The Security Gap. Philip Young aka Soldier of Fortran @mainframed767



Similar documents
Mark Wilson Session Details: The Introduction

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Walkthrough

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Vulnerability Assessment and Penetration Testing

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Author: Sumedt Jitpukdebodin. Organization: ACIS i-secure. ID: My Blog:

Information Security Services

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Penetration testing. A step beyond missing patches and weak passwords

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

A Decision Maker s Guide to Securing an IT Infrastructure

Penetration Testing with Kali Linux

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

PENETRATION TESTING GUIDE. 1

How To Test For Security On A Network Without Being Hacked

PCI-DSS Penetration Testing

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Client logo placeholder XXX REPORT. Page 1 of 37

CYBERTRON NETWORK SOLUTIONS

Understanding Security Testing

Passing PCI Compliance How to Address the Application Security Mandates

Patch and Vulnerability Management Program

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Penetration: from Application down to OS

Seven Things To Consider When Evaluating Privileged Account Security Solutions

HackMiami Web Application Scanner 2013 PwnOff

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. (312) KRI

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Network Security Audit. Vulnerability Assessment (VA)

Penetration Testing Workshop

Learn Ethical Hacking, Become a Pentester

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Penetration Testing in Romania

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

How Reflection Software Facilitates PCI DSS Compliance

Goal Oriented Pentesting Getting the most value out of Penetration Testing

Top Ten Security Vulnerabilities in z/os Security

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Hack Your SQL Server Database Before the Hackers Do

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

THE TOP 4 CONTROLS.

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Secret Server Qualys Integration Guide

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Hands-on Hacking Unlimited

SCP - Strategic Infrastructure Security

PCI Security Scan Procedures. Version 1.0 December 2004

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Topics in Network Security

GFI White Paper PCI-DSS compliance and GFI Software products

A Penetration Testing Maturity and Scoring Model

Introduction to Penetration Testing Graham Weston

Penetration Testing Services. Demonstrate Real-World Risk

PCI Compliance for Healthcare

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

Web Application Security

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

(WAPT) Web Application Penetration Testing

Enterprise-Grade Security from the Cloud

System Management. Leif Nixon. a security perspective 1/37

Web application security: automated scanning versus manual penetration testing.

Penetration Testing - a way for improving our cyber security

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Andreas Dittrich, Philipp Reinecke Testing of Network and System Security. example.

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

How We're Getting Creamed

Divide and Conquer Real World Distributed Port Scanning

Transcription:

The Security Gap Philip Young aka Soldier of Fortran @mainframed767

DISCLAIMER All research was done under personal time. I am not here in the name of, or on behalf of, my employer. Any views expressed in this talk are my own and not those of my employer. This talk discusses work performed in my spare using personal equipment and resources. 2/27/15 3

My Story Started a LONG time ago Ok, not THAT long ago 2/27/15 4

2/27/15 5

2/27/15 6

2/27/15 7

2/27/15 8

Let s fast forward Joined Ernst & Young in 2005 Young bright eyed Naïve Bounced around consulting firms for a bit Joined Visa in 2009 2009-2013: Internal Audit 2013-2014: Information Security Currently: Large Financial Institution Joined Cyber Security Red Team 2/27/15 9

@ Visa Tasked on multiple mainframe reviews Started doing personal research Thought to myself: I can t be the only one thinking like this, maybe other people would be interested 2/27/15 10

Speaking Out 2/27/15 11

Internet Mainframes Project Early 2014 scanned entire internet Thanks to help from friends Supplemented with tools like Shodan/GoogleFu Found 332 MFScreen.py: Python script Connected to mainframe over TOR Takes a screenshot Some personal favorites: 2/27/15 12

Pensys1.army.pentagon.mil

ICS.ISUZUNET.com 2/27/15 14

2/27/15 15

2/27/15 16

Interesting Factoid Only about half use SSL https://infogr.am/unencrypted_mainframes 2/27/15 17

Current Landscape 2/27/15 18

Current Testing Vulnerability Scanning Using automated tools to scan a machine for known weaknesses Usually detects lack of patches or configuration issues Penetration Testing Black Box: No information known White Box: Attacker has system information Purpose: Identify potential security weaknesses 2/27/15 19

Penetration Testing Rarely performed on mainframes or mainframe applications Lack of skillsets and information Lack of demand from enterprise Concern for system outtages and downtime Mainframe organization political power 2/27/15 20

Vulnerability Scanning You re being force to do it Standard processes being forced to fit Example: Qualys Standard vulnerability scanning tool Used all over the world Supports both authenticated and unauthenticated scans Completely useless outside of common issues 2/27/15 21

Why? Qualys doesn t support z/os IBM (and Vendors) don t publicly release security vulnerabilities Resulting in: Compliance scans only catching small issues E.G. Older version of apache False sense of security Appeasing PCI gods 2/27/15 22

The Community Really hard to break in to Pay to participate model Closed off and silo d Compare to open source community: 2/27/15 23

Opensource Community 2/27/15 24

Opensource Community 2/27/15 25

z/os Community 2/27/15 26

Opensource Community 2/27/15 27

Vendor Trust A lot of trust is placed on operating system and software vendors (when it comes to security) Example: CENSORED CENSORED 2/27/15 28

The Hackers are Coming 2/27/15 29

When I started - 2012 Prior to 2012: Some forum posts No public discussion No tools support Complete misunderstanding Trouble for asking simple question! 2/27/15 30

2012 It s starting Gave first public talk Asked simple question on offline cracking tool mailing list John the Ripper With significant help from Nigel Pentland and Dhiru Kolia added support for RACF Started Mainframe Security Blog: mainframed767.tumblr.com Not a single email 2/27/15 31

2013 & 2014 Years of Talks Gave 10 talks in 2013/2014 8 in US 1 in Sweden 1 in Hungary Created new tools, or added support for mainframe applications Man in the Middle TSO connections Enumerate user IDs OMVS Privilege Escalation Netcat + ebcdic 2/27/15 32

Interest in the Community 2/27/15 33

CENSORED 2/27/15 34

Then There Were Two Dominic White Gave a talk at Hack in the Box and DerbyCon in 2014 Discussed vulnerabilities at TN3270 level Developed two applications: Big Iron Reconnaissance and Pwnage Mainframe Brute Talk available online: https://www.youtube.com/watch?v=3hfiv7nvwrm 2/27/15 35

User Enumeration 2/27/15 36

REXX SetUID Exploit 2/27/15 37

BIRP 2/27/15 38

MitM TSO Credential Stealing 2/27/15 39

MainTP FTP + JCL + REXX + C = 2/27/15 40

Logica and Nordea Breach 2/27/15 41

Breached! 2/27/15 42

2012 Anakata: Created PirateBay Was sued by Swedish RIAA Fled to Cambodia Cambodian Hackers Break in to neighbors wifi Target Swedish RIAA lawyer steal her credentials for a Swedish government application Anakata discovers this application runs on z/os 2/27/15 43

Next Steps Installs Hercules Hercules is a zseries CPU emulator Allows you to run z/os on commodity hardware Check out Tur(n)key MVS for public domain OS Also runs z/os Obtains z/os R1V9 Develops two zero day attacks, multiple backdoors, code, etc 2/27/15 44

Zero Days CVE-2012-5951 Local Privilege Escalation Uses REXX and spawn function Exploits SetUID files to get UID 0 in OMVS Script: kuku.rx CVE-2012-5955 CGI-BIN parser flaw* Passing ; to parser allowed command execution Script: UTCam.sh All scripts available at: https://github.com/mainframed/logica * This is just a guess. IBM doesn t share details 2/27/15 45

Backdoors 8 C programs to execute a root shell were uploaded: asd, be, err, d044, qwe, daf1367, daf1473 and e90opc, a.env a.env was reworked and eventually became CSQXDISP A program calling home on port 443 A custom interpreter phoning home INETD was changed (root shell on port 443) SSH keys added Custom assembly to disable RACF (Tfy.source.backdoor) All scripts available at: https://github.com/mainframed/logica 2/27/15 46

I m in Trouble That s me! 2/27/15 47

More Information Read the detailed investigation Most of it is in Swedish Read the (few) news articles Buy me a beer OR Come see my hour long talk just about the breach! 2/27/15 48

Embrace the Community 2/27/15 49

Nothing to be Afraid Of Hacker isn t a bad word Not all Hackers are Bad not all 14,000 people at DEFCON are evil, just some It s already started You invited me here! Demand in the hacker community Change their opinion of you 2/27/15 50

Where to Start? It starts with you Invite the Hackers in No, not really, just your internal security people Show them the ways Be patient Answer questions Learn from them! 2/27/15 51

Work With Us, Not Against Mainframes aren t going anywhere Neither is security Want to make them as secure as possible View security as a partner Security experts will eventually poke around, either by audit mandate Executive Management concerns Red Team exercises Might as well be at the table 2/27/15 52

The Future Capture the Flag Events Contests with vulnerable systems Pwn 2 Own participation Application compete to prove they can t be hacked CDCC Participation Next generation of system administrators compete to keep hackers out Open sharing of known vulnerabilities Better integration with tools and general openess of the platform 2/27/15 53