HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional...

55
ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | [email protected]

Transcript of HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional...

Page 1: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

H A C K E R S & A T T A C K A N A T O M Y

Geoff Gentry, Regional Director | [email protected]

Page 2: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

Why is this important?

ISE Proprietary

Page 3: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

Attacks

III. Security vs. Functionality

ISE Proprietary

I. Assets vs. Perimeters

About ISE

II. Black Box vs. White Box V. Ongoing vs. Periodic

IV. Build In vs. Bolt On

Page 4: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 5: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 6: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 7: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

About ISE

ISE Proprietary

Analysts

• Fortune 500 Enterprises Customers

• White box

Perspective

• Computer Scientists; Ethical Hackers Research

• Recent: Browsers; Routers; Hospital

Page 8: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 9: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 10: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

I. Secure Assets, Not Just Perimeters

ISE Proprietary

Page 11: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

I. Secure Assets, Not Just Perimeters

Traditional Attacks Traditional Defenses

11

ISE Proprietary

Page 12: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

I. Secure Assets, Not Just Perimeters

12

ISE Proprietary

Page 13: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

I. Secure Assets, Not Just Perimeters

13

ISE Proprietary

Page 14: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 15: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

II. Black Box Penetration Tests == Good

ISE Proprietary

Page 16: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

II. Black Box Penetration Tests == Good

ISE Proprietary

White box vulnerability assessment == GOOD!

Page 17: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

II. Black Box vs. White Box

ISE Proprietary

• Access Level

• Black Box

• White Box

• Evaluation Types

• Penetration Test

• Vulnerability Assessment

Page 18: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

II. Black Box vs. White Box

ISE Proprietary

Black Box Perspective

Page 19: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

II. Black Box vs. White Box

ISE Proprietary

White Box Perspective

Page 20: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

II. Black Box vs. White Box

ISE Proprietary

Page 21: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

II. Black Box vs. White Box

ISE Proprietary

Black Box

2 mo. / 200 hrs.

4 potential issues

1 confirmed

none

no recommendations

very low

200+ hrs.

White Box

2 mo. / 200 hrs.

11 confirmed

10 confirmed

21+ mitigation strategies

high

~9 hrs.

~9 hrs.

Time/cost

Severe issues

Other issues

Results

Completeness/Confidence

Cost/issue

Cost/solution

8

Page 22: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 23: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

SOHO Routers: Outcomes

ISE Proprietary

Goals Results 10 13 Any Remote, Local, Both >30% 100% Broken

Models Attacks

Compromise

Page 24: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 25: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 26: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 27: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

III. Security vs. Functionality

ISE Proprietary

Page 28: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

III. Security vs. Functionality

ISE Proprietary

EMBARRISNGLY OVERSIMPLIFIED CORPORATE STRUCTURE

SALES IT HR ...

IT FUNCTIONALITY IT SECURITY

Page 29: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

III. Security vs. Functionality

ISE Proprietary

EMBARRISINGLY OVERSIMPLIFIED CORPORATE STRUCTURE

SALES IT HR SECURITY

IT FUNCTIONALITY IT SECURITY

Page 30: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

III. Security vs. Functionality

ISE Proprietary

CONFLICT IS GOOD!

Page 31: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

III. Security vs. Functionality

ISE Proprietary

Page 32: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

I. Security Separated From Functionality

ISE Confidential - not for distribution

Page 33: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

I. Security Separated From Functionality

ISE Confidential - not for distribution

Page 34: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

I. Security Separated From Functionality

ISE Confidential - not for distribution

Page 35: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 36: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 37: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Confidential - not for distribution

Page 38: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Confidential - not for distribution

Page 39: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

IV. “Build It In,” Not “Bolt It On”

ISE Proprietary

Page 40: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

IV. “Build It In,” Not “Bolt It On”

ISE Proprietary

Page 41: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

IV. “Build It In,” Not “Bolt It On”

ISE Proprietary

REQUIREMENTS

DESIGN

IMPLEMENTATION

TESTING

DEPLOYMENT

MAINTENANCE

Determine business & user needs

Define architecture

Coding

System testing

Customer roll-out

Resolve bugs

Develop threat model

Design defense in depth

Audit code

White box vulnerability assessment

Configuration Guidance

Iteration Hardening

Page 42: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

IV. “Build It In,” Not “Bolt It On”

ISE Proprietary

Built In

90%

- - -

1x

Bolted On

100%

- - -

25x : application

300x : infrastructure

Assessment cost

Assessment overhead

Mitigation cost / issue

Page 43: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Proprietary

Page 44: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Confidential - not for distribution

Page 45: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

V. Security as Ongoing Process

ISE Proprietary

Page 46: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

V. Security as Ongoing Process

ISE Proprietary

Page 47: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

V. Security as Ongoing Process

ISE Proprietary

Page 48: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

V. Security as Ongoing Process

ISE Proprietary

Page 49: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

V. Security as Ongoing Process

ISE Proprietary

Yearly

X

90-95%

1

X (0.9)

Quarterly

X

20-30%

4

X (0.8)

Initial assessment cost

Full scope reassessment cost

Full assessments / year

Cost / year

Bi-yearly

X

35-45%

2

X (0.7)

Page 50: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Confidential - not for distribution

Page 51: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Confidential - not for distribution

Page 52: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

ISE Confidential - not for distribution

Page 53: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

Heartbleed Mitigations

PROVIDERS

• Update to patched version of OpenSSL

• Revoke all SSL certificates

• Get new certificates

• Update all credentials

USERS

• Test all providers, using a tool such as:

https://demo.securityevaluators.com/Heartbleed/

• Change passwords

ISE Proprietary

Page 54: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

Get Involved

ISE Proprietary

Page 55: HACKERS & ATTACK ANATOMY - SNIA · ISE Proprietary HACKERS & ATTACK ANATOMY Geoff Gentry, Regional Director | ggentry@securityevaluators.com

[email protected]

ISE Proprietary