Employing EMET for Application Security
GCIA, GCIH, GSEC, CCNA, CISSP
@dacoursey
EMET
MS Office
Acrobat
Flash
Java
DEP
ASLR
SEHOP
etc…
Progress Report
ASLR
DEP
What is it?
But what about…
What does it NOT do?
Deployment
Management
Microsoft’s
Strategy
Questions?
http://blogs.technet.com/b/srd/archive/2010/12/08/on-the-effectiveness-of-dep-and-aslr.aspx?Redirected=true
https://blogs.technet.com/b/srd/archive/2009/02/02/preventing-the-exploitation-of-seh-overwrites-with-sehop.aspx?Redirected=true
https://blogs.technet.com/b/security/archive/2012/08/08/microsoft-s-free-security-tools-enhanced-mitigation-experience-toolkit.aspx?Redirected=true
http://technet.microsoft.com/en-us/library/dd837644(v=ws.10).aspx

Editor's Notes

  • #3 Prior-service Army, Pre-WarBoth Private Sector and Defense experience
  • #5 Man has used firewalls to protect our assets (our flock)Worked very well for a long time – only security strategyFlaming brick wall, good to goFirewalls became more advanced, so did attacksEvading firewall, going for weaker members of the flock
  • #6 These days difficult to protect the flockIt can be so difficult, in part sheep don’t protect themselves
  • #7 So what have we done?
  • #8 Building fences to corral the sheep Intended boundaries – sheep don’t knowThis worked pretty wellThen what happened?
  • #9 The pentesters come inAs soon as ASLR created, bypass naturally followed
  • #10 Security Development Lifecycle Progress Report2004 – 2010 41 consumer apps, millions of usersDEP without ASLRLine-of-business apps
  • #11 Two Drop Down listsSo what’s better than a fence?
  • #12 Sheepdog
  • #13 Version 4.0 released June 2013Version 1.0 released Oct 2009Both servers and workstationsFree utility from MS .net 4.0 – No other dependenciesNo signatures or updatingNo whitelist or blacklistNo guessingJust good programmingPart of Windows 8 STIG
  • #14 Blacklisting is deadHBSS can’t provide good defaults
  • #15 So let’s go through an EMET installation
  • #16 One choice to makeService is installed and running, launch client
  • #17 This is GUIBottom is the list of running processes
  • #20 Sheepdog
  • #21 Calls to external binary files go through the Import Address TableWorks for both static and dynamically linked dllRedirects call to windows to Shim addressWhat all this means – you don’t talk to Windows without EMET
  • #22 All happen simultaneously
  • #23 14 Default Trusted Roots – Necessary?
  • #24 Sheepdog
  • #25 Sheepdog
  • #26 Some code so bad
  • #27 Sheepdog
  • #28 Whatever you’re using now
  • #29 GPO or script through CLISupport with existing contract
  • #30 Jonathan Ness from MSSupport with valid Support Contract or through forum