SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
CYBER	
  SECURITY	
  VIA	
  TECHNOLOGY	
  FAILS

Jeremy	
  Conway	
  
Introduc:ons	
  
•  Founder	
  and	
  Managing	
  Partner	
  @	
  
SudoSecure	
  
•  Creden:als:	
  
–  16+	
  Years	
  in	
  Informa:on	
  	
  
Security	
  
–  NASA,	
  DoD,	
  US	
  Army	
  
–  MS,	
  Informa:on	
  Security	
  
–  BS,	
  Computer	
  Science	
  and	
  	
  
Math	
  
–  20+	
  Industry	
  Cer:fica:ons	
  
The	
  true	
  sign	
  of	
  intelligence	
  is	
  not	
  
knowledge	
  but	
  imagina9on.	
  

Albert	
  Einstein	
  
Demo	
  1:	
  
This	
  is	
  not	
  the	
  A@ack	
  your	
  Looking	
  for!	
  
IDS/IPS	
  and	
  Correla:on	
  Engines	
  
•  Evading	
  an	
  IDS/IPS	
  requires	
  understanding	
  
the	
  signature	
  (matching	
  paVern)	
  
–  Most	
  cases	
  it	
  is	
  TRIVIAL	
  at	
  BEST	
  to	
  evade!	
  

•  Correla:on	
  Engines	
  tend	
  to	
  use	
  simple	
  logic	
  
–  Evading	
  these	
  complex	
  and	
  expensive	
  devices	
  is	
  EASY	
  
when	
  it	
  relies	
  on	
  Insecure	
  Protocols!	
  

•  Ge[ng	
  it	
  RIGHT!	
  
–  Understand	
  the	
  limita:ons	
  of	
  Signature	
  Detec:on	
  Engines	
  
–  Decompose	
  complex	
  rule	
  engines	
  and	
  correla:on	
  logic	
  to	
  
iden:fy	
  possible	
  evasion	
  techniques	
  
–  Consider	
  adding	
  a	
  “TRUSTED”	
  	
  
metric	
  value	
  when	
  designing	
  	
  
a	
  Secured	
  Architecture	
  
Demo	
  2:	
  Can	
  you	
  spot	
  the	
  Imposter?	
  
SSL	
  MiTM	
  
•  “YES”	
  SSL	
  can	
  be	
  MiTM’ed	
  
•  Encryp:on	
  does	
  not	
  imply	
  “No	
  Worries”!	
  
•  Ge[ng	
  it	
  right!	
  
–  Never	
  use	
  self-­‐signed	
  Cer:ficates	
  
–  Never	
  allow	
  an	
  Exemp:on	
  
–  Be	
  OVERLY	
  Paranoid!	
  
Demo	
  3:	
  
Outsourced	
  Trust,	
  the	
  Domino	
  Effect	
  
Outsourced	
  Trust	
  
•  The	
  Web	
  and	
  your	
  Browser	
  are	
  GREAT	
  at	
  
CACHING	
  
–  Even	
  when	
  it	
  is	
  Malicious	
  Injected	
  Badness	
  

•  Two-­‐Factor	
  Authen:ca:on	
  doesn’t	
  solve	
  
EVERTHING!	
  
•  Ge[ng	
  it	
  Right!	
  
–  Never	
  include	
  content	
  you	
  don’t	
  control	
  on	
  a	
  Secure	
  Site!	
  
Demo	
  4:	
  
Begging	
  to	
  be	
  Hi-­‐Jacked	
  
WiFi	
  Hi-­‐Jacking	
  
•  By	
  DEFAULT	
  most	
  Wireless	
  Devices	
  Probe	
  and	
  Connect	
  
to	
  Preferred	
  Networks	
  
•  Ge[ng	
  it	
  Right	
  
–  Disable	
  Automa:c	
  Connec:ons	
  to	
  Preferred	
  Network	
  List	
  
–  Disable	
  WiFi	
  when	
  NOT	
  in	
  Use	
  
Demo	
  5:	
  
Passwords	
  –	
  Are	
  you	
  doing	
  it	
  wrong?	
  
LM	
  Passwords	
  
• 
• 
• 
• 

Used	
  to	
  support	
  the	
  legacy	
  LAN	
  Manager	
  protocol	
  
Disabled	
  by	
  default	
  on	
  Windows	
  star:ng	
  with	
  Vista	
  
S:ll	
  found	
  enabled	
  everywhere	
  though!	
  
Weaknesses:	
  
–  Password	
  truncated	
  at	
  14	
  Chars	
  	
  
–  Split	
  into	
  2	
  halves	
  of	
  7	
  Char	
  passwords	
  
–  Password	
  is	
  converted	
  to	
  UPPERCASE	
  

•  PROTIPS:	
  
–  Crack	
  LM	
  hashes	
  then	
  use	
  Cracked	
  password	
  to	
  aVack	
  NTLM	
  
password	
  
–  Free	
  Rainbow	
  Tables	
  (freerainbowtables.com)	
  will	
  crack	
  about	
  
99%	
  of	
  LM	
  hashes	
  using	
  rcracki_mt	
  
–  John	
  the	
  ripper	
  use:	
  -­‐-­‐loopback	
  -­‐-­‐format=nt	
  	
  -­‐-­‐rules=NT	
  	
  
–  Hashcat	
  use	
  -­‐a	
  to	
  toggle	
  case	
  of	
  LM	
  cracked	
  hashes	
  
	
  
Something	
  to	
  consider!	
  

Albert	
  Einstein	
  
Ques9ons?	
  
Jeremy	
  Conway	
  

jeremy@sudosecure.com	
  
twi@er:	
  cj3r3my	
  

Thank	
  You!	
  
References	
  
THC-­‐Hydra:	
  h@p://www.thc.org/thc-­‐hydra/	
  
Mitmproxy:	
  h@p://mitmproxy.org/	
  
Burp	
  Suite:	
  h@p://portswigger.net/burp/	
  
HTTPS	
  Cache	
  Injec:on	
  AVack	
  (Bad	
  Memories):	
  
h@p://elie.im/talks/bad-­‐memories	
  
•  Wifi	
  Pineapple	
  (Karma	
  AVack):	
  	
  
h@ps://wifipineapple.com/	
  
•  LM	
  Hash:	
  	
  
h@p://en.wikipedia.org/wiki/LM_hash	
  
• 
• 
• 
• 

Weitere ähnliche Inhalte

Was ist angesagt?

Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Duo Security
 

Was ist angesagt? (11)

Basics of Meterpreter Evasion
Basics of Meterpreter EvasionBasics of Meterpreter Evasion
Basics of Meterpreter Evasion
 
Hijacking Softwares for fun and profit
Hijacking Softwares for fun and profitHijacking Softwares for fun and profit
Hijacking Softwares for fun and profit
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
 
Test & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated
 
Avalanche Disclosure
Avalanche DisclosureAvalanche Disclosure
Avalanche Disclosure
 
Tale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learnedTale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learned
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
Ground Zero Training- Metasploit For Web
Ground Zero Training- Metasploit For WebGround Zero Training- Metasploit For Web
Ground Zero Training- Metasploit For Web
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
Passwords, Attakcks, and Security, oh my!
Passwords, Attakcks, and Security, oh my!Passwords, Attakcks, and Security, oh my!
Passwords, Attakcks, and Security, oh my!
 

Ähnlich wie TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway

InheritedASecurityDept
InheritedASecurityDeptInheritedASecurityDept
InheritedASecurityDept
Amanda Berlin
 
Dmk sb2010 web_defense
Dmk sb2010 web_defenseDmk sb2010 web_defense
Dmk sb2010 web_defense
Dan Kaminsky
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
Dan Kaminsky
 

Ähnlich wie TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway (20)

Where to Start When Your Environment is Fucked
Where to Start When Your Environment is FuckedWhere to Start When Your Environment is Fucked
Where to Start When Your Environment is Fucked
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
InheritedASecurityDept
InheritedASecurityDeptInheritedASecurityDept
InheritedASecurityDept
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud Security
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
 
Dmk sb2010 web_defense
Dmk sb2010 web_defenseDmk sb2010 web_defense
Dmk sb2010 web_defense
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM Techniques
 
BSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on WheelsBSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on Wheels
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
 
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
ANALYZE'15 - Bulk Malware Analysis at Scale
ANALYZE'15 - Bulk Malware Analysis at ScaleANALYZE'15 - Bulk Malware Analysis at Scale
ANALYZE'15 - Bulk Malware Analysis at Scale
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Confidence web
Confidence webConfidence web
Confidence web
 
WiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFestWiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFest
 
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure  BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
 
A Technical Dive into Defensive Trickery
A Technical Dive into Defensive TrickeryA Technical Dive into Defensive Trickery
A Technical Dive into Defensive Trickery
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
How i'm going to own your organization v2
How i'm going to own your organization v2How i'm going to own your organization v2
How i'm going to own your organization v2
 

Mehr von EC-Council

Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
EC-Council
 

Mehr von EC-Council (20)

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway

  • 1. CYBER  SECURITY  VIA  TECHNOLOGY  FAILS Jeremy  Conway  
  • 2. Introduc:ons   •  Founder  and  Managing  Partner  @   SudoSecure   •  Creden:als:   –  16+  Years  in  Informa:on     Security   –  NASA,  DoD,  US  Army   –  MS,  Informa:on  Security   –  BS,  Computer  Science  and     Math   –  20+  Industry  Cer:fica:ons  
  • 3. The  true  sign  of  intelligence  is  not   knowledge  but  imagina9on.   Albert  Einstein  
  • 4. Demo  1:   This  is  not  the  A@ack  your  Looking  for!  
  • 5. IDS/IPS  and  Correla:on  Engines   •  Evading  an  IDS/IPS  requires  understanding   the  signature  (matching  paVern)   –  Most  cases  it  is  TRIVIAL  at  BEST  to  evade!   •  Correla:on  Engines  tend  to  use  simple  logic   –  Evading  these  complex  and  expensive  devices  is  EASY   when  it  relies  on  Insecure  Protocols!   •  Ge[ng  it  RIGHT!   –  Understand  the  limita:ons  of  Signature  Detec:on  Engines   –  Decompose  complex  rule  engines  and  correla:on  logic  to   iden:fy  possible  evasion  techniques   –  Consider  adding  a  “TRUSTED”     metric  value  when  designing     a  Secured  Architecture  
  • 6. Demo  2:  Can  you  spot  the  Imposter?  
  • 7. SSL  MiTM   •  “YES”  SSL  can  be  MiTM’ed   •  Encryp:on  does  not  imply  “No  Worries”!   •  Ge[ng  it  right!   –  Never  use  self-­‐signed  Cer:ficates   –  Never  allow  an  Exemp:on   –  Be  OVERLY  Paranoid!  
  • 8. Demo  3:   Outsourced  Trust,  the  Domino  Effect  
  • 9. Outsourced  Trust   •  The  Web  and  your  Browser  are  GREAT  at   CACHING   –  Even  when  it  is  Malicious  Injected  Badness   •  Two-­‐Factor  Authen:ca:on  doesn’t  solve   EVERTHING!   •  Ge[ng  it  Right!   –  Never  include  content  you  don’t  control  on  a  Secure  Site!  
  • 10. Demo  4:   Begging  to  be  Hi-­‐Jacked  
  • 11. WiFi  Hi-­‐Jacking   •  By  DEFAULT  most  Wireless  Devices  Probe  and  Connect   to  Preferred  Networks   •  Ge[ng  it  Right   –  Disable  Automa:c  Connec:ons  to  Preferred  Network  List   –  Disable  WiFi  when  NOT  in  Use  
  • 12. Demo  5:   Passwords  –  Are  you  doing  it  wrong?  
  • 13. LM  Passwords   •  •  •  •  Used  to  support  the  legacy  LAN  Manager  protocol   Disabled  by  default  on  Windows  star:ng  with  Vista   S:ll  found  enabled  everywhere  though!   Weaknesses:   –  Password  truncated  at  14  Chars     –  Split  into  2  halves  of  7  Char  passwords   –  Password  is  converted  to  UPPERCASE   •  PROTIPS:   –  Crack  LM  hashes  then  use  Cracked  password  to  aVack  NTLM   password   –  Free  Rainbow  Tables  (freerainbowtables.com)  will  crack  about   99%  of  LM  hashes  using  rcracki_mt   –  John  the  ripper  use:  -­‐-­‐loopback  -­‐-­‐format=nt    -­‐-­‐rules=NT     –  Hashcat  use  -­‐a  to  toggle  case  of  LM  cracked  hashes    
  • 14. Something  to  consider!   Albert  Einstein  
  • 15. Ques9ons?   Jeremy  Conway   jeremy@sudosecure.com   twi@er:  cj3r3my   Thank  You!  
  • 16. References   THC-­‐Hydra:  h@p://www.thc.org/thc-­‐hydra/   Mitmproxy:  h@p://mitmproxy.org/   Burp  Suite:  h@p://portswigger.net/burp/   HTTPS  Cache  Injec:on  AVack  (Bad  Memories):   h@p://elie.im/talks/bad-­‐memories   •  Wifi  Pineapple  (Karma  AVack):     h@ps://wifipineapple.com/   •  LM  Hash:     h@p://en.wikipedia.org/wiki/LM_hash   •  •  •  •