SlideShare a Scribd company logo
1 of 38
Download to read offline
Code & Cannoli
< Security >
13th January 2016
@DevMob
#CodeCannoli
Code & Cannoli < Security >
17:30	- 18:15	 Drinks,	pasta	&	cannoli
18:15	- 19:00	 Fabrizio Cilli:	"Vulnerability:	Assessing	and	Managing	–
A	dive	into	the	unexpected	weaknesses”
19:00	– 20:00 Jacco van	Tuijl:	"Penetration	Testing	Process”	- part	1
20:00	- 20:15	 Break	
20:15	- 21:15	 Jacco van	Tuijl:	"Penetration	Testing	Process”	- part	2
21:15	 Drinks
@DevMob
#CodeCannoli
Vulnerability:	Assessing	&	Managing
Assessing	the	exposures	won’t	close	the	circle
Vulnerable
A	vulnerability	is	a	weakness	in	an	asset	or	group	of	assets.	An	asset’s	
weakness	could	allow	it	to	be	exploited	and	harmed	by	one	or	more	
threat	vectors.
In	the	cyclic	ticker	of	a	PDCA wheel:	Assessing is	a	phase	we	can	
execute	at	will.	Managing	its	results,	is	an	endeavour,	impacting	
Governance,	IT	Operations,	adding	workload.
Surface	and	Core
We	expose	our	business	to	external	(Surface)	attackers	and	internal	
(Core)	malicious	users.	The	Attack	Vectors	are	a	myriad,	from	network	
to	hosts,	and	to	their	virtual	counterparts.
The	concept	of	Attack	Vector	is	vital	when	it	comes	to	evaluate	the	
gravity	of	the	vulnerabilities	we	are	assessing	in	our	environment:	And	
the	best	way	to	understand	it	is	by	breaking	down	the	CVSS	score	of	
found	vulnerability!
CVSS	Access	Vector
BaseScore=	round_to_1_decimal(((0.6*Impact)+(0.4*Exploitability)-1.5)*f(Impact))
Impact	=	10.41*(1-(1-ConfImpact)*(1-IntegImpact)*(1-AvailImpact))
Exploitability	=	20*	AccessVector*AccessComplexity*Authentication
f(impact)=	0	if	Impact=0,	1.176	otherwise
AccessVector =	case	AccessVector of
requires	local	access:	0.395
adjacent	network	accessible:	0.646
network	accessible:	1.0
Attack	Surface
Attack	Surface
Cyclic	checks
The	best	exercise	to	achieve	a	“capable”	response	mechanism	when	a	
0-Day	happens	to	be	announced	into	the	wild,	is	to	have	your	test	
cycle,	in	line	with	your	asset	base.
The	limit	in	security	operations	is	completeness,	nothing	can	be	
measured	as	absolute,	given	the	changing	environment	IT	OPS	manage.	
To	react	to	emerging	threats	the	identification	and	sanitization	needs	to	
be	fast	and	precise.
Tools	or	Subscriptions	?
A	sound	vulnerability	management	program	does	not	cost	in	itself	due	
to	the	technology	requirements,	it	costs	as	it	is	a	part	of	a	GRC	
program,	one	step	to	obtain	a	smart	governance	and	to	maintain	
regulatory	compliance.
Cyclic	checks,	sync’ed with	an	asset	manager	not	only	require	IT	
Operations	to	be	fast	reacting,	but	the	Assessment	results	(or	reports)	
to	be	intelligently	filtered	and	analysed	against	threat	intel	and	
frequently	updated	feeds.
Integrating	Testing	and	Assessment
Security	Programme:	This	unknown.	Well	not	100%	unknown,	we	know	
we	should	commit	to	long	term	integration	between	periodic	
(application	and	infrastructure)	tests,	and	cyclic	vulnerability	
assessments	but	the	lack	is	to	achieve	it	and	maintain	that	
commitment.
Everything	in	IT	is	most	probably	identifiable	as	a	SYSTEM,	with	an	
INPUT,	TRANSFORMATION	and	an	OUTPUT.	Penetration	Testing	is	a	
fundamental	input to	the	Vulnerability	Management	Process	and	
together	these	can	boost your	Threat	Response	(and	ROI).
Static	analysis	and	Dynamic	testing
Another	element	of	a	sound	Vulnerability	Management	Process	
especially	in	Enterprise	environments	lies	in	the	certainty	of	a	
qualitative	analysis	of	algorithms,	before	moving	application	
architectures	to	production	environment.
Let	me	say	that	it’s	most	likely	that	unsafe	or	lazy	coding	habits	end	
writing 0-Days,	instead	of	saving	from	them.	Weak code	will	facilitate	
access	to	back-ends,	data,	and	impair	your	vulnerability	management	
program	adding	what	we	call	make	future	Zero	Days.
Weakness Awareness
Security	
Program
Integration
Get	the	most,	stay	safe!
Combining	the	following	actions	we	DO	get	the	most	with	a	
measurable	return	on	our	security	programme	investment.
Achievement
Security	Programme	Investment	Wheel
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Weakness
Awareness
Security	ProgramIntegration
Achievement
Weakness	to	Achievement
Insecurity ROI
START
Investment	
Returns
Effects
0% Open	Attack	Surface
5%
Increasing	
Awareness
15%
Plans	and	
deployments
25% Enabling	interchange
30% Achieving	returns
Exposure	
Factor
Effects
99%
Easily	violated	
by	any	vector
85%
Understanding	
attack	surface
75%
Reducing	exposure	
by	means	of	special	tools
50%
Integrating	diverse	tools	
to	achieve	intelligence
25%
Only	0-Days	and	
unknow threats	can	hurt
A	practical	case	study.
What	happens	when.
The	Battleship	Yamato	!
The	Battleship	Yamato	!
…	oops	…	that’s	the	 !
…	ehm …	let’s	get	back	to	 !
The	Battleship	Yamato
The	Battleship	Yamato
Assessing:
While	in	home	waters	after	the	winter	1944-1945	refitting	(more	anti-
aircraft	weapons),	she	was	spotted	and	attacked	by	U.S.	Navy	carrier	
planes	in	March	1945.	She	escaped	with	light	damage,	but	her	
vulnerability	against	the	swarming	American	aircrafts was	now	clear.
[…]
The	Battleship	Yamato
Q1:	By	looking	at	the	battleship	architecture	and	defense,	what	can	you
assess the	Battleship	to	be	considered	“vulnerable”	in	your	opinion?
The	Battleship	Yamato
Exploit:
[…] At	1220	on	7	Apr	1945,	while	still	some	270	miles	north	of	
Okinawa,	after	being	tracked by	American	reconnaissance aircraft	and	
submarines	almost	the	entire	way,	Yamato	was	attacked by	waves	and	
waves	of	American	carrier	planes. […]
The	Battleship	Yamato
Q2:	By	what	attack	vector,	the	vulnerability	could	have	been		
exploited?
The	Battleship	Yamato
Pwnage:
[…] After	an	agonizing	two	hours,	the	largest	battleship	in	the	world	
sank	as	the	list	reached	nearly	90	degrees.	[…]
The	Battleship	Yamato
Q3:	To	adapt to	the	upcoming	pwonage,	what	do	you	think	it	was	
possible	to	do,	on-the-fly?	…or	maybe	after	the	inevitable	happened?
The	Battleship	Yamato
Zero-Day:
[…] She	then	exploded	twice	under	water;	the	cause	of	the	explosion	
was	likely	the	shells	from	the	primary	and	secondary	magazines	falling	
off	their	shelves	and	detonating	their	fuses	against	the	overhead.	[…]
The	Battleship	Yamato
Q4:	What	do	you	think	was	the	reason	for	all	the	opponent’s	forces	to	
concentrate	a	huge	set	of	resources	just	against	this	single	target	?
The	Battleship	Yamato
Loss:
Only	269	men	survived	the	sinking	super	battleship.	(Out	of	2750	
original	crewlist)
Resilient
Definition	and	Substantial	
meaning
OPEN	TALK	SESSION	:	 R	SAY	ON	TOPIC	!
Few	topics	for	you	to	Join	the	Talk	[Before	the	third	beer	J]	!
Assessment
R	SAY	ON	…
…
Code	Security
R	SAY	ON	…
…
Code	Security
R	SAY	ON	…	OWASP	ASVS	v.3.0
Disclosure
R	SAY	ON	…
…
Going	home	by	Train?
R	SAY	ON	…		 http://trainwatch.u0d.de/
Thanks	for	your	time	!
We	hope	our	message	in	a	bottle	left	the	shores	!
Send	your	feedback with	the	reference	#CODECANNOLI	on	
our	Social Channels	!	To	get	in	touch	use	instead	@DEVMOB !
Code&Cannoli - 150113 - Feeling Vulnerable is Good! - v.1.1

More Related Content

Similar to Code&Cannoli - 150113 - Feeling Vulnerable is Good! - v.1.1

The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon usJonathan Sinclair
 
Using JIRA for Risk Based Testing - QASymphony Webinar
Using JIRA for Risk Based Testing  - QASymphony WebinarUsing JIRA for Risk Based Testing  - QASymphony Webinar
Using JIRA for Risk Based Testing - QASymphony WebinarQASymphony
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC PerspectivePositive Hack Days
 
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIESISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIESCasey Ellis
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementIvanti
 
Penetration testing as an internal audit activity
Penetration testing as an internal audit activityPenetration testing as an internal audit activity
Penetration testing as an internal audit activityTranscendent Group
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draftEoin Keary
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015Jeremiah Grossman
 
Global threat-landscape report by fortinet.
Global threat-landscape report by fortinet.Global threat-landscape report by fortinet.
Global threat-landscape report by fortinet.Reham Maher El-Safarini
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Dinis Cruz
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
How we successfully implemented ai in audit by venkat vajradhar _ dec, 202...
How we successfully implemented ai in audit    by venkat vajradhar _ dec, 202...How we successfully implemented ai in audit    by venkat vajradhar _ dec, 202...
How we successfully implemented ai in audit by venkat vajradhar _ dec, 202...venkatvajradhar1
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Harry Gunns
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfawish11
 

Similar to Code&Cannoli - 150113 - Feeling Vulnerable is Good! - v.1.1 (17)

The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
 
Using JIRA for Risk Based Testing - QASymphony Webinar
Using JIRA for Risk Based Testing  - QASymphony WebinarUsing JIRA for Risk Based Testing  - QASymphony Webinar
Using JIRA for Risk Based Testing - QASymphony Webinar
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIESISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
Penetration testing as an internal audit activity
Penetration testing as an internal audit activityPenetration testing as an internal audit activity
Penetration testing as an internal audit activity
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015
 
Global threat-landscape report by fortinet.
Global threat-landscape report by fortinet.Global threat-landscape report by fortinet.
Global threat-landscape report by fortinet.
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)
 
2015 Security Report
2015 Security Report 2015 Security Report
2015 Security Report
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
How we successfully implemented ai in audit by venkat vajradhar _ dec, 202...
How we successfully implemented ai in audit    by venkat vajradhar _ dec, 202...How we successfully implemented ai in audit    by venkat vajradhar _ dec, 202...
How we successfully implemented ai in audit by venkat vajradhar _ dec, 202...
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
 

Code&Cannoli - 150113 - Feeling Vulnerable is Good! - v.1.1