Insecurity-In-Security version.2 (2011)

23
Hacker's Work Hacker's Work is is a Form Of a Form Of Participation Participation in the Work of in the Work of God in Creation God in Creation .” .” -by, -by, Father Antonio Sapadaro (Vatican) Father Antonio Sapadaro (Vatican) R e c e n t N e w s

description

Presentation (version.2) from 2011 describing how Security mechanisms placed to secure us are insecure themselves.

Transcript of Insecurity-In-Security version.2 (2011)

Page 1: Insecurity-In-Security version.2 (2011)

““Hacker's WorkHacker's Work isis a Form Of a Form Of Participation Participation in the Work of in the Work of God in CreationGod in Creation.”.”

-by, -by, Father Antonio Sapadaro (Vatican)Father Antonio Sapadaro (Vatican)

R e c e n

t

N e w s

Page 2: Insecurity-In-Security version.2 (2011)

Do You?Do You?

+ O.S. User Accounts

+ Browse Web

+ Use Web Services

+ Use Computer Networks Any Way

+ Have Any Form Of Binary Data

Page 3: Insecurity-In-Security version.2 (2011)

You Are Not Secure If You Don't...You Are Not Secure If You Don't...

+ Use Strong Passwords 'n Keep Them Safe

+ Browse Web In Safe Browsers

+ Use SSL-ified Web Services

+ Use Patched Name Servers

+ Keep Your Data Protected

Page 4: Insecurity-In-Security version.2 (2011)

You Are InSecure Even If You Did...You Are InSecure Even If You Did...

Page 5: Insecurity-In-Security version.2 (2011)

IInnSSecurityecurity

SSecurityecurity

IInn

Security is just maintained... it's never achieved.

Page 6: Insecurity-In-Security version.2 (2011)

First Some history from Version First Some history from Version 11

Page 7: Insecurity-In-Security version.2 (2011)

O.S. User AccountsO.S. User Accounts

Page 8: Insecurity-In-Security version.2 (2011)

Bypass Account ProtectionBypass Account Protection

Page 9: Insecurity-In-Security version.2 (2011)

Vaccinated BrowsersVaccinated Browsers

Page 10: Insecurity-In-Security version.2 (2011)

Browsing <Unknown> WWWBrowsing <Unknown> WWW

[+] SMBEnum |=+ using 'file ://', 'res ://', 'resource ://' Say, if it gains success accessing 'file:///c:/oracle/ora81/bin/orclcontainer.bmp'

[+] ResTiming Attack |=+ using 'res ://', 'resource ://' to execute So, gains timing for different binaries & Identify which exists

Page 11: Insecurity-In-Security version.2 (2011)

Protector of AllProtector of All

Page 12: Insecurity-In-Security version.2 (2011)

Defeating SSLDefeating SSL

[] “Signing Authority” field in Digital Certificates

[] Tricking SSL Libraries with NULL Mod Certificates

[] Online Certificate Revocation Policy {ResponseStatus=3, ResponseBytes='' || SSL}

Page 13: Insecurity-In-Security version.2 (2011)

Basis Of All NetworksBasis Of All Networks

Page 14: Insecurity-In-Security version.2 (2011)

DNSSEC ain't all GOODDNSSEC ain't all GOOD

[] Provides 'Origin Auth', 'Integrity Protection', PKI & even Auth. Denial of Data Existence

[] Still No 'Confidentiality' {basics of security} AND CPU-flooding is possible due to exhaustive cryptography

[] Variation of DNS Rebinding Attack presented at BH2010 still affected network

Page 15: Insecurity-In-Security version.2 (2011)

Data ForensicsData Forensics

Page 16: Insecurity-In-Security version.2 (2011)

Data Forensic HackersData Forensic Hackers

[] Data Carving (Imaging RAM, Dig O.S.)

[] Dig Information from Files

[] Timestomp, Zipbomb

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

[] Mining Network Traffic for Files/Sessions

Page 17: Insecurity-In-Security version.2 (2011)

Now Some Mystery for Version Now Some Mystery for Version 22

Page 18: Insecurity-In-Security version.2 (2011)

Hash-Crack on SteroidsHash-Crack on Steroids

http://hashcat.net/oclhashcat/

Page 19: Insecurity-In-Security version.2 (2011)

'RSA' Theft & Threat'RSA' Theft & Threat

http://www.schneier.com/blog/archives/2011/03/rsa_security_in.html

Page 20: Insecurity-In-Security version.2 (2011)

Comodo Pwn3d CertSComodo Pwn3d CertS

Janam Fadaye Rahbar

http://www.wired.com/threatlevel/2011/03/comodo_hack/

Page 21: Insecurity-In-Security version.2 (2011)

OpenBSD 'n BackdoorsOpenBSD 'n Backdoors

[]10yrs back FBI consulted NETSEC, CTO Perry

[]Lotz of code commit by NETSEC developers

[]Few daz back, Perry's NDA expired with FBI

[]Alleged backdoors in IPSEC Stack

[]FreeBSD inherited lotz code from OpenBSD

http://marc.info/?l=openbsd-tech&m=129236621626462&w=2

Page 22: Insecurity-In-Security version.2 (2011)

Samsung Key-loG ConflictSamsung Key-loG Conflict

http://arstechnica.com/hardware/news/2011/03/samsung-laptop-keylogger-almost-certainly-a-false-positive.ars

Page 23: Insecurity-In-Security version.2 (2011)

Who Is This Guy?Who Is This Guy?Family Named: AbhishekKrFriends Call: ABKg33k Handle: aBionic {@Twitter, @LinkedIn, @Facebook}

Itweet : http://www.twitter.com/aBionic

iBlog: http://abhishekkr.wordpress.com

Security Enthusiast; Working for ThoughtWorks Inc.; OpenSource Lover

My Crime Is That Of CurosityMy Crime Is That Of Curosity

ANY QUESTIONS?ANY QUESTIONS?