You are making whitelisting difficult
Casey Smith
Two Ways to Engage the Enemy
Off Horizon - Collect and Analyze Telemetry
Hand To Hand Combat - Mitigations (User/
Kernel/Hypervisor)
Whitelisting is a street fight
But I mean, Does it work?
Red October ( For Us ;-) ) - October 22, 2013
Whitelisting Full Enforcement, April 2014. Yes, even DLLs. It is possible.
Was it difficult, YES.
Did it work? YES.
Are there bypasses? YES.
Disrupt/Degrade Adversary Capabilities
Three Problem Statements
admins often do not know where or
how to begin to deploy whitelisting
1.
Defenders need to hear the positive results
I actually want whitelisting to work.
I worry defenders are not talking about its efficacy.
...for fear attackers will switch tactics?
trust by default
instead of
trust by exception
2.
More of this please...Ignite 2017 Talk (Aaron & Chris)
Trust Decisions made on... publisher…?
● Was this the intent of code signing?
● Verifies Identity and Integrity
● Not Intent
trusted signed tools can lead to compromise
3.
My experience with bypasses
IEExec - Jan 16, 2014 (Proved my theory Trusted Things Can Execute Things)
InstallUtil - October 31, 2014
RegAsm/RegSvcs - November 6, 2015
Regsvr32 - April 19, 2016
MSBuild - May 27, 2016 - Device Guard Bypass.
Exploit Free Evasion - Living Off The Land
Alex Ionescu
James Forshaw
Lee Christensen
Matt Graeber
Matt Nelson
Oddvar Moe
dbghost.exe
Discovered accidentally by …
Reading MSDN & :)
Honestly need all need a better
methodology to find these...
Significance of dbghost.exe
Unconstrained Script Host
Debug Level Control of an Application
Not Default
Does keeping a blacklist for whitelisting even make sense?
Current Published Device Guard Bypass Tools
How many unknown/other bypass tools exist?
Will this scale? We need to consider...
How are new bypasses...
Discovered?
Serviced?
Announced?
Assume Compromise
You should also assume…
Admin
Execution
Call To Action
Three Things We Need
Acknowledge whitelisting is a boundary. ;-)
1.
“sign everything same way”, needs to be
evaluated
notepad.exe == windbg.exe ?
2.
more .NET visibility
3.
Closing Thoughts
No one is building wooden ships for warfare
anymore...
Help make whitelisting a new normal
Drive out commodity and opportunistic attacks
The Genius of Device Guard
Virtualization Based Security
“Attackers with capabilities to evade, don’t actually give a crap about executing PE
files…”
This can help drive naïve attackers out of the fight.
Thank you
Questions? Feedback?
Casey Smith

BlueHat v17 || You Are Making Application Whitelisting Difficult

Editor's Notes

  • #3 Battle of Hampton Roads March 8–9, 1862 Union Monitor Confederates Merrimac The major significance of the battle is that it was the first meeting in combat of ironclad warships The day these two ships sailed, every other ship was obsolete... The Day device Guard Shipped…
  • #6 Not here, never again, not oun our watch
  • #11 Australian Signals Directorate… Has been saying this for 10+ years…
  • #14 Ignite Talk Defending against malware with robust and practical application whitelisting Aaron Margosis, Chris Jackson
  • #15 Shout Out To Matt’s Subverting Trust.
  • #18 Patterns for developers. Assembly.Load(byte[])
  • #22 This exclude PowerShell constrained mode
  • #31 Assembly.Load()
  • #34 In January at BlueHat IL... Matt and I talked about Naive and Enlightened attackers…