www.planittesting.com
Security Implied
Ferdinand Hagethorn
fhagethorn@planittesting.com
@hagnf
© Planit Software Testing 1
www.planittesting.com
Who is this Ferdinand?
Dutch
Degree in information engineering
Fan of Open Source, UNIX, Linux, and free beer
Since 2015: Security specialist for Planit Software Testing NZ
Worked for 9 years in the energy sector in the Netherlands
Solutions & IT Security Architect
Business Analyses
Data & Service Management
Resident “Hacker”, from Office to SCADA systems
© Planit Software Testing 2
www.planittesting.com
Agenda
Security & Risk
Threats & Vulnerabilities
What do we do now?
Where can we improve?
© Planit Software Testing 3
www.planittesting.com
What is security?
Definition: “The state of being free of danger or threat”
A process, not a product
© Planit Software Testing 4
www.planittesting.com
Why “do” security?
© Planit Software Testing 5
To mitigate risk
• Financial Risk
• Operational Risk
• Strategic Risk
• Reputation Risk
• Legal & Regulatory Compliance Risk
• Information Systems Risk
Enable business in a secure way
A threat becomes a risk, if you are vulnerable to it
www.planittesting.com
What is Risk?
© Planit Software Testing 6
Threat Vulnerability Risk
Can’t influence Can influence
www.planittesting.com
Security Risk calculation
© Planit Software Testing 7
ARO SLE ALE
Annual Risk
Occurrence
Example:
0nce every
4 years =
0.25/yr
Single Loss
Expectancy
Damage
cost per
occurrence
=
50,000NZD
Annual Loss
Expectancy
The risk would
cost 12,500NZD
for the business
annually
www.planittesting.com
Let’s meet the threats
© Planit Software Testing 8
www.planittesting.com
The Threat Curve ~ 2010
© Planit Software Testing 9
“Type 1”
“Type 2”
“Type 3”
Script Kiddies
Lone Wolves
Organized Crime
“Hacktivists”
Nation States
(Tier 2)
Nation States
(Tier 1)
Mass Targeting Pinpoint Targeting
High
Sophistication
Low
www.planittesting.com
Type 1: Script kiddie
© Planit Software Testing 10
Exploration, KUDO’S, Fun & Games
Uses standard tools
www.planittesting.com
Type 1: Lone Wolf
© Planit Software Testing 11
www.planittesting.com © Planit Software Testing 12
Type 1(?...): Hacktivists
www.planittesting.com
Type 2: Organised crime
© Planit Software Testing 13
Ransomware & Spam
www.planittesting.com
Type 3: Nation States (2012+)
© Planit Software Testing 14
Cyber weapons; Advanced Persistent Threat (APT)
www.planittesting.com
A few interesting case studies
© Planit Software Testing 15
© Planit Software Testing
Case study: Stuxnet (Type 3)
Incident: January 2010, An “unnamed” nation state (or
states) deployed a cyber weapon on the uranium
enrichment plant of Iran, possibly injected via infected
USB stick
Impact: Centrifuge crashes, disabled ability to enrich
uranium
Specifics: The cyber weapon Stuxnet used 4 zero days
to dig deep into the control network and change the
programming of the centrifuge controllers. The new
programming disrupted the rotation while reporting
stable rotation speeds resulting in the crash of the
centrifuges.
Lessons learned:
Nation states have near unlimited
resources
Apply defence in depth
Source: https://en.wikipedia.org/wiki/Stuxnet
© Planit Software Testing
Case study: ISS Air gap bridged (Type 2)
Incident: August 2008, Virus intended to steal
passwords to send them to a remote server infected
laptops of the International Space Station (again)
Impact: Created a “nuisance” to noncritical space
station laptops
Specifics: Infection spread to more than one laptop,
could have spread via some sort of intranet or USB-
stick.
Lessons learned:
Because of the human factor, no
true air gap exists.
Examples: VPN, thumb drives, wifi,
CD/DVD(recordables)
Source: http://www.telegraph.co.uk/technology/3358263/Computer-virus-infects-International-Space-Station-laptops.html
© Planit Software Testing
Case study: The Target Hack (Type 2)
Incident: in 2013 hackers got in through a 3rd party – The Airco
maintenance company.
Moved laterally through the Target networks
Installed Malware onto POS machines
Impact: 40 million credit card details stolen, 70 million addresses,
phone numbers, and other pieces of personal information
Specifics: Target Security saw it, but didn’t take action and ignored
alarms. The malware used was “uninteresting and unsophisticated”
according to Jim Walter, director of threat intelligence operations at
security technology company McAfee. “COTS malware”
© Planit Software Testing 18
Lessons learned:
Don’t be stupid, respond to alerts!
Note: Only 31% of companies discover the breach
themselves. For retailers it’s 5%
Source: http://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-credit-card-data
www.planittesting.com
More recently
2015: OPM (Office of Personnel Management)
Data breach, APT, breached since march 2014
Executed by: (most likely) Chinese army
Impact: 41 million personnel records stolen
2015: Ashley Madison
Data breach, SQL injection and other public exploits,
Executed by: Hacktivists “The Impact Team”
Impact: Leaked 60GB of company data, emails, user details, documents
2014: Sony
Data breach, various techniques
Executed by: N. Korea (or disgruntled employee?)
Impact: 100 Terabytes of data stolen, movies, emails, documents
20
www.planittesting.com
7 Steps of Breach to Exfil
Exploit access
&/ data
Collect,
Exfiltrate
Move LaterallyInstall tools
Establish
Persistence
Initial
Exploitation
Reconnaissance
© Planit Software Testing 20
www.planittesting.com
Trends since 2000
Motives for hacking have changed
From: Demonstration of skills & explorations
To: Monetary gain & Political power
Conclusion: Threats are a moving target, we can only
only observe and respond
© Planit Software Testing 21
www.planittesting.com
The Threat Curve ~ 2010
© Planit Software Testing 22
“Type 1”
“Type 2”
“Type 3”
Script Kiddies
Lone Wolves
Organized Crime
“Hacktivists”
Nation States
(Tier 2)
Nation States
(Tier 1)
Mass Targeting Pinpoint Targeting
High
Sophistication
Low
www.planittesting.com
Type 1
Type 2
The Threat Curve ~ now
© Planit Software Testing 23
Type 3
Script Kiddies
Lone Wolves
Organized Crime
“Hacktivists”
Nation States
(Tier 2)
Nation States
(Tier 1)
Mass Targeting Pinpoint Targeting
High
Sophistication
Low
Observation:
Less advanced
adversaries now have
access to very
sophisticated malware
www.planittesting.com
Exploits & the malware marketplace
© Planit Software Testing 24
www.planittesting.com
Darkode market place
© Planit Software Testing 25
Worldwide: 700-800 Hacker forums
July 2015: Darkode takedown
3 levels of trade on the black market:
Skills: Top-end, highly skilled people
Tools: Hack & deception tools
Data: Personal data, stolen bank cards
www.planittesting.com
The 0-day exploit black market prices
© Planit Software Testing 26http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/
www.planittesting.com
Several Bug Bounty Programmes
© Planit Software Testing 27
Facebook Whitehat Program
Bounty: $500 US minimum, no maximumGoogle Vulnerability Reward Program (VRP)
Bounty: $100 US minimum, $20k US max
Yahoo Bug Bounty Program
Bounty: $100 US minimum, $20k US maxMozilla Bug Bounty Program
Bounty: $500 US minimum, $3k US max
Microsoft Online Services Bug Bounty Program
Bounty: $500 US minimum, $100k maximumBut you don’t get money from:
Adobe
Apple
eBay
Deutsche Telecom
www.planittesting.com
Microsoft 1st to be “on par”
© Planit Software Testing 28http://www.infosecurity-magazine.com/news/microsoft-doubles-defense-bug/
www.planittesting.com
An expert exploit writer can make 10-100x as
much on the black market vs bug bounties
© Planit Software Testing 29
www.planittesting.com
What we can do
© Planit Software Testing 30
www.planittesting.com
Software Development LifeCycle (SDLC)
Buy: COTS
Software
Develop: custom
code
(Pen) Testing &
Integration
Deployment Use Decommissioning
© Planit Software Testing 31
www.planittesting.com
What we do now
Buy: COTS
Software
Develop: custom
code
(Pen) Testing &
Integration
Deployment Use Decommissioning
© Planit Software Testing 32
www.planittesting.com
Think about it
© Planit Software Testing 33
You have a building with 20 exterior doors
You secure 19 doors
Are you 95% secure?
www.planittesting.com
What does a penetration tester test?
Known vulnerabilities & configuration issues – often the OWASP Top 10
Limited time & scope
How good the penetration tester is
© Planit Software Testing 34
What is not tested?
Secure Software Design & Development Lifecycle
Security awareness of users & system administrators
Patch & update mechanisms
Secure solution integration
Visibility of application functioning  breach detection quality
Fail-safe functionality
Intrusion detection, prevention, alerting, lateral movement
Incident response processes
www.planittesting.com
Tip for Pen-testing
The “Pivot-card”
Give the pen-tester a set number of:
- “Pivot Cards”
- based on real world value of 0-day exploits vs value of
system
- can be reused for the same exploit to jump hosts
Goals:
- Inventory the impact of possible breach, lateral
movement
- Check if alerting system will trigger
- Check response times of incident response process
- Test more in less time
© Planit Software Testing 35
www.planittesting.com
Add security requirements
Add security visibility to the requirements
 Set alarms for max number of records accessed per account/user
 Amount of data exchanged per hour/day
 Fail safe functionality
 Encryption standard
 Secure error logging
 Patch and Upgrade compatibility
 Legal compliance – Privacy act, Public Records Act, etc.
© Planit Software Testing 36
www.planittesting.com
The sooner a breach can be detected, the better the effects can be
prevented
Average detection now is after 6 months of the breach
31% of organisations in US find out themselves, in retail only 5%
Time between compromise and exfiltration: minutes to a day
© Planit Software Testing 37
www.planittesting.com © Planit Software Testing 38
Remember: security is a chain
Security is a chain, it is only as strong as its weakest link. It is a process and a mind-set.
More than conducting penetration tests following development, security should remain a
priority for applications once already in production. After all, it is no longer a question of if
you get hacked, but when.
Preventive
Deterrent
Detective
Corrective
Recovery Compensation
www.planittesting.com
This is why we focus on everything
Benefit from our extensive catalogue of security testing, bespoke consulting and training services to ensure the security of your
applications, infrastructure and compliance with rules and regulations.
© Planit Software Testing 39
Software Infrastructure Operational & Regulatory
Testing
• OWASP ASVS certification
• OWASP Top-10 test
• Code Audit
• Ethical hacking penetration
Test
• Vulnerability Assessment
• Verifying policy
implementations
• Architecture design review
Consulting
• Security in the SDLC
• Secure Coding principles
• Secure architecture principles
• Secure configuration
benchmarks
• Configuration principles
• Secure architecture principles
• Security policy design
• Information Security
Management System
establishment
• Secure operating procedures
Training • Secure software development
• Secure engineering
• Security through architecture
• Defence in depth
• Introduction to information
security
• Local and global standards
(NZISM/ISO27001)
• The human firewall
www.planittesting.com
Thank you
© Planit Software Testing 40
www.planittesting.com
Further reading
Verizon Data Breach Investigations Report:
http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
IBM Ponemon Cost of Data Breach study:
http://www-03.ibm.com/security/data-breach/
The Open Web Application Security Project (OWASP):
https://www.owasp.org/
© Planit Software Testing 41

Things Behaving Badly, Security Implied (NZ Tech Day - Presentation 4)

  • 1.
  • 2.
    www.planittesting.com Who is thisFerdinand? Dutch Degree in information engineering Fan of Open Source, UNIX, Linux, and free beer Since 2015: Security specialist for Planit Software Testing NZ Worked for 9 years in the energy sector in the Netherlands Solutions & IT Security Architect Business Analyses Data & Service Management Resident “Hacker”, from Office to SCADA systems © Planit Software Testing 2
  • 3.
    www.planittesting.com Agenda Security & Risk Threats& Vulnerabilities What do we do now? Where can we improve? © Planit Software Testing 3
  • 4.
    www.planittesting.com What is security? Definition:“The state of being free of danger or threat” A process, not a product © Planit Software Testing 4
  • 5.
    www.planittesting.com Why “do” security? ©Planit Software Testing 5 To mitigate risk • Financial Risk • Operational Risk • Strategic Risk • Reputation Risk • Legal & Regulatory Compliance Risk • Information Systems Risk Enable business in a secure way A threat becomes a risk, if you are vulnerable to it
  • 6.
    www.planittesting.com What is Risk? ©Planit Software Testing 6 Threat Vulnerability Risk Can’t influence Can influence
  • 7.
    www.planittesting.com Security Risk calculation ©Planit Software Testing 7 ARO SLE ALE Annual Risk Occurrence Example: 0nce every 4 years = 0.25/yr Single Loss Expectancy Damage cost per occurrence = 50,000NZD Annual Loss Expectancy The risk would cost 12,500NZD for the business annually
  • 8.
    www.planittesting.com Let’s meet thethreats © Planit Software Testing 8
  • 9.
    www.planittesting.com The Threat Curve~ 2010 © Planit Software Testing 9 “Type 1” “Type 2” “Type 3” Script Kiddies Lone Wolves Organized Crime “Hacktivists” Nation States (Tier 2) Nation States (Tier 1) Mass Targeting Pinpoint Targeting High Sophistication Low
  • 10.
    www.planittesting.com Type 1: Scriptkiddie © Planit Software Testing 10 Exploration, KUDO’S, Fun & Games Uses standard tools
  • 11.
    www.planittesting.com Type 1: LoneWolf © Planit Software Testing 11
  • 12.
    www.planittesting.com © PlanitSoftware Testing 12 Type 1(?...): Hacktivists
  • 13.
    www.planittesting.com Type 2: Organisedcrime © Planit Software Testing 13 Ransomware & Spam
  • 14.
    www.planittesting.com Type 3: NationStates (2012+) © Planit Software Testing 14 Cyber weapons; Advanced Persistent Threat (APT)
  • 15.
    www.planittesting.com A few interestingcase studies © Planit Software Testing 15
  • 16.
    © Planit SoftwareTesting Case study: Stuxnet (Type 3) Incident: January 2010, An “unnamed” nation state (or states) deployed a cyber weapon on the uranium enrichment plant of Iran, possibly injected via infected USB stick Impact: Centrifuge crashes, disabled ability to enrich uranium Specifics: The cyber weapon Stuxnet used 4 zero days to dig deep into the control network and change the programming of the centrifuge controllers. The new programming disrupted the rotation while reporting stable rotation speeds resulting in the crash of the centrifuges. Lessons learned: Nation states have near unlimited resources Apply defence in depth Source: https://en.wikipedia.org/wiki/Stuxnet
  • 17.
    © Planit SoftwareTesting Case study: ISS Air gap bridged (Type 2) Incident: August 2008, Virus intended to steal passwords to send them to a remote server infected laptops of the International Space Station (again) Impact: Created a “nuisance” to noncritical space station laptops Specifics: Infection spread to more than one laptop, could have spread via some sort of intranet or USB- stick. Lessons learned: Because of the human factor, no true air gap exists. Examples: VPN, thumb drives, wifi, CD/DVD(recordables) Source: http://www.telegraph.co.uk/technology/3358263/Computer-virus-infects-International-Space-Station-laptops.html
  • 18.
    © Planit SoftwareTesting Case study: The Target Hack (Type 2) Incident: in 2013 hackers got in through a 3rd party – The Airco maintenance company. Moved laterally through the Target networks Installed Malware onto POS machines Impact: 40 million credit card details stolen, 70 million addresses, phone numbers, and other pieces of personal information Specifics: Target Security saw it, but didn’t take action and ignored alarms. The malware used was “uninteresting and unsophisticated” according to Jim Walter, director of threat intelligence operations at security technology company McAfee. “COTS malware” © Planit Software Testing 18 Lessons learned: Don’t be stupid, respond to alerts! Note: Only 31% of companies discover the breach themselves. For retailers it’s 5% Source: http://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-credit-card-data
  • 19.
    www.planittesting.com More recently 2015: OPM(Office of Personnel Management) Data breach, APT, breached since march 2014 Executed by: (most likely) Chinese army Impact: 41 million personnel records stolen 2015: Ashley Madison Data breach, SQL injection and other public exploits, Executed by: Hacktivists “The Impact Team” Impact: Leaked 60GB of company data, emails, user details, documents 2014: Sony Data breach, various techniques Executed by: N. Korea (or disgruntled employee?) Impact: 100 Terabytes of data stolen, movies, emails, documents 20
  • 20.
    www.planittesting.com 7 Steps ofBreach to Exfil Exploit access &/ data Collect, Exfiltrate Move LaterallyInstall tools Establish Persistence Initial Exploitation Reconnaissance © Planit Software Testing 20
  • 21.
    www.planittesting.com Trends since 2000 Motivesfor hacking have changed From: Demonstration of skills & explorations To: Monetary gain & Political power Conclusion: Threats are a moving target, we can only only observe and respond © Planit Software Testing 21
  • 22.
    www.planittesting.com The Threat Curve~ 2010 © Planit Software Testing 22 “Type 1” “Type 2” “Type 3” Script Kiddies Lone Wolves Organized Crime “Hacktivists” Nation States (Tier 2) Nation States (Tier 1) Mass Targeting Pinpoint Targeting High Sophistication Low
  • 23.
    www.planittesting.com Type 1 Type 2 TheThreat Curve ~ now © Planit Software Testing 23 Type 3 Script Kiddies Lone Wolves Organized Crime “Hacktivists” Nation States (Tier 2) Nation States (Tier 1) Mass Targeting Pinpoint Targeting High Sophistication Low Observation: Less advanced adversaries now have access to very sophisticated malware
  • 24.
    www.planittesting.com Exploits & themalware marketplace © Planit Software Testing 24
  • 25.
    www.planittesting.com Darkode market place ©Planit Software Testing 25 Worldwide: 700-800 Hacker forums July 2015: Darkode takedown 3 levels of trade on the black market: Skills: Top-end, highly skilled people Tools: Hack & deception tools Data: Personal data, stolen bank cards
  • 26.
    www.planittesting.com The 0-day exploitblack market prices © Planit Software Testing 26http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/
  • 27.
    www.planittesting.com Several Bug BountyProgrammes © Planit Software Testing 27 Facebook Whitehat Program Bounty: $500 US minimum, no maximumGoogle Vulnerability Reward Program (VRP) Bounty: $100 US minimum, $20k US max Yahoo Bug Bounty Program Bounty: $100 US minimum, $20k US maxMozilla Bug Bounty Program Bounty: $500 US minimum, $3k US max Microsoft Online Services Bug Bounty Program Bounty: $500 US minimum, $100k maximumBut you don’t get money from: Adobe Apple eBay Deutsche Telecom
  • 28.
    www.planittesting.com Microsoft 1st tobe “on par” © Planit Software Testing 28http://www.infosecurity-magazine.com/news/microsoft-doubles-defense-bug/
  • 29.
    www.planittesting.com An expert exploitwriter can make 10-100x as much on the black market vs bug bounties © Planit Software Testing 29
  • 30.
    www.planittesting.com What we cando © Planit Software Testing 30
  • 31.
    www.planittesting.com Software Development LifeCycle(SDLC) Buy: COTS Software Develop: custom code (Pen) Testing & Integration Deployment Use Decommissioning © Planit Software Testing 31
  • 32.
    www.planittesting.com What we donow Buy: COTS Software Develop: custom code (Pen) Testing & Integration Deployment Use Decommissioning © Planit Software Testing 32
  • 33.
    www.planittesting.com Think about it ©Planit Software Testing 33 You have a building with 20 exterior doors You secure 19 doors Are you 95% secure?
  • 34.
    www.planittesting.com What does apenetration tester test? Known vulnerabilities & configuration issues – often the OWASP Top 10 Limited time & scope How good the penetration tester is © Planit Software Testing 34 What is not tested? Secure Software Design & Development Lifecycle Security awareness of users & system administrators Patch & update mechanisms Secure solution integration Visibility of application functioning  breach detection quality Fail-safe functionality Intrusion detection, prevention, alerting, lateral movement Incident response processes
  • 35.
    www.planittesting.com Tip for Pen-testing The“Pivot-card” Give the pen-tester a set number of: - “Pivot Cards” - based on real world value of 0-day exploits vs value of system - can be reused for the same exploit to jump hosts Goals: - Inventory the impact of possible breach, lateral movement - Check if alerting system will trigger - Check response times of incident response process - Test more in less time © Planit Software Testing 35
  • 36.
    www.planittesting.com Add security requirements Addsecurity visibility to the requirements  Set alarms for max number of records accessed per account/user  Amount of data exchanged per hour/day  Fail safe functionality  Encryption standard  Secure error logging  Patch and Upgrade compatibility  Legal compliance – Privacy act, Public Records Act, etc. © Planit Software Testing 36
  • 37.
    www.planittesting.com The sooner abreach can be detected, the better the effects can be prevented Average detection now is after 6 months of the breach 31% of organisations in US find out themselves, in retail only 5% Time between compromise and exfiltration: minutes to a day © Planit Software Testing 37
  • 38.
    www.planittesting.com © PlanitSoftware Testing 38 Remember: security is a chain Security is a chain, it is only as strong as its weakest link. It is a process and a mind-set. More than conducting penetration tests following development, security should remain a priority for applications once already in production. After all, it is no longer a question of if you get hacked, but when. Preventive Deterrent Detective Corrective Recovery Compensation
  • 39.
    www.planittesting.com This is whywe focus on everything Benefit from our extensive catalogue of security testing, bespoke consulting and training services to ensure the security of your applications, infrastructure and compliance with rules and regulations. © Planit Software Testing 39 Software Infrastructure Operational & Regulatory Testing • OWASP ASVS certification • OWASP Top-10 test • Code Audit • Ethical hacking penetration Test • Vulnerability Assessment • Verifying policy implementations • Architecture design review Consulting • Security in the SDLC • Secure Coding principles • Secure architecture principles • Secure configuration benchmarks • Configuration principles • Secure architecture principles • Security policy design • Information Security Management System establishment • Secure operating procedures Training • Secure software development • Secure engineering • Security through architecture • Defence in depth • Introduction to information security • Local and global standards (NZISM/ISO27001) • The human firewall
  • 40.
  • 41.
    www.planittesting.com Further reading Verizon DataBreach Investigations Report: http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ IBM Ponemon Cost of Data Breach study: http://www-03.ibm.com/security/data-breach/ The Open Web Application Security Project (OWASP): https://www.owasp.org/ © Planit Software Testing 41