hack in the box (dubai) 04172008

63
Did you know? Hacks Happen Jeremiah Grossman Founder & CTO WhiteHat Security 1

Upload: guesta84549

Post on 09-Jun-2015

3.338 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Hack In The Box (Dubai) 04172008

Did you know? Hacks Happen

Jeremiah GrossmanFounder & CTO WhiteHat Security

1

Page 2: Hack In The Box (Dubai) 04172008

First Book I Read on Website Security

“It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. It's just not true.

Cryptography can't do any of that.” :(2

Page 3: Hack In The Box (Dubai) 04172008

Did you know?

3

Page 4: Hack In The Box (Dubai) 04172008

By the End of 2008...

17 million programmers

worldwideWriting 6,000 lines of code per year (each)

4

Page 5: Hack In The Box (Dubai) 04172008

Windows 2000 29 MillionRed Hat Linux 7.1 30 Million

Windows XP 40 MillionWindows Vista 50 MillionMac OS X 10.4 86 Million

= 102 BillionNew lines of code pushed per year

5

Page 6: Hack In The Box (Dubai) 04172008

Conservative research says: 1 security defect for every 10,000 lines of code

6

Page 7: Hack In The Box (Dubai) 04172008

(potentially) newundiscoveredvulnerabilities

850,000 per month 28,000 per day

10,200,000per year

7

Page 8: Hack In The Box (Dubai) 04172008

If only 1% of new undiscovered vulnerabilities are exploitable:

102,000zero-days per year

8

Page 9: Hack In The Box (Dubai) 04172008

Location of the other ~95,000:

In 2007 IBM X-force reported vulnerabilities 6,437

Total vulnerabilities EVER reported in National Vulnerability Database CVE Publication rate: 16 vulnerabilities / day

30,253

unknown

9

Page 10: Hack In The Box (Dubai) 04172008

By the end of this presentation:

10 millionnewly written lines of code

2,739 new websites

10,000 new undiscovered vulnerabilities

10

Page 11: Hack In The Box (Dubai) 04172008

Did you know?

11

Page 12: Hack In The Box (Dubai) 04172008

Web application flaws account for 4 of the top 5 spots in well-known vulnerabilities

Roughly 70% of developers work on Web-related projects

12

Page 13: Hack In The Box (Dubai) 04172008

Qualys: from Q3/2002 to Q3/2005 performed 32,147,000 vulnerability ip-scans...

Identified 21,347,000 critical issues*providing an attacker the ability to gain full control of the system,and/or leakage of highly sensitive information

13

Page 14: Hack In The Box (Dubai) 04172008

The average window of exposure (before patching) for well-known vulnerabilities affecting

enterprise vendors:

55 daysEnough time for...

15 billion new lines of code15 thousand potential zero-days

880 disclosed well-known vulnerabilities

80% of exploits are available within

19 daysof disclosure.

14

Page 15: Hack In The Box (Dubai) 04172008

if every 10 seconds...

It would take about 3 years to find all the new vulnerabilities

for just this year.

If all new code is inspectedto find 1 undiscovered

vulnerability every 60 seconds...

We’d never find them all.

15

Page 16: Hack In The Box (Dubai) 04172008

starting in 2006The Department of Homeland Security spent

$300,000 (US) on a project to find and fix security defects in 180 Open Source projects.

Found 1 security defect per 1,000 lines (not 10,000)

7,826 defects fixed

1 defect remediated every 2 hours

$38 per vulnerabilityBy 2012 over 90% of enterprises will use open source

16

Page 17: Hack In The Box (Dubai) 04172008

PayPal or eBay Acct $8Credit cards w/ CCV & exp $25

WMF Exploit $4,000RealPlayer 11 $10,000OS X $10,000 +

15-inch MacBook Pro

0-Days

Windows Vista $50,000

What Microsoft pays for 0-days... $0

$1,000Bank Acct

World-of-Warcraft l-70 Acct $4

Internet Explorer $100,000

17

Page 18: Hack In The Box (Dubai) 04172008

China-based online “Password Recovery” services:

1. 300 Yuan ($43) to break an overseas mailbox password, with 85% probability of success.

2. 200 Yuan ($29) to break a domestic mailbox password, with 90% probability of success. 3. 1000 Yuan ($143) to break a company’s mailbox password (no success rate given).

Also on the menu:passwords for 163, 126, QQ, Yahoo, Sohu, Sina, TOM, Hotmail, MSN…etc.

18

Page 19: Hack In The Box (Dubai) 04172008

Did you know?

19

Page 20: Hack In The Box (Dubai) 04172008

There are

162,000,000 websites

millions more added per month

20

Page 21: Hack In The Box (Dubai) 04172008

809,000 websites use SSL

have something worth protecting

21

Page 22: Hack In The Box (Dubai) 04172008

More than a year after Extended Validation

certificates offered to “fight phishing scams”

less than 5,000 websites upgraded

22

Page 23: Hack In The Box (Dubai) 04172008

Multiple experts report

9 out of 10 websites have vulnerabilities

potentially allowing hackers unauthorized access

23

Page 24: Hack In The Box (Dubai) 04172008

If there’s just 1 vulnerability on 90% of the SSL websites...Other reports say an average of 7

728,100 total vulnerabilities

24

Page 25: Hack In The Box (Dubai) 04172008

Time to Fix

180 270 365

Days

URGENT

CRITICAL

HIGH

180 270 365

180 270 365

25

Page 26: Hack In The Box (Dubai) 04172008

XSSed.com has reported:

20,843 total vulnerabilities

1,072 fixed (5%)

26

Page 27: Hack In The Box (Dubai) 04172008

Experts say 90% of externally accessible applications today are Web-enabled, and two-thirds have exploitable vulnerabilities.

Likelihood that a website has a vulnerability, by Class

27

Page 28: Hack In The Box (Dubai) 04172008

28

Page 29: Hack In The Box (Dubai) 04172008

Do you know about XSLF?

29

Page 30: Hack In The Box (Dubai) 04172008

No one does

Because XSLF doesn’t exist

Yet.

How can we secure applications against technologies and attacks that don’t exist?

30

Page 31: Hack In The Box (Dubai) 04172008

Website Founded

Amazon 1994

Yahoo 1995

eBay 1995

Bank of America 1997

Google 1998

MySpace 2003

YouTube 2005

Vulnerability Attack

Buffer Overflow 1996

Command Injection 1996

SQL Injection 2004

XSS 2005

Predictable Resource Location ?

HTTP Response Splitting 2005 / ?

CSRF ?

More major websites were launched before significant classes of attack were “well-known”

31

Page 32: Hack In The Box (Dubai) 04172008

The Attack of the TINY URLsBackdooring MP3 FilesBackdooring QuickTime MoviesCSS history hacking with evil marketingI know where you've beenStealing Search Engine Queries with JavaScriptHacking RSS FeedsMX Injection : Capturing and Exploiting Hidden Mail ServersBlind web server fingerprintingJavaScript Port ScanningCSRF with MS WordBackdooring PDF FilesExponential XSS AttacksMalformed URL in Image Tag Fingerprints Internet ExplorerJavaScript Portscanning and bypassing HTTP AuthBruteforcing HTTP Auth in Firefox with JavaScriptBypassing Mozilla Port BlockingHow to defeat digg.comA story that diggs itselfExpect Header Injection Via FlashForging HTTP request headers with FlashCross Domain Leakage With Image SizeEnumerating Through User AccountsWidespread XSS for Google Search ApplianceDetecting States of Authentication With Protected ImagesXSS Fragmentation AttacksPoking new holes with Flash Crossdomain Policy FilesDetecting Privoxy Users and Circumventing ItUsing CSS to De-AnonymizeResponse Splitting Filter EvasionAdultspace XSS Worm

Newest Web Hacking TechniquesCSS History Stealing Acts As CookieDetecting FireFox ExtensionsStealing User Information Via Automatic Form FillingCircumventing DNS Pinning for XSSNetflix.com XSRF vulnBrowser Port Scanning without JavaScriptWidespread XSS for Google Search ApplianceBypassing Filters With EncodingVariable Width EncodingNetwork Scanning with HTTP without JavaScriptAT&T Hack Highlights Web Site VulnerabilitiesHow to get linked from SlashdotF5 and Acunetix XSS disclosureAnti-DNS Pinning and Circumventing Anti-Anti DNS pinningGoogle plugs phishing holeNikon magazine hit with security breachGovernator HackMetaverse breached: Second Life customer database hackedHostGator: cPanel Security Hole Exploited in Mass HackI know what you've got (Firefox Extensions)ABC News (AU) XSS linking the reporter to Al QaedaAccount Hijackings Force LiveJournal ChangesXanga Hit By Script WormAdvanced Web Attack Techniques using GMailPayPal Security Flaw allows Identity TheftInternet Explorer 7 "mhtml:" Redirection Information DisclosureBypassing of web filters by using ASCIIGoogle Indexes XSSXML Intranet Port ScanningIMAP Vulnerable to XSSSelecting Encoding Methods For XSS Filter Evasion

32

Page 33: Hack In The Box (Dubai) 04172008

Anonymizing RFI Attacks Through GoogleGoogle Hacks On Your BehalfGoogle Dorks Strike AgainCross-Site Printing (Printer Spamming)Stealing Pictures with PicasaHScan ReduxISO-8895-1 Vulnerable in Firefox to Null InjectionMITM attack to overwrite addons in FirefoxMicrosoft ASP.NET Request Validation Bypass Vulnerability (POC)Non-Alpha-Non-Digit 3Steal History without JavaScriptPure Java™, Pure Evil™ PopupsGoogle Adsense CSRF holeThere’s an OAK TREE in my blog!?!?!BK for Mayor of Oak Tree ViewGoogle Docs puts Google Users at RiskAll Your Google Docs are Belong To US…Java Applets and DNS RebindingScanning internal Lan with PHP remote file opening.Firefox File Handling WoesFirefoxurl URI Handler FlawBugs in the Browser: Firefox’s DATA URL Scheme VulnerabilityMultiviews Apache, Accept Requests and free listingOptimizing the number of requests in blind SQL injectionBursting Performances in Blind SQL Injection - Take 2 (Bandwidth)Port Scan without JavaScriptFavorites Gone WildLogin Detection without JavaScriptAnti-DNS Pinning ( DNS Rebinding ) : Online DemonstrationUsername Enumeration Timing Attacks (Sensepost)Google GMail E-mail Hijack TechniqueRecursive Request DoSExaggerating Timing Attack Results Via GET FloodingInitiating Probes Against Servers Via Other Servers

Effects of DNS Rebinding On IE’s Trust ZonesPaper on Hacking Intranets Using Websites (Not Web Browsers)More Port Scanning - This Time in FlashHTTP Response Splitting and Data: URI scheme in FirefoxRes:// Protocol Local File EnumerationRes Timing AttackIE6.0 Protocol GuessingIE 7 and Firefox Browsers Digest Authentication Request SplittingHacking Intranets Via Brute ForceHiding JS in Valid ImagesInternet Archiver Port ScannerNoisy Decloaking MethodsCode Execution Through Filenames in UploadsCross Domain Basic Auth Phishing TacticsAdditional Image Bypass on WindowsDetecting users via Authenticated RedirectsPassing Malicious PHP Through getimagesize()Turn Any Page Into a Greasemonkey PopupEnumerate Windows Users In JSAnti-DNS Pinning ( DNS Rebinding ) + Socket in FLASHIframe HTTP PingRead Firefox Settings (PoC)Stealing Mouse Clicks for Banner Fraud(Non-Persistent) Untraceable XSS AttacksInter Protocol ExploitationDetecting Default Browser in IEBypass port blocking in Firefox, Opera and Konqueror.LocalRodeo DetectionImage Names Gone BadIE Sends Local Addresses in Referer HeaderPDF XSS Can Compromise Your MachineUniversal XSS in Adobe’s Acrobat Reader PluginFirefox Popup Blocker Allows Reading Arbitrary Local FilesIE7.0 Detector

33

Page 34: Hack In The Box (Dubai) 04172008

overwriting cookies on other people’s domains in Firefox.Embeding SVG That Contains XSS Using Base64 Encoding in FirefoxFirefox Header Redirection JavaScript ExecutionMore URI Stuff… (IE’s Resouce URI)Hacking without 0days: Drive-by JavaGoogle Urchin password theft madnessUsername Enumeration VulnerabilitiesClient-side SQL Injection AttacksContent-Disposition HackingFlash Cookie Object TrackingJava JAR Attacks and FeaturesSevere XSS in Google and Others due to the JAR protocol issuesWeb Mayhem: Firefox’s JAR: Protocol issues (bugzilla)0DAY: QuickTime pwns FirefoxExploiting Second LifeInjecting the script tag into XMLCross-Browser Proxy UnmaskingSpoofing Firefox protected objects

Most of them unresolved

34

Page 35: Hack In The Box (Dubai) 04172008

Google Hacking (code search)(request.form|request.querystring) lang:asp

Results 1 - 10 of about 15,400

(response.write) (request.form) lang:aspResults 1 - 10 of about 8,000

35

Page 36: Hack In The Box (Dubai) 04172008

Ajax

Silverlight

Flash/Flex

Ruby on Rails

DojoC#

JavaScript

JSON

OpenID

Widgets

SaaS

HTML5Python

J2EE

MooTools

RSS

Social Networks

OpenSocial OpenSocial

Welcome to

Web 2.036

Page 37: Hack In The Box (Dubai) 04172008

Did you know?

37

Page 38: Hack In The Box (Dubai) 04172008

Studies indicate that 75% of security breaches are due to flaws in software.

71% of vulnerabilities reported during Q4 2007 affected Web apps, up 3% from Q3.

90% of IT security spending is on perimeter security such as firewalls

38

Page 39: Hack In The Box (Dubai) 04172008

Bill rate for a source code reviewer $150 (US)per hour

$25,000 (US)Source code review for the average small to mid-sized website

To cover 10% of the SSL Websites (~80,000) ...

Total man hours 13,360,000

Source code reviewers 6,680

Annual economic burden $2,000,000,000 (US)

39

Page 40: Hack In The Box (Dubai) 04172008

And then we still have to fix the vulnerabilities

Hackers just need to exploit one to get in.

40

Page 41: Hack In The Box (Dubai) 04172008

"Personally, I'd love to see everyone go through an OWASP-based source-code review, but certainly, that's not going to happen."

Bob RussoPCI Standards Council General Manager

41

Page 42: Hack In The Box (Dubai) 04172008

“ There is no "secure development lifecycle" in the vast majority of universities' degree programs - that is, security is not "baked into" graduates of relevant programs (e.g., computer science) throughout their degree programs. And that is a problem, perhaps the problem plaguing the software industry.”

Mary Ann DavidsonChief Security Officer at Oracle

42

Page 43: Hack In The Box (Dubai) 04172008

Survey of the Web application security community

69% Hunt for website vulnerabilities without permission

50% Said they’d disclose findings to the owner.

73% Believe PCI-DSS will make little to no difference

90% Say the average user has no way to protect themselves from being exploited online.

43

Page 44: Hack In The Box (Dubai) 04172008

What does this mean?Hacks Happen

44

Page 45: Hack In The Box (Dubai) 04172008

493,000 in 2005

752,000 in 2006

480,000 in 2007

Website Defacements

~1 defacement every second

45

Page 46: Hack In The Box (Dubai) 04172008

A new infected Web page is discovered every:14 seconds 24 hours a day365 days a year

Over 50% of websites hosting malicious code are legitimate(compromised by attackers)

46

Page 47: Hack In The Box (Dubai) 04172008

2006, 0.3% of all Internet queries return at least one URL containing malicious content.

2007, 1.3%

47

Page 48: Hack In The Box (Dubai) 04172008

48

Page 49: Hack In The Box (Dubai) 04172008

MySpace Samy Worm1 millions profiles infected

Code Red359,000 infected computers

Code Red II275,000 infected computers

Slammer’s55,000 - 75,000 (10 minutes)

Blaster336,000 infected computers

1st generation malware

(first 24 hours)

49

Page 50: Hack In The Box (Dubai) 04172008

52,771 active bot-infected computers were observed per

day in the first half of 2007

50

Page 51: Hack In The Box (Dubai) 04172008

Kraken400,000 infected computers

Srizbi315,000 infected computers

Storm200,000 infected computers

2nd generation malware

51

Page 52: Hack In The Box (Dubai) 04172008

Did you know?

52

Page 53: Hack In The Box (Dubai) 04172008

Conservative estimates put the total annual IT security spend in the US at $50 billion and e-crime losses at $100 billion.

We’re losing two dollars for every dollar spent.

53

Page 54: Hack In The Box (Dubai) 04172008

In 2007 the FBI's Internet Crime Complaint Center:

220,000 Online fraud complains

US consumers losing more than $239 million

Up from $198 million in 2006

Most cyber-fraud is not reported

54

Page 55: Hack In The Box (Dubai) 04172008

55

Page 56: Hack In The Box (Dubai) 04172008

Loss of personal information

TJX, CardSystems, America Online, TD Ameritrade, Hannaford, etc.

measured in millions of records

California Senate Bill

1386

56

Page 57: Hack In The Box (Dubai) 04172008

2008 0.50

2007 5

2006 1.6

Records lost/stolen per second

In the first three months of 2008, the number of data breaches more than doubled over the same period last year.

57

Page 58: Hack In The Box (Dubai) 04172008

What Do We Do?

58

Page 59: Hack In The Box (Dubai) 04172008

1. Turn off the Internet2. Stop developing software3. Cash only

Just kidding!

Sort of...

59

Page 60: Hack In The Box (Dubai) 04172008

best practices recommended by the FBI, eBay, PayPal,

Microsoft, Google, Yahoo, etc. all say the same thing.

FirewallsAnti-Virus / Anti-Spyware SoftwareKeep Patches Up to DateBe Careful What You DownloadTurn Off Your Computer

Good ideas, but no longer effective.

60

Page 61: Hack In The Box (Dubai) 04172008

“The signature files of the market-leading anti-virus product that Yankee Group uses, for example, exceed 9 MB, encompassing 200,000 signatures. Full-disk scans of a typical PC’s 100,000-plus files exceed 90 minutes.”

“The net effect of the increase has been, as one anti-virus senior manager put it, “a denial of service against our labs.” Worse, private bench tests by host-based intrusion prevention system (HIPS) vendors suggest that detection rates against new malware variants are less than 70%. Anti-virus labs are typically 30 to 60 days behind for run-of the mill malware.”

Is Standalone Anti-virus Dead?

61

Page 62: Hack In The Box (Dubai) 04172008

“SSL is like using an armored truck to transport rolls of pennies between someone on a park bench and someone doing business from a cardboard box.”Eugene H. Spafford, Professor Purdue University

“The user's going to pick dancing pigs over security every time.”Bruce Schneier, founder and CTO of BT Counterpane

“The relationship between signature-based antivirus companies and the virus writers is almost comical. One releases something and then the other reacts, and they go back and forth. It's a silly little arms race that has no end.”Greg Shipley, CTO of Neohapsis

62

Page 63: Hack In The Box (Dubai) 04172008

For more information visit: www.whitehatsec.com/

Jeremiah Grossman, founder and CTOblog: http://jeremiahgrossman.blogspot.com/email: [email protected]

Thank You

63