how to backdoor invulnerable code
play

How to Backdoor Invulnerable Code Josh Schwartz, Director of - PowerPoint PPT Presentation

How to Backdoor Invulnerable Code Josh Schwartz, Director of Offensive Security @Salesforce Bio Offensive Security aka Red Team at Salesforce Realistic Adversary Simulation Security Change Catalyst Im a hacker, rule


  1. How to Backdoor “Invulnerable Code” Josh Schwartz, Director of Offensive Security @Salesforce

  2. Bio Offensive Security aka Red Team at Salesforce “Realistic Adversary Simulation” “Security Change Catalyst” I’m a hacker, rule breaker, general troublemaker.

  3. “ “A red team is an independent group that challenges an organization to improve its effectiveness.”

  4. Spoiler Alert No such thing as “invulnerable code”.

  5. Invulnerable Code At best you get code that is “secure enough”

  6. Invulnerable Code What is secure enough?

  7. Invulnerable Code Code without security bugs…?

  8. “ Code that enforces expected states, rather than allowing users to do things with your system that you did not account for.

  9. Invulnerable Code How do you secure code? Obvious!? Don’t write code with bugs! Right?

  10. Yes, you should do that. But, there is more...

  11. Invulnerable Code Let’s imagine that “invulnerable code” is this nickel, and on one side is all the lines of code that you write without any security related bugs

  12. Invulnerable Code Now let’s take a look at the other side and flip that nickel over.

  13. Invulnerable Code The other side is every other aspect that goes into writing that code.

  14. Invulnerable Code The third party libraries that you didn’t write yourself

  15. Invulnerable Code The code repo that stores the code

  16. Invulnerable Code The integration systems that put it together and test it

  17. Invulnerable Code The build pipeline that moves it around and deploys it

  18. Invulnerable Code The humans that create and maintain all of those systems

  19. Invulnerable Code The humans that have access to those human’s computers...

  20. Invulnerable Code Perhaps some of you realize there is still another side of this coin?

  21. Invulnerable Code It’s the side you don’t see.

  22. Invulnerable Code The side you can’t see.

  23. Invulnerable Code The things we can’t account for.

  24. The Black Swan Theory

  25. The best we can do Accept there is no ubiquitous security perfection

  26. On the bright side We can think like an adversary We can challenge where we set the bar

  27. I’m going to share with you some of my tactics as the attacker

  28. What is Social Engineering

  29. You are probably thinking Isn’t that just a fancy word for lying?

  30. “ “Any act that influences a person to take an action that may or may not be in their best interest”

  31. Core Concepts Influence through emotional response Pretext Manipulation vs Elicitation

  32. Social Engineering vs. Phishing

  33. Phishing Examples ⊡ Classic Credential Capturing ⊡ The Nigerian Prince with a Diamond Mine ⊡ The IRS Call

  34. Phishing This type of phishing is weak.

  35. Phishing It’s impersonal.

  36. Spear Phishing ⊡ More targeted ⊡ More personal ⊡ More effort per person ⊡ Less likely to be detected ⊡ More likely to succeed

  37. Spear Phishing Example I’m volunteering with Surf For Life! Vibe Manager Red Team

  38. Spear Phishing Example Red Team

  39. Spear Phishing Example

  40. Spear Phishing Example

  41. Spear Phishing Example Of course there is no form

  42. Spear Phishing Example

  43. How we start a Spear Phish Step 1: Social Recon

  44. Social Recon

  45. Social Recon: LinkedIn

  46. Social Recon: Employment

  47. Social Recon: Personal Site

  48. Social Recon: Twitter

  49. Social Recon: Facebook

  50. Social Recon: Google Sites

  51. Social Recon: Result

  52. Yeah Sorry Attackers can stalk you using the internet to get access to the things that you have access to. This is not a new thing. also it get’s worse.

  53. Identity Duplication: Orig

  54. Identity Duplication: Fake

  55. Identity Duplication: Result Cloning public profiles allows a social engineer to leverage a targets subliminal familiarity with identity based content to gain instant rapport.

  56. Identity Duplication: Result

  57. Gmail Helps Prevent Malware Blocking malicious file types in emails

  58. Google Drive Sharing You can share any type of file through Google Drive

  59. Google Drive Sharing Real Example

  60. Google Drive Sharing They receive this

  61. Google Drive Sharing Google Hosts the file

  62. Google Drive Sharing They send back:

  63. But What if something so simple doesn't work?

  64. Example 2 1. Notice our target has nice offices from pictures they post on social media 2. Create our pretext: Freelance journalist for a magazine that features interior design 3. Contact target asking to feature them alongside other big companies 4. Set up “interview”

  65. Example 2 Our request gets a response and fwd from their PR firm

  66. Example 2 They are totally stoked and set up the interview

  67. Example 2 Interview and tour of offices lasts for about 4 hours ⊡ ⊡ Take pictures of security systems, whiteboards, post-it notes, etc. ⊡ Spring the trap

  68. Example 2

  69. Example 2

  70. What then? So what happens after you get that access? Sure would be nice to get that person’s password...

  71. Local Phishing osascript -e 'tell app "System Events" to display dialog "Software Update requires your password to apply ." & return & return default answer "" with icon file ":System:Library:CoreServices:Software Update.app:Contents:Resources:SoftwareUpdate.icns" with hidden answer with title "Software Update" buttons {"OK"} default button "OK"'

  72. Local Phishing $credential = $host.ui.PromptForCredential("Credentials Required", "Please enter your user name and password.", "$env:username", "NetBiosUserName") $credential.Password | ConvertFrom-SecureString $env:username $credential.GetNetworkCredential().password

  73. Local Phishing DISPLAY=:0 gksudo -p -m "Enter your password to apply changes."

  74. 2FA is Good We are good at stealing passwords. 2FA will go a long way here. It makes it way harder for us but it isn’t perfect. Here are a few ways we get around it:

  75. Cookie Stealing

  76. SSH Multiplexing Bypassing 2FA

  77. Continuous Integration JENKINS!

  78. Backdooring Code you understand the company you have access internally you have passwords you can bypass 2FA you have access to internal documents you have access to servers you have access to the code pipeline

  79. Backdooring Code Is backdooring your production code really that hard?

  80. Zero Bugs

  81. This isn’t everything

  82. The End

  83. Questions / Complaints?

  84. Thank You

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend