Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... ·...

17
Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security, CNE Senior Security Engineer Law Enforcement Tech Lead CSS Security [email protected]

Transcript of Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... ·...

Page 1: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Layer8 and the attack of the flying pigs

Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security, CNESenior Security EngineerLaw Enforcement Tech LeadCSS [email protected]

Page 2: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Agenda

Microsoft CSS Security

Brief overview of the trends we’re seeing

Top 10 Microsoft Attack Vectors

Social engineering

Beast Demo

Tools

Page 3: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Microsoft CSS Security“Hacking the hackers”

Who we are

Incident Response specialists

What we do

Compromised = free MS support

TACTICAL mitigation

Postmortem analysis

Recommendations to help the customer secure against another attack

Get Security Support: http://www.microsoft.com/uk/protect/support/default.mspx

Page 4: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Trends we’re seeing

Sharp increase in cyber crime

Monetary incentive

Low risk of capture

Targeted attacks

Availability of web based info

Growth of the insider threat

Focus moving away from the OS

Attacking the applications

Combined with web app attacks

Page 5: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Attack Vectors:Our Customers Top 10

Social Engineering

Education (x3!), defence in depth, run as limited user, transparent security controls

Technological attacks:

Mass SQL Injection ASP.NET coding best practises, SDL for developers

Passwords Make em long and complex, change them every 90 days

Physical Attacks Bitlocker in advanced mode, disable 1394 device drivers, EFS, strong

passwords

Page 6: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Attack Vectors:Our Customers Top 10

Technological attacks, cont.:

Remote Code Execution Vulnerabilities Defence in depth, patch management

NULL Session Enumeration

Set RestrictAnonymous reg key – watch out for compat issues

http://support.microsoft.com/kb/823659

UnauthN Network Access

NAP, NAC technologies

VPN Servers

Harden the base machine, tighten access as per:

http://technet.microsoft.com/en-us/library/bb794723.aspx

Page 7: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,
Page 8: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Threat – Social Engineering

Why?

Most of your attackers already have access

It is a lot harder to configure users

Most attacks against layer 8 succeed immediately

http://zdnet.com.com/2100-1105_2-5195282.html

An example: Flying Pigs

Page 9: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,
Page 10: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Real example

Page 11: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

vcodec.com

V-codec.com

vcodecdownload.com

vcodec-download.com

vcodecget.com

vcodec-get.com

vcodecpull.com

Vicodec.com

Vidcodec.com

vidscodec.com

zcodec.com

myspace.com/82959792

Page 12: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Another type of threat...

Page 13: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,
Page 14: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Evolution of Security Controls

Protection must move to the endpoints and the data

Network can no longer be the primary enforcement point

Page 15: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Social Engineering

THE best way to get hold of classified information

Products will in most cases NOT block the attack

KNOWLEDGE is the key to ensure this attack vector doesn’t work

Page 16: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Threat – Social Engineering

Demo: Beast Malware

Demo: Sysinternals\autoruns\WOLF

Page 17: Layer8 and the attack of the flying pigsdownload.microsoft.com/documents/uk/security/issa/... · Layer8 and the attack of the flying pigs Lesley Kipling: CCE, CISA, CISSP, MCSE:+Security,

Questions?