Qualys Vulnerabilities, Statistics and… Malware ?

Slides:



Advertisements
Similar presentations
InterScan AppletTrap Zhang Hong Trend Micro, AppletTrap Team (Nanjing)
Advertisements

Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Stonesoft Roadmap WHAT FEATURES WILL COME IN
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Web browsers It’s a software application for retrieving and presenting information on WWW. An information resource is identified by a Uniform Resource.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
The Most Analytical and Comprehensive Defense Network in a Box.
The Free IT Management App & Community. What Do I Have? How Do I Keep Track of Everything? Is Everything Working? How Do I Fix IT? IT Admin What IT Pros.
Lesson 4: Web Browsing.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
WORKDAY TECHNOLOGY Stan Swete CTO - Workday 1.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Spiceworks Overview Enterprise Business Group Jul-2015.
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Automated Malware Analysis
Security Scanning OWASP Education Nishi Kumar Computer based training
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
The Most Analytical and Comprehensive Defense Network in a Box.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Nynox.com Nynox Help Desk Affordable Help Desk Solution.
A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13.
The Microsoft Baseline Security Analyzer A practical look….
Proof-Of-Concept: Signature Based Malware Detection for Websites and Domain Administrators - Anant Kochhar.
Zscaler New Interface and Reporting From Saturday 8 th June 2013.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
SIGITE 2008: Oct Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Integrating and Troubleshooting Citrix Access Gateway.
Bill Jensen Bashar Kachachi Session Code: SIA309.
Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu – Google First Workshop on Hot Topics in Understanding Botnets (HotBots.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Web Content Security Unlock the Power of the Web
BUILD SECURE PRODUCTS AND SERVICES
    Customer Profile: If you have tech savvy customers, having your site secured for mobile users is recommended. Business Needs: With the growing number.
Critical Security Controls
Barracuda Web Filtering Service
Real-time protection for web sites and web apps against ATTACKS
Lesson 4: Web Browsing.
Secure Software Confidentiality Integrity Data Security Authentication
W3 Status Analyzer.
Software Applications for end-users
HTML Level II (CyberAdvantage)
How To Fix AOL Desktop Update Error AOL Helpline Number
Internet Basics.
Healthcare Cloud Security Stack for Microsoft Azure
ISMS Information Security Management System
الفصل الثالث عشر الانترنت والاتصالات
Secure once, run anywhere Simplify your security with Sophos
Watchdog Anti malware is reliable application and a multi engine scanner, which can detect various malicious files, worms, malware and other online threats.
Healthcare Cloud Security Stack for Microsoft Azure
Lesson 4: Web Browsing.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Increase and Improve your PC management with Windows Intune
Presentation transcript:

Qualys Vulnerabilities, Statistics and… Malware ? Wolfgang Kandek CTO Qualys, Inc. http://null.co.in/ http://nullcon.net/ http://nullcon.net/

Qualys Basics Founded to automate Vulnerability Assessments Software as a Service (SaaS) with: Internet based shared scanners Scanner Appliances for internal scanning Webportal for data access http://nullcon.net/ http://null.co.in/

VIP 2-factor or Client certificate strong authentication options http://nullcon.net/ http://null.co.in/

VIP 2-factor or Client certificate strong authentication options http://nullcon.net/ http://null.co.in/

Qualys Basics Founded to automate Vulnerability Assessments Software as a Service (SaaS) with: Internet based shared scanners Scanner Appliances for internal scanning Webportal for data access 270 employees (140 in Engineering) 5000+ customers http://nullcon.net/ http://null.co.in/

http://nullcon.net/ http://null.co.in/

IDC 2011 Report http://nullcon.net/ http://null.co.in/

Frost & Sullivan 2010 Report Frost & Sullivan: Vulnerability Management Market Leadership Report - Nov 2010 http://nullcon.net/ http://null.co.in/

Laws of Vulnerabilities 2004 - 3M IPs scanned, 2M vulnerabilities Half-life – 30 days Prevalence – 50 % renewal annually Persistence – unlimited for some Exploitation – 80 % available with 60 days 2009 - 80M IPs scanned, 680M vulnerabilities, 72M+ vulnerabilities of critical severity http://nullcon.net/ http://null.co.in/

Laws of Vulnerabilities Half-Life = 29.5 days http://nullcon.net/ http://null.co.in/

Laws of Vulnerabilities 2004 - 3M IPs scanned, 2M vulnerabilities Half-life – 30 days Prevalence – 50 % renewal annually Persistence – unlimited for some Exploitation – 80 % available with 60 days 2009 - 80M IPs scanned, 680M vulnerabilities, 72M+ vulnerabilities of critical severity Difference by OS and Application http://nullcon.net/ http://null.co.in/

Laws of Vulnerabilities 12 http://nullcon.net/ http://null.co.in/

Laws of Vulnerabilities 13 http://nullcon.net/ http://null.co.in/

New Services Policy Compliance Web Application Scanning Configuration checks Password length, installed SW, access rights 20 technologies, 2000 controls Web Application Scanning Web Application Catalog Batch oriented production scanning http://nullcon.net/ http://null.co.in/

New Research Activities Blind Elephant – Web Application Fingerprinter Neptune – Malware Detection Scanner Browsercheck – Light-weight, end-user VA IronBee – Web Application Firewall SSL Labs – World-wide SSL usage statistics Dissect – Malware Exchange/Analysis Portal HoneyNet Research Portal http://nullcon.net/ http://null.co.in/

Blind Elephant Web App Fingerprinter Fingerprint common web applications by analyzing source code Blogs, Forums, Wikis, etc http://nullcon.net/ http://null.co.in/

Blind Elephant Web App Fingerprinter http://nullcon.net/ http://null.co.in/

Blind Elephant Web App Fingerprinter http://nullcon.net/ http://null.co.in/

Blind Elephant Web App Fingerprinter Fingerprint common web applications by analyzing source code Blogs, Forums, Wikis, etc Goals: accuracy, speed, low resource usage Results http://nullcon.net/ http://null.co.in/

Blind Elephant Web App Fingerprinter 1 Million “.com” domains http://nullcon.net/ http://null.co.in/

Blind Elephant Web App Fingerprinter http://nullcon.net/ http://null.co.in/

Blind Elephant Web App Fingerprinter http://nullcon.net/ http://null.co.in/

Blind Elephant Web App Fingerprinter Fingerprint common web applications by analyzing source code Blogs, Forums, Wikis, etc Goals: accuracy, speed, low resource usage Results Available at: blindelephant.sourceforge.net http://nullcon.net/ http://null.co.in/

New Research Activities Blind Elephant – Web Application Fingerprinter Neptune – Malware Detection System http://nullcon.net/ http://null.co.in/

Neptune Malware Detection System Visit/crawl web site with: Virtualized Machine Vulnerable, but instrumented OS Vulnerable, but instrumented Browser Configuration VMware Internet Explorer 6 on Windows XP Detours + Custom Hooks Log everything Detect malicious intent early, avoid infection http://nullcon.net/ http://null.co.in/

Neptune Malware Detection System Static Detection Analyze inputs for known exploit patterns, signature based Pro: efficient and fast, signatures easily updated and shared Con: false positives, defeated by obfuscation, known threats only Behavioral Detection Monitor the browser process, check for anomalous activity Pro: false positives low, immune to obfuscation and detect new threats Con: success required, false negatives, expensive Reputation and AV checks (pluggable: Google, Trend) http://nullcon.net/ http://null.co.in/

Neptune Malware Detection System UI version Focus on end-user, website owner Daily scheduled scans, alerts http://nullcon.net/ http://null.co.in/

Neptune Malware Detection System UI version Focus on end-user, website owner Daily scheduled scans, alerts http://null.co.in/ http://nullcon.net/

Neptune Malware Detection System UI version Focus on end-user, website owner Daily scheduled scans, alerts API version Focus on bulk user, integration, research Single URLs, Maps, or site with crawling http://nullcon.net/ http://null.co.in/

Neptune Malware Detection System UI version Focus on end-user, website owner Daily scheduled scans, alerts API version Focus on bulk user, integration, research Single URLs, Maps, or site with crawling Available: qualys.com/stopmalware Contact: pthomas@qualys.com for API access http://nullcon.net/ http://null.co.in/

New Research Activities Blind Elephant – Web Application Fingerprinter Neptune – Malware Detection Scanner Browsercheck – Light-weight, end-user VA http://nullcon.net/ http://null.co.in/

BrowserCheck https://browsercheck.qualys.com Security check for Browsers and Plug-ins End user focus, free and easy to use http://nullcon.net/ http://null.co.in/

BrowserCheck http://nullcon.net/ http://null.co.in/

BrowserCheck https://browsercheck.qualys.com Security check for Browsers and Plug-ins End user focus, free and easy to use 200,000 visits – Jul 2010 / Jan 2011 IE, Firefox, Safari, Chrome, Opera Windows, Mac OS X and Linux http://nullcon.net/ http://null.co.in/

BrowserCheck http://nullcon.net/ http://null.co.in/

BrowserCheck Stats http://nullcon.net/ http://null.co.in/

BrowserCheck Stats http://nullcon.net/ http://null.co.in/

BrowserCheck Stats http://nullcon.net/ http://null.co.in/

BrowserCheck Stats http://nullcon.net/ http://null.co.in/

BrowserCheck Stats http://nullcon.net/ http://null.co.in/

BrowserCheck Stats Operating System: Browser: Plug-in: ? Country: Windows XP – 47 % Windows 7 – 32 % Browser: IE 8 – 36 % Firefox 3.6 – 34 % Plug-in: ? Country: http://nullcon.net/ http://null.co.in/

BrowserCheck Stats http://nullcon.net/ http://null.co.in/

BrowserCheck Stats http://nullcon.net/ http://null.co.in/

New Research Activities Blind Elephant – Web Application Fingerprinter Neptune – Malware Detection Scanner Browsercheck – Light-weight, end-user VA IronBee – Web Application Firewall http://nullcon.net/ http://null.co.in/

Ironbee – Web App Firewall Open source effort led by Ivan Ristic Author of mod_security WAF technology renewed Focus on accuracy and usability WAS and MDS (neptune) integration Available at: www.ironbee.com SSL Labs – SSL usage statistics V2 is coming http://ssllabs.com http://nullcon.net/ http://null.co.in/

New Research Activities Blind Elephant – Web Application Fingerprinter Neptune – Malware Detection Scanner Browsercheck – Light-weight, end-user VA IronBee – Web Application Firewall SSL Labs – World-wide SSL usage statistics Dissect – Malware Exchange/Analysis Portal http://nullcon.net/ http://null.co.in/

Dissect – Malware portal Led by Rodrigo Branco - www.kernelhacking.com Team in Brazil, Malware and Vulnerability Research Malware exchange system up and running Malware analysis in alpha Static analysis Runtime analysis on virtual and real machines Integration with Neptune MDS coming in Community oriented effort Contact: rbranco@qualys.com http://nullcon.net/ http://null.co.in/

New Research Activities Blind Elephant – Web Application Fingerprinter Neptune – Malware Detection Scanner Browsercheck – Light-weight, end-user VA IronBee – Web Application Firewall SSL Labs – World-wide SSL usage statistics Dissect – Malware Exchange/Analysis Portal HoneyNet Research Portal http://nullcon.net/ http://null.co.in/

Honeynet Nemean Networks acquisition University of Wisconsin research team Paul Barford - http://pages.cs.wisc.edu/~pb/publications.html Honeynet/Signature/IDS system Global Honeynet Effort Centralized Signature generation – open-source Snort/Suricata plug-ins – open-source http://null.co.in/ http://nullcon.net/

Contacts Wolfgang Kandek – wkandek@qualys.com Amit Deshmukh – adeshmukh@qualys.com http://nullcon.net/ http://null.co.in/