apocalypse now? - cisco · © 2008 cisco systems, inc. all rights reserved. 1 apocalypse now? msc....

55
© 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

Upload: others

Post on 04-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2008 Cisco Systems, Inc. All rights reserved. 1

Apocalypse Now?

MSc. Ivica Ostojic CISSP, CISM

Thursday, November 5, 2009

Page 2: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 2

Warning – Disclaimer - Upozorenje

Thursday, November 5, 2009

Page 3: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 2

Warning – Disclaimer - Upozorenje

Neither Cisco or the presentor encourages the use of any methods and/or tools mentioned within this

presentation without the expresses aproval and signed agreement with the owner of the IT

infrastructure in question.

Thursday, November 5, 2009

Page 4: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 2

Warning – Disclaimer - Upozorenje

Neither Cisco or the presentor encourages the use of any methods and/or tools mentioned within this

presentation without the expresses aproval and signed agreement with the owner of the IT

infrastructure in question.

The unathorised usage of the aforementioned tools and/or methods could lead to legal prosecution

and severe penalties.

Thursday, November 5, 2009

Page 5: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 3Thursday, November 5, 2009

Page 6: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 3

First – words of wizdom

Thursday, November 5, 2009

Page 7: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 4

If you know the enemy and know yourself, you need

not fear the result of a hundred battles. If you know yourself but not the

enemy, for every victory gained you will also suffer a defeat. If you know

neither the enemy nor yourself, you will succumb in every battle.

Thursday, November 5, 2009

Page 8: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 5Thursday, November 5, 2009

Page 9: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 5Thursday, November 5, 2009

Page 10: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 5Thursday, November 5, 2009

Page 11: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 6Thursday, November 5, 2009

Page 12: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 6

Back to IT security ;-)

Thursday, November 5, 2009

Page 13: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 7Thursday, November 5, 2009

Page 14: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 8Thursday, November 5, 2009

Page 15: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 9Thursday, November 5, 2009

Page 16: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 10

Black Hats

Thursday, November 5, 2009

Page 17: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 10

Black Hats

Thursday, November 5, 2009

Page 18: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 10

Black Hats

Thursday, November 5, 2009

Page 19: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 10

Black Hats

Thursday, November 5, 2009

Page 20: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 10

Black Hats

Thursday, November 5, 2009

Page 21: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 11

Attack by web sites

Thursday, November 5, 2009

Page 22: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 11

Attack by web sites

Thursday, November 5, 2009

Page 23: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 11

Attack by web sites

Thursday, November 5, 2009

Page 24: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 11

Attack by web sites

Thursday, November 5, 2009

Page 25: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 12Thursday, November 5, 2009

Page 26: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 12

WELCOME TO DARK MARKET

Thursday, November 5, 2009

Page 27: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 13

Dark Market – The Bazaar

Thursday, November 5, 2009

Page 28: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 13

Dark Market – The Bazaar

Thursday, November 5, 2009

Page 29: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 13

Dark Market – The Bazaar

Thursday, November 5, 2009

Page 30: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 13

Dark Market – The Bazaar

Thursday, November 5, 2009

Page 31: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 13

Dark Market – The Bazaar

Thursday, November 5, 2009

Page 32: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 13

Dark Market – The Bazaar

Thursday, November 5, 2009

Page 33: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 13

Dark Market – The Bazaar

Thursday, November 5, 2009

Page 34: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 13

Dark Market – The Bazaar

Thursday, November 5, 2009

Page 35: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 13

Dark Market – The Bazaar

Thursday, November 5, 2009

Page 36: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 13

Dark Market – The Bazaar

Thursday, November 5, 2009

Page 37: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 14Thursday, November 5, 2009

Page 38: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved.

Bluetooth

14Thursday, November 5, 2009

Page 39: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 15Thursday, November 5, 2009

Page 40: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 15Thursday, November 5, 2009

Page 41: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 15Thursday, November 5, 2009

Page 42: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 16

Security Posture Assessment

About SPA

Things We’ve Found

Thursday, November 5, 2009

Page 43: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 17

About SPA

SPA is a ‘snap shot’ of the current state of a network, identifying and detailing how the network can be compromised and so highlighting risk factors

A hybrid penetration test and vulnerability assessment

Delivered using a combination of commercial and proprietary tools

The proprietary tools are developed and maintained in house with capabilities that extend beyond standard commercial tools, both in terms of efficiency and robustness

SPA is available in two ‘families’:Vector-defined: how unauthorised access is gained to a networkFunctional: testing an aspect of network functionality

Thursday, November 5, 2009

Page 44: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 18

About SPAExternal SPA Internal SPAWireless SPA

Assessment DescriptionConducted from Cisco SOCIdentify Internet visible vulnerabilities

Value PropositionMature service offeringProprietary toolsIndustry leading expertise

ImpactProtect intellectual capitalHarden Internet perimeter

Assessment DescriptionLocate rogue access pointsReview 802.11 security

Value PropositionJoint NAR offering with WWWPProprietary toolsIndustry leading expertise

ImpactProtect intellectual capitalLocate and disable backdoors

Assessment DescriptionOn-site inspectionTrusted insider perspective

Value PropositionMature service offeringProprietary toolsIndustry leading expertise

ImpactProtect intellectual capitalMeet compliance requirementsMergers and acquisitions

Thursday, November 5, 2009

Page 45: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 19

About SPA

Source: Placeholder for Notes is 14 points

Unified Communications SPA “Leak Test”Web Application SPA

Assessment DescriptionOn-site assessmentTrusted insider perspectiveIdentify VoIP / IPT vulnerabilities

Value PropositionProprietary toolsIndustry leading expertise

ImpactProtect intellectual capitalMeet compliance requirementsMergers and acquisitions

Assessment DescriptionIn-depth review of web app(s)Black-box and white-box testingIntegrate into development lifecycle

Value PropositionProprietary toolsIndustry leading expertise

ImpactProtect intellectual capitalMeet compliance requirementsHarden web applications

Assessment DescriptionLocate unauthorized Internet accessCollector - injector architectureOn-site assessment

Value PropositionProprietary toolsIndustry leading expertise

ImpactProtect intellectual capitalMeet compliance requirementsMergers and acquisitions

Thursday, November 5, 2009

Page 46: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 20

About SPA

FeaturesManaged

vulnerability scan

(e.g. Qualys)

Traditional penetration

test

Cisco SPA(vector-defined)

Automated ICMP (ping) scan Full TCP and UDP scans for asset fingerprinting In-depth vulnerability scan Manual confirmation of vulnerabilities through secondary exploitation, so removing false positives

Wireless Access Point configuration review, rogue AP detection and wireless authentication analysis

Understand and prove how vulnerabilities on one system can be exploited to provide access to another

Prove and report unauthorised system access Validate compliance against relevant parts of ISO27001 framework and industry best practices

Formal report, including in-depth analysis specific to your network, by security experts

Onsite report presentation / workshop ?

Thursday, November 5, 2009

Page 47: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 21

About SPA

Why is a vector-defined SPA different from a penetration test or vulnerability assessment service?

Comprehensive approach – we look for all ways into the network, not just a sampling of some IPs, attack vectors, etc.

Confirm the presence of vulnerabilities on network – leverage non-destructive exploits to gain root access, prove the risk

Prioritize vulnerabilities – all vulnerabilities are rated (low, medium or high) to help prioritise remediation effortsPerform secondary exploitation – skilled security experts undertake a detailed analysis of how vulnerabilities can be used in combination to gain unauthorized access

Thursday, November 5, 2009

Page 48: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 22

CONCLUSION – GINSBERG THEOREM

Thursday, November 5, 2009

Page 49: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 22

CONCLUSION – GINSBERG THEOREM

You can’t win!

Thursday, November 5, 2009

Page 50: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 22

CONCLUSION – GINSBERG THEOREM

You can’t win!You can’t break even!

Thursday, November 5, 2009

Page 51: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 22

CONCLUSION – GINSBERG THEOREM

You can’t win!You can’t break even!You can’t even quit the game!

Thursday, November 5, 2009

Page 52: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 23

Ehermans Corollary to Ginsberg’s Theorem

Things will get worse before they get better!Who said things would get better??

Thursday, November 5, 2009

Page 53: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 23

Ehermans Corollary to Ginsberg’s Theorem

Things will get worse before they get better!Who said things would get better??

Thursday, November 5, 2009

Page 54: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 24

Conclusion...

Thursday, November 5, 2009

Page 55: Apocalypse Now? - Cisco · © 2008 Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM Thursday, November 5, 2009

© 2007 Cisco Systems, Inc. All rights reserved. 25Thursday, November 5, 2009