knocking down the big door
play

Knocking Down the Big Door Breaking Authentication and Segregation - PowerPoint PPT Presentation

Knocking Down the Big Door Breaking Authentication and Segregation of Production and Non-Production Environments Nahuel Grisola Cinta Infinita, Founder / CEO @cintainfinita Buenos Aires, 27 de Abril 2018 nahuel@cintainfinita.com.ar


  1. Knocking Down the Big Door Breaking Authentication and Segregation of Production and Non-Production Environments Nahuel Grisolía Cinta Infinita, Founder / CEO @cintainfinita 
 Buenos Aires, 27 de Abril 2018 nahuel@cintainfinita.com.ar

  2. § Cinta Infinita Founder and CEO § (Web) Application Security specialist & enthusiast § Many vulnerabilities discovered in Open Source and Commercial software: Vmware, Websense, OSSIM, Cacti, McAfee, OracleVM, etc. § Gadgets and Electronics Lover (RFID!) § http://ar.linkedin.com/in/nahuelgrisolia § http://cintainfinita.com § http://www.exploit-db.com/author/?a=2008 § http://www.proxmark.org/forum/profile.php?id=3000

  3. MOTIVATION “The Purpose of Education” - Enlightenment Sense “The highest goal in life is to inquire and create” “Education is really aimed at helping students get to the point where they can learn on their own” “It’s you the learner who is going to achieve in the course of education and it’s really up to you to determine how you’re going to master and use it.” - Noam Chomsky

  4. MOTIVATION “The Purpose of Education” - Enlightenment Sense “The highest goal in life is to inquire and create” “Education is really aimed at helping students get to the point where they can learn on their own” “It’s you the learner who is going to achieve in the course of education and it’s really up to you to determine how you’re going to master and use it.” - Noam Chomsky

  5. MOTIVATION “The Purpose of Education” - Enlightenment Sense “The highest goal in life is to inquire and create” “Education is really aimed at helping students get to the point where they can learn on their own” “It’s you the learner who is going to achieve in the course of education and it’s really up to you to determine how you’re going to master and use it.” - Noam Chomsky

  6. Introduction (boring but necessary)

  7. Introduction (boring but necessary) Case 1: Be careful while impersonating users . Seriously

  8. Introduction (boring but necessary) Case 1: Be careful while impersonating users . Seriously Case 2: Authentication Bypass vulnerability in the Auth0 platform

  9. Introduction (boring but necessary) Case 1: Be careful while impersonating users . Seriously Case 2: Authentication Bypass vulnerability in the Auth0 platform Case 3: Observations in MS Azure and IIS installations running .NET Web Applications using SAML Authentication Machine Keys ? Is that a new rock band?

  10. Introduction (boring but necessary) Case 1: Be careful while impersonating users . Seriously Case 2: Authentication Bypass vulnerability in the Auth0 platform Case 3: Observations in MS Azure and IIS installations running .NET Web Applications using SAML Authentication Machine Keys ? Is that a new rock band? Final Conclusions & Recommendations

  11. Introduction (boring but necessary) Case 1: Be careful while impersonating users . Seriously Case 2: Authentication Bypass vulnerability in the Auth0 platform Case 3: Observations in MS Azure and IIS installations running .NET Web Applications using SAML Authentication Machine Keys ? Is that a new rock band? Final Conclusions & Recommendations

  12. Authentication (AuthN) Restrictions on Who (or What) can Access a System

  13. Authentication (AuthN) Restrictions on Who (or What) can Access a System Authorization (AuthZ) Restrictions on Actions of Authenticated Users

  14. We usually Pentest in 
 Staging / Development Environments Full Isolation / Complete Segregation between Environments? Shared Secrets? Which secrets exactly? Shared Databases? 


  15. We usually Pentest in 
 Staging / Development Environments Full Isolation / Complete Segregation between Environments? Shared Secrets? Which secrets exactly? Shared Databases? 


  16. Federated Identity pattern “Delegate authentication to an external identity provider” https://docs.microsoft.com/en-us/azure/architecture/patterns/federated-identity

  17. https://jwt.io

  18. Security Assertion Markup Language ( SAML ) “XML-based framework for communicating user authentication, entitlement, and attribute information” Signed Audience And more…

  19. Case Number One (1/3) User Impersonation

  20. Case Number One (1/3) User Impersonation Usually only for Super Users or Full Site Administrators

  21. Case Number One (1/3) User Impersonation Usually only for Super Users or Full Site Administrators

  22. Case Number One (1/3) User Impersonation Usually only for Super Users or Full Site Administrators No password reset (or password sharing ;-) is

  23. Case Number One (1/3) User Impersonation Usually only for Super Users or Full Site Administrators No password reset (or password sharing ;-) is required to “act” as the target user

  24. Case Number One (1/3) User Impersonation Usually only for Super Users or Full Site Administrators No password reset (or password sharing ;-) is required to “act” as the target user

  25. Case Number One (1/3) User Impersonation Usually only for Super Users or Full Site Administrators No password reset (or password sharing ;-) is required to “act” as the target user Very sensitive functionality (Broken Authorization?)

  26. Case Number One (1/3) User Impersonation Usually only for Super Users or Full Site Administrators No password reset (or password sharing ;-) is required to “act” as the target user Very sensitive functionality (Broken Authorization?)

  27. Case Number One (1/3) User Impersonation Usually only for Super Users or Full Site Administrators No password reset (or password sharing ;-) is required to “act” as the target user Very sensitive functionality (Broken Authorization?) No “common strategy”

  28. Case Number One (2/3) User Impersonation

  29. Case Number One (2/3) User Impersonation Request: POST /api/user/1753/impersonate HTTP1.1 Host: test .crazy.net […] Response: HTTP/1.1 200 OK Server: Microsoft-IIS/8.5 Date: Tue, 16 Jan 2018 15:28:17 GMT Connection: close Content-Length: 245 {“username":"1753_user","passkey":"OMRDSPWTM 2X6KNM3KYHINET6MHL3XHNLYORN3VOK7EFJBFWXHX54H FLQRF7XSVEGOJGZ6G4YHTMPNEBTKKIEGLSC4WUCTVDV[ redacted]"}

  30. Case Number One (2/3) User Impersonation Request II: Request: POST /api/authentication/token HTTP/1.1 POST /api/user/1753/impersonate HTTP1.1 Host: test .crazy.net Host: test .crazy.net […] […]grant_type=password&username= admin &passw ord=OMRDSPWTM2X6KNM3KYHINET6MHL3XHNLYORN3VO Response: K7EFJBFWXHX54HFLQRF7XSVEGOJGZ6G4YHTMPNEBTKK HTTP/1.1 200 OK IEGLSC4WUCTVDV[redacted] Server: Microsoft-IIS/8.5 Date: Tue, 16 Jan 2018 15:28:17 GMT Response II: Connection: close HTTP/1.1 200 OK Content-Length: 245 Server: Microsoft-IIS/8.5 Date: Tue, 16 Jan 2018 15:31:12 GMT {“username":"1753_user","passkey":"OMRDSPWTM Connection: close 2X6KNM3KYHINET6MHL3XHNLYORN3VOK7EFJBFWXHX54H Content-Length: 1169 FLQRF7XSVEGOJGZ6G4YHTMPNEBTKKIEGLSC4WUCTVDV[ redacted]"} {"access_token":"dxjPlvTBeSg9ztuzMq8Ja_FKcg NaSV-SVHCt49OXxL2FOkALjeD- Aq3dOEH4fnOgADjfiHgmmOsChuAkXY2OQbrlUnZfotf KePcLhcY8BJxcJukPlHuJCwtUo6kj_7IR81- MQ4cbOARDG9N81FUaP45VHcYxexLGS8JMzEscPJBe[r edacted] ","token_type":"bearer","expires_in": 1209599,"userName":"admin",".issued":"Tue, 16 Jan 2018 15:31:12 GMT",".expires":"Tue, 30 Jan 2018 15:31:12 GMT"}

  31. Case Number One (2/3) User Impersonation Request II: Request: POST /api/authentication/token HTTP/1.1 POST /api/user/1753/impersonate HTTP1.1 Host: test .crazy.net Host: test .crazy.net […] […]grant_type=password&username= admin &passw ord=OMRDSPWTM2X6KNM3KYHINET6MHL3XHNLYORN3VO Response: K7EFJBFWXHX54HFLQRF7XSVEGOJGZ6G4YHTMPNEBTKK HTTP/1.1 200 OK IEGLSC4WUCTVDV[redacted] OK, this is bad, but… Server: Microsoft-IIS/8.5 Date: Tue, 16 Jan 2018 15:28:17 GMT Response II: Connection: close HTTP/1.1 200 OK Content-Length: 245 Server: Microsoft-IIS/8.5 Date: Tue, 16 Jan 2018 15:31:12 GMT {“username":"1753_user","passkey":"OMRDSPWTM Connection: close 2X6KNM3KYHINET6MHL3XHNLYORN3VOK7EFJBFWXHX54H Content-Length: 1169 FLQRF7XSVEGOJGZ6G4YHTMPNEBTKKIEGLSC4WUCTVDV[ redacted]"} {"access_token":"dxjPlvTBeSg9ztuzMq8Ja_FKcg NaSV-SVHCt49OXxL2FOkALjeD- Aq3dOEH4fnOgADjfiHgmmOsChuAkXY2OQbrlUnZfotf KePcLhcY8BJxcJukPlHuJCwtUo6kj_7IR81- MQ4cbOARDG9N81FUaP45VHcYxexLGS8JMzEscPJBe[r edacted] ","token_type":"bearer","expires_in": 1209599,"userName":"admin",".issued":"Tue, 16 Jan 2018 15:31:12 GMT",".expires":"Tue, 30 Jan 2018 15:31:12 GMT"}

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend