SlideShare a Scribd company logo
1 of 43
THE 99¢ HEART SURGEON
DILEMMA
Stefan Friedli




                        1
THE 99¢... WHAT?




                   2
COMPARE.




           3
THIS IS ABOUT BAD
    EXAMPLES.




                    4
WHO NEEDS A PENTEST?




                       5
6
HOWTO:
FIGURE OUT IF A PAINTER SCREWED
             YOU OVER...
   (EVEN IF YOU NEVER TOUCHED
               PAINT.)
   Good                 Bad




                                  7
HOWTO:
  IDENTIFY A GOOD PENTESTER.
(... EVEN IF YOU WEAR A SUIT AND
THINK “COMPUTER PEOPLE” SMELL
               FUNNY.)
   Good                 Bad




                                   8
9
Overall Quality




     ELIMINATE


10
Pre-Engagement
                  Interactions

    Reporting                    Intelligence
                                  Gathering


Post-Exploitation                    Threat
                                    Modelling


                             Vulnerability
        Exploitation
                               Analysis


                                                11
5173 PAGES



             12
13
«Due to copyright reasons, all of our
documents are print-only by default. If
you would like to purchase an
electronic version at additional cost,
please contact our sales staff.»*
                                          14
WAIT... BOMBS?




«Due to the incorrect input validation of the parameter
‘s’, arbitrary script code can be executed.»



                                                          15
IMPACT METRICS?
  
           Magic happens here.




                                 16
YOU’RE ALL WRONG.


 «The amount of bombs depends on the danger
 the vulnerability causes. (...) There is no upper
 limit.»*

* Translated from German



                                                     17
MS08-067: Microsoft Windows Server Service
  RPC Handling Remote Code Execution
               Vulnerability




















                                             18
MAKING IMPORTANT
  THINGS INVISIBLE.




                      19
VISUALIZATION IS COOL
      IF YOU DO IT RIGHT.



                  Google this:
                 Wim Remes @
                  Blackhat EU


                                 20
MISE EN PLACE




                21
Pre-Engagement
                  Interactions

    Reporting                    Intelligence
                                  Gathering


Post-Exploitation                    Threat
                                    Modelling


                             Vulnerability
        Exploitation
                               Analysis


                                                22
SO YOU DIDN’T DO YOUR
     HOMEWORK?




                        23
SO YOU DIDN’T DO YOUR
       HOMEWORK?
XXX.213.XX.1/24   XXX.231.XX.1/24




                                    24
IF THINGS DON’T ADD UP:
     TALK TO PEOPLE.

But... but... the bad guys don’t talk
            to you either!




                                        25
26
BAD GUYS DON’T NEED TO
 WRITE REPORTS FOR YOU.




                          27
COOPERATE
Confrontation       Cooperation




                                  28
TALK TO PEOPLE.
 ALL OF THEM.




                  29
SAY WHAT?

Management Summary:
«(...) While it was not possible to use
a reverse tcp shell to get an
outbound connection, we were able
to tunnel traffic through ICMP in
order to get a shell on the system.
(...)»

                                          30
“OH, A DOS BOX!”




                   31
WHAT DO PEOPLE CARE
       ABOUT?

STUFF THAT MATTERS TO
         THEM.


                        32
SCOPE!




         33
Pre-Engagement
                  Interactions

    Reporting                    Intelligence
                                  Gathering


Post-Exploitation                    Threat
                                    Modelling


                             Vulnerability
        Exploitation
                               Analysis


                                                34
THINGS THAT DON’T EXIST.

• Unicorns
• Imaginary childhood friends (most of them)
• A decent Metallica album after 1991
• «No Scope, just look at everything.»




                                               35
SCOPING MAKES SENSE
       BECAUSE...


Scope   Time/Effort   Money




                              36
WHAT DO PEOPLE CARE
       ABOUT?
STUFF THAT MATTERS TO
         THEM.



                        37
KEEP IT REAL.


 We have a pretty cool job.
Don’t let anyone change that.




                                38
DON’T BE THAT GUY.
Management Summary:
«(...) We were unable to complete
the task because it [the website] was
too big. (...)»

       Thank you Ben Jackson.
        http://code.google.com/p/weblabyrinth/




                                                 39
HOW DO WE FIX IT?




                    40
Just exploit stuff.

                  41
Pre-Engagement
                  Interactions

    Reporting                    Intelligence
                                  Gathering


Post-Exploitation                    Threat
                                    Modelling


                             Vulnerability
        Exploitation
                               Analysis


                                                42
LIKE IT? MAKE IT BETTER!
         Help killing bad pentesting.
         http://www.pentest-standard.org
         Check out the PTES-G!



   DONE. IT’S OVER.
         Thanks for being here,
         feel free to ask questions
         and have a great night!

                                           43

More Related Content

Recently uploaded

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 

Recently uploaded (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 

The 99c Heart Surgeon Dilemma (BruCON 2011)

  • 1. THE 99¢ HEART SURGEON DILEMMA Stefan Friedli 1
  • 4. THIS IS ABOUT BAD EXAMPLES. 4
  • 5. WHO NEEDS A PENTEST? 5
  • 6. 6
  • 7. HOWTO: FIGURE OUT IF A PAINTER SCREWED YOU OVER... (EVEN IF YOU NEVER TOUCHED PAINT.) Good Bad 7
  • 8. HOWTO: IDENTIFY A GOOD PENTESTER. (... EVEN IF YOU WEAR A SUIT AND THINK “COMPUTER PEOPLE” SMELL FUNNY.) Good Bad 8
  • 9. 9
  • 10. Overall Quality ELIMINATE 10
  • 11. Pre-Engagement Interactions Reporting Intelligence Gathering Post-Exploitation Threat Modelling Vulnerability Exploitation Analysis 11
  • 13. 13
  • 14. «Due to copyright reasons, all of our documents are print-only by default. If you would like to purchase an electronic version at additional cost, please contact our sales staff.»* 14
  • 15. WAIT... BOMBS? «Due to the incorrect input validation of the parameter ‘s’, arbitrary script code can be executed.» 15
  • 16. IMPACT METRICS?  Magic happens here. 16
  • 17. YOU’RE ALL WRONG. «The amount of bombs depends on the danger the vulnerability causes. (...) There is no upper limit.»* * Translated from German 17
  • 18. MS08-067: Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability                  18
  • 19. MAKING IMPORTANT THINGS INVISIBLE. 19
  • 20. VISUALIZATION IS COOL IF YOU DO IT RIGHT. Google this: Wim Remes @ Blackhat EU 20
  • 22. Pre-Engagement Interactions Reporting Intelligence Gathering Post-Exploitation Threat Modelling Vulnerability Exploitation Analysis 22
  • 23. SO YOU DIDN’T DO YOUR HOMEWORK? 23
  • 24. SO YOU DIDN’T DO YOUR HOMEWORK? XXX.213.XX.1/24 XXX.231.XX.1/24 24
  • 25. IF THINGS DON’T ADD UP: TALK TO PEOPLE. But... but... the bad guys don’t talk to you either! 25
  • 26. 26
  • 27. BAD GUYS DON’T NEED TO WRITE REPORTS FOR YOU. 27
  • 28. COOPERATE Confrontation Cooperation 28
  • 29. TALK TO PEOPLE. ALL OF THEM. 29
  • 30. SAY WHAT? Management Summary: «(...) While it was not possible to use a reverse tcp shell to get an outbound connection, we were able to tunnel traffic through ICMP in order to get a shell on the system. (...)» 30
  • 31. “OH, A DOS BOX!” 31
  • 32. WHAT DO PEOPLE CARE ABOUT? STUFF THAT MATTERS TO THEM. 32
  • 33. SCOPE! 33
  • 34. Pre-Engagement Interactions Reporting Intelligence Gathering Post-Exploitation Threat Modelling Vulnerability Exploitation Analysis 34
  • 35. THINGS THAT DON’T EXIST. • Unicorns • Imaginary childhood friends (most of them) • A decent Metallica album after 1991 • «No Scope, just look at everything.» 35
  • 36. SCOPING MAKES SENSE BECAUSE... Scope Time/Effort Money 36
  • 37. WHAT DO PEOPLE CARE ABOUT? STUFF THAT MATTERS TO THEM. 37
  • 38. KEEP IT REAL. We have a pretty cool job. Don’t let anyone change that. 38
  • 39. DON’T BE THAT GUY. Management Summary: «(...) We were unable to complete the task because it [the website] was too big. (...)» Thank you Ben Jackson. http://code.google.com/p/weblabyrinth/ 39
  • 40. HOW DO WE FIX IT? 40
  • 42. Pre-Engagement Interactions Reporting Intelligence Gathering Post-Exploitation Threat Modelling Vulnerability Exploitation Analysis 42
  • 43. LIKE IT? MAKE IT BETTER! Help killing bad pentesting. http://www.pentest-standard.org Check out the PTES-G! DONE. IT’S OVER. Thanks for being here, feel free to ask questions and have a great night! 43