My presentation at HackCon 7 Oslo, exploring where the world of information security is headed. Crude vs. stealthy exploit techinques, the underground digital economy, failure of anti-virus, the future of web application security and the (de)evolution of browsers and HTTP.
Gen AI in Business - Global Trends Report 2024.pdf
2012: The End of the World?
1. What is coming in 2012?
Saumil Shah
CEO, Net-Square
net-square HACKCON7 Oslo - 29.03.12
2. # who am i
Saumil Shah, CEO Net-Square.
• Hacker, Speaker, Trainer,
Author - 15 yrs in Infosec.
• M.S. Computer Science
Purdue University.
• saumil@net-square.com
• LinkedIn: saumilshah
• Twitter: @therealsaumil
net-square
3. My area of work
Penetration Reverse Exploit
Testing Engineering Writing
New Offensive Attack
Research Security Defense
Conference "Eyes and
Speaker ears open"
net-square
4. Highlights
from
2010-2011
net-square "The Future is already here"
20. It was different 10 years ago!
• Individual effort.
• 1 week dev time.
• 3-6 months shelf life.
• Hundreds of public
domain exploits.
• "We did it for the
fame."
net-square
21. Today...
• Team effort.
• 1-2 months dev time.
• 24h to 10d shelf life.
• Public domain
exploits ~ 0.
• Value of exploits has
significantly risen.
net-square
24. What the Defense is up to
• HIGH EXPOSURE
• Rigorous Internal Testing
• Proactive Exploit Mitigation Technology
• Quick Turnaround Times (24 hours)
• Bug Bounties
• HIGH EXPOSURE
• Good Efforts
• Don't have resources / focus
• Slow Turnaround Times (1 month)
• Learning the hard way
net-square
25. /GS
SafeSEH
DEP
ASLR
Permanent DEP
ASLR and DEP
net-square
26. /GS SEH overwrites
SafeSEH non-SEH DLLs
DEP Return to LibC
ASLR Heap Sprays
Permanent DEP ROP
ASLR and DEP ROP+memleak
net-square
28. The buyers
.gov
Exploits
corporate organized
espionage crime
net-square
29. The prices
Vulnerability Value (USD) Source
"Some exploits" 200,000-250,000 Govt. official referring to what
"some people" pay.
A "real good" exploit > 100,000 SNOsoft Research Team
Chrome exploit upto 60,000 Google
Vista exploit 50,000 Raimund Genes, Trend Micro
Weaponized exploit 20,000-30,000 David Maynor, Secureworks
ZDI/iDefense purchases 2,000-10,000 David Maynor, Secureworks
WMF exploit 4,000 Alexander Gostev, Kaspersky
Google exploit 500-3133.7 Google
Mozilla exploit 500-3000 Mozilla
Microsoft Excel > 1,200 Ebay auction site
net-square
credit: Charlie Miller - http://securityevaluators.com/files/papers/0daymarket.pdf
42. Software Developers...
• ...more dependent on external tools and
frameworks for security.
• Less on design and proper
implementation.
net-square
43. Software Development Trends
17 million devs
102 billion lines of code
6000 LOC/yr in 2008
1 bug per 10000 lines of code
10,200,000 defects per year
1% exploitable? 102,000 0-days/yr
net-square
credit: Hacks Happen - Jeremiah Grossman - http://tinyurl.com/hacks-happen
44. Security Products
• Same ol' same ol'
• FW IDS IPS AV SIEM
UTM DLP DPI WAF ...
• "Sit back and watch
das blinkenlights"
net-square
48. "A wall is only as good as those
who defend it"
Genghis Khan
net-square
49. Change in Mindset
"We assume that all our
Internet Banking
customers' computers
are compromised. We
now rely on near real-
time fraud analytics."
net-square
50. The FUTURE?
Full ASLR by 2014
Mobile Attacks
Real Time Analytics
Blurred boundaries
IPv6
net-square