SlideShare ist ein Scribd-Unternehmen logo
1 von 43
THE 99¢ HEART SURGEON
DILEMMA
Stefan Friedli




                        1
THE 99¢... WHAT?




                   2
COMPARE.




           3
THIS IS ABOUT BAD
    EXAMPLES.




                    4
WHO NEEDS A PENTEST?




                       5
6
HOWTO:
FIGURE OUT IF A PAINTER SCREWED
             YOU OVER...
   (EVEN IF YOU NEVER TOUCHED
               PAINT.)
   Good                 Bad




                                  7
HOWTO:
  IDENTIFY A GOOD PENTESTER.
(... EVEN IF YOU WEAR A SUIT AND
THINK “COMPUTER PEOPLE” SMELL
               FUNNY.)
   Good                 Bad




                                   8
9
Overall Quality




     ELIMINATE


10
Pre-Engagement
                  Interactions

    Reporting                    Intelligence
                                  Gathering


Post-Exploitation                    Threat
                                    Modelling


                             Vulnerability
        Exploitation
                               Analysis


                                                11
5173 PAGES



             12
13
«Due to copyright reasons, all of our
documents are print-only by default. If
you would like to purchase an
electronic version at additional cost,
please contact our sales staff.»*
                                          14
WAIT... BOMBS?




«Due to the incorrect input validation of the parameter
‘s’, arbitrary script code can be executed.»



                                                          15
IMPACT METRICS?
  
           Magic happens here.




                                 16
YOU’RE ALL WRONG.


 «The amount of bombs depends on the danger
 the vulnerability causes. (...) There is no upper
 limit.»*

* Translated from German



                                                     17
MS08-067: Microsoft Windows Server Service
  RPC Handling Remote Code Execution
               Vulnerability




















                                             18
MAKING IMPORTANT
  THINGS INVISIBLE.




                      19
VISUALIZATION IS COOL
      IF YOU DO IT RIGHT.



                  Google this:
                 Wim Remes @
                  Blackhat EU


                                 20
MISE EN PLACE




                21
Pre-Engagement
                  Interactions

    Reporting                    Intelligence
                                  Gathering


Post-Exploitation                    Threat
                                    Modelling


                             Vulnerability
        Exploitation
                               Analysis


                                                22
SO YOU DIDN’T DO YOUR
     HOMEWORK?




                        23
SO YOU DIDN’T DO YOUR
       HOMEWORK?
XXX.213.XX.1/24   XXX.231.XX.1/24




                                    24
IF THINGS DON’T ADD UP:
     TALK TO PEOPLE.

But... but... the bad guys don’t talk
            to you either!




                                        25
26
BAD GUYS DON’T NEED TO
 WRITE REPORTS FOR YOU.




                          27
COOPERATE
Confrontation       Cooperation




                                  28
TALK TO PEOPLE.
 ALL OF THEM.




                  29
SAY WHAT?

Management Summary:
«(...) While it was not possible to use
a reverse tcp shell to get an
outbound connection, we were able
to tunnel traffic through ICMP in
order to get a shell on the system.
(...)»

                                          30
“OH, A DOS BOX!”




                   31
WHAT DO PEOPLE CARE
       ABOUT?

STUFF THAT MATTERS TO
         THEM.


                        32
SCOPE!




         33
Pre-Engagement
                  Interactions

    Reporting                    Intelligence
                                  Gathering


Post-Exploitation                    Threat
                                    Modelling


                             Vulnerability
        Exploitation
                               Analysis


                                                34
THINGS THAT DON’T EXIST.

• Unicorns
• Imaginary childhood friends (most of them)
• A decent Metallica album after 1991
• «No Scope, just look at everything.»




                                               35
SCOPING MAKES SENSE
       BECAUSE...


Scope   Time/Effort   Money




                              36
WHAT DO PEOPLE CARE
       ABOUT?
STUFF THAT MATTERS TO
         THEM.



                        37
KEEP IT REAL.


 We have a pretty cool job.
Don’t let anyone change that.




                                38
DON’T BE THAT GUY.
Management Summary:
«(...) We were unable to complete
the task because it [the website] was
too big. (...)»

       Thank you Ben Jackson.
        http://code.google.com/p/weblabyrinth/




                                                 39
HOW DO WE FIX IT?




                    40
Just exploit stuff.

                  41
Pre-Engagement
                  Interactions

    Reporting                    Intelligence
                                  Gathering


Post-Exploitation                    Threat
                                    Modelling


                             Vulnerability
        Exploitation
                               Analysis


                                                42
LIKE IT? MAKE IT BETTER!
         Help killing bad pentesting.
         http://www.pentest-standard.org
         Check out the PTES-G!



   DONE. IT’S OVER.
         Thanks for being here,
         feel free to ask questions
         and have a great night!

                                           43

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Empfohlen

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

The 99c Heart Surgeon Dilemma (BruCON 2011)

  • 1. THE 99¢ HEART SURGEON DILEMMA Stefan Friedli 1
  • 4. THIS IS ABOUT BAD EXAMPLES. 4
  • 5. WHO NEEDS A PENTEST? 5
  • 6. 6
  • 7. HOWTO: FIGURE OUT IF A PAINTER SCREWED YOU OVER... (EVEN IF YOU NEVER TOUCHED PAINT.) Good Bad 7
  • 8. HOWTO: IDENTIFY A GOOD PENTESTER. (... EVEN IF YOU WEAR A SUIT AND THINK “COMPUTER PEOPLE” SMELL FUNNY.) Good Bad 8
  • 9. 9
  • 10. Overall Quality ELIMINATE 10
  • 11. Pre-Engagement Interactions Reporting Intelligence Gathering Post-Exploitation Threat Modelling Vulnerability Exploitation Analysis 11
  • 13. 13
  • 14. «Due to copyright reasons, all of our documents are print-only by default. If you would like to purchase an electronic version at additional cost, please contact our sales staff.»* 14
  • 15. WAIT... BOMBS? «Due to the incorrect input validation of the parameter ‘s’, arbitrary script code can be executed.» 15
  • 16. IMPACT METRICS?  Magic happens here. 16
  • 17. YOU’RE ALL WRONG. «The amount of bombs depends on the danger the vulnerability causes. (...) There is no upper limit.»* * Translated from German 17
  • 18. MS08-067: Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability                  18
  • 19. MAKING IMPORTANT THINGS INVISIBLE. 19
  • 20. VISUALIZATION IS COOL IF YOU DO IT RIGHT. Google this: Wim Remes @ Blackhat EU 20
  • 22. Pre-Engagement Interactions Reporting Intelligence Gathering Post-Exploitation Threat Modelling Vulnerability Exploitation Analysis 22
  • 23. SO YOU DIDN’T DO YOUR HOMEWORK? 23
  • 24. SO YOU DIDN’T DO YOUR HOMEWORK? XXX.213.XX.1/24 XXX.231.XX.1/24 24
  • 25. IF THINGS DON’T ADD UP: TALK TO PEOPLE. But... but... the bad guys don’t talk to you either! 25
  • 26. 26
  • 27. BAD GUYS DON’T NEED TO WRITE REPORTS FOR YOU. 27
  • 28. COOPERATE Confrontation Cooperation 28
  • 29. TALK TO PEOPLE. ALL OF THEM. 29
  • 30. SAY WHAT? Management Summary: «(...) While it was not possible to use a reverse tcp shell to get an outbound connection, we were able to tunnel traffic through ICMP in order to get a shell on the system. (...)» 30
  • 31. “OH, A DOS BOX!” 31
  • 32. WHAT DO PEOPLE CARE ABOUT? STUFF THAT MATTERS TO THEM. 32
  • 33. SCOPE! 33
  • 34. Pre-Engagement Interactions Reporting Intelligence Gathering Post-Exploitation Threat Modelling Vulnerability Exploitation Analysis 34
  • 35. THINGS THAT DON’T EXIST. • Unicorns • Imaginary childhood friends (most of them) • A decent Metallica album after 1991 • «No Scope, just look at everything.» 35
  • 36. SCOPING MAKES SENSE BECAUSE... Scope Time/Effort Money 36
  • 37. WHAT DO PEOPLE CARE ABOUT? STUFF THAT MATTERS TO THEM. 37
  • 38. KEEP IT REAL. We have a pretty cool job. Don’t let anyone change that. 38
  • 39. DON’T BE THAT GUY. Management Summary: «(...) We were unable to complete the task because it [the website] was too big. (...)» Thank you Ben Jackson. http://code.google.com/p/weblabyrinth/ 39
  • 40. HOW DO WE FIX IT? 40
  • 42. Pre-Engagement Interactions Reporting Intelligence Gathering Post-Exploitation Threat Modelling Vulnerability Exploitation Analysis 42
  • 43. LIKE IT? MAKE IT BETTER! Help killing bad pentesting. http://www.pentest-standard.org Check out the PTES-G! DONE. IT’S OVER. Thanks for being here, feel free to ask questions and have a great night! 43