0days: How hacking really works. V 1.0 Jan 29, 2005 Dave Aitel dave@immunitysec.com



Similar documents
Security Testing in Critical Systems

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

TIME TO LIVE ON THE NETWORK

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Custom Penetration Testing

The Hacker Strategy. Dave Aitel Security Research

INTRUSION DETECTION SYSTEM

IDS / IPS. James E. Thiel S.W.A.T.

Securing OS Legacy Systems Alexander Rau

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Banking Security using Honeypot

IQware's Approach to Software and IT security Issues

Vinny Hoxha Vinny Hoxha 12/08/2009

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

N-Dimension Solutions Cyber Security for Utilities

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

The Roles of Software Testing & QA in Security Testing

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Passing PCI Compliance How to Address the Application Security Mandates

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Certified Ethical Hacker (CEH)

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Information Security Attack Tree Modeling for Enhancing Student Learning

Defense in Depth: Protecting Against Zero-Day Attacks

Automated Protection on UCS with Trend Micro Deep Security

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Windows Operating Systems. Basic Security

Introduction to Penetration Testing Graham Weston

Build Your Own Security Lab

Network- vs. Host-based Intrusion Detection

Yahoo Attack. Is DDoS a Real Problem?

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology Xiaoqin Song 1

Information Security Services

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

A Decision Maker s Guide to Securing an IT Infrastructure

Vulnerability Testing of Industrial Network Devices

Penetration Testing Report Client: Business Solutions June 15 th 2015

Total Defense Endpoint Premium r12

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Web Applications The Hacker s New Target

Network Forensics: Log Analysis

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

USM IT Security Council Guide for Security Event Logging. Version 1.1

EECS 354 Network Security. Introduction

IBM Managed Security Services Vulnerability Scanning:

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Network and Host-based Vulnerability Assessment

CYBERTRON NETWORK SOLUTIONS

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.

Why The Security You Bought Yesterday, Won t Save You Today

Linux Network Security

How To Prevent Hacker Attacks With Network Behavior Analysis

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Web App Security Audit Services

External Penetration Assessment and Database Access Review

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

Penetration Testing with Kali Linux

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Divide and Conquer Real World Distributed Port Scanning

FREQUENTLY ASKED QUESTIONS

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

API Cybersecurity Conference Industrial Control Systems Workshop. Sponsored by Alpine Security

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Presented by Evan Sylvester, CISSP

McAfee Database Security. Dan Sarel, VP Database Security Products

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Sample Report. Security Test Plan. Prepared by Security Innovation

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

A Brief History of IT Security & Architecture

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Intrusion Detections Systems

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

E-Commerce for IT Advanced. Louis Aguila & Matt Burt

WHITEPAPER. Nessus Exploit Integration

APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL

Course Title: Penetration Testing: Security Analysis

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Boston University Security Awareness. What you need to know to keep information safe and secure

USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany

Data Security for the Hospitality

Transcription:

0days: How hacking really works V 1.0 Jan 29, 2005 Dave Aitel dave@immunitysec.com

Who am I? NSA->@stake->Immunity CEO of Immunity, Inc. Consulting (product assessments) Immunity CANVAS Immunity Partner's Program Training Ongoing research in exploits and software vulnerabilities

Common Questions Why have I been hacked? How have I been hacked? Specifically Generally, how could this happen to me when I put all that money into firewalls and patching systems?

Agenda Examine different types of vulnerabilities from a hacker's standpoint Look at the future of hacking Look into the future of defensive measures

Quick note Some of the following slides are from a hacker's perspective We're not backing this up with academic papers and equations, consider it all opinion

Exploits vs Vulnerabilities An exploit is a working program that takes advantage of one or more vulnerabilities in order to break security boundaries A good exploit often costs a lot more to develop than the initial cost of discovering a vulnerability A vulnerability may be something as simple as a memory leak or DoS It's hard to say if a vulnerability is exploitable without an exploit GOBBLES and Apache

Working Exploits What does a hacker want to know about a given exploit? Reliability Will this work in the wild? Target set Do I even care if it does?

Exploit Reliability/Usage Logging Logging can be both too succinct to be useful, or two verbose Does the service restart vs. One-Shot Many Windows services are one-shot attacks, but Win32 threading models can make for very reliable one-shot attacks Failure modes Even very good exploits fail sometimes

Target Set Interesting boxes? SSHD vs SADMIND vs WUFTPD Default/common configuration? Multiple configurations? Increase in targeting complexity Is this an exploit I can easily scan for? fingerprinting

Survivability Exploits require large amounts of investment Scanning/fingerprinting is non-trivial QA on a complex piece of software is expensive How long is this vulnerability going to be valid? Turn windows of vulnerability upside down Multiple independent discoveries are more the rule than the exception

Easy vs. Hard Targets RealServer Where do I invest my time? dtlogin Realserver: Multi-shot target-less selffingerprinting stack overflow dtlogin: one shot heap corruption Compounded by question: What are your most important targets running?

Custom Exploitation The most covert exploit is one that is used only once Custom web application hacking Custom analysis of target's environment Example: Exploit for cam.exe with Entercept installed in the exact configuration you have for all your servers

Pre-recon, Modeling and Research Workflow Successful Entry 0days Exploits Penetration Attempts General Research

Pre-recon, Modeling and Research 0days Why not? Exploits Penetration Attempts Successful Entry General Research Known Vulns/Exploits

Why not to use known vulns/exploits A bad investment, even if it works May be detected by IDS, allowing target to track your methodology and toolkit toolkits are expensive ($100K->$1M) methodologies are more expensive a trained team: $1M->$10M Worse, if it doesn't work Each attack burns a bounce host Each attack alerts target they are under attack

One shot, one kill But we have to make all our bullets by hand Is it logistically possible to write an 0day for each target? What is the cost of using an exploit? Our toolkits and methodologies are even more expensive Can we afford complete duplication of effort?

Writing an 0day per target Costs network Between $10-100K per network for a given exploit Benefits Research can be version specific (cuts costs) No IDS catches you Getting caught does not blow other targets backwards operational security is as valuable as forwards

Windows of Vulnerability Arbaugh, et. al. in 2000 IEEE Computer paper http://www.cs.umd.edu/~waa/vulnerability.html (2002) Active Systems Management: The Evolution of Firewalls Accepted general model of security industry To defeat the industry, hackers have defeated this generic model

IEEE (Dec 2000) Arbaugh Fithen, McHugh Intuitive?

Hacking is not theoretical Hackers do not own every machine that has a given vulnerability that would be stupid Hackers own every important box that they do not already own Generic and specific automation is as old as exploits Admhack, etc. It is fair to say hackers have a generational lead on the industry

A closer curve Most interesting machines are owned shortly after discovery. Discovery rarely happens by researchers first. Patch information releases a lot of information about the vulnerability. Upon disclosure, real hacking stops. Hackers have access to a lot more Internet than the average public or a worm Most vulnerable machines are on intra-nets

Why doesn't my IDS report this? IDS becomes potentially effective here. Entire study is based on discovered intrusions! (vs. attempted intrusions?) Are we measuring detections, rather than intrusions?

Passwords Are still the best way to protect information systems great manageability interoperability, etc Are also the best way to hack into systems known_hosts password reuse is universal

Hacker Network Targets Nervous systems are the primary target Management networks Intrusion detection networks Software companies add to this: Security departments and QA systems Predicted: A small bounce when vulnerabilities are reported

Looking towards the future of Attack More automated frameworks, public and private 0day and more 0day Customized worms

Automated Attack Frameworks Public, high quality rootkits VMWare Reduced vulnerability disclosure

0day and more 0day As systems get more protected 0day becomes more valuable Survivability of even very popular 0day is measured in years, if not decades Sadmind VSC results Web application vulnerabilities are just the beginning

Customized Worms Custom worm generation languages AdvancedOrdnance Automated frameworks ARE worms (hydras) Worms are also useful for enterprises looking for distributed techniques Think of them as distributed computing writ large Write applications with worms as your platform

Looking towards the future of Defense The failure of patching Universal Configurations (automated patching) HIDS OS Protection

Patching is basically useless for security You must reinstall all vulnerable systems, reset all passwords for security This is an unattainable goal Patching quickly is extremely expensive manpower, resources mistakes are costly still not winning race

Universal Configurations Mono-cultures are a known evil Management software is typically weakly secured Computer Associates cam.exe, Naimas32,etc Custom exploits are best against universal configurations From custom exploits to custom worms

HIDS HIDS products receive little 3 rd party testing Phrack 62 describes some widely known techniques for bypassing common HIDS technology You need a HIDS that prevents attacks, not shellcode HIDS are too expensive, by far

Network Intrusion Prevention Systems NIPS has a very very hard problem Must model all types of systems and protocols Must correctly detect attacks while in stream to target Must know about all different variants on attacks This is all exponentially expensive stuff Good against worms

OS protection Windows XP SP2 Should be required Not perfect Immunity has generic techniques to bypass it, so assume hackers do as well IE is impossible to truly secure, ban it if possible Linux is much better (GRSecurity) Unix is much worse

Regulation No presentation is valid these days without a slide on Sarbanes-Oxley This is that slide

Conclusion Use GRSecurity or HIDS Don't rely on patching as a security measure Get third party reviews of critical custom software Your intrusion response team is only really tested by 0days Stop purchasing junk software and then blaming other people for your problems

Questions? Did we answer more than we asked?