considerations and resources for practical securityconsiderationsandresourcesforpracticalsecurity...

64
Considerations and Resources for Practical Security Evan Misshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security 2018-02-25 1 / 48

Upload: others

Post on 25-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Considerations and Resources for Practical Security

Evan Misshula

2018-02-25

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 1 / 48

Page 2: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

what to expect

a lot of this presentation is humorousreal references at the endsecurity is incrementalperfect is the enemy of getting better

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 2 / 48

Page 3: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

what this is not

not about physical securitynot a tutorialnot what to do if the FBI, CIA of FSB is after you

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 3 / 48

Page 4: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

what we will cover some important security problems

passwords

ssh keysfile security

email

mobile/wifi

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 4 / 48

Page 5: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

what we will cover some important security problems

passwords

ssh keysfile security

email

mobile/wifi

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 4 / 48

Page 6: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

what we will cover some important security problems

passwords

ssh keysfile security

email

mobile/wifi

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 4 / 48

Page 7: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

what we will cover some important security problems

passwords

ssh keysfile security

email

mobile/wifi

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 4 / 48

Page 8: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

my exposure

I worked for three years for Center for Cybercrime Studies

I took at the GC:Secure Operating SystemsAdvanced Penetration Testing

I went to Eastern Regional Security Camps for the US Cyberchallengefor 2011 and 2012

I designed the curriculum for the High School for NSF/NSACybercamp at John Jay

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 5 / 48

Page 9: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

my exposure

I worked for three years for Center for Cybercrime Studies

I took at the GC:Secure Operating SystemsAdvanced Penetration Testing

I went to Eastern Regional Security Camps for the US Cyberchallengefor 2011 and 2012

I designed the curriculum for the High School for NSF/NSACybercamp at John Jay

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 5 / 48

Page 10: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

my exposure

I worked for three years for Center for Cybercrime Studies

I took at the GC:Secure Operating SystemsAdvanced Penetration Testing

I went to Eastern Regional Security Camps for the US Cyberchallengefor 2011 and 2012

I designed the curriculum for the High School for NSF/NSACybercamp at John Jay

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 5 / 48

Page 11: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

my exposure

I worked for three years for Center for Cybercrime Studies

I took at the GC:Secure Operating SystemsAdvanced Penetration Testing

I went to Eastern Regional Security Camps for the US Cyberchallengefor 2011 and 2012

I designed the curriculum for the High School for NSF/NSACybercamp at John Jay

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 5 / 48

Page 12: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

my exposure

I worked for three years for Center for Cybercrime Studies

I took at the GC:Secure Operating SystemsAdvanced Penetration Testing

I went to Eastern Regional Security Camps for the US Cyberchallengefor 2011 and 2012

I designed the curriculum for the High School for NSF/NSACybercamp at John Jay

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 5 / 48

Page 13: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

password problem

different for each entitylonger is betterrandom is better

humans need help

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 6 / 48

Page 14: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

password problem

different for each entitylonger is betterrandom is better

humans need help

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 6 / 48

Page 15: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

What we all think

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 7 / 48

Page 16: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

What about a really good password

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 8 / 48

Page 17: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

What about a really good password

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 8 / 48

Page 18: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

or with a nerd’s imagination

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 9 / 48

Page 19: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

terrible implications

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 10 / 48

Page 20: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

terrible implications

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 10 / 48

Page 21: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

One more problem

I will show you the solution I useBut there is one more problem

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 11 / 48

Page 22: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

too short

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 12 / 48

Page 23: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 13 / 48

Page 24: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 14 / 48

Page 25: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 15 / 48

Page 26: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 16 / 48

Page 27: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 17 / 48

Page 28: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 18 / 48

Page 29: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 19 / 48

Page 30: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 20 / 48

Page 31: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 21 / 48

Page 32: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 22 / 48

Page 33: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 23 / 48

Page 34: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 24 / 48

Page 35: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 25 / 48

Page 36: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 26 / 48

Page 37: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 27 / 48

Page 38: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 28 / 48

Page 39: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

:PROPERTIES: :BEAMERenv: frame :END:x

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 29 / 48

Page 40: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 30 / 48

Page 41: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 31 / 48

Page 42: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 32 / 48

Page 43: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 33 / 48

Page 44: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

A small slide-show from intel on passwords

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 34 / 48

Page 45: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

So the problem for IT

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 35 / 48

Page 46: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

So how does everyone do it?

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 36 / 48

Page 47: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Tutorials on ssh keys

OS X and LinuxSearch: standard unix password managerhttps://www.passwordstore.org/

WindowsSearch: keeperhttps://keepersecurity.com/personal.html

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 37 / 48

Page 48: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

How a password manager works

one very strong passwordit keeps all of your other usernames and passwordsit generates long random passwordsyou login by copying and pasting from your manager to the website

Don’t lose your laptop

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 38 / 48

Page 49: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

How a password manager works

one very strong passwordit keeps all of your other usernames and passwordsit generates long random passwordsyou login by copying and pasting from your manager to the website

Don’t lose your laptop

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 38 / 48

Page 50: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Keys

ssh keys are a pair of two large numberscall one: publiccall the other: private

that multiply to a very large number

That very large number is only divisible each of theseIt is equivelent to a 670 random character password

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 39 / 48

Page 51: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Tutorials on ssh keys

OS XSearch: osx generate ssh keyshttps://help.github.com/articles/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent/

WindowsSearch: windows generate ssh keyshttps://www.digitalocean.com/community/tutorials/how-to-use-ssh-keys-with-putty-on-digitalocean-droplets-windows-users

LinuxSearch: ubuntu generate ssh keys

https://help.ubuntu.com/community/SSH/OpenSSH/Keys

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 40 / 48

Page 52: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

So

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 41 / 48

Page 53: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

And now:

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 42 / 48

Page 54: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

But of course:

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 43 / 48

Page 55: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

File security

We can use our keys to encode a file even if the whole drive is notThe encoded file is called Ciphertext

We can also use our private key to encode emailgmail has plugins to automatically use our private keys so all email isencrypted

search: gmail encrypted emailhttps://support.google.com/mail/answer/6330403?hl=en

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 44 / 48

Page 56: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

File security

We can use our keys to encode a file even if the whole drive is notThe encoded file is called Ciphertext

We can also use our private key to encode emailgmail has plugins to automatically use our private keys so all email isencrypted

search: gmail encrypted emailhttps://support.google.com/mail/answer/6330403?hl=en

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 44 / 48

Page 57: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

File security

We can use our keys to encode a file even if the whole drive is notThe encoded file is called Ciphertext

We can also use our private key to encode emailgmail has plugins to automatically use our private keys so all email isencrypted

search: gmail encrypted emailhttps://support.google.com/mail/answer/6330403?hl=en

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 44 / 48

Page 58: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Basic email security

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 45 / 48

Page 59: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Check before you click

1 Did this come from someone you know?2 What is file extension?

don’t click on anything that "pdf.exe", "docx.exe", "pptx.exe"3 Videos (Adobe Flash) can execute arbitrary code on your computer

1 Do not ever watch porn on a computer you need to keep secure

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 46 / 48

Page 60: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Check before you click

1 Did this come from someone you know?2 What is file extension?

don’t click on anything that "pdf.exe", "docx.exe", "pptx.exe"3 Videos (Adobe Flash) can execute arbitrary code on your computer

1 Do not ever watch porn on a computer you need to keep secure

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 46 / 48

Page 61: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Mobile/wifi

Don’t do your banking at Starbucks on their wifi

Anything you share in plaintext is vulnerable

Don’t let your phone automatically connecthackers use strong signals to get a shot at your mobile data

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 47 / 48

Page 62: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Mobile/wifi

Don’t do your banking at Starbucks on their wifi

Anything you share in plaintext is vulnerable

Don’t let your phone automatically connecthackers use strong signals to get a shot at your mobile data

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 47 / 48

Page 63: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Mobile/wifi

Don’t do your banking at Starbucks on their wifi

Anything you share in plaintext is vulnerable

Don’t let your phone automatically connecthackers use strong signals to get a shot at your mobile data

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 47 / 48

Page 64: Considerations and Resources for Practical SecurityConsiderationsandResourcesforPracticalSecurity EvanMisshula 2018-02-25 Evan Misshula Considerations and Resources for Practical Security

Great resources on security

Verne Paxsonhttp://www.icir.org/vern/

Avinash Kakhttps://engineering.purdue.edu/kak/compsec/Lectures.html

Evan Misshula Considerations and Resources for Practical Security 2018-02-25 48 / 48