runtime security lab
play

Runtime Security Lab Michael Schwarz Friday 31 st August, 2018 Graz - PowerPoint PPT Presentation

Runtime Security Lab Michael Schwarz Friday 31 st August, 2018 Graz Security Week 2018 https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html www.tugraz.at Large IoT Incidents September 21, 2016 > 600 Gbps on Brian Krebs


  1. Runtime Security Lab Michael Schwarz Friday 31 st August, 2018 Graz Security Week 2018

  2. https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html

  3. www.tugraz.at Large IoT Incidents September 21, 2016 > 600 Gbps on Brian Krebs (security researcher) website (Mirai botnet) September 30, 2016 Mirai source code published October 21, 2016 ˜ 1 Tbps on DNS provider Dyn November 26, 2016 > 900 000 routers of Deutsche Telekom attacked and offline February, 2018 > 1.35 Tbps attack on GitHub 2 Michael Schwarz — Graz Security Week 2018

  4. www.tugraz.at Top 10 IoT Bugs 3 Michael Schwarz — Graz Security Week 2018

  5. www.tugraz.at Top 10 IoT Bugs 1. Insecure Web Interface Default usernames and passwords 4 Michael Schwarz — Graz Security Week 2018

  6. www.tugraz.at Top 10 IoT Bugs 1. Insecure Web Interface 2. Insufficient Authentication Weak passwords 4 Michael Schwarz — Graz Security Week 2018

  7. www.tugraz.at Top 10 IoT Bugs 1. Insecure Web Interface 2. Insufficient Authentication 3. Insecure Network Services Unnecessary ports open 4 Michael Schwarz — Graz Security Week 2018

  8. www.tugraz.at Top 10 IoT Bugs 1. Insecure Web Interface 2. Insufficient Authentication 3. Insecure Network Services 4. Lack of Transport Encryption SSL/TLS not available 4 Michael Schwarz — Graz Security Week 2018

  9. www.tugraz.at Top 10 IoT Bugs 1. Insecure Web Interface 2. Insufficient Authentication 3. Insecure Network Services 4. Lack of Transport Encryption 5. Privacy Concerns Collected information not properly protected 4 Michael Schwarz — Graz Security Week 2018

  10. www.tugraz.at Top 10 IoT Bugs 1. Insecure Web Interface 2. Insufficient Authentication 3. Insecure Network Services 4. Lack of Transport Encryption 5. Privacy Concerns 6. Insecure Cloud Interface Interfaces with security vulnerabilities 4 Michael Schwarz — Graz Security Week 2018

  11. www.tugraz.at Top 10 IoT Bugs 1. Insecure Web Interface 2. Insufficient Authentication 3. Insecure Network Services 4. Lack of Transport Encryption 5. Privacy Concerns 6. Insecure Cloud Interface 7. Insecure Mobile Interface No account lockout mechanisms 4 Michael Schwarz — Graz Security Week 2018

  12. www.tugraz.at Top 10 IoT Bugs 1. Insecure Web Interface 2. Insufficient Authentication 3. Insecure Network Services 4. Lack of Transport Encryption 5. Privacy Concerns 6. Insecure Cloud Interface 7. Insecure Mobile Interface Encryption is not available 8. Insufficient Security Configurability 4 Michael Schwarz — Graz Security Week 2018

  13. www.tugraz.at Top 10 IoT Bugs 1. Insecure Web Interface 2. Insufficient Authentication 3. Insecure Network Services 4. Lack of Transport Encryption 5. Privacy Concerns 6. Insecure Cloud Interface 7. Insecure Mobile Interface Updates are not signed 8. Insufficient Security Configurability 9. Insecure Software/Firmware 4 Michael Schwarz — Graz Security Week 2018

  14. www.tugraz.at Top 10 IoT Bugs 1. Insecure Web Interface 2. Insufficient Authentication 3. Insecure Network Services 4. Lack of Transport Encryption 5. Privacy Concerns 6. Insecure Cloud Interface 7. Insecure Mobile Interface Unnecessary external ports like USB 8. Insufficient Security Configurability 9. Insecure Software/Firmware 10. Poor Physical Security 4 Michael Schwarz — Graz Security Week 2018

  15. www.tugraz.at Summary The 90s called... 5 Michael Schwarz — Graz Security Week 2018

  16. www.tugraz.at Summary The 90s called... ...they want their bugs back! 5 Michael Schwarz — Graz Security Week 2018

  17. www.tugraz.at Infrastructure • There are 15 challenges 6 Michael Schwarz — Graz Security Week 2018

  18. www.tugraz.at Infrastructure • There are 15 challenges • Different difficulties (the more points, the harder) 6 Michael Schwarz — Graz Security Week 2018

  19. www.tugraz.at Infrastructure • There are 15 challenges • Different difficulties (the more points, the harder) • 4 different categories 6 Michael Schwarz — Graz Security Week 2018

  20. www.tugraz.at Infrastructure • There are 15 challenges • Different difficulties (the more points, the harder) • 4 different categories • Play on your own or as team 6 Michael Schwarz — Graz Security Week 2018

  21. https://ctf.attacking.systems

  22. www.tugraz.at Infrastructure • Capture-the-flag (CTF) style 7 Michael Schwarz — Graz Security Week 2018

  23. www.tugraz.at Infrastructure • Capture-the-flag (CTF) style • Every challenge has a hidden flag 7 Michael Schwarz — Graz Security Week 2018

  24. www.tugraz.at Infrastructure • Capture-the-flag (CTF) style • Every challenge has a hidden flag • Flags are usually in a text file flag.txt on the device 7 Michael Schwarz — Graz Security Week 2018

  25. www.tugraz.at Infrastructure • Capture-the-flag (CTF) style • Every challenge has a hidden flag • Flags are usually in a text file flag.txt on the device • A flag looks like {A_S4MPL3_FL4G!} 7 Michael Schwarz — Graz Security Week 2018

  26. www.tugraz.at Infrastructure • Capture-the-flag (CTF) style • Every challenge has a hidden flag • Flags are usually in a text file flag.txt on the device • A flag looks like {A_S4MPL3_FL4G!} • Goal is to get the flag and submit it to the CTF system 7 Michael Schwarz — Graz Security Week 2018

  27. www.tugraz.at Timeline • CTF runs until Friday, 3:00pm 8 Michael Schwarz — Graz Security Week 2018

  28. www.tugraz.at Timeline • CTF runs until Friday, 3:00pm • Last-minute questions from 2:00pm to 3:00pm 8 Michael Schwarz — Graz Security Week 2018

  29. www.tugraz.at Timeline • CTF runs until Friday, 3:00pm • Last-minute questions from 2:00pm to 3:00pm • Best player/team gets a price 8 Michael Schwarz — Graz Security Week 2018

  30. www.tugraz.at How to Start • Use your own computer or our provided Linux VM (on USB or from https://ctf.attacking.systems/res ) 9 Michael Schwarz — Graz Security Week 2018

  31. www.tugraz.at How to Start • Use your own computer or our provided Linux VM (on USB or from https://ctf.attacking.systems/res ) • Create or join a team in the CTF system: https://ctf.attacking.systems 9 Michael Schwarz — Graz Security Week 2018

  32. www.tugraz.at How to Start • Use your own computer or our provided Linux VM (on USB or from https://ctf.attacking.systems/res ) • Create or join a team in the CTF system: https://ctf.attacking.systems • Choose a hacklet, read the description, and download it 9 Michael Schwarz — Graz Security Week 2018

  33. www.tugraz.at How to Start • Use your own computer or our provided Linux VM (on USB or from https://ctf.attacking.systems/res ) • Create or join a team in the CTF system: https://ctf.attacking.systems • Choose a hacklet, read the description, and download it • Solve the hacklet by connecting to the hacklet 9 Michael Schwarz — Graz Security Week 2018

  34. www.tugraz.at How to Connect • Hacklets are accessible over the network 10 Michael Schwarz — Graz Security Week 2018

  35. www.tugraz.at How to Connect • Hacklets are accessible over the network • Every hacklet has a text interface on a specific port 10 Michael Schwarz — Graz Security Week 2018

  36. www.tugraz.at How to Connect • Hacklets are accessible over the network • Every hacklet has a text interface on a specific port • You can connect using any telnet-like program: PuTTY Terminal, netcat , telnet netcat , telnet 10 Michael Schwarz — Graz Security Week 2018

  37. www.tugraz.at How to Connect • Hacklets are accessible over the network • Every hacklet has a text interface on a specific port • You can connect using any telnet-like program: PuTTY Terminal, netcat , telnet netcat , telnet • For example on Linux/Mac in the shell: netcat hacklets2.attacking.systems 8000 10 Michael Schwarz — Graz Security Week 2018

  38. www.tugraz.at The Categories There are 4 categories: pwn ( ), forensics ( ), crypto ( ), misc ( ) 11 Michael Schwarz — Graz Security Week 2018

  39. www.tugraz.at The Categories There are 4 categories: pwn ( ), forensics ( ), crypto ( ), misc ( ) Vulnerable binaries which you have to exploit 11 Michael Schwarz — Graz Security Week 2018

  40. www.tugraz.at The Categories There are 4 categories: pwn ( ), forensics ( ), crypto ( ), misc ( ) Vulnerable binaries which you have to exploit Basically finding/reconstructing hidden/deleted stuff 11 Michael Schwarz — Graz Security Week 2018

  41. www.tugraz.at The Categories There are 4 categories: pwn ( ), forensics ( ), crypto ( ), misc ( ) Vulnerable binaries which you have to exploit Basically finding/reconstructing hidden/deleted stuff (Bad) Cryptography you have to break 11 Michael Schwarz — Graz Security Week 2018

  42. www.tugraz.at The Categories There are 4 categories: pwn ( ), forensics ( ), crypto ( ), misc ( ) Vulnerable binaries which you have to exploit Basically finding/reconstructing hidden/deleted stuff (Bad) Cryptography you have to break Random and fun hacklets which do not fit into any category (often no programming required) 11 Michael Schwarz — Graz Security Week 2018

  43. www.tugraz.at How to Start • Download the hacklet 12 Michael Schwarz — Graz Security Week 2018

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend