Download presentation
Presentation is loading. Please wait.
1
Exploits and Zero-Days Exploits
Richard Gariboldi, Patrick Jette, Jay Jackson
2
Definitions Vulnerability: A flaw in a computer system that can allow an attacker to compromise that system. Exploit: An attack that takes advantage of a security vulnerability. Zero-Day Vulnerability: An unknown and unpatched vulnerability. Zero-Day Exploit: An exploit to an previously unknown vulnerability. We have not found all vulnerabilities Zero-day exploits are different from zero-day vulnerabilities. a zero-day vulnerability can have multiple exploits
3
What is a Zero-day? Anatomy of a zero day .
4
Dark web & zero-days TheRealDeal Market
Apple iCloud accounts exploit cost $17,000 in bitcoin. Another to hack WordPress’ multisite configuration . Offers multisignature transactions Bitcoins are managed by the buyer, seller, and market admins for buyer and seller protection. Bitcoins are not held by the market itself. We don’t know for sure if these exploits actually work and there is no legal way to test them. Internet explorer exploit
5
NSA Zero-days “Shadow Brokers” days/
6
Types of exploits Latest exploit news! Remote Code Execution
Privilege Escalation Denial of Service Web Application SQL Injection XSS Buffer Overflow Etc. Latest exploit news! Known & Unknown OWASP – Open Web application security project: organization that provides unbiased and practical, cost-effective information about computer and Internet applications. The exploit DB Fireeye zero day news Mitre
7
Statistics db.com/exploit-database- statistics/ “I see you have a Masters in music composition, you're hired!”
8
Vulnerability Protection Measures
Update your systems regularly Implement vulnerability scans into your patch management cycle Know your systems: Frequently update network and configuration maps NIDS/IPS Perform regular security audits (to include Pen. Testing) SANs 0-day whitepaper Patch management only goes so far. Patches are not always made. Some patches may be faulty and break other parts of the system. Some vulnerabilities cannot be fixed by patching -Patch management will not correct vulnerabilities caused by misconfiguration, such as default settings that allow access to systems that should be restricted. Hackers can reverse engineer patches and create a new exploit Cybersecurity experts at Arizona state created a cyberthreat intelligence-gathering operation that uses machine learning to study hacking forums and marketplaces in the dark web and deep net.
9
Bugcrowd Large community of white hat hackers
All searching for vulnerabilities Submit vulnerabilities for review and compensation Beneficial to enterprises with lack of resources Increase the chance to find zero-day exploits. Who uses bugcrowd: Netgear, Western Union, OWASP, etc.
10
Reporting Department of Justice Framework for Vulnerability Discloser
Cert Disclosure Policies:
11
https://nvd.nist.gov/vuln/detail/CVE-2017-5638
Examples Internet Explorer BlueBorne Microsoft SMB WinXP Apache Struts
12
Metasploit Tutorial
13
Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.