patch, 60 to 90 days
3. Acknowledgement
– Public recognition of researcher
Options:
• Contest/Challenge
• Payment/Bug Bounty
www.xerox.com/security
https://www.google.com/appserve/security-
bugs/m2/new?rl=&key=
https://technet.microsoft.com/en-
us/security/ff852094.aspx http://www.cisco.com/c/en/us/about/securit
y-center/security-vulnerability-
policy.html#roosfassv
Questions?

More Related Content

Viewers also liked

Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13aemachamer
 
El turismo como competencia del desarrollo local
El turismo como competencia del desarrollo localEl turismo como competencia del desarrollo local
El turismo como competencia del desarrollo localSusana Marin Traura
 
Presentacion patines
Presentacion patinesPresentacion patines
Presentacion patinescokke23
 
El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613Marcos Luk'aña
 
Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)ve-finance
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowCloudIDSummit
 
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-FarberPhotos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-FarberDana-Farber Cancer Institute
 
(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311MikelOrrantia
 
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.Mi rincón de Medicina
 
Aprendizaje activo ak-1
Aprendizaje activo ak-1Aprendizaje activo ak-1
Aprendizaje activo ak-1cepcpp Lara
 
consommation alimentaire en France en 2010
consommation alimentaire en France en 2010consommation alimentaire en France en 2010
consommation alimentaire en France en 2010FNICGV
 
MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction Fahim Kawsar
 
Monografia Cristiana Pedagogia Itiúba 2012
Monografia Cristiana Pedagogia Itiúba 2012Monografia Cristiana Pedagogia Itiúba 2012
Monografia Cristiana Pedagogia Itiúba 2012Biblioteca Campus VII
 

Viewers also liked (15)

Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13
 
El turismo como competencia del desarrollo local
El turismo como competencia del desarrollo localEl turismo como competencia del desarrollo local
El turismo como competencia del desarrollo local
 
Presentacion patines
Presentacion patinesPresentacion patines
Presentacion patines
 
El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613
 
Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-FarberPhotos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
 
(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311
 
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
 
Mis lecturas ciclo2
Mis lecturas ciclo2Mis lecturas ciclo2
Mis lecturas ciclo2
 
Aprendizaje activo ak-1
Aprendizaje activo ak-1Aprendizaje activo ak-1
Aprendizaje activo ak-1
 
consommation alimentaire en France en 2010
consommation alimentaire en France en 2010consommation alimentaire en France en 2010
consommation alimentaire en France en 2010
 
MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction
 
Hemostasia
HemostasiaHemostasia
Hemostasia
 
Monografia Cristiana Pedagogia Itiúba 2012
Monografia Cristiana Pedagogia Itiúba 2012Monografia Cristiana Pedagogia Itiúba 2012
Monografia Cristiana Pedagogia Itiúba 2012
 

More from BSidesROC

Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling
Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat ModelingLet’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling
Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat ModelingBSidesROC
 
Bitclamp - A Permanent and Anonymous Publishing Platform Over Bitcoin
Bitclamp - A Permanent and Anonymous Publishing Platform Over BitcoinBitclamp - A Permanent and Anonymous Publishing Platform Over Bitcoin
Bitclamp - A Permanent and Anonymous Publishing Platform Over BitcoinBSidesROC
 
BSidesROC 2016 - Jaime Geiger - Android Application Function Hooking With Xposed
BSidesROC 2016 - Jaime Geiger - Android Application Function Hooking With XposedBSidesROC 2016 - Jaime Geiger - Android Application Function Hooking With Xposed
BSidesROC 2016 - Jaime Geiger - Android Application Function Hooking With XposedBSidesROC
 
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz Ostmaster
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz OstmasterBSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz Ostmaster
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz OstmasterBSidesROC
 
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control Networks
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control NetworksBSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control Networks
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control NetworksBSidesROC
 
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The LawBSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The LawBSidesROC
 

More from BSidesROC (6)

Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling
Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat ModelingLet’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling
Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling
 
Bitclamp - A Permanent and Anonymous Publishing Platform Over Bitcoin
Bitclamp - A Permanent and Anonymous Publishing Platform Over BitcoinBitclamp - A Permanent and Anonymous Publishing Platform Over Bitcoin
Bitclamp - A Permanent and Anonymous Publishing Platform Over Bitcoin
 
BSidesROC 2016 - Jaime Geiger - Android Application Function Hooking With Xposed
BSidesROC 2016 - Jaime Geiger - Android Application Function Hooking With XposedBSidesROC 2016 - Jaime Geiger - Android Application Function Hooking With Xposed
BSidesROC 2016 - Jaime Geiger - Android Application Function Hooking With Xposed
 
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz Ostmaster
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz OstmasterBSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz Ostmaster
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz Ostmaster
 
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control Networks
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control NetworksBSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control Networks
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control Networks
 
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The LawBSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

BSidesROC 2016 - Holly Turner - How To Hug A Hacker

  • 1. How to Hug a Hacker (Lessons from Manufacturing) Holly Turner, Xerox Information Security Manager CISSP, PMP, Six Sigma Black Belt
  • 2.
  • 3. "My father taught me many things here — he taught me in this room. He taught me — keep your friends close but your enemies closer.“ "Michael Corleone" in The Godfather Part II (1974)
  • 4. • Mike Lynn, age 24, presented vulnerabilities in Cisco IOS at Black Hat in Vegas https://www.blackhat.com/html/bh-blackpage/bh-blackpage-11092005.html https://www.schneier.com/blog/archives/2005/07/cisco_harasses.html • Resigned from ISS, after being asked to ‘edit’ presentation content • Lawsuit filed by Cisco, ISS 2005 “Ciscogate”
  • 5.
  • 6. "No one really thought this …was possible, until Wednesday, so no one really looked to defend against it," [Mike]Lynn said. "A router is like any computer in that, when it has a vulnerability, you can hack it.“ Blowback - 1 http://www.securityfocus.com/news/11260
  • 7. "The whole attempt at security through obscurity is amazing, especially when a big company like Cisco tries to keep a researcher quiet“ “ People are definitely going to want to find more vulnerabilities ... and now people aren't going to care to report things to Cisco.” Marc Maiffret, chief hacking officer for network protection firm eEye Digital Security Blowback - 2 http://www.securityfocus.com/news/11260
  • 8. "You have EULAs that tell people they can't reverse engineer and companies who are ready to levy the most severe penalties for anyone who breaks those agreements,“[Jennifer] Granick said. "It is time to begin to worry about the rights that companies are trying to take away from us.” Blowback- 3 http://www.securityfocus.com/news/11260 EULA
  • 9. • Processor • RAM, ROM, SDRAM • HD • NIC • Analog Fax Modem • Linux OS • Apache, Open SSL, Open LDAP, Samba, Kerberos, PHP, Netsnmp Say hello to my little friend.
  • 10. • Brendan O’Connor, undergrad intern, presents “Vulnerabilities in embedded systems” https://www.blackhat.com/presentations/bh-usa-06/BH-US-06-OConnor.pdf Black Hat 2006
  • 12. • Senior Security Advisor at Leviathan Security Group • Juris Doctor, Law, University of Wisconsin, MSE Computer Science, Johns Hopkins • CIPP/US, CIPP/G, CISSP, Certificate of Cloud Security Knowledge https://www.linkedin.com/in/ussjoin Where is he now?
  • 13. • Researchers at Columbia School of Engineering and Applied Science reverse engineer printer • Software updates are not digitally signed and checked for authenticity • Malware can replace OS http://www.nbcnews.com/business/consumer/exclusive-millions-printers-open- devastating-hack-attack-researchers-say-f118851 Printers on Fire? 2012
  • 14. • Dr. Ang Cui, CEO and chief scientist • Dr. Salvatore Stolfo, co-founder • Red Balloon Security https://www.redballoonsecurity.com/ • Project Symbiote – software to defend embedded devices, in HP devices Where are they now?
  • 15. • Andrei Costin, presentation on “Embedded Devices Security and Firmware Reverse Engineering” https://www.blackhat.com/us-13/briefings.html#Costin Black Hat 2013
  • 17. • Co-founder at Firmware.RE • PhD from EURECOM/Telecom ParisTech • Google Security Hall of Fame • 12/29/2015 presentation on “(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale “ https://www.youtube.com/watch?v=Rum1e8ZJlys Where is he now?
  • 18. • Andrew Auernheimer, Weev, hacktivist claims ‘mass printer trolling’ sending an unauthorized document to printers on open, unsecured Internet connections. • http://www.nytimes.com/2016/03/29/nyregion/hacker-weev-says-he-printed-anti- semitic-and-racist-fliers-at-colleges-across-us.html?_r=0 Fast forward, March 2016
  • 19.
  • 20. • Self-Employed • Seeking Crowdfunding on Liberapay • Twitter – “Tons of Soviet bureaucracy. Submitted my request for a 15 year residency. If you don't travel to Eastern Europe I'll see you when I'm 45” https://www.linkedin.com/in/rabite Where is he now?
  • 21. How hugging works 1. Contact – Dedicated webpage.com/security – Technical Support, phone or email 2. Publication Pause – Negotiated time period for manufacturer to develop patch, 60 to 90 days 3. Acknowledgement – Public recognition of researcher Options: • Contest/Challenge • Payment/Bug Bounty

Editor's Notes

  1. Hi. My name is Holly Turner. I’ve been at Xerox roughly 20 years. I joined as Windows 95 was launched and have been hands-on with coding, project management, scrum, and test. Unlike most InfoSec professionals, I don’t work on the corporate HQ team writing policy, setting firewall rules, running scans, or doing forensics to protect the company’s assets. Instead, my focus has always been outwardly focused, on the customer experience and protecting their assets. If you’re going to stay in business, you soon learn that the ‘customer is always right’ and you work hard to keep customers happy. All the slides will be available to you after the presentation if you’d like to dig in a bit more. I’m going to run though them quickly so please hold your questions until the end. Let’s get started! When you’re a manufacturer, your product is your baby. It’s beautiful.
  2. Until some hacker bursts that bubble! From this side of the podium, hackers are pointing out flaws in your baby. Next thing you know, you’re holding an ugly baby. The sales team can’t sell an ugly baby. Support doesn’t want to deal with an ugly baby. And stockholders run from brands with ugly babies. The knee jerk reaction from manufacturers is to hit back. We’ll talk about an example of that today.
  3. I’m also going to talk about smart manufacturers. Like the Godfather, they recognize that it’s business, not personal. Manufacturers who befriend and embrace hackers, while counter-intuitive, will be more successful. Finally, I’m going to talk about some hackers I’ve observed. I’ll share some examples of smart hackers that have capitalized on their research professionally and financially. My first lesson came from Black Hat 2005 and a manufacturer called Cisco.
  4. Mike Lynn employed as a security researcher just out of college identified vulnerabilities in Cisco’s router operating system in 2005. Concerned about risks for the Internet and undeterred at that time by threats, he resigned his job and presented his findings at Black Hat.
  5. The judge ruled in favor of Cisco and as part of the settlement all copies of the presentation were deleted. Mike was unemployed and gagged, unable to share any of his findings or continue to participate in Black Hat.
  6. More interesting is the blowback from the Cisco decision to sue. Let’s look a few of these. Prior to this court case, all the heat and light was on operating systems on clients and servers. This case exposed vulnerabilities in routers and other IT components with embedded software. The same functionality that allows management over the network opens doors for attackers. The Internet of Things continues to expand the attack surface to your house and car. I like to use cheese as a thought model for hacking. Manufacturer specifications are the cheese, product features that customers are willing to pay for. Testers and the Common Criteria Certifications look at the cheese, ensuring that features work as specified and designed. Hackers look for the holes in the cheese – undocumented, unintended functionality. The lawsuit exposed this first hole in routers to the world in public records and news articles. In millions of lines of Cisco code, surely more holes could be found. No manufacturer wants their brand name on hacker radar. Unfortunately, after the long legal battle Mike Lynn, faded from the hacker stage.
  7. Cisco thought that going to court would keep the vulnerability hidden and intimidate others from looking for holes in their products. Instead, this action seemed to play out as a cover-up and tarnished the brand. It’s no longer an option for a manufacturer to bury their head in the sand and pretend that vulnerabilities don’t happen in their products. If your product includes software, you need to pay attention. Smart manufacturers listen to their customers. You don’t have to like hackers, but they are here to stay! Hacker knowledge is powerful and can help manufacturers respond with better quality software to protect systems and people. Getting your credit card number hacked is a first world problem, but as embedded software is built into healthcare systems and products, like pacemakers and insulin pumps, it could mean your life.
  8. One of the first Latin phrases I learned was ‘Caveat Emptor’ which loosely translates as ‘buyer beware’. The End User License Agreement, known as the EULA, protects manufacturers, not customers. Imagine if your local baker slapped one of these on a bread wrapper. Would you purchase and consume bread if you didn’t have confidence in the ingredients and manufacturing process? What if bakers didn’t have to recall tainted bread or warn you that it could make you sick? Smart manufacturers recognize that customers have some basic rights. The United States Consumer Product Safety Commission regulates many products, among them toys (no lead), electrical products (fires), and lawnmowers (toes). My thoughts are that product security may soon be regulated in a similar way. Certainly standards like ISO 27001 and NIST 800-53 are driving manufacturers to provide controls to protect information and the integrity of software components.
  9. My experience centers around the print environment, so that’s the story I’m going to share today. As you can see, multi-function devices have full operating systems that have a broad potential attack surface.
  10. In 2006, a Xerox multi-function device was the focus of a Black Hat presentation by Brendan O’Connor an undergrad at Johns Hopkins looking at embedded systems. So, what did Xerox learn from the Cisco experience?
  11. Rather than pursue legal action, Xerox sent a representative to the presentation. Engineers reached out to Brendan for more info, then issued security bulletins with software patches, and acknowledged his assistance. This soft approach closed vulnerabilities for customers, saved the company court costs, protected the brand, and established a respectful, productive relationship with the hacker that kept the door open for future engagement. While there were a few news articles at the time, the news cycle moved on very quickly.
  12. Brendan O’Connor has enjoyed great success in his career. He’s still hacking and based on his online profiles, is happy. Please note that his path was fueled by a solid foundation in education and certification.
  13. Columbia PhD student Ang Cui and Professor Salvatore Stolfo led a team exploring vulnerabilities in the software update process for HP printers and funded by government and industry grants. First disclosure was a private briefing to the government that was paying the bills, a week later to HP, and a week later to the national press. A sensational claim was made that malware commands could cause a printer to catch fire although print manufacturers uniformly responded that mechanical safeguards would prevent this.
  14. Andrei Costin is another researcher who worked with Xerox to resolve vulnerabilities in printers in an ethical manner back in 2013.
  15. Again rather than pursue legal action, Xerox engineers worked closely with the researchers to develop solutions for customers.
  16. And he’s still rocking embedded systems.
  17. In March 2016, hundreds of printers in the US were the victim of a hacktivist who used simple tools to scan the Internet for printers exposing port 9100. This wasn’t really a ‘hack’ but just a straight-forward print job containing highly controversial content. This generated headaches and unplanned emergency responses for network administrators. This hacktivist was not motivated by financial gain and did not attempt to work with any print manufacturer.
  18. Again, no printer hacking was involved this round. For most customers, putting the printer behind a firewall closed the door on this vulnerability. Additionally, most MFD provide access controls could be enabled to prevent insider copy cat attacks.
  19. Andrew pursues an alternate career path.
  20. It’s a win-win for manufacturers and hackers to work together when vulnerabilities are discovered. Customers also win as product security is maintained over time. <Go through motions, contact, pause, bow head in thanks> Smart manufacturers make contact easy. They’ll often have a dedicated landing page for security. Check out www.xerox.com/security, www.cisco.com/security, www.microsoft.com/security, www.xerox.com/security and others.
  21. Examples of Vulnerability Reporting links
  22. Namaste – Contact, Pause, Acknowledge