Special Anatomy of an Attack Or Layered Security Failure.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Ethics, Privacy and Information Security
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Slide 1 Vitaly Shmatikov CS 378 Attacks on Authentication.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Survey results: why this stuff matters Case study: Mat Honan hacking case Social Networking safety Examples Tech demo.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Cryptography and Network Security Chapter 20 Intruders
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Electronic Transaction Security (E-Commerce)
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Lecture 11 Reliability and Security in IT infrastructure.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Incident Response Updated 03/20/2015
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Security Testing Case Study 360logica Software Testing Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Architecture Planning and designing a successful system Use tried and tested techniques Easy to maintain Robust and long lasting.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.
The Security Circus.
We will cover in this lecture A first look at issues related to Security Maintenance Scalability Simple Three Tier Architecture Module Road Map Assignment.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Advanced Strategies Supplemental Training Disclaimer No Guarantee That These Strategies Will Work For You Since we do not know your personal capabilities.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Computer Security By Duncan Hall.
Module: Software Engineering of Web Applications Chapter 3 (Cont.): user-input-validation testing of web applications 1.
The Security Circus MPICT Summer Conference, June, 2011.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
SSH/SSL Attacks not on tests, just for fun. SSH/SSL Should Be Secure Cryptographic operations are secure SSL uses certificates to authenticate servers.
FERPA & Data Security:FERPA & Data Security: Passwords and Authenticators.
Stuff to memorise… "A method tells an object to perform an action. A property allows us to read or change the settings of the object."
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Stuff to memorise… "A method tells an object to perform an action. A property allows us to read or change the settings of the object."
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Module: Software Engineering of Web Applications
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Recommending a Security Strategy
Forensics Week 11.
Robert Leonard Information Security Manager Hamilton
First-time Login to Business Banking:
Unit 1.6 Systems security Lesson 2
Introduction to Computers
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Lecture 2 - SQL Injection
Gmail Password Recovery
Presentation transcript:

Special Anatomy of an Attack Or Layered Security Failure

Some Background In case you missed the news in the in 2011 –Anonymous, an decentralized online community acting anonymously in a coordinated manner –Orchestrated Operation Payback, Operation Avenge Assange, and many others

Background Wikileaks support by creating Distributed Denial of Service attack: –Amazon, –PayPal, –MasterCard, –Visa –and the Swiss bank PostFinance

HBGary Federal Security firm had been researching the group Anonymous Thought they had identified many of the responsible people in Anonymous On Feb 5-6, 2011, CEO of HBGary Federal, Aaron Barr announces they have this info, but would not hand over to police. Goal: to reveal findings at a conference

Timeline of Activity Aaron Barr had his work written about in Financial Times on Feb 4. Strange network traffic was pounding HBGary Federal Was finishing presentation slides and since the story was in print, confronted who Barr believed to be “CommanderX” on Facebook. Without using an alias.

Motives For Confronting Mitigate the current attack on his company Try to portray himself as equal to Anonymous –Not at all wise to do to a group like Anonymous

Anonymous Reaction Predictable: –Attack. –Expose as much as possible When Barr went into an IRC to try to continue “reasoning” attacks escalated.

Damage Web site defaced. Some 68,000 s were stolen from HBGary Federal and posted to BitTorrent. Compromised Barr’s Twitter account Deleted over 1TB of backups Claimed to remote wipe Barr’s iPad

Attack avenues SQL Vulnerability on website –Used a 3 rd party custom CMS (content management system) –CMS had multiple vulnerabilities Social engineering to gather key data Reused passwords!!!!

CMS issues Using a 3 rd party, custom CMS, you don’t get other users reviewing the code, like open source would have. Contained a SQL-injection vulnerability –Detectable by scanning software.

URL Used eNav=2&page=27 The values of either 2 or 27 were not handled by the CMS correctly Allowed retrieval of data from the database Specifically: the user database from the CMS in order to glean userid/passwords

User Database Contained hashed passwords –Unsalted MD5 –Susceptible to Rainbow table attacks - provided they are not long, complex passwords They were not 2 passwords with high access were weak: 6 lower case chars and 2 numbers

Compound the Problem These two passwords were re-used all over. – –Twitter –LinkdIn –SSH accounts on a Linux Support system

One SSH Password Unfortunately, (for the attacker) the SSH account/password did not have elevated privileges on the Linux support system they found. However, it had an privilege escalation vulnerability that should have been patched months previously Full access now was available to Anonymous – and they purged data!

Barr’s Account/Password Even more valuable –Company used Google Apps/GMail –Barr’s account on Google was also the Administrator for the entire Google Apps/GMail. –Including resetting passwords on other Gmail accounts.

Reset Password Access to Greg Hoglund’s mail (HBGary employee and operator of rootkit.com site for analyzing rootkits). Found the root password to rootkit.com –Unfortunately, you have use a non-root account to SSH, which they didn’t have (direct ssh to root is prohibited on most Linux systems now)

Social Engineering ed a security person pretending to be Greg to allow firewall access and reset a password to gain access. Tricked the security person into giving the local account name with a new password. Access now theirs to rootkit.com speaks-the-inside-story-of-the-hbgary-hack.ars/3http://arstechnica.com/tech-policy/news/2011/02/anonymous- speaks-the-inside-story-of-the-hbgary-hack.ars/3

Next Steps Logged in as local account on rootkit.com Switched to root Copied the user database, password hashes, accounts of all registered users of rootkit.com Defaced the web site.

Rootkit.com Hashes Unsalted MD5 hashes, once again. One rainbow table search later, more accounts to use. No information available as to whether any of this data has been used…or exposed

In Summary Vulnerable CMS/SQL injection –Didn’t follow security best practices for security review of CMS software. –Didn’t scan the software for vulnerabilities before going to production Use of open source would have been better, but not guaranteed. Picking a reputable/proven firm: best

Passwords Complexity lacking. –Need to use strong passphrases Reuse –Need to use DIFFERENT passphrases for different accounts Servers allow basic password authentication –Use of private key for SSH

Systems Not Patched Even if it is a local account privilege elevation: PATCH! As a security firm, this is just inexcusable.

Social Engineering Yes, someone is asking to reset password via . It happens. The security person should have had some checks to do: –Verify. Call him back on his established phone number –If that’s not available, have the person prove identity other ways –Not done. Simply accepted the as the verification

Social Engineering (cont.) –Use of Personal Certificates on –Send back only encrypted mail Would have forced attacker to try and find the certificate –Many other ideas exist here…

Security Experts Didn’t follow basic security best practices.

References policy/news/2011/02/anonymous- speaks-the-inside-story-of-the-hbgary- hack.arshttp://arstechnica.com/tech- policy/news/2011/02/anonymous- speaks-the-inside-story-of-the-hbgary- hack.ars undhttp://en.wikipedia.org/wiki/Greg_Hogl und And various other links off of these main pages