How to hack
Security meetup, Limassol, 05/15/18
Ivan Novikov (@d0znpp)
200+
$1M
10+
1
//(medium|twitter).com/@d0znpp
security audits
since 2009
total bug bounties
and rewards
researches and
discovers
e-book
SSRF bible
“Gartner Says Worldwide
Information Security Spending Will
Grow 7.9 Percent to Reach $81.6
Billion in 2016”
2015 $75 B
2016 $81.6 B
This bullet definitely costs more than $156.6 B
It’s not a silver… Or the weight is about 269’400 tons
One simple
question
How it
works?
Why? Two important things since the 30s
No documentation (because of the Apple
and UX)
● Try to find documentation for Chrome
:)
● How to understand that it’s the bug but
not a backdoor
Closed source software (because of the
Intel et al.)
● What’s does “Intel inside” really mean?
Layer cake
How many layers do you know?
I spent last 10 year for the
security and don't sure that know
about all of them
Computer
science
Information
security
What exactly we are doing
Perimeter discovery
Vulnerability discovery
Exploitation
Post-exploitation
Risk analysis
Perimeter discovery NOC
Vulnerability discovery QA engineer
Exploitation Developer
Post-exploitation DevOps
Risk analysis Manager
What exactly we are doing
Main aspects
Perimeter. Just know your perimeter
3rd party components and software. Just know your requirements
Test coverage and test plan
Monitoring
Incident response
Case #1. Gaming platform (10+ games under the
roof)
A hacker found SQL injection because on gaming forum
The forum was connected to main players database
Hackers started to ‘;INSERT INTO stuff SET (<userid>, <rare-stuff-id>, …
Then they sold a lot of stuff for 30% price
Crash the entire game economy
No users report (all of them were happy)
Case #2. E-commerce platform, #1 local market
player
The point was to ship order with no payment somewhere
From the website to corporate network
Research how it’s going on inside with shipments
Hack the printer and just print an order on it
Staff there will use paper to deliver order ;)
Case #3. Internet bank
Client-side vector like really
Digital signatures everywhere
Stored XSS (Cross Site Scripting) in a news feed
JavaScript inject to send transactions when token installed on the client side
Use the same JS to hide these transactions from the web page ;)
Case #4. Payment system, a secured one
We tried to hack smth but were failed
Perimeter discovery process identified IoT devices inside corporate AS (thanks
BGP)
Found security cameras which protects private space (home of one of the
co-founder)
Hacked DVR device (Digital Video Recorded) inside home network
Found VPN from there to corporate network
Hacked power device in a datacenter to avoid isolation
Case #5. Hack them all!
Thanks!
Follow me: @d0znpp
Twitter, Medium, Facebook, Telegram, Snapchat
https://www.forbes.com/sites/forbestechcouncil/people/ivannovikov/
How to hack. Cyprus meetup

How to hack. Cyprus meetup

  • 1.
    How to hack Securitymeetup, Limassol, 05/15/18 Ivan Novikov (@d0znpp)
  • 2.
    200+ $1M 10+ 1 //(medium|twitter).com/@d0znpp security audits since 2009 totalbug bounties and rewards researches and discovers e-book SSRF bible
  • 3.
    “Gartner Says Worldwide InformationSecurity Spending Will Grow 7.9 Percent to Reach $81.6 Billion in 2016” 2015 $75 B 2016 $81.6 B This bullet definitely costs more than $156.6 B It’s not a silver… Or the weight is about 269’400 tons
  • 4.
  • 5.
  • 6.
    Why? Two importantthings since the 30s No documentation (because of the Apple and UX) ● Try to find documentation for Chrome :) ● How to understand that it’s the bug but not a backdoor Closed source software (because of the Intel et al.) ● What’s does “Intel inside” really mean?
  • 7.
    Layer cake How manylayers do you know? I spent last 10 year for the security and don't sure that know about all of them
  • 8.
  • 9.
  • 10.
    What exactly weare doing Perimeter discovery Vulnerability discovery Exploitation Post-exploitation Risk analysis
  • 11.
    Perimeter discovery NOC Vulnerabilitydiscovery QA engineer Exploitation Developer Post-exploitation DevOps Risk analysis Manager What exactly we are doing
  • 13.
    Main aspects Perimeter. Justknow your perimeter 3rd party components and software. Just know your requirements Test coverage and test plan Monitoring Incident response
  • 14.
    Case #1. Gamingplatform (10+ games under the roof) A hacker found SQL injection because on gaming forum The forum was connected to main players database Hackers started to ‘;INSERT INTO stuff SET (<userid>, <rare-stuff-id>, … Then they sold a lot of stuff for 30% price Crash the entire game economy No users report (all of them were happy)
  • 15.
    Case #2. E-commerceplatform, #1 local market player The point was to ship order with no payment somewhere From the website to corporate network Research how it’s going on inside with shipments Hack the printer and just print an order on it Staff there will use paper to deliver order ;)
  • 16.
    Case #3. Internetbank Client-side vector like really Digital signatures everywhere Stored XSS (Cross Site Scripting) in a news feed JavaScript inject to send transactions when token installed on the client side Use the same JS to hide these transactions from the web page ;)
  • 17.
    Case #4. Paymentsystem, a secured one We tried to hack smth but were failed Perimeter discovery process identified IoT devices inside corporate AS (thanks BGP) Found security cameras which protects private space (home of one of the co-founder) Hacked DVR device (Digital Video Recorded) inside home network Found VPN from there to corporate network Hacked power device in a datacenter to avoid isolation
  • 18.
    Case #5. Hackthem all!
  • 19.
    Thanks! Follow me: @d0znpp Twitter,Medium, Facebook, Telegram, Snapchat https://www.forbes.com/sites/forbestechcouncil/people/ivannovikov/