SlideShare a Scribd company logo
1 of 16
One, two..
Vulns are Coming for You
Curtis Brazzell
Principal Security Consultant
THREAT HUNTING AND RESPONSE | SECURITY
CONSULTING
CONTENTS
Killing Zombie Sessions
Expelling the MitMs
Red Balloon Social Engineering
Amityville Header
Q & A
Shameless Self Promotion
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
01 |
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
Sessions That Just Won’t Die
ZOMBIE SESSIONS
» Types and Examples
• Long Timeouts
• Red Team / Blue Team Example
• O365 Phishing Example
- Add Session Termination to IR Plan (CIRP)
• No Timeout
• AppSec Examples
• Broken Logout Functionality
• AppSec Examples
» Don’t Get Bit! (Risk)
• Takeover Users (Session Hijacking)
» “Double Tap” (Solution)
• Idle Timeout
• 2-5 Min for High Value Apps
• 13-30 Min for Low Risk Apps
• Absolute Timeout
• Renewal Timeout
• Manual Expiration
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
Other Spooky Session Issues
ZOMBIE SESSIONS
» Types
• Weak Session Entropy
• Session Fixation
• JWT Issues
• Submission & Storage via Insecure Methods
• URL
• Missing Secure / HTTPOnly / SameSite Flags
• LocalStorage for Persistent Cookies
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
02 |
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
They’re Watching You!
MAN IN THE MIDDLE
» Man-in-the-Middle (MitM) AKA Creepy Crawlers
• Between Client and Server
• Hiding in Plain Sight
• Starbucks
• Airport
• Your Home! (War Driving)
» At Risk Traffic
• Unencrypted Protocols
• FTP / SMTP / Telnet / HTTP / etc
• Weak Encryption
• Broken Ciphers and Algorithms
• Downgrade Attacks
• Authenticity Issues (w/ Examples)
• Self-Signed Certs
• No SMB Signing
• No RDP NLA
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
What’s the Big Deal?
MAN IN THE MIDDLE
» Data Integrity Issues
• Modified Data
• Example (Real-Time)
» Confidentiality Issues
• Sensitive Information Exposure
• Credit Cards / Banking Information
• Credentials / Session Information
• PII / PHI
» Account Takeover
• Credentials / Session
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
Expel the MITM
MAN IN THE MIDDLE
» Fight Using
• Strong and Trusted Encryption
• Current Ciphers
• Disable Outdated Protocols & Ciphers
• Trusted CA
• Trusted Networks
• Examples of ARP / WiFi Spoofing
• VPN if Untrusted
• Training
• Look for Certificate Warnings
• Enforce Signing on Relevant Protocols
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
03 |
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
“Red Balloon” Social Engineering
PHISHING
» Victims and Targets Due to
• Inefficient Spam Filters
• Their Role / Position
• Public Information (Recon)
• Lacking or Improper 2FA
• Lack of Security Awareness Training
• Convincing / Targeted Campaigns
• Urgency / Threatening
• Rewards / Approval
• Financial Incentives
• Chain of Command
• Types & Examples
• Phishing / SMS
• Call Centers (Machine Learning)
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
Don’t Take the Balloon
PHISHING
» Phishing Techniques
• Spoofed Sender
• Doppelganger Domain
• Google Calendar (Black Hills InfoSec)
• Open Redirects
• 2FA Bypass
• Session Stealing Reverse Proxy (Modlishka, Evilnginx)
• PIN / Code Capture
» Security Awareness Training
• On-Site
• Tools like KnowBe4, PhishAPI, GoPhish
• Third Party
• After SE Engagement
• Google’s Interactive Phish Training (Mobile, Desktop)
• Know What Links Should Look Like
• URL Encoding
• Subdomains
• Know What File Types Typically Contain Malware
• Maldocs (PDF, MS Office Files, Executables, Archives, etc)
» Analyze URLs and Attachments
» Self-Report if You DID Take the Balloon!
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
04 |
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
Hold Onto Your Head!
SECURE WEB APP
HEADERS
» Secure Header Issues
• Easy to Introduce
• Defaults
• Easy to Resolve
• Web Config
• Examples
• HSTS (SSLStrip)
• Click Jacking
• CORS
• XSS
- XSS Filter, CSP
QUESTIONS?
“SEVEN DAYS”
THREAT HUNTING AND RESPONSE | SECURITY
CONSULTING
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING

More Related Content

Similar to One, Two... Vulns are Coming for You

DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
T. J. Saotome
 
Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation Training
Bryan Len
 
Security what it means to your business - circa 1999
Security   what it means to your business - circa 1999Security   what it means to your business - circa 1999
Security what it means to your business - circa 1999
Chaim Yudkowsky
 

Similar to One, Two... Vulns are Coming for You (20)

DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
Incident_Response_for_Management_Presentation.pptx
Incident_Response_for_Management_Presentation.pptxIncident_Response_for_Management_Presentation.pptx
Incident_Response_for_Management_Presentation.pptx
 
Spo2 w23 a
Spo2 w23 aSpo2 w23 a
Spo2 w23 a
 
Secure 360 adversary simulation
Secure 360   adversary simulationSecure 360   adversary simulation
Secure 360 adversary simulation
 
The Offensive Defender | Cyberspace Trapping
The Offensive Defender  | Cyberspace TrappingThe Offensive Defender  | Cyberspace Trapping
The Offensive Defender | Cyberspace Trapping
 
Threat Modeling in the Cloud
Threat Modeling in the CloudThreat Modeling in the Cloud
Threat Modeling in the Cloud
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
 
Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Threat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star WarsThreat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star Wars
 
Effective tactics used by hackers and how to avoid being the next cyber victim
Effective tactics used by hackers and how to avoid being the next cyber victimEffective tactics used by hackers and how to avoid being the next cyber victim
Effective tactics used by hackers and how to avoid being the next cyber victim
 
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleThreat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
 
DS Crisis Management Foundation Risk
DS Crisis Management Foundation RiskDS Crisis Management Foundation Risk
DS Crisis Management Foundation Risk
 
Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation Training
 
Under thehood
Under thehoodUnder thehood
Under thehood
 
Security what it means to your business - circa 1999
Security   what it means to your business - circa 1999Security   what it means to your business - circa 1999
Security what it means to your business - circa 1999
 
Cs461 06.risk analysis (1)
Cs461 06.risk analysis (1)Cs461 06.risk analysis (1)
Cs461 06.risk analysis (1)
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

One, Two... Vulns are Coming for You

  • 1. One, two.. Vulns are Coming for You Curtis Brazzell Principal Security Consultant
  • 2. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING CONTENTS Killing Zombie Sessions Expelling the MitMs Red Balloon Social Engineering Amityville Header Q & A Shameless Self Promotion
  • 3. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING 01 |
  • 4. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING Sessions That Just Won’t Die ZOMBIE SESSIONS » Types and Examples • Long Timeouts • Red Team / Blue Team Example • O365 Phishing Example - Add Session Termination to IR Plan (CIRP) • No Timeout • AppSec Examples • Broken Logout Functionality • AppSec Examples » Don’t Get Bit! (Risk) • Takeover Users (Session Hijacking) » “Double Tap” (Solution) • Idle Timeout • 2-5 Min for High Value Apps • 13-30 Min for Low Risk Apps • Absolute Timeout • Renewal Timeout • Manual Expiration
  • 5. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING Other Spooky Session Issues ZOMBIE SESSIONS » Types • Weak Session Entropy • Session Fixation • JWT Issues • Submission & Storage via Insecure Methods • URL • Missing Secure / HTTPOnly / SameSite Flags • LocalStorage for Persistent Cookies
  • 6. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING 02 |
  • 7. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING They’re Watching You! MAN IN THE MIDDLE » Man-in-the-Middle (MitM) AKA Creepy Crawlers • Between Client and Server • Hiding in Plain Sight • Starbucks • Airport • Your Home! (War Driving) » At Risk Traffic • Unencrypted Protocols • FTP / SMTP / Telnet / HTTP / etc • Weak Encryption • Broken Ciphers and Algorithms • Downgrade Attacks • Authenticity Issues (w/ Examples) • Self-Signed Certs • No SMB Signing • No RDP NLA
  • 8. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING What’s the Big Deal? MAN IN THE MIDDLE » Data Integrity Issues • Modified Data • Example (Real-Time) » Confidentiality Issues • Sensitive Information Exposure • Credit Cards / Banking Information • Credentials / Session Information • PII / PHI » Account Takeover • Credentials / Session
  • 9. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING Expel the MITM MAN IN THE MIDDLE » Fight Using • Strong and Trusted Encryption • Current Ciphers • Disable Outdated Protocols & Ciphers • Trusted CA • Trusted Networks • Examples of ARP / WiFi Spoofing • VPN if Untrusted • Training • Look for Certificate Warnings • Enforce Signing on Relevant Protocols
  • 10. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING 03 |
  • 11. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING “Red Balloon” Social Engineering PHISHING » Victims and Targets Due to • Inefficient Spam Filters • Their Role / Position • Public Information (Recon) • Lacking or Improper 2FA • Lack of Security Awareness Training • Convincing / Targeted Campaigns • Urgency / Threatening • Rewards / Approval • Financial Incentives • Chain of Command • Types & Examples • Phishing / SMS • Call Centers (Machine Learning)
  • 12. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING Don’t Take the Balloon PHISHING » Phishing Techniques • Spoofed Sender • Doppelganger Domain • Google Calendar (Black Hills InfoSec) • Open Redirects • 2FA Bypass • Session Stealing Reverse Proxy (Modlishka, Evilnginx) • PIN / Code Capture » Security Awareness Training • On-Site • Tools like KnowBe4, PhishAPI, GoPhish • Third Party • After SE Engagement • Google’s Interactive Phish Training (Mobile, Desktop) • Know What Links Should Look Like • URL Encoding • Subdomains • Know What File Types Typically Contain Malware • Maldocs (PDF, MS Office Files, Executables, Archives, etc) » Analyze URLs and Attachments » Self-Report if You DID Take the Balloon!
  • 13. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING 04 |
  • 14. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING Hold Onto Your Head! SECURE WEB APP HEADERS » Secure Header Issues • Easy to Introduce • Defaults • Easy to Resolve • Web Config • Examples • HSTS (SSLStrip) • Click Jacking • CORS • XSS - XSS Filter, CSP
  • 15. QUESTIONS? “SEVEN DAYS” THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
  • 16. THREAT HUNTING AND RESPONSE | SECURITY CONSULTING