Bram's Blog

View on GitHub

Global AppSec

This week is Global AppSec Amsterdam, including three days of training and two days of conference. I was able to visit the conference days and attended the following talks.

Opening Keynote by Chris Kubecka

September 2014

Four incidents Saudi Embassy in The Hague

Lessons learned

Martin Knobloch

All talks are recorded and will be published

Unlikely allies: How HR can help build a security-first culture by Alison Eastaway

Security and HR should work together, because:

How should they work together:

Some other notes:

Do certain types of developers write more secure code by Anita D’Amico and Chris Horn

Why investigate human factors that affect code quality & security?

Human factors influence human performance

How do we investigate human factor influence on code quality & security?

Mining existing opensource code / repositories for indirect measures of human factors

Compare attributes on files with vulnerabilities and without vulnerabilities

What did we find in our investigation?

Can human factors influence code quality and security

Findings:

Where can we learn from our findings?

Where can we learn from this?

Most important causes:

Look for:

Other factors to study:

The security we need: Designing usable IoT Security by Damilare D. Fagbemi

What if we ignore security usability?

The 5 C’s:

The 10 P’s

Closing notes:

The state of credential stuffing and the future of Account Takeovers by Jarrod Overson

In security, we scoff at credential stuffing, because we simply don’t reuse passwords, BUT: it’s a major problem.

A credential stuffing attack goes through these four stages:

  1. Get credentials
  2. Automate login
  3. Defeat automation defenses
  4. Distribute globally

Some statistics:

Manual vs. automation

When a system has no defenses:

Any defense will increase cost immediately, defenders should add defenses until cost to attack is higher than the potential value, but: Over time, computing-cost (also of attacks) will decrease and you have to add more defenses

Step 1: Get credentials

A terabyte of credentials can be bought for as low as $2,50 from forums like RaidForums

Step 2: Automate

Step 3: Defeat automation defenses

These can be beaten by:

Captcha’s do not work well with accessibility devices for disabled people.

Step 4: Distribute globally

Distribute your traffic for automation to prevent IP blocking

Total

To launch 100k Account Takeover attempts, the costs are:

This equals to less than $ 0.0024 per attempt. Given that:

How credential stuffing has evolved

Defending:

Where do attackers go from here

Genesis

Genesis is the newest in credential stuffing tech:

Buzzfeed: Apps track user behavior

Fraud problems are human problems, and are not technical problems

Breaches are everywhere. What’s a good security leader to do? by Richard Greenberg

Current state of risk:

Where is the improvement?

CISO is not able to work at the C-level (though C stands for Chief)

Security awareness

Notes:

What should we do:

Security patch management

Lunch with key executives Meet regularly

Practice good configuration management

Enforce policies & procedures

Bake security into SDLC

Don’t forget physical security

Monitor & detect systems

Create and review reporting

Access management

Patching:

Incident response:

Encrypt everything, everywhere

Disaster recovery

Network and collaborate

Keep learning, subscribe to:

Teach:

How to learn (and teach) hacking by Ruber Gonzalez

1. What is hacking

What does a hacker need:

2. How to learn: CTFs books, courses

Theory:

Practice:

CTF’s:

Think outside the box

How to learn:

  1. Find a group (preferably IRL)
  2. Solve challenges
  3. Win CTFs
  4. Do writeups
  5. Repeat

CTF Time Mind the ratings, avoid bad rated CTFs

Play CTFs for fun, not the money (do bug-bounties instead)

3. How to teach

Problem based learning (PBL)

Four rules to PBL:

Finding an authentic problem is hard, the rest is natural in CTFs

Avoid:

Tips:

Closing Keynote: History of InfoSec By Mario Heiderich

Mario Heiderich speed-ran through history and eventually ultra-speeded through his visions of the future in a fun-laden and obviously not serious take on Info Security. Since the future-part was too fast, chaotic and comedic, I haven’t been able to keep up.

Act one: the past

1971: First computer worm called Creeper by Bob Thomas bounced between machines

1980: Intrusion detection System by James Anderson of NSA

1981:

1986:

Astronomer Cliff Stoll captured Markus Hess

First actual IDS design by Dorothy E Denning assisted by Peter G Neumann

1987:

Fred Cohen: “Impossible to detect intrusion every case and resources grow with the number of users” Wikipedia: Positive virusses, like compression virus

1988:

Robert Morris:

Years later: Samy Kamkar

1989

Morris Worm damage: 100k to 10M$ Clifford Stoll saved the day and mitigates

First ransomware AIDS:

1990

1991

1994

1995

1996

1998

1999

### 2001 * IE 6 was the best browser with 89% * IE all versions were 95% * OWASP Started * CSRF discovered ### 2002 * EU launches Directive for Privacy and Electronic Communications * User consent to use cookies and similar technologies * Possible to * Clickjacking discovered * JHesse Rudman registered the bug with Mozilla in BugZilla * No one understands implications * Now still in a secret cave * The ModSecurity project started ### 2003 * Anonymous started * International hacktivist group * Guy Fawkes masks sales went up * OWASP Top 10 Vuln. project published for first time * Most linked project ### 2004 * Mass exploitation of IE bugs * Download.ject tens of millions of PCs through IE, backdooring through visiting infected site * Firefox 1.0 released * Phoenix, but BIOS Phoenix sued * Second Browser War (2004 to 2017) * April 2004 WHATWG created ### 2005 * Ransomware: * Gpcode, Archiveus, Krotten, MayArchive using RSA encryption * Sammy Kamkar accidentally released XSS worm on MySpace * Within 20 hours more than one million infected * Alberto Gonzales and gang steals 45.7M payment card credentials of US retailer TJX * $256M damage ### 2007 * Cenzic files lawsuit against SPI Dynamics * Fault injection, every vulnerability scanner does this * Cenzic site hacked * HP bought SPI Dynamics and Cenzic settled ### 2008 * More sophisticated ransomware * Gpcode.AK uses 1024-bit RSA * Clickjacking rediscovered (six years after the first) * Adobe Flash clickjacking * Adobe made them pull their OWASP New York talk in 2008 ### 2013 * Ransomware becomes more expensive * Cryptolocker collects $27M in 4 days * iFrames gets a sandbox to be more secure * Untrusted coontent loaded in iFrames, browsers start implementing sandbox ### 2014 * eBay gets hacked and lots of PII leaks * 145M users affected * Social engineering * 221 days in eBays network * CEO of eBay said decline in user activity * Little impact bottom line * Revenue up 14% ### 2015 * Microsoft abandoned IE * Shiny new Edge, better with better security ### 2016 * CSRF is dead: * SameSite cookies * Yahoo admits a small security oops (just tiny) * "State sponsored" attack of 500M user data * December corrected to 1B accounts, but.... ### 2017 * 3 Billion: all accounts compromised * Chrome dominates with 60% usage * MS IE 11 does not offer SameSite ### 2019 Everything is still a thing * SQLI * XSS ## Act two: The future ### 2020 * Fight CSP 4.0 vs CSP.next * 10 different security headers * Chrome sets samsite flag on all cookies by default * All OWASP Conferences cancelled until 2050 ### 2022 * HTTP response headers same size as the body * Google finally buys Mozilla * Apple iPhone 13 with no buttons noty apps ### 2023 * Apple lost phone business * Buys Google * iPhone * HTTP Response headers more bytes than body ### 2024 Mark Zuckerberg is 46th president * Facebook buys Apple