SlideShare a Scribd company logo
1 of 39
Security 
It's more than just your database you should 
worry about 
David Busby 
Information Security Architect 
2014-11-02
Sample Text Page 
• David Busby 
–Percona since January 2013 
–R.D.B.A 
–EMEA && Security Lead 
–I.S.A (current) 
–14 years sysadmin / dev 
–Ju-Jitsu instructor for N.F.P club. 
–Volunteer assist teaching computing at Secondary 
school 
2
Agenda 
• Got F.U.D? 
•What is an attack surface? 
• D.A.C, M.A.C, I.P.S, I.D.S, WTF? 
• Heartbleed / Shellshock / #gate / #bandwagon 
• Detection or prevention: the boy who cried 
wolf 
• Emerging tech to keep an eye on. 
• 2014 … it's been interesting 
3
Here be dragons ... 
• Previous talks focused on a select set of 
identification and prevention 
● This talk is different … 
● Focus is on a mindset change for pure 
identification of potential attack vectors. 
Aswell as clarification of some points along 
the way 
● There's F.U.D by the ton; and we each get a 
shovel. 
4
Got F.U.D? 
• Fear Uncertainty Doubt 
• C.R.I.M.E (CVE-2012-4929) 
• B.E.A.S.T (CVE-2011-3389) 
• Heartbleed (CVE-2014-0160) 
• Shellshock CVE-2014-6271, 6277, 6278, 7169, 
7186, 7187 
• P.O.O.D.L.E (CVE-2014-3566) 
5
What's an “attack surface”? 
• Potential areas for compromise 
– Application 
– Database 
– Network 
– Hardware 
– Software 
– Employees 
– Other 
6
What's an “attack surface”? 
• Application 
– Engine / Interpreter, e.g. Java, PHP, etc. 
● e.g. PHP CVE-2011-4885 (hash collide) 
– Framework 
● Or most likely a plugin 
– Developer errors, SQLi, XSS, CSRF etc ... 
– HTTP Service Apache, Nginx, Lighthttpd, etc. 
– Sysadmin errors e.g. missconfiguration of SSL 
cipers / certs 
7
What's an “attack surface”? 
• Database 
– Weak passwords 
– Overpermissive grants 
– Overly broad host spefications e.g. @% 
● Vulnerabilities in service (often denoted by CVE's 
e.g. CVE-2012-2122) 
– Poor isolation (Network, users etc) 
– Malicious plugins e.g. UDF's 
8
What's an “attack surface”? 
• Network 
– Overly open ACL 
– Little or no isolation 
– Little or no monitoring 
– Little or no packet inspection 
– “An open playground” 
– Hardware embedded OS vulnerabilities 
– Other entry points 
● It's not limited to Ethernet / 2.4 && 5 GHz WiFi 
(look at the NSA ANT catalogue) 
9
What's an “attack surface”? 
• Hardware 
– Lack of tamper evident seals 
– Lack of control of use 
– Malicious USB / Firewire / etc 
● COTTONMOUTH-I 
● Iron Geek's plug & prey 
● USB Rubber Ducky 
– Embedded firmware vulnerabilites 
– “Freebie” / “Gift” / “Other” 
– Lack of physical access controls 
● e.g. Barclays £1.3M Theft 
– Lack of $vendor updates (e.g. Android) 
10
What's an “attack surface”? 
• Lock all the things! 
– Combination T.S.A locks 
● Easily picked 
– Traditional tumbler locks 
● Picking / bump keys 
– Biometrics 
● Mythbusters 
• Key pads 
– Check for wear / dirt marks / vedor codes 
• Key switches (e.g. in lifts) 
– As per above 
• Room card keys 
– Magstripe read and write 
• RFID 
– Easily read tags content and replay 
11
What's an “attack surface”? 
• And then there's … I.o.T 
– T.V 
– Cameras 
– Light bulbs 
– Fridges 
– Home automation 
– Locks 
– Printer 
● Cloud print … 
– Etc 
– Supervisory Control And Data Acquisition 
● Let's put a hydro electric dam controll system on the internet! 
12
What's an “attack surface”? 
• But wait … there's more! 
• Your cars 
•Medical devices (more famously RF enabled 
pacemakers), wireless insulin pumps etc … 
• https://www.iamthecavalry.org/ 
13
What's an “attack surface”? 
• Software 
– Modified binaries 
– “Install for FREE STUFF!” 
– Unaudited source code … cough cough 
● Truecrypt, openssl ... 
– Poor isolation (no M.A.C, only D.A.C) 
– Process injection, buffer overflows etc … 
– Unpatched software 
14
What's an “attack surface”? 
• Employees 
– “I put all my details on this pastebin, can you take a 
look?” 
– “Sure you can use my phone / workstation!” 
– “So all I have to do is click this link?” 
– “Oh you're from HR? Sure I can install that!” 
– “A magic trick? YEY!” 
– “FREE STUFF?!” 
15
What's an “attack surface”? 
• Employees 
– Phishing / Spear Phishing 
– Social engineering 
– D.L.P bypass is no longer just crafted devices 
● Making comodity USB "evil" 
● Derbycon presentation 
● Adam Caudil && Brandon Wilson 
– Implied trust 
● Uniform / Badge != Proof 
16
What's an “attack surface”? 
• Other 
– Side channel attacks 
● Cache timing 
● Co-residency (side channel against “cloud”) 
– Unintentional “emissions” 
● Melissa Elliot “Noise Floor” 
● S.D.R (Software Defined Radio) 
● Monitor / Display, RAM, F.S.B, etc ... 
17
F.U.D! 
18
Well … not so much 
19
D.A.C, M.A.C, I.P.S, I.D.S … WTF? 
• Discretionary Access Control 
– POSIX permissions 
● File mode 
● UID 
● GID 
● Software runs with same permissions as user 
and group 
● e.g. your brower could read ~/.ssh/id_rsa in 
this model 
20
D.A.C, M.A.C, I.P.S, I.D.S … WTF? 
•Mandatory Access Control 
– SELinux 
● Process running with context x 
● e.g. MySQL 
● Access to resource y 
● listen *:3306 
● Denied access to resource z 
● Connect *:80 
– App armor 
– Gazzang (Has some M.A.C) 
21
Heartbleed/Shellshock/#bandwagon 
• “Media” 
– Need to drive views / purchases aka revenue 
– F.U.D “slinging” is an effective method for this. 
(Everything is a Virus) 
● e.g. The Registers “Critical SSL vulnerability out 
tomorrow” 
● No detail 
● No sources 
● PURE F.U.D 
22
Heartbleed/Shellshock/#bandwagon 
• But naming vulnerabilites has its place 
● C.R.I.M.E / CVE-2012-4929 
● B.E.A.S.T / CVE-2011-3389 
● Heartbleed CVE-2014-0160 
● Shellshock CVE-2014-6271, 6277, 6278, 
7169, 7186, 7187 
● P.O.O.D.L.E CVE-2014-3566 
23
Heartbleed/Shellshock/#bandwagon 
• Even if it can go a bit far ... 
24
Heartbleed/Shellshock/#bandwagon 
• There is hope behind the hype. 
● Elastica Inc @ Vimeo 
● Heartbleed instructional video 
● Shellshock instructional video 
● Poodle instructional video 
25
Detection or prevention 
•Why not both? 
– Block known “bad” 
● By writing your own rules 
● Reguarly syncing with emerging rules 
– Allow known “good” 
● IPS / WAF blocking your app? Write an exeception, 
carefully! 
● Be selective! 
● e.g. don't: if /cart(.*) then skip 
– Log everything else 
● And check the logs! 
26
Detection or prevention 
•Why not both? 
– Generate alerts 
● e.g. logstash can send alerts to nagios 
– Y.M.W.V 
● You will know your applications behaviour 
● Consider what's “out of context” 
● e.g. 10x increase in additions to shopping cart for 
invalid items (could be someoneattempting SQLi) 
● 10x increase in requests, could be a DoS 
27
Detection or prevention 
• Detection 
● Alert on set conditions 
● SQLi, Fuzzing, out of context requests. 
● Write Rules / exceptions to reduce “noise” 
● Be specific in said rules! 
• Prevention 
● Block and alert 
● Reduce “noise” through blacklists. 
● {"timestamp":"2014-05- 
15T07:30:42.970624","event_type":"alert","src_ip":"101.227.170.42","src_port":58613,"dest_ip":"XXX.XXX.XXX.XXX 
","dest_port":22,"proto":"TCP","alert": 
{"action":"allowed","gid":1,"signature_id":2500002,"rev":3231,"signature":"ET COMPROMISED Known 
Compromised or Hostile Host Traffic group 2","category":"Misc Attack","severity":2}} 
28
Detection or prevention 
• Reduce NOISE! 
– Avoiding the “boy who cried wolf” 
– Aka staff becoming desensitized to the slew of alerts that “oh 
that's normal, just ignore” 
– “Familiarity breeds comtempt” 
• Why not just buy $product? 
– It's still an option but be 100% sure you know what you're buying. 
● Paying over the odds for rebranded nessus is never good. 
● Ongoing rule updates, custom rule support, $vendor support to 
“tune” the appliance to your needs. 
29
Emerging tech to keep an eye on 
• Fidoalliance.org 
– U2F (Universal two factor) 
– UAF (Universal authentication framework) 
– Google, yubico, ARM, bank of america, Lenovo, 
Mastercard, Discover, Microsoft, Paypal, Qualcomm, 
RSA, Samsung, Visa … 
● The list of members is extensive 
– TL;DR improve security by implementing a common 
two factor auth standard; and comoditizing it to 
improve addoption. 
30
Emerging tech to keep an eye on 
• Keybase.io 
– Nodejs 
– “socializes” GPG 
● Tracking → sign a “snapshot” of their key and 
identity profile 
● “On this date I <name> verify this is Joe Blogs's 
gpg key, twitter account … etc” 
– TL;DR wrapper and service to help spread the use of 
GPG 
– https://keybase.io/oneiroi/ 
31
Emerging tech to keep an eye on 
• Suricata 
– IDS / IPS 
– Libjannson → eve.json 
● Compatible with E.L.K stack: blog post 
– Multi threaded 
● Claims 10Gbit support with no ruleset sacrifice 
● Protocol identification 
● File identification, extraction 
– Open Information Security Foundation 
32
Emerging tech to keep an eye on 
• E.L.K (Elastic search, Logstash, Kibana) 
– Easily store, index and visualize data 
● e.g. suricata data 
33
Emerging tech to keep an eye on 
• Docker 
– Wrapper for LXC 
● “Linux containers” 
– Vagrant / git esq cli 
– Raw hardware access 
● Not paravirtual 
– Suffers from “container breakout” 
● Gains root on host system 
– REST API is very open 
– Docker Security page 
– Dan Walsh SELinux and Docker 
34
Emerging tech to keep an eye on 
• Haka 
– “Software defined security” 
– $developer sentric security 
– LUA DSL 
– Another tool in the $devops chain 
– E.L.K support 
• Why not IPTables / Netfilter / other 
– Why not both? 
– Eases developers adoption 
35
2014 … it's been interesting 
• 2014 
– Isn't over yet ... 
– Heartbleed, shellshock, poodle 
– F.U.D 
● Gmail “leak” (wasn't gmail, just happened to have 
gmail addresses) 
● Dropbox “leak” (wasn't dropbox, just happened that 
users were using same credentials) 
– Home Depot 
– Target (Fall 2013, still “in the news”) 
36
2014 … it's been interesting 
• 2014 
– No more “head in the sand” 
– No more “features before security” 
– The cost of compromise is proven 
– Increasing Ubiquity of I.o.T 
● without proper security measures is not maintainable 
– Time to build security into the product, not as an 
afterthought. 
37
2014 … it's been interesting 
• 2014 
– You are not alone! 
– https://www.iamthecavalry.org/ 
– http://www.openinfosecfoundation.org/ 
– https://www.reddit.com/r/netsec 
– http://seclists.org/fulldisclosure/ 
– https://bugcrowd.com 
– https://44con.com/ 
– http://dc4420.org/ 
– Deploy your own “Responsible disclosure program” 
38
The End … 
• Questions? (And Thank you for attending!) 
• I also have a tirade of equipment with me if 
anyone is interested in learning more; see me 
after this talk. 
39

More Related Content

What's hot

Smart Sheriff, Dumb Idea, the wild west of government assisted parenting
Smart Sheriff, Dumb Idea, the wild west of government assisted parentingSmart Sheriff, Dumb Idea, the wild west of government assisted parenting
Smart Sheriff, Dumb Idea, the wild west of government assisted parentingAbraham Aranguren
 
15 years through Infosec
15 years through Infosec15 years through Infosec
15 years through InfosecSaumil Shah
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Jakub Kałużny
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear DenESET
 
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec JourneySaumil Shah
 
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces securityZeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces securityJakub Kałużny
 
Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015ESET
 
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014Security Weekly
 
How to Build Your Own Physical Pentesting Go-bag
How to Build Your Own Physical Pentesting Go-bagHow to Build Your Own Physical Pentesting Go-bag
How to Build Your Own Physical Pentesting Go-bagBeau Bullock
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListSecurity Weekly
 
Security Testing: Fuzzing
Security Testing: FuzzingSecurity Testing: Fuzzing
Security Testing: FuzzingAndrei Rubaniuk
 
Distributed Fuzzing Framework Design
Distributed Fuzzing Framework DesignDistributed Fuzzing Framework Design
Distributed Fuzzing Framework Designbannedit
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration TestingScott Sutherland
 
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disasters
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration DisastersBSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disasters
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disastersinfodox
 
Web Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartWeb Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartSatria Ady Pradana
 
Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterMike Felch
 
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Security Weekly
 
Hardwear.io 2018 BLE Security Essentials workshop
Hardwear.io 2018 BLE Security Essentials workshopHardwear.io 2018 BLE Security Essentials workshop
Hardwear.io 2018 BLE Security Essentials workshopSlawomir Jasek
 

What's hot (20)

Smart Sheriff, Dumb Idea, the wild west of government assisted parenting
Smart Sheriff, Dumb Idea, the wild west of government assisted parentingSmart Sheriff, Dumb Idea, the wild west of government assisted parenting
Smart Sheriff, Dumb Idea, the wild west of government assisted parenting
 
15 years through Infosec
15 years through Infosec15 years through Infosec
15 years through Infosec
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear Den
 
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
 
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces securityZeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
 
Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015
 
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
 
How to Build Your Own Physical Pentesting Go-bag
How to Build Your Own Physical Pentesting Go-bagHow to Build Your Own Physical Pentesting Go-bag
How to Build Your Own Physical Pentesting Go-bag
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted List
 
Security Testing: Fuzzing
Security Testing: FuzzingSecurity Testing: Fuzzing
Security Testing: Fuzzing
 
Distributed Fuzzing Framework Design
Distributed Fuzzing Framework DesignDistributed Fuzzing Framework Design
Distributed Fuzzing Framework Design
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration Testing
 
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disasters
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration DisastersBSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disasters
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disasters
 
Web Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartWeb Security Workshop : A Jumpstart
Web Security Workshop : A Jumpstart
 
Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite Perimeter
 
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
 
Hardwear.io 2018 BLE Security Essentials workshop
Hardwear.io 2018 BLE Security Essentials workshopHardwear.io 2018 BLE Security Essentials workshop
Hardwear.io 2018 BLE Security Essentials workshop
 
Penetration Testing
Penetration TestingPenetration Testing
Penetration Testing
 
Introduction to Browser Fuzzing
Introduction to Browser FuzzingIntroduction to Browser Fuzzing
Introduction to Browser Fuzzing
 

Similar to Security its-more-than-just-your-database-you-should-worry-about

Web application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursWeb application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursDavid Busby, CISSP
 
Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busbyDavid Busby, CISSP
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interactionDefconRussia
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andAlisa Esage Шевченко
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin FalckNorth Texas Chapter of the ISSA
 
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust TheoremOWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust TheoremOWASP
 
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...Michael Boman
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class Chris Gates
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via smsqqlan
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10Pawel Rzepa
 
Securing a Raspberry Pi and other DIY IoT devices
Securing a Raspberry Pi and other DIY IoT devicesSecuring a Raspberry Pi and other DIY IoT devices
Securing a Raspberry Pi and other DIY IoT devicesIan Kluft
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Digital Bond
 
EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22MichaelM85042
 
CSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage GearCSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage Gearshawn_merdinger
 
I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of themRoberto Suggi Liverani
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device InsecurityJeremy Brown
 
My tryst with sourcecode review
My tryst with sourcecode reviewMy tryst with sourcecode review
My tryst with sourcecode reviewAnant Shrivastava
 
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Sergey Gordeychik
 

Similar to Security its-more-than-just-your-database-you-should-worry-about (20)

Web application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursWeb application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yours
 
Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busby
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interaction
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits and
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
 
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust TheoremOWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
 
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via sms
 
CloudStack Secured
CloudStack SecuredCloudStack Secured
CloudStack Secured
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10
 
Securing a Raspberry Pi and other DIY IoT devices
Securing a Raspberry Pi and other DIY IoT devicesSecuring a Raspberry Pi and other DIY IoT devices
Securing a Raspberry Pi and other DIY IoT devices
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22
 
CSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage GearCSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage Gear
 
I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of them
 
OWASP
OWASPOWASP
OWASP
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device Insecurity
 
My tryst with sourcecode review
My tryst with sourcecode reviewMy tryst with sourcecode review
My tryst with sourcecode review
 
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
 

Recently uploaded

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 

Recently uploaded (20)

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 

Security its-more-than-just-your-database-you-should-worry-about

  • 1. Security It's more than just your database you should worry about David Busby Information Security Architect 2014-11-02
  • 2. Sample Text Page • David Busby –Percona since January 2013 –R.D.B.A –EMEA && Security Lead –I.S.A (current) –14 years sysadmin / dev –Ju-Jitsu instructor for N.F.P club. –Volunteer assist teaching computing at Secondary school 2
  • 3. Agenda • Got F.U.D? •What is an attack surface? • D.A.C, M.A.C, I.P.S, I.D.S, WTF? • Heartbleed / Shellshock / #gate / #bandwagon • Detection or prevention: the boy who cried wolf • Emerging tech to keep an eye on. • 2014 … it's been interesting 3
  • 4. Here be dragons ... • Previous talks focused on a select set of identification and prevention ● This talk is different … ● Focus is on a mindset change for pure identification of potential attack vectors. Aswell as clarification of some points along the way ● There's F.U.D by the ton; and we each get a shovel. 4
  • 5. Got F.U.D? • Fear Uncertainty Doubt • C.R.I.M.E (CVE-2012-4929) • B.E.A.S.T (CVE-2011-3389) • Heartbleed (CVE-2014-0160) • Shellshock CVE-2014-6271, 6277, 6278, 7169, 7186, 7187 • P.O.O.D.L.E (CVE-2014-3566) 5
  • 6. What's an “attack surface”? • Potential areas for compromise – Application – Database – Network – Hardware – Software – Employees – Other 6
  • 7. What's an “attack surface”? • Application – Engine / Interpreter, e.g. Java, PHP, etc. ● e.g. PHP CVE-2011-4885 (hash collide) – Framework ● Or most likely a plugin – Developer errors, SQLi, XSS, CSRF etc ... – HTTP Service Apache, Nginx, Lighthttpd, etc. – Sysadmin errors e.g. missconfiguration of SSL cipers / certs 7
  • 8. What's an “attack surface”? • Database – Weak passwords – Overpermissive grants – Overly broad host spefications e.g. @% ● Vulnerabilities in service (often denoted by CVE's e.g. CVE-2012-2122) – Poor isolation (Network, users etc) – Malicious plugins e.g. UDF's 8
  • 9. What's an “attack surface”? • Network – Overly open ACL – Little or no isolation – Little or no monitoring – Little or no packet inspection – “An open playground” – Hardware embedded OS vulnerabilities – Other entry points ● It's not limited to Ethernet / 2.4 && 5 GHz WiFi (look at the NSA ANT catalogue) 9
  • 10. What's an “attack surface”? • Hardware – Lack of tamper evident seals – Lack of control of use – Malicious USB / Firewire / etc ● COTTONMOUTH-I ● Iron Geek's plug & prey ● USB Rubber Ducky – Embedded firmware vulnerabilites – “Freebie” / “Gift” / “Other” – Lack of physical access controls ● e.g. Barclays £1.3M Theft – Lack of $vendor updates (e.g. Android) 10
  • 11. What's an “attack surface”? • Lock all the things! – Combination T.S.A locks ● Easily picked – Traditional tumbler locks ● Picking / bump keys – Biometrics ● Mythbusters • Key pads – Check for wear / dirt marks / vedor codes • Key switches (e.g. in lifts) – As per above • Room card keys – Magstripe read and write • RFID – Easily read tags content and replay 11
  • 12. What's an “attack surface”? • And then there's … I.o.T – T.V – Cameras – Light bulbs – Fridges – Home automation – Locks – Printer ● Cloud print … – Etc – Supervisory Control And Data Acquisition ● Let's put a hydro electric dam controll system on the internet! 12
  • 13. What's an “attack surface”? • But wait … there's more! • Your cars •Medical devices (more famously RF enabled pacemakers), wireless insulin pumps etc … • https://www.iamthecavalry.org/ 13
  • 14. What's an “attack surface”? • Software – Modified binaries – “Install for FREE STUFF!” – Unaudited source code … cough cough ● Truecrypt, openssl ... – Poor isolation (no M.A.C, only D.A.C) – Process injection, buffer overflows etc … – Unpatched software 14
  • 15. What's an “attack surface”? • Employees – “I put all my details on this pastebin, can you take a look?” – “Sure you can use my phone / workstation!” – “So all I have to do is click this link?” – “Oh you're from HR? Sure I can install that!” – “A magic trick? YEY!” – “FREE STUFF?!” 15
  • 16. What's an “attack surface”? • Employees – Phishing / Spear Phishing – Social engineering – D.L.P bypass is no longer just crafted devices ● Making comodity USB "evil" ● Derbycon presentation ● Adam Caudil && Brandon Wilson – Implied trust ● Uniform / Badge != Proof 16
  • 17. What's an “attack surface”? • Other – Side channel attacks ● Cache timing ● Co-residency (side channel against “cloud”) – Unintentional “emissions” ● Melissa Elliot “Noise Floor” ● S.D.R (Software Defined Radio) ● Monitor / Display, RAM, F.S.B, etc ... 17
  • 19. Well … not so much 19
  • 20. D.A.C, M.A.C, I.P.S, I.D.S … WTF? • Discretionary Access Control – POSIX permissions ● File mode ● UID ● GID ● Software runs with same permissions as user and group ● e.g. your brower could read ~/.ssh/id_rsa in this model 20
  • 21. D.A.C, M.A.C, I.P.S, I.D.S … WTF? •Mandatory Access Control – SELinux ● Process running with context x ● e.g. MySQL ● Access to resource y ● listen *:3306 ● Denied access to resource z ● Connect *:80 – App armor – Gazzang (Has some M.A.C) 21
  • 22. Heartbleed/Shellshock/#bandwagon • “Media” – Need to drive views / purchases aka revenue – F.U.D “slinging” is an effective method for this. (Everything is a Virus) ● e.g. The Registers “Critical SSL vulnerability out tomorrow” ● No detail ● No sources ● PURE F.U.D 22
  • 23. Heartbleed/Shellshock/#bandwagon • But naming vulnerabilites has its place ● C.R.I.M.E / CVE-2012-4929 ● B.E.A.S.T / CVE-2011-3389 ● Heartbleed CVE-2014-0160 ● Shellshock CVE-2014-6271, 6277, 6278, 7169, 7186, 7187 ● P.O.O.D.L.E CVE-2014-3566 23
  • 24. Heartbleed/Shellshock/#bandwagon • Even if it can go a bit far ... 24
  • 25. Heartbleed/Shellshock/#bandwagon • There is hope behind the hype. ● Elastica Inc @ Vimeo ● Heartbleed instructional video ● Shellshock instructional video ● Poodle instructional video 25
  • 26. Detection or prevention •Why not both? – Block known “bad” ● By writing your own rules ● Reguarly syncing with emerging rules – Allow known “good” ● IPS / WAF blocking your app? Write an exeception, carefully! ● Be selective! ● e.g. don't: if /cart(.*) then skip – Log everything else ● And check the logs! 26
  • 27. Detection or prevention •Why not both? – Generate alerts ● e.g. logstash can send alerts to nagios – Y.M.W.V ● You will know your applications behaviour ● Consider what's “out of context” ● e.g. 10x increase in additions to shopping cart for invalid items (could be someoneattempting SQLi) ● 10x increase in requests, could be a DoS 27
  • 28. Detection or prevention • Detection ● Alert on set conditions ● SQLi, Fuzzing, out of context requests. ● Write Rules / exceptions to reduce “noise” ● Be specific in said rules! • Prevention ● Block and alert ● Reduce “noise” through blacklists. ● {"timestamp":"2014-05- 15T07:30:42.970624","event_type":"alert","src_ip":"101.227.170.42","src_port":58613,"dest_ip":"XXX.XXX.XXX.XXX ","dest_port":22,"proto":"TCP","alert": {"action":"allowed","gid":1,"signature_id":2500002,"rev":3231,"signature":"ET COMPROMISED Known Compromised or Hostile Host Traffic group 2","category":"Misc Attack","severity":2}} 28
  • 29. Detection or prevention • Reduce NOISE! – Avoiding the “boy who cried wolf” – Aka staff becoming desensitized to the slew of alerts that “oh that's normal, just ignore” – “Familiarity breeds comtempt” • Why not just buy $product? – It's still an option but be 100% sure you know what you're buying. ● Paying over the odds for rebranded nessus is never good. ● Ongoing rule updates, custom rule support, $vendor support to “tune” the appliance to your needs. 29
  • 30. Emerging tech to keep an eye on • Fidoalliance.org – U2F (Universal two factor) – UAF (Universal authentication framework) – Google, yubico, ARM, bank of america, Lenovo, Mastercard, Discover, Microsoft, Paypal, Qualcomm, RSA, Samsung, Visa … ● The list of members is extensive – TL;DR improve security by implementing a common two factor auth standard; and comoditizing it to improve addoption. 30
  • 31. Emerging tech to keep an eye on • Keybase.io – Nodejs – “socializes” GPG ● Tracking → sign a “snapshot” of their key and identity profile ● “On this date I <name> verify this is Joe Blogs's gpg key, twitter account … etc” – TL;DR wrapper and service to help spread the use of GPG – https://keybase.io/oneiroi/ 31
  • 32. Emerging tech to keep an eye on • Suricata – IDS / IPS – Libjannson → eve.json ● Compatible with E.L.K stack: blog post – Multi threaded ● Claims 10Gbit support with no ruleset sacrifice ● Protocol identification ● File identification, extraction – Open Information Security Foundation 32
  • 33. Emerging tech to keep an eye on • E.L.K (Elastic search, Logstash, Kibana) – Easily store, index and visualize data ● e.g. suricata data 33
  • 34. Emerging tech to keep an eye on • Docker – Wrapper for LXC ● “Linux containers” – Vagrant / git esq cli – Raw hardware access ● Not paravirtual – Suffers from “container breakout” ● Gains root on host system – REST API is very open – Docker Security page – Dan Walsh SELinux and Docker 34
  • 35. Emerging tech to keep an eye on • Haka – “Software defined security” – $developer sentric security – LUA DSL – Another tool in the $devops chain – E.L.K support • Why not IPTables / Netfilter / other – Why not both? – Eases developers adoption 35
  • 36. 2014 … it's been interesting • 2014 – Isn't over yet ... – Heartbleed, shellshock, poodle – F.U.D ● Gmail “leak” (wasn't gmail, just happened to have gmail addresses) ● Dropbox “leak” (wasn't dropbox, just happened that users were using same credentials) – Home Depot – Target (Fall 2013, still “in the news”) 36
  • 37. 2014 … it's been interesting • 2014 – No more “head in the sand” – No more “features before security” – The cost of compromise is proven – Increasing Ubiquity of I.o.T ● without proper security measures is not maintainable – Time to build security into the product, not as an afterthought. 37
  • 38. 2014 … it's been interesting • 2014 – You are not alone! – https://www.iamthecavalry.org/ – http://www.openinfosecfoundation.org/ – https://www.reddit.com/r/netsec – http://seclists.org/fulldisclosure/ – https://bugcrowd.com – https://44con.com/ – http://dc4420.org/ – Deploy your own “Responsible disclosure program” 38
  • 39. The End … • Questions? (And Thank you for attending!) • I also have a tirade of equipment with me if anyone is interested in learning more; see me after this talk. 39

Editor's Notes

  1. BEAST – Browser Exploit Against SSL TLS Targets CBC Siphers; padding oracle attack to obtain plaintext; requires MITM strick control over the connection CRIME – Compression Ratio Info-leak Made Easy Exploited compression optimization to reveal encrypted plaintext such as cookie data. Poodle – Padding Oracale On Downgraded Legacy Encryption Padding oracle attack on CBC SSLv3 ciphers;
  2. Lack of physical controlls: - installation of tap / other device -
  3. Lack of physical controlls: - installation of tap / other device -
  4. Lack of physical controlls: - installation of tap / other device -
  5. Lack of physical controlls: - installation of tap / other device -
  6. Lack of physical controlls: - installation of tap / other device -
  7. Lack of physical controlls: - installation of tap / other device -
  8. Lack of physical controlls: - installation of tap / other device -
  9. BEAST – Browser Exploit Against SSL TLS Targets CBC Siphers; padding oracle attack to obtain plaintext; requires MITM strick control over the connection CRIME – Compression Ratio Info-leak Made Easy Exploited compression optimization to reveal encrypted plaintext such as cookie data. Poodle – Padding Oracale On Downgraded Legacy Encryption Padding oracle attack on CBC SSLv3 ciphers;
  10. BEAST – Browser Exploit Against SSL TLS Targets CBC Siphers; padding oracle attack to obtain plaintext; requires MITM strick control over the connection CRIME – Compression Ratio Info-leak Made Easy Exploited compression optimization to reveal encrypted plaintext such as cookie data. Poodle – Padding Oracale On Downgraded Legacy Encryption Padding oracle attack on CBC SSLv3 ciphers;
  11. BEAST – Browser Exploit Against SSL TLS Targets CBC Siphers; padding oracle attack to obtain plaintext; requires MITM strick control over the connection CRIME – Compression Ratio Info-leak Made Easy Exploited compression optimization to reveal encrypted plaintext such as cookie data. Poodle – Padding Oracale On Downgraded Legacy Encryption Padding oracle attack on CBC SSLv3 ciphers;
  12. BEAST – Browser Exploit Against SSL TLS Targets CBC Siphers; padding oracle attack to obtain plaintext; requires MITM strick control over the connection CRIME – Compression Ratio Info-leak Made Easy Exploited compression optimization to reveal encrypted plaintext such as cookie data. Poodle – Padding Oracale On Downgraded Legacy Encryption Padding oracle attack on CBC SSLv3 ciphers;
  13. BEAST – Browser Exploit Against SSL TLS Targets CBC Siphers; padding oracle attack to obtain plaintext; requires MITM strick control over the connection CRIME – Compression Ratio Info-leak Made Easy Exploited compression optimization to reveal encrypted plaintext such as cookie data. Poodle – Padding Oracale On Downgraded Legacy Encryption Padding oracle attack on CBC SSLv3 ciphers;