2 root@labla/# whoami The OWASP Foundation Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior...

49

Transcript of 2 root@labla/# whoami The OWASP Foundation Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior...

Page 1: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.
Page 2: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

2

Page 3: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

root@labla/# whoami

Page 4: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

The OWASP Foundationhttp://www.owasp.org

Nahidul Kibria

Co-Leader, OWASP Bangladesh,Senior Software Engineer, KAZ

Software Ltd.  

Writing code for fun and food.And security enthusiastic

  Twitter:@nahidupa

Page 5: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

5

What is the event all about?

Computer security?

Information security?

Cyber Security?

Is it a game?

Are we going to learn hacking?

Page 6: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

6

Capture The Flag(CTF)

In computer security, Capture the Flag (CTF) is a computer security wargame. Each team is given a machine (or small network) to defend on an isolated network.--wikipedia

Page 7: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

7

Its not just a competition… more than it…

HOW?

Page 8: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

8

Page 9: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

9

Page 10: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

10

The domain is giant

Page 11: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

11

If you want to be a Penetration Tester

A penetration test, occasionally pentest, is a method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders with authorize by the owner of that system.

Page 12: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

12

Prerequisites

1. Good understanding network architecture.

2. How modern operating system work and system administration.

3. Application/Database/Service how they designed and work.

Page 13: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

13

Penetration testingPenetration testing methodology

• Information Gathering/Reconnaissance

• Scanning/Enumeration

• Vulnerability Identification

• Exploitation

• Report

Page 14: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

14

Tools and tactics

• Do not reinvent the wheel…Use existing tools

• But do not just depends on Tools/Scripts…In some case you have to write your own

Page 15: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

15

Books

Page 16: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

16

If you want to be a Malware Analyst

Page 17: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

17

Kick startBasic Static Analysis

Basic Dynamic Analysis

Page 18: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

18

Lab Setup

Page 19: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

19

Collect sampleHashing: A Fingerprint for Malware

Look like--373e7a863a1a345c60edb9e20ec3231

http://www.kernelmode.info/forum/viewtopic.php?f=16&t=308

Page 20: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

20

Sysinternals tools

Tcpview.exe Procexp.exe

Procmon.exe

Page 21: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

21

Reverse engineering ollydbg 

Immunity debugger

Ida Pro

Page 22: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

22

Books

Page 23: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

23

If you want to be a Vulnerability Researcher

Page 24: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

24

Common techniquesFuzzing

Code review

Disassemblers

Debuggers

Page 25: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

25

Page 26: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

26

Books

Page 27: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

27

If you want to be a Exploit Developer

Page 28: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

28

PrerequisitesProgramming

Assembly

Memory management

Windows/*nix internal

Kernel

Page 29: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

29

Books

Page 30: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

30

If you want to be a Forensic Analyst

Page 31: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

31

Books

Page 32: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

32

Coolest Jobs in Information Security

#1 Information Security Crime Investigator/Forensics Expert#2 System, Network, and/or Web Penetration Tester#3 Forensic Analyst#4 Incident Responder#5 Security Architect#6 Malware Analyst#7 Network Security Engineer#8 Security Analyst#9 Computer Crime Investigator#10 CISO/ISO or Director of Security#11 Application Penetration Tester#12 Security Operations Center Analyst#13 Prosecutor Specializing in Information Security Crime#14 Technical Director and Deputy CISO#15 Intrusion Analyst#16 Vulnerability Researcher/ Exploit Developer#17 Security Auditor#18 Security-savvy Software Developer#19 Security Maven in an Application Developer Organization#20 Disaster Recovery/Business Continuity Analyst/Manager

Page 33: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

33

But you have only one life

Page 34: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

34

Just become a learning machine

Page 35: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

35

Here comes communityCollaborative learning

Page 36: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

36

Page 37: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

About OWASPOWASP’s mission is “to make application security

visible, so that people and organizations can make informed decisions about true application”

Attacker not use black art to exploit your application

Page 38: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

OWASP Bangladesh• Bangladeshi community of Security professional

• Globally recognized

• Open for all

• Free for all

What do we have to offer?

• Monthly Meetings

• Mailing List

• Presentations & Groups

• Open Forums for Discussion

• Vendor Neutral Environments

Page 39: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

220 Chapters

39

Page 40: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

40

Our SuccessesOWASP Tools and

Documentation:

• ~15,000 downloads (per month)

• ~30,000 unique visitors (per month)

• ~2 million website hits (per month)

OWASP Chapters are blossoming worldwide

• 1500+ OWASP Members in active chapters worldwide

• 20,000+ participants

OWASP AppSec Conferences:

• Chicago, New York, London, Washington D.C, Brazil, China, Germany, more…

Distributed content portal

• 100+ authors for tools, projects, and chapters

OWASP and its materials are used, recommended and referenced by many government, standards and industry organizations.

Page 41: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

Conferences

41

Page 42: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

Download Get OWASP Books

Page 43: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

Ok enough ! Can you please tell me what I need to do

today?

Page 44: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

WE DO NOT HAVE ANY PREPARATION

Page 45: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

45

Questions.1. A question from cryptography.  (300

points)

2. A question from malware analysis. (not that much hardcore as it sound) (150 points) 

3. A forensic analysis ( The easiest question of the contest) (50 points)

Page 46: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

46

Final Questions.

1. A server named GetRoot_v00t  will be given. (500 points)

2. Another server named GetRoot_Drag0n will be given. (1000 points)

Both server is taken down from live, because it is suspected as compromised by attacker and the attacker changed its root password. So your job is to recover the root access of those server as well as create a report of what venerability those server has to the judges.

Page 47: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

47

Rules• You must run the given Virtual machine only in NATed mode.

• Take Screenshots in each success steps include them to a document.

• You can ask judge for clue to solve a problem with sacrificing some point(s). It's will be totally depending on judge how much point he will deduct for the clue before he give the clue he will tell you how much point will be deducted. This rule because this type contest is new will not be available in future.

•  You are suppose to work with given machine(vmware), Any type of activity that might be destructive for lab setup or host machine or any type of  destructive activity using lab internet is strictly forbidden. If any team do such activity, the team  cannot continue the contest anymore also IUT will take legal action about such activity.

• You should stay around your work station until it not require to move.

Page 48: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

48

We select the winner according the following criteria (We will do partial marking.)

1.How many points the participants has (scoring).

2.How complete the solutions are (quality).

3. Creativity, Geek Factor.

Page 49: 2 root@labla/# whoami The OWASP Foundation  Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.

49

Not End! Open question hands on