security kaizen 41

Upload: rain8

Post on 05-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Security Kaizen 41

    1/31

  • 8/2/2019 Security Kaizen 41

    2/31

    Editors Note

    1 year, 12 months, 365 daysand 8760 hours had beenpassed since the release ....

    True Story

    Treachery, deceit and pilfer-ing have always been associ-ated with mankind ever sincethe Neanderthal age. Historyhas been a sore witness ....

    Awareness

    Facebook TipsAt Facebook, we work hard toprotect the people ...

    Grey HAT

    It all started while being sohungry and trying to figure

    out what to eat ...

    Security Kaizen is issued

    Every 3 monthsReproduction in Whole or

    part without written permis-sion is strictly prohibitedALL COPYRIGHTS ARE

    PRESERVED TOWWW.BLUEKAIZEN.ORG

    For Advertisement In Security Kaizen Magazine and www.bluekaizen.org WebsiteMail:[email protected] Or Phone: 0100 267 5570

    Best Practice

    Constructing mature in-

    formation security aware-ness and educationalmodels,Information Security is definedas protecting information andthe systems that hold andsupport them directly fromunauthorized use, access,disclosure, disruptions, modi-fication and destruction. Anyorganization irrespective oftheir size and number util ...

    New & News

    For those who are not familiarwith CSCAMP, its an annualconference for informationsecurity professionals wherewe gather all security

    SK Magazine Team

    Chairman & Editor-In-ChiefMoataz Salah

    EditorsHidayath Ullah Khan

    Joe SullivanSameh SabryAhmed NileOmar Sherin

    Vinoth SivasubramanianNaveen Sharma

    Website DevelopmentMariam Samy

    TranslationMai Alaa El-DeinAsmaa Ibrahim

    Marketing CoordinatorMahitab Ahmed

    PhotographersMohamed MohsenMohamed Samy

    Designed & Printed By2DAY Adv.

    Interview

    Senior Advisor to the CIT Minis-ter for CyberSecurity at Minis-try of Communications ....

    With ... Dr.

    Sherif Hashem

    Contents

  • 8/2/2019 Security Kaizen 41

    3/31

    1 year, 12 months, 365 days and 8760 hours hadbeen passed since the release of our Security Kaizen Magazine first issue.Today, we are celebrating with you the first birthday of your Magazine.

    Days passed so fast and I believe everyone feels the same, I stillremember, as if it was last month, the 25th of January revolution days, Tah-rir square, the internet cut off and the waking up at nights protecting ourhomes, although a whole year has gone now.

    During this year , if I have the right to say that, we have been mov-ing from success to another, the feedback we got from our followers whetherinternationally or locally was beyond my expectations and was somethingthat made me feel so proud, not of myself, but of the great work that myteam did and regardless of the hard conditions the country was in, we wereable to survive and continuously improve ourselves

    Editors Note

    ACHIEVEMENTS2011

    Securitykaizen MagazineEditors Note3

    Afterthe release of the First issue in English language, we received many requests torelease another version in Arabic, so we started, from the second issue, to release 2versions one in Arabic and another in English and it was really hard to translate sometechnical expressions and concepts to Arabic especially that our translators are nottechnical ones but I would like to use this opportunity to thank all the translators whohelped us to release the Arabic issues till we reached now a stable state.

    Editors Note 4www.bluekaizen.org

    We were able to be a media sponsor for nearly most of the famous Information Security Confer-ences during 2011 Starting by Hacker Halted Cairo in December 2010 passing by HITB in Amster-dam and Malaysia, Takedowncon in Dallas, Hacker Halted in Miami, RSA in London, Abu DhabiCyber Defense Summit and Others. We were also a media sponsor for the first Cyberlympicsgames.

    The most astonishing thing to me is that, despite the expensive ticket price of these conferenc-es, average of 2000 $, our international readers in USA, Amsterdam and London were so keen toattend the above conferences using our discount code, we were able to get one reader in USAto attend Takedowncon in Dallas, 4 readers from Amsterdam to attend HITB, 1 reader to attendRSA in London.

  • 8/2/2019 Security Kaizen 41

    4/31

    We had a list of interviews withthe highest prestigious profes-sionals in the Information Se-curity field such as: Joe Sulli-van (the chief security officerof facebook). Also we wereable to make a partnershipwith facebook where theywill write an article every is-sue covering Security tips in

    Facebook.com. We had aninterview with Clement Dupuis(the founder of CCCURE.ORGPortal) and Al Berman (CEO ofDRII.ORG) and in this issue Drsherif Hashem, senior Advisorto the Minister of Communica-tion and Information Technol-ogy for Cyber security, andthe Executive vice presidentof ITIDA, Egypt.

    During this year, the biggestchallenge to us was to trans-fer the magazine from anelectronic version to a printedone, printing a magazine isnot that cheap especially thatSecurity Kaizen Magazine isa free magazine and the only

    source of expenses cover-age is through advertisementsand we all know how the busi-ness was hard during this yearthat even caused some com-panies to close, but we wereable to do it and we are con-tinuing do it.

    Due to these financial prob-lems, we were not able to re-lease the fourth issue on timeand we had to merge theOctober and January issuetogether to release one issuein December to be the yearlyissue, but we tried to make it

    unique and I hope you willlike it. But to be able to surviveand continue producing yourmagazine and keep it for free,we decided to make a sort offund from all fans of Bluekai-zen and Security KaizenMagazine who are willing toparticipate, usually in suchcases in western countries a

    donation button on the web-site is enough, but in Middleeast countries we dont havesuch culture so we decidedto make a section calledBluekaizen Store, in this sec-tion you will be able to buyT-shirts, Mugs and differentproducts with Security KaizenLogos, our animated charac-ter kaizono and other de-signs. We have been thinkingabout an idea that wont bea direct donation for moneyand we found that this solu-tion will be the best so if Youlike our magazine and our ac-tivities help us to continue pro-ducing it by giving an amountof your liking.

    Finally, I am not saying all of this to take pride in what we have done, althoughwe should, but mainly to share that success with all our beloved readers and let thembe sure that we wouldnt have gone that far without them and also to thank all myteam members who are volunteering with their time and effort because they believe inBluekaizen goals and I want to thank especially Mariam Samy (our website developer),Mai Alaa and her team (our Arabic translator) who really did a great effort during thisyear to move Security Kaizen forward and finally a special thanks to my wife that with-out her support and the calm atmosphere she provided, I wouldnt have been able toachieve this success.

    Moataz SalahBluekaizen founder

    Securitykaizen MagazineEditors Note5

  • 8/2/2019 Security Kaizen 41

    5/31

    TrueSTORY

    Fun and proft!

    Hacking the Banks for

    Securitykaizen MagazineTrue Story7

    Treachery, deceit and pilfering have always been associated with mankind ever since theNeanderthal age. History has been a sore witness to the many acts of treason perpetrated byman to entice, dupe and usurp the innocent. Currently, as the world is shifting to a new paradigmpropelled by technological advancement, the temperament of man remains much the same.The medieval swindling tactics have been augmented with sophisticated cons. Today, the highlyprecarious Internet is relentlessly misused for committing atrocities over the cyber space. Amongthe numerous cyber-crimes committed, hacking the banks provides the best bang for buck forthe cyber criminals.

    True Story 8www.bluekaizen.org

    Take a look at the recent online bank heists that haveoccurred over the last couple of years:

    Inmid-July2010,computercrooks

    stole $447,000 from Ferma Corp. a SantaMaria, California based Demolition Com-pany by initiating a large batch of trans-fers from Fermas online bank account. AlsoinJuly2010,attackersstole

    $415,000 from Bullitt County Bank, Ken-tucky in US. In December2009, cybercrimi-nals successfully stole 300,000 Euro froma German banks online accounts. Andthel is tgoeson..The modus operandi adopted by cybercriminals for hacking banks is evolvingcontinuously keeping in pace with to-days modern banking technology.The Basic Attack Plan

    In order for the attack to work, the at-tacker has to first remotely take controlof an online-bank users desktop/laptopthrough which the user will be doing his/

    her online banking transactions. Thereare many ways of taking control of thevictim machine remotely, but the easiestapproach for the attackers would be toattack the desktop applications like webbrowser, PDF reader and MS-Office ap-plications etc. which are by default in-stalled on the victims machine. Thesedesktop applications contain a plethoraof vulnerabilities that can be remotelyexploited by the attackers to give themunauthorized access to the victims ma-chine.

    Attacking these desktop applicationscould be done in many different ways.The easiest way would be to send afraudulent e-mail to the online bank usercontaining a PDF or MS-office attach-ment with malicious software embeddedinside the attachment. When the user un-wittingly opens the attachment, the ma-

  • 8/2/2019 Security Kaizen 41

    6/31

    Securitykaizen MagazineTrue Story9

    licious software will get downloaded onhis/her desktop. This malicious software issome type of data-stealing Trojan horseprogram which seemingly looks very in-nocuous but its main purpose is to silentlyconnect the victims machine to a re-mote command server controlled by theattacker.

    Alternatively, instead of sending a di-rect e-mail, the attacker will try to enticethe online bank user to visit some fraudu-lent websites controlled by the attackerwhich will contain attack code plantedinvisibly within the website. Once an un-

    suspecting user visits such websites, his/her web browser will be automaticallyattacked by the attackers attack codeforcing the users machine to downloadsome malicious Trojan software unbe-

    knownst to him/her.

    Malicious Banking Trojans Cyber criminals use specialized bank-ing trojans like Zeus, LuckySpoilt,MPack, Clampi, URLZone etc. for thispurpose. Some of these trojans are com-mercially available for as little as $500with options for software updates, remotesupport, annual maintenance etc.

    These trojans are tailor-made for hack-ing online bank accounts and comewith all the bells and whistles required formaking online bank hacking a relativelyeasy chore for the attackers. Following

    are some of the features found in bank-ing trojans like URLZone or Zeus: Abi li tytologcredent ialsandac-tivities of bank accounts Cantakescreenshotsofwebpag-es served by the websites Canstealmoney fromthecom-promised accounts Ability to hide its fraudulenttransaction(s) in the report screen of thecompromised account TheCommandcontrolservercan

    send instructions remotely to the bankingtrojans about the amount to be stolenand where the stolen money should be

    deposited Logsandreportsonotherwebac-counts (e.g.: Facebook, PayPal, Gmail)and banks from other countries

    Current versions of ZeuS sell for up to$10,000 and are used by elite cybergangs to wire funds from the online bank-ing accounts of small-sized and medium-sized businesses.

    A relatively new type of financial mal-ware with the ability to hijack customersonline banking sessions in real time usingtheir session ID tokens called OddJobhas been released. This new banking Tro-

    jan, keeps sessions open after customersthink they have logged off, enablingcriminals to extract money and commitfraud unnoticed. This is a completely newpiece of malware that pushes the hack-ing envelope through the evolution of ex-isting attack methodologies. It shows howattacker ingenuity can side-step manycommercial IT security applications tra-ditionally used to defend users digital assets and online monetary assets.

    At the time of this writing, a far nastierbanking Trojan by the name tatangahas been just released. Tatanga hooksinto explorer.exe and can inject HTML inInternet Explorer, Mozilla Firefox, GoogleChrome, Opera, Minefield (Firefox devbuilds), Maxthoon, Netscape, Safariand Konqueror, basically every popularbrowser.

    How Do These Banking Trojans

    Work? BankingTrojansitsinsideausersbrowser and waits for the user to log intoa bank. During login, the banking Tro-jan copies the users ID, password andOTP (One Time Password), sends them tothe attacker and stops the browser fromsending the login request to the bankswebsite, telling the user that the service istemporarily unavailable. The fraudsterimmediately uses the user ID, passwordand OTP to log in and drain the users ac-counts.

    True Story 10www.bluekaizen.org

    Some bankingTrojansoverwrites

    transactions sent by a user to the onlinebanking website with the criminals owntransactions. This overwrite happens be-hind the scenes so that the user does notsee the revised transaction values. Simi-larly, many online banks will then com-municate back to the users browser thetransaction details that need to be con-firmed by the user with an OTP entry, butthe malware will change the values seenby the user back to what the user origi-nally entered. This way, neither the usernor the bank realizes that the data sent

    to the bank has been altered. Authent icat ion that depends onout-of-band authentication using voicetelephony is circumvented by a simpletechnique whereby the fraudster asksthe phone carrier to forward the legiti-mate users phone calls to the fraudstersphone. The fraudster simply tells the car-rier the original phone number is havingdifficulty and needs the calls forwarded,and the carrier does not sufficiently verifythe requestors identity before executingthe fraudsters request.Command & Control Server

    After having infected the victims ma-chine, the banking Trojan then connectsto the Command & Control Servers to re-ceive instructions. The Command & Con-trol Servers for these trojans are usuallyhosted in Russia and other far eastern Eu-ropean countries. The Command & Con-

    trol Server will then issue instructions whichwill include the amount to be stolen fromthe bank account, the money mulesaccount details to transfer the money,instructions to capture the screenshot ofthe online banking interface, etc.

    Money Mules Money mules are willing or unsuspect-ing individuals typically hired via Inter-net job search Web sites to act as localagents or financial agents responsiblefor moving money on behalf of a gener-ic-sounding international corporation, le-

    gal experts say. Once a mule is hiredby the cyber-gang, the stolen money istransferred to the mules bank account.Later on, the mule is asked to transferthe stolen amount after deduction ofhis or her commission to a bank ac-count provided by the cyber gang viaWestern Union or Moneygram typically infar Eastern Europe countries.

    Evading Anti-fraud systems To avoid warning signs by anti-fraudsystems at the bank, the money mule ac-counts are only used for a limited number

    of times within a certain timeframe. Sincebanks monitor large bank transfers, theamount of money deposited in a moneymule account is predefined in order tostay under the radar.

    To minimize detection by anti-fraud sys-tems, the cyber criminals use various pa-rameters to define the amount of moneythey will steal on each transaction. Crite-ria used by the criminals include: makingsure that the victims balance is positive,ensuring that the amount to be stolen isnot too high, setting a random amounton each transaction, making sure thatthe remaining balance remains positive.The aim is to minimize detection by theanti-fraud systems.

    Avoiding Detection by the Victim In order to continue with their nefariousbusiness activities in a clandestine way,the cyber criminals also need to hide theillegal money transfer transaction fromthe victim, otherwise the game will beover for them if the victim were to detectthe unauthorized transfer and complainabout it to his/her bank. To minimize thechances of their detection, the Trojancreates a forged bank report page thatwill be presented to the victim, effective-ly hiding the fraudulent transaction. TheTrojan hides the transaction it conductedfrom the victims machine by forging abank report screen on the infected com-puter.

  • 8/2/2019 Security Kaizen 41

    7/31

    Securitykaizen Magazine11

    In the case of German Bank as discovered by M86 security group, the transferredamountbelowisshownasEuro53.94,insteadoftherealamountofEuro8,576.31.TheTrojangeneratedaforgedscreenshowingthetransferredamountasEuro53.94,andsent

    it back to its Command & Control server as an image. If the victim would log into his/heronline banking account from a different, uninfected computer the real transaction will

    show up.

    Conclusion Cyber attacks and attackers are getting increasingly sophisticated and there is an ur-gent need to protect our resources from these threats.

    Online bank users should be alert and keep abreast of the various tricks used by thecyber criminals while surfing the web. Users should also ensure adequate security of theirsystems by installing personal firewalls and other security tools that will alert on any suspi-cious activity.

    Banks and financial institutions should employ unified web security solutions like web ap-plication firewalls with real-time content inspection, multi-factor authentication etc. Banksshould consider deploying the following measures:

    Server-basedfrauddetectiontomonitortransactionsforsuspiciousbehavior. Out-of-bandtransactionverificationtoverifyusertransactionrequests,andexe-cute only the specific transaction verified or signed by the requesting user. Out-of-bandcommunicationprotocolsthatcanpreventcallsfrombeingforward-ed to numbers that are not registered to a specific user account.

    True Story 12www.bluekaizen.org

    True Story

    I am the CEO of Sentelist MiddleEast an IT consultancy firm specializing in Application Secu-rity, Penetration Testing and Forensics

    Hidayath Ullah Khan

  • 8/2/2019 Security Kaizen 41

    8/31

    Makea

    Sandwich?

    Crack

    into

    a

    WirelessNetw

    orkor

    Thats rightIt all started while being so hungry and tryingto figure out what to eat, during the last visit tomy family and found out that my brother haschanged the wireless connection password.The moment I started thinking of what to do, fewapplication names popped out of my head suchas aircrack-ng, weplab, WEPCrack, or airsnort.As my eyes gaze around the room, checkingwhat else could have possibly changed, I foundthis mini-live-cd based on Tiny Core Linux calledBeini a Chinese GNU/Linux distribution, createdand maintained by ZhaoChunsheng from Tianjin,China lying around on my desk.

    The distribution is not commonly known and/or used however, it is very light and if you needan easy and simple way to crack into a wirelessnetwork, Beini is the best open source tool for it.

    It took me less than a minute to boot from theCD, and another couple of minutes to get the keyfor the house wireless network.

    As I am about to show you step by step how-tocrack into a wireless network, first let me show youhow would I think and what are the techniquesthat could be used on the figure below (Figure 1):

    G

    rey

    HAT

    Securitykaizen MagazineGREY HAT13

    1. ARP Request Replay AttackThis is a very effective way to create new initialization vectors (IVs), the program listens for anAddress Resolution Protocol (ARP) packet then retransmits it back to the access point. The ac-cess point keeps responding with ARPs (new IVs) and this way well be able to determine theWEP key

    Figure 1. Wireless/Security Cracking Techniques

    Figure 2. ARP Request Replay Attack Process Flow

    I would probably use the following cracking techniques:

    Wired Equivalent Privacy (WEP)

    GREY HAT 14www.bluekaizen.org

    ARP RequestReplay Attack

    KorekChopchop

    Attack

    HandshakeAttack

    ) Crack PSK (

    InteractivePacket Replay

    Attack

    FragmentationAttack

    launchingAttack)s( phase

    InformationGathering Phase

    WPA / WPA2

    Scanningfor wireless Networks

    WEP

    DiscoveryPhase

    PROGRAM LISTENSTO ARP REQUESTS

    RETRANSMIT ARPTO ACCESS POINT

    CONVERT FROMHEX TO ASCII

    ACCESS POINTREPLIES WITH IVS

    DETERMINE WEPKEY IN HEX

  • 8/2/2019 Security Kaizen 41

    9/31

    2. Interactive Packet Replay AttackThis attack allows you to inject and obtain packets to replay from your own wireless card anda pcap file (heard of something called libpcap before? Maybe?). Certain packets wouldonly work (to be accepted by the access point) which will in return cause new IVs, and thatsthe goal of this whole process, new IVs to find the WEP Key.

    3. KoreK ChopChop AttackDecode one packet! Disclose the plain text. Successful attacks can decrypt a WEP datapacket without knowing the key. It is also worth mentioning that it can even work against dy-namic WEP which is a combination of 802.1x technology and the Extensible AuthenticationProtocol (EAP) -- Dynamic WEP changes WEP keys dynamically.

    Securitykaizen MagazineGREY HAT15

    4. Fragmentation AttackAgain, fragmentation attack does not recover the WEP key itself, but only obtains the PRGA(Pseudo Random Generation Algorithm). PRGA can be utilized later on to generate packetswhich is also in return help in the injection attacks. The attack obtains the full packet lengthof 1500 bytes xor, so any size of packet could be generated, and is sufficient to create ARPrequest.

    Wi-Fi Protected Access (WPA/WPA2)The authentication methodology is the same on both, a dictionary attack must bedeployed otherwise forget about it (in case of brute-force/dictionary attack failure)

    Figure 6. WPA/WPA2 Attack(s) Process Flow

    Figure 5. Fragmentation Attack Process Flow

    Figure 4. KoreK ChopChop Attack Process Flow

    Figure 2. ARP Request Replay Attack Process Flow

    GREY HAT 16www.bluekaizen.org

    PROGRM CHOOSES ASPECIFIC PACKET FOR

    INJECTING

    ACCESS POINT DROPSPACKETS < 42 BYETS

    APPLICATION GENERTESTRAFFIC/TRIES TO

    GUESSMISSING DATA

    ACCESS POINT SENDSDATA

    GETTING A REPLY FROM TOWRESOURCES: WIRELESS CARD

    AND PCAP FILE

    ACCESS POINTRESPONDS NEW

    WITH IVS

    CONVERT FROMHEX TO ASCII

    DUMP AND CRACKCOLLECTED DATA

    CREATE ARPPACKET

    APPLICATION GETSXOR FILE

    COLLECTAUTHENTICATION

    HANDSHAKE

    DE- AUTHENTICATETHE WIRELESS

    CLIENT

    CRACK PRE-SHARED KEY

    )AUTHENTICATIONHANDSHAKE(

    DETERMINE WEPKEY IN HEX

    APPLICATION GETSXOR FILE

    CREATE ARPPACKET

    DUMP AND CRACKCOLLECTED DATA

    CONVERT FROEMHEX TO ASCII

    CONVERT FROMHEX TO ASCII

    ACCESS POINTACCEPTS ) INJECTED (

    APPLICATION CAPTURESPACKETS

    INITIATE ASSCOCIATIONREQUEST

    DUMP PACKETS. FILTERACCESS POINT

    CHANNEL

    WIRELESS INTERFACE ISSET

    IN MONITOR MODE

    INITIATE ASSCOCIATIONREQUEST

    CREAT FRAGMENTEDPACKETS

  • 8/2/2019 Security Kaizen 41

    10/31

    First, I will boot up my device using the Beini Live CD (from a USB stick or a regular CD)

    Choose the FeedingBottle icon from the task bar.

    lets start cracking.Alright alright, enough talking,

    First ScreenAfter BootingBeini Live-CD

    LaunchingFeeding Bot-tle Applica-tion

    Figure8.

    Figure

    7.

    Securitykaizen MagazineGREY HAT17

    Once you hit Next -> and Scan airdump-ng starts to capture raw 802.11 frames to startcollecting IVs.

    After scanning the large network (so many birds to hunt) I choose my house access point, I ama good guy.

    Choosing Wire-less Card(Monitor Mode)

    Airdump-ngCapturing

    Please remember,this is only a proof of concept and you may test it on youraccess point only.After clicking Yes you will get the following screen to choose your wireless card and settingit into Monitor Mode.

    Figure

    10.

    Figur

    e

    9.

    GREY HAT 18www.bluekaizen.org

  • 8/2/2019 Security Kaizen 41

    11/31

    As previously mentioned, I would think of 4 attacks to launch against WEP of which ARP Re-quest Replay Attack is considered to be the quickest and Fragmentation Attack is consid-ered to be the longest, at least in my very own opinion and more reliable since ChopChopattack doesnt work with all access points. On this proof-of-concept I will be showing you thelongest way Fragmentation Attack.

    LaunchingFragmenta-tion Attack

    Once the attack is launched, airdump-ng starts to capture, IVs are the keys of our

    success, we try to initiate association request for fake authentication.

    Figure12.

    WEP WirelessAccess PointFound

    Figure11.

    Securitykaizen MagazineGREY HAT19

    After the injection, IVs are being captured and collected to start cracking. IVs collecting/capturing is what counts and not the packets because it doesnt help us with WEP crackingand many of the packets will be beacons (transmitted by access points to show their exist-

    ence hey I am here!).

    Whenenough IVs are captured (depending on the WEP Key size) you shall find the crackerworking smoothly and in a few minutes the message Key Found will light up your eyes. Belowyou will see that the key was found and even converted to ASCII (from HEX).

    Now association is happening, fragmented packets will be sent and generating a

    key stream fle (xor fle that will help in creating packets without knowing the key).

    Generat-ing XOR File,Forged ARPRequest andInjecting

    Figure 13.

    Cracking IVs,Key Found

    Figure 14.

    GREY HAT 20www.bluekaizen.org

    Finally, cracking intowireless networks couldbe easy, and it couldtake a few minutes, espe-cially in the case of Wired

    Equivalent Privacy (WEP)Security. In that case, it ishighly recommended toswitch to the newer securi-ty, WPA2 which is using Ad-vanced Encryption Stand-

    I am Security Consultant, OSCP, LPT, CHFI, C|EH, SANS PCI/DSS, Security+,Linux+, RHCE, LPI, CCNA

    Sameh Sabry

    ard (AES), and use higher security techniques in order to protect your wireless network. Also, it isworth mentioning that the strength of your password plays a main role, so please consider us-ing a strong password including uppercase/lowercase characters, numbers, and symbols. Lastbut not least, please use the above mentioned information wisely and remember: With GreatPower, Comes Great Responsibility Spider Man.

  • 8/2/2019 Security Kaizen 41

    12/31

    Securitykaizen MagazineGREY HAT21 GREY HAT 22

    www.bluekaizen.org

    There are many ways used by the attackers to execute theCSRFattack. The most popularway is to use an HTML image tag, or JavaScript image object. As I stated previously; the attackerwill embed these tags into an email or website. Without the users knowledge, he loads the pageor email, by which a request to any URL that the attacker has the link. Below is a list of the com-mon ways that an attacker may use to try sending a request.

    IEvar post_data = name=value;var xmlhttp=new ActiveXObject(Microsoft.

    XMLHTTP);xmlhttp.open(POST, http://url/path/file.

    ext, true);xmlhttp.onreadystatechange = function ()

    {if (xmlhttp.readyState == 4){alert(xmlhttp.responseText);}};xmlhttp.send(post_data);

    HTML MethodsIMG SRC

    SCRIPT SRCIFRAME SRC

    JavaScript MethodsImage Objectvar foo = new Image();foo.src = http://host/?command;

    XMLHTTP Object (See Can applications us-ing only POST be vulnerable? for when thiscan be used)

    After we illustrated an overview on CSRF attack and how attackers think about it. Now you haveto know to keep yourself safe.I personally recommend reviewing the OWASP CSRF attack prevention cheat sheet which canbefoundin[https://www.owasp.org/index.php/CrossSite_Request_Forgery_%28CSRF%29_Pre-vention_Cheat_Sheet]In the OWASP web site you can find also, tools that help you to test your code, and more aboutother related attacks in details.Actually, if you look online for how to prevent yourself from CSRF attack dozens but millions ofarticles and resources online will give you suggestions about that. But if you have a deeperlook at most of these best practices as they claim you will find there is a huge misconceptionswhich discussed by Eric Sheridan (who was one of the team who reviewed this update of theTop 10 web application vulnerabilities by OWASP you can find more about on [https://www.owasp.org/index.php/Top_10_2010]), to be as follows:

    How to Avoid Such Attacks?

    What is CSRF?CSRF (Cross-Site Request Forgery) is web application vulnerability. It enables the attacker to ob-tain any kind of information through creating a website or email after the authenticated user/viewer access this website or e-mail remotely. The purpose of this malicious code is to redirectthe users request to a specific task URL. Actually this kind of attacks is severe and difficult to de-

    tect, because all the process is done without users knowledge.

    ExampleImagine that a user want to chat with his friends through his favorite social networking site (forinstance www.socialnet.net). Unfortunately this website allows its users to insert their images intothe website such as the avatars for forums or social networks as in face book.The normal action taken in this case is like this: (the users method)< img src=http://socialnetworking/image.jpg>The attackers method:< img src=http://socialnetworking/changepassword?newpassword=password12345>

    Illustration

    Figure 1: example on how the CERF attack would happen.

    1. Only accept POST Stops simple link-based attacks (IMG,frames, etc.) ButhiddenPOSTrequestscanbecreated

    with frames, scripts, etc

    2. Referrer checking Someusersprohibitreferrers,soyoucantjust require referrer headers Techniquestoselect ively create HTTPre-quest without referrers exist

    Figure 2: example on HTTP Referrer [4]

    Attack

  • 8/2/2019 Security Kaizen 41

    13/31

    Securitykaizen MagazineGREY HAT23 GREY HAT 24

    www.bluekaizen.org

    3. Requiring multi-step transactions CSRFattackcanperformeachstepinorder

    ConclusionDue to the severity of CSRF attack targeting our financial, health care, and computer infra-structure which enables the attacker to take advantage of any authenticated transactionthe user can do.As I stated before you can find your bank account is transferred to another account withyour knowledge or more than that, your password on any web application is modified, onthat you can measure. The severity of this attack is based on all the transactions done by the

    attacker sound authenticated.

    AcknowledgeI hereby certify that most of this article has a reference of other authors, in addition to thatsome of the code above has been taken from another web sites which is referenced in thereference section. Besides I would like to thank the editorial team for making this work cometo the light. If you have any suggestions, comments, or questions. Please contact me @[email protected]

    Reference and Further Reading

    1. OWASP [https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29]2. Robert Auger @ [http://www.cgisecurity.com/csrf-faq.html]3. [http://haacked.com/archive/2009/04/02/anatomy-of-csrf-attack.aspx]4. [http://knol.google.com/k/preventing-cross-site-request-forgeries-csrf-using-modsecurity#]5. [http://evilzone.org/tutorials/csrf-tutorial-by-connection/]6. [http://www.gnucitizen.org/blog/csrf-demystified/]7. Eric Sheridan, Cross-Site Request Forgery: Danger, Detection, and Defenses, can be found on OWASP8. [http://www.techrepublic.com/blog/networking/csrf-attacks-home-dsl-routers-are-vulnerable/756]9. JesseBurns,CrossSiteRequestForgery,Anintroductiontoacommonwebapplicationweakness,canbefoundin https://www.isecpartners.com10. Kurt Seifried, Attack of the CSRF, 2008

    I am the OWASP Mansoura Egypt chapter leader. Neil is an Information Securityresearcher in the Faculty of Computer and Information Sciences at MansouraUniversity-Egypt.

    Ahmed Nile

  • 8/2/2019 Security Kaizen 41

    14/31

    Alico Egypt, the insurance company ap-parently has a Microsoft FTP server accessibleonline that doesnt accept anonymous ac-counts, which is a good security practice.

    To take it up a notch, how about a query thatcan get you all the IIS servers (Web servers) inEgypt that are still using IIS 6.0 for example:Typing: IIS 6.0 -404 -403 -302 country: eg re-turned 2443 web servers in Egypt still using Mi-crosoft IIS 6.0 with its known vulnerabilities, atleast 8 ministerial/government websites are onthe list.

    Ever wondered who in Egypt is still using IIS 5.0 just ask Shodan.Typing IIS 5.0 -404 -403 -302 country: eg returned 526 web servers including the website of theAmerican University in Egypt, so the AUC is still using IIS 5.0 that originally was released with Win-

    dows 2000 (around 12 years ago). They can definitely do better than that.Another IIS 5.0 worthy note was an exchange securities trading company called Optima

    (http://41.205.125.68/), the vulnerable website host important clients information. Who is monitor-ing the private information protection in Egypt?Buttobefairthisisaglobalproblem,evenlookingforSCADAkeywordsreturnedmorethan59SCADAservicesavailableonlineforexamplethisparticularwebSCADAinFinlandownedbya

    tractor manufacturing company just asks you about your (username/password) and you are in,howimmuneisthisagainstbruteforceattacksonlytheexperimentcantell.

    OpportunitiesVulnerabilities

    Vulnerabilities are indeed opportunities for information security

    professional regardless whether you are a good or a bad guy.

    f you are a hacker then this is your golden ticket to fulfill your dreams of hacking glory, and if youare a system or network admin then these are the holes that you need to cover.ForSysAdmins(atleastthegoodones),vulnerabilitiesmeansfinallysomeseriousworkat

    east better than resetting passwords for idiotic users also known as top management who keepforgetting the CAPS Lock on after 6 attempts.Thequestionishowtofindvulnerabilities?

    Professional hackers follow a process (called Triage) to collect information about their target. Thenformation will help them identify and answer questions like:WhatOperatingsystemsaretheyusing?

    Whatisthetargetpatchlevel?

    Whatvendorsaretheyusing(Cisco,Linksys,Microsoftetc.)?Dotheyhaveasurveillancecameraonlinethatcangivemeapeekinsidethecompany?

    DotheyhaveanyprintersaccessiblefromtheInternet?And ultimately and after long days of search they will know the exact vulnerability they should betargeting.

    Having said that, I never thought that a day would come where a hacker or just a curious profes-sional can have an entire search engine doing this for him.Then about 2 years ago I meet Shodan: www.shodanhq.com

    Shodan is an online computer search engine that lets you find servers/ routers/ printers/ sur-

    veillancecamerasetc.byusingsimplesearchkeywordslike(Ports,Services,vendors,countrynamesetc.).

    Typingthesearchkeywords:ciscocountry:egreturnedforme1409IPsforCiscodevicesac -cessible from the internet in Egypt. Why not spend some time trying the default user names andpasswords and see what you can get. You will be surprised.TypingFTPcountry:egreturned9373FTPserversinEgypt,Imanagedtoaccesssomeofthem

    ust by trying the guest credentials. That left me depressed for days.Inthose9373FTPservers,someofthosecompaniesevenprovidetheexactversionoftheFTP

    server they are using which only makes it easier for the bad guy to look for the vulnerabilities avail-able in this particular version. Its really that easy.n the above example, Egypt Air our national carrier disclosed that they have a CISCO device(IP: 217.139.100.1),withtheFTP server enabledandpublicly publishedonlineandits version(1.00), and this obsolete version has known vulnerabilities. This FTP server can be either insignifi-cant or of great value.

    Securitykaizen MagazineGREY HAT25 GREY HAT 26

    www.bluekaizen.org

    Looking to cause an empty tray of papers some-where, how about looking for HP print servers withanonymous FTP access: searching for 230-Hewl-ett-Packard retrieved more than 350 print serversavailable online that you can try and access.

    If you are just looking for fun, try searching for Pel-coNet-Web server, which is the default streamingserver for Pelco surveillance cameras, the worldsbest CCTV cameras. And you can see what yourtarget company security officer is watching live. Ibelieve this can be useful if you are planning onrobbingabankyoudidnthearthatfromus.

    I am a certified CBCP, CRISC And ISO27001 LAand in my spare time an active blogger in CIIP.

    Wordpress.com

    Omar Sherin

  • 8/2/2019 Security Kaizen 41

    15/31

    AWARENESS

    TipsAt Facebook, we work hard to protect the peoplewho use our site. From our User Operations team,who work to re-secure compromised accounts,to the Engineering team, that designs and imple-ments new security features like login notifications.Everyone is working to ensure users have a safe,enjoyable experience. Our personnel, investmentin equipment, development of proprietary toolsand optional security features help us keep yousafe. But we know this task is never completed,and so we continue to innovate.

    Facebook Security TipsUse our Security Tools - Review your security settings and consider enabling login notifi-cations and login approvals. Theyre in the drop-down box under Account Settings onthe upper right hand corner of your Facebook home page.

    Dont Click on Strange Links: even if theyre from friends, and no-tify the person if you see something suspicious.

    Use the Report Links on the Site: if you come across scam or spam click on the reportlinks so that Facebook can take it down.

    sit Facebooks Security Page: http://www.facebook.com/security, read the items Takection and Threats.

    Dont Click on Friend Requests from Unknown Users

    Dont download any applications that you dont trust.

    Securitykaizen MagazineAwareness27

    Facebookhas always been committed to protecting the account and information ofpeople who use our site. Our 300-member Security Team works around the clock to thwartspammers and keep Facebook safe. We process a huge amount of content everyday to pro-tect the people on Facebook - we vet over 26 billion pieces of content and 2 trillion link thatclinks daily.

    Byutilizing advanced technology, our engineers work to ensure that using Facebook is a safeexperience. We have several systems that run behind the scenes to discover, disarm, and dis-able threats. We have added tools to prevent various forms of spam and have implementedanti-scraping protection to ensure that your data stays safe. We also work with law enforcementand check the 300 million photos that are uploaded daily against a blacklist database from

    international, federal, state and local law enforcement agencies.

    But, not all the security mechanisms operate in the background and we want to give every-one more control over their Facebook experience. We have several user controls that utilize thepower of social connections to keep everyone safe on the site. Some of these are automaticparts of your account, while others allow you to choose what level of security best fits your life-style. We encourage people to visit the Facebook Security Page or our Help Center to learn

    about these tools.

    Wearm the people who use our site with the power to protect themselves. You can easilyenable controls that will keep you updated and secure. Over the last year we have launchedtools such as login approvals, login notifications, one-time passwords and HTTPS browsing and

    we are constantly looking for ways to educate users and encourage them to use these tools.

    So far weve been pleased with our results to keep Facebook safe and are working hard eachday to improve our systems and tools. Less than 0.5% of users experience spam on any givenday, and less than 0.1% of logins are classified as suspicious. However, we are never fully satis-fied, and strive to build innovative tools and systems to adapt and respond to new threats. Wetake the safety of our users and the security of their data seriously and strive to ensure a safeand secure experience when you use Facebook.

    Awareness 28www.bluekaizen.org

    Joe SullivanI am the chief security officer of faceebook.com, i manage a few ofthe teams at facebook focused on making sure that people who usefacebook have a safe and positive experience

  • 8/2/2019 Security Kaizen 41

    16/31

    For those who are not familiar with CSCAMP, its an annual conference for information securityprofessionals where we gather all security related experts and non experts in one place for 2 dayso discuss and share security knowledge and technologies. Cairo Security Camp was launched in2010 with a small gathering (80 persons) in Nile University in smart village. In 2011, the event washeld in the American University in Cairo and the attendees reached more than 300 persons fromhe security professionals in Egypt and Middle East, for more info about CSCAMP archive kindly visitwww.bluekaizen.org

    This years event was a very new and unique experience for everyone who is interested in in-ormation security in Egypt and Middle East. Everyone was able to mingle freely in this geekycommunity, meeting up with new people, learning new stuff and having fun at the same time. Noto mention of course being able to witness for the first time Capture the Flag Competition in Egyptponsored by synapsLabs.The first day started with CTF competitors registration and teams formation, accompanied byhe registration of the Conference and the distribution of the latest issue of Security Kaizen Maga-ine. Attending the CTF, that was fully developed by synapse-labs.com, required to pass 2 levels

    of JavaScript reversing a couple of weeks before the competition days, where you had to extracthe key by reversing the encryption functions that was a bit of programming and cryptanalysis. InCSCAMP, the competitor received 6 problems, two of which were based on reverse engineeringexecutable programs, the other two of challenges were writing exploits to attack the vulnerabili-ies in the programs, and the other two were related to web application exploitation where youneeded to gain access over a web server from an exploit in session values to abuse RFI (Remoteile inclusion) to view the SAM and System contents to crack the hash. The remaining one was a

    brutal challenge which, till now, no one solved this exploit which was based on gaining accessthrough passing parameters to the system dir command called in a PHP script. We hope that thedir challenge can be added to next years CTF. as it gave nightmares to the CTF competitors.

    After the Gomaa prayer, Moataz Salah, CSCAMP Founder, gave an introductory session aboutCairo Security Camp and expressed his feeling towards CSCAMP as it is his second kid and that weall should contribute with care and support and excuse its lapses as your little kid till it finally standson its feet and start running as an athletic.

    After that, first days Keynote by Mr. Chris Brown, Director EMEA Operations NetWitness at RSA, wason the stage and his session was about why the golden solutions of Ant viruses are over. After that,Mr. Samer Omer, Middle East Managing Director at Qualys was on stage to talk about securing thecloud, and then the Rest of Speakers.

    The Second day started with the 2nd days keynote by Dr. Sherif Hashem, Senior Advisor to theMinister of Communications and Information Technology for Cyber Security, and the Executive VicePresident of ITIDA and then the rest of sessions were followed

    One of the most sessions that attracted the attentions of users was Omar Sherins Session. Omaris a Critical Infrastructure Information Protection Manager in QCert his session name was SCADASecurity the emerging Threat. The session was number one in the evaluation of the conferenceand gained the top score in everything including the profile of the speaker, presentation skills,topic and the slide show. He mentioned major threats in Egypts SCADA systems, the video is highlyrecommended to be watched on www.bluekaizen.org. Also the Closing note by Osama Hiji andAhmed Elezabi was a unique one; the session name was Information Security and Egypt Future.They talked about the future of information security in Egypt after the 25th of January and howwe should take quick actions in the progress of fixing our Information Security issues. Osama andAhmed focused on the free of communication Law and the rights to make the communicationmedium allowable to everyone and avoid what happened during the revolution of cutting theinternet and the mobile communications. The choice of the talk and the discussion was openedduring and after the session was a good choice to close CSCAMP2011.

    Securitykaizen MagazineNew & News New & News29

    New2011News

    30

    www.bluekaizen.org

  • 8/2/2019 Security Kaizen 41

    17/31

    Securitykaizen Magazine31

    Finally,Although CSCAMP 2011 is just a small baby trying to stand up and move, we re-ceived a lot of positive feedbacks and supporting comments on the events hash tag #CS-CAMP2011 and facebook page that made us sure that CSCAMP conference was born tolive and to be one of the main conferences for Information Security in Middle East that youshouldnt miss.

    At the end of the Conference, free prizeswere distributed randomly on all attendeesincluding 5 free subscriptions to the famoushakin9magazine,3coursewareforCEHv7

    from EC Council and others. Also valuableprizes were distributed to the winners of theCTF competitions including free coursesand Free Exam Vouchers from Raya Acad-emy for the winning teams and more.

    Before leaving, Moataz Salah was so keento take a live feedback from the attendeesabout CSCAMP 2011. So, a live survey wasmade to users if they would like to attendCSCAMP 2012 or not? Check fig.1 for re-sults.

    From Nearly 80 users submitted the live sur-vey,79% fromtheusersareinterestedto

    attend CSCAMP 2012, 5 % said No, and15% said May be

    34

    www.bluekaizen.orgNew & News New & News

  • 8/2/2019 Security Kaizen 41

    18/31

    CommentsADHAM(one of CTF winners) said:It has been long time searching for a challenge or a security competition to evaluatemy experience and meet real security geeks. That search ended when I knew aboutCSCAMP. One of the major things that let me joined is that it had a CTF challenge ofmulti levels; the perquisite phase was 2 levels of JavaScript that measures your way ofthinking and ability to circumvent the situation. It was loads of fun, I was a bit worriedin the beginning because it was my first time to join a real CTF, But the CTF organizerswere available for chat and Qs at the IRC channel all the time and were very friendly.The joy and fun during the two days cannot be described in words. The winner teamsgot prizes that ranged from huge discounts on security courses to totally free coursesand a chance to travel to the next CTF phase in Dubai. No one got out of that a loser,knowing great fellows in the field and meeting new amazing people was the real gift.

    Securitykaizen Magazine33 36

    www.bluekaizen.orgNew & News New & News

  • 8/2/2019 Security Kaizen 41

    19/31

    A cross section of the audience is represented below.

    Executive Result Summary:The results of the event were very clear and can be summarized below.

    1. Greater Intelligence sharing mechanismat the national and international levels.

    2. The need for a central forum to look intothe cyber security threats.

    3. People, the weakest link in the securitychain needs to be strengthened throughregular training and awareness programs.

    4. The need for a national cyber secu-rity awareness programs, through focus

    groups.5. The need to create central points ofcontact at enterprise levels to share andmitigate cyber security risks.

    6. The need to build in intelligence intotraffic coming and going into the networks.

    7. The need for a proactive offensive ap-proach rather than a reactive defensiveapproach.8. The greater need to build more securityinto supply chains.

    Securitykaizen Magazine35

    Last but not the least, cyber security risksas growing at an alarming rate and thelosses incurred in the Middle East alone isaround an estimated 1.44 Billion Dirhamsin dealing with cyber security incidents.

    Countering cyber security threats needsan integrated approach comprising ofpeople, process, technology and inter-national co-operation. This was endorsedby one and all who had attended theevent.About the Author: The author is workingas an Infosec professional in UAE. He hasdeep passion towards information secu-rity and leadership. Hes continually striv-ing to reach the pinnacle in both areas.

    36

    www.bluekaizen.org

    Conclusion

    New & News New & News

    This year Cyber Defense Summit hosted in Abu Dhabi, the Capital city of UAE at RadissonBlu Hotel in YAS Island, revolved around the central theme Protecting critical assets againstcyber threats. The summit featured high profile Keynotes, Panel Discussions, Round Table Dis-cussions and one to one business meetings. The meeting was well received by all the execu-tives in UAE and the Middle East. Majority of the attendees were government attendees andthis shows the commitment of the countrys leadership towards cyber security and protectingcritical national assets.

    Day one included: High-

    lightsOpening speech by Philip Victor, Directorof Policy and International Co-operation at

    International Multilateral Partnership againstCyber Threats (IMPACT).

    Panel discussion on the role and importanceof the CERTs participated by (AE Cert andOman Cert)

    Keynote on the integrated cyber shield byMarco Donfrancesco, Head of Special Prod-uct Strategy and Selex Sistemi Integrati

    This event was attended by various delegates comprising of armed forces, government de-cision makers, front liners and executives from various organizations.

    Day two featured: Presen-tationsA keynote on forward planning to ensure acyber-protected organization by Carl Wil-liamson, Executive Director of Cyber Strat-egy Defense Enterprise Solutions, NorthropGrumman Corporation

    Panel discussion about the threats and chal-lenges of cloud computing integration forthe public sector

    Roundtables debating the future of cybersecurity in GCC, and the feasibility of nation-al and international information sharing andcollaboration.

    Abu Dhabi

  • 8/2/2019 Security Kaizen 41

    20/31

    Securitykaizen Magazine37

    Hackingincide

    ntsinEgyp

    t

    AndMiddleE

    ast

    Israeli Prime Minister Netanyahus Website Defaced byEgyptian Hacker

    On the 20th of August 2011, An Egyptian hacker managed on Sunday to hack into thewebsite of Israeli Prime Minister, Benjamin Netanyahu, and placed a picture of Egyptian soldiersraisingtheEgyptianflaginSinaiduringtheOctober,6,1973,onthesiteshomepage.Thehacker

    who managed to penetrate the webpage of Netanyahu wrote Anti Zionism; the site was thengradually taken offline.

    Israel Radio is hacked

    Egyptian hacker defaced the website of Israel Radio , and Write a messageon homepage as shown:

    Hi to greatest son of the bitches of the world ...This Msg From Egypt Mother Of The World We Never Forgot And Never ForgiveAny Isrealian Bitch3Zyou StartedThe War Attack Us 0n The borders of Egypt For Nothing Reason .. So You Have Bear Our At-tacks Fuck To All Isreal.

    by Egyptian hacker

    38

    www.bluekaizen.orgNew & News New & News

  • 8/2/2019 Security Kaizen 41

    21/31

    Securitykaizen Magazine39

    Vodafone Egypts Facebook

    page hacked, then disappearsGroup of hackers called Destructive Tornado hacked Vodafone Egypt Facebook fan page,changed the display picture & posts comments declaring control of the admin panel. Actioncame expressing Egyptian anger for communication shutdown toke place Jan25. Quickly thefan page gained more popularity with thousands of comments in favour of the hacker Thankinghim mocking Vodafone Egypt lame Vodafone Shokran campaign.However for some reasonthe hacker decided to delete the fan page which had 800,000 followers. Ewwww!! It wasnt be-

    fore too long when Vodafone Social Team came up with astatement & re-creating their face-book fan page again to gain 1,155 followers.

    According to Vodafone Egypt the hacker had 45mins window in control of Voda-fones Facebook page which he was in fully control of accessing Messageswhich has customers phone numbers using facebook sending complains andphone numbers.

    40

    www.bluekaizen.org

    Microsoft

    Channel hackedComputer giant Microsofts official YouTube channel appears to have been hacked Sundaymorning. All of the official videos, including recent ad campaigns, have been removed from theaccount. In their place are short clips soliciting advertisers, not surprisingly, as the channel hassome 24,000+ subscribers.

    As of 1:30 p.m. ET, four videos have been uploaded to the account, all time-stamped within the

    past two hours. A fifth video, most recently uploaded, seems to have been removed. Thevideo,Garrys Mod Escape the Box,featured what appeared to be an animatedgunman shooting at the inside of a construction box.

    New & News New & News

  • 8/2/2019 Security Kaizen 41

    22/31

    Moataz: Can you introduce yourself to SECURITYKAIZEN Magazine readers?

    Dr Sherif: I am the Senior Advisor to the Minister

    of Communications and Information Technology for CyberSecurity, and the ExecutiveVice President of the Information Technology Industry Development Agency (ITIDA),Egypt. I am also a Professor at the Faculty of Engineering, Cairo University, Egypt (onleave). I had received a B.Sc. in Communication & Electronic Engineering (Distinctionwith honor) and an M.Sc. in Engineering Mathematics from Cairo University (Egypt 1985&1988),andaPh.D.inIndustrialEngineeringfromPurdueUniversity(USA1993).

    I had also completed the Senior Executive Program at Harvard Business School (USA 2001). I am currently responsible for e-Signature, cyber security, and Intellectual Prop-erty Rights (IPR) protection for software and databases. Dr. My responsibility includessetting the framework for establishing and operating the Egyptian Computer Emer-gency Response Team (EG-CERT) at the National Telecom Regulatory Authority, theEgyptian Root Digital Certificate Authority (Root-CA) and the Software IPR Office at ITIDA

    Senior Advisor to the Minister ofCommunications and Informa-tion Technology for CyberSecurity,and the Executive Vice President ofthe Information Technology Indus-try Development Agency (ITIDA),Egypt

    ByMoa

    tazSalah

    InterviewDr. Sherif Hashemwith

    Securitykaizen MagazineInterviews41 Interviews 42

    www.bluekaizen.org

    Moataz: What are the benefits that ITIDA provide to Information Security Communityspecifically, not the IT sector as a whole?

    Dr Sherif: ITIDA is the main anchor for E-signature in Egypt, and it hosts the Root PKICertificate Authority (Root CA) for the country. The Root CA links the 3 private e-signa-ture certification service providers (CSPs) as well as the governmental CA run by theMinistry of Finance, thus providing an integrated infrastructure for PKI services ande-signature applications in Egypt. Such an infrastructure is essential for establishingand protecting the digital identities of individuals as well as organizations, whichpaves the road for a more interactive Egyptian information society with enhancedquality of life. The PKI infrastructure is also essential for advanced and secure e-

    government and e-business applications. The Root CA also provides a gateway forcross-recognition of PKI digital certificates with other countries, thus facilitating andempowering e-business applications with the international community. The estab-lishment and the operation of the PKI infrastructure involved a comprehensive train-ing and skills development programs for professionals working at ITIDA and with theprivate CSPs; which not only enhances the security of the operation of the nationalinfrastructure, but also provides opportunities to export advanced PKI services to theArab and African Regions. Since its establishment in 2005, ITIDA has organized,supported and hosted several events and workshops, such as the I TU Arab Re-gional CyberSecurity and Digital Identity Symposium held at the Smart village18-20 Dec 2011.Moataz: Can you give us an overview, status and progress of the e-signatureand Root CA projects?

    Dr Sherif:TheRootCAwaslaunchedon28September2009,andthethreeli -censed private CSPs have been linked to the Root CA shortly after. ITIDA has alsoprovided a grant to develop an Egyptian Smart PKI Token. The company that won thegrant developed two PKI tokens: with and without biometrics (finger print), which arecurrently available in the Egyptian market, and are also being marketed abroad.ITIDA has been lobbying for the deployment of e-signature and PKI applications with

    the e-Government Program, and with key stakeholders in various sectors, includingof course the ICT Sector, the banking sector and the Stock Market.

    Moataz: you were the pioneer in establishing CERT in Egypt; can you please give usa quick overview about CERT and the role of EGCERT in Egypt Security life?

    Dr Sherif: The Egyptian CERT (EG-CERT) was established at the National TelecomRegulatoryAuthority(NTRA)andstarteditsoperationinApril2009.Operatingon24/7

    basis, EG-CERT has about 16 professionals who provide high level monitoring andsecurity incident handling support to key stakeholders responsible for the ICT infra-structure in Egypt. EG-CERT also assist in providing expert reports to courts in majorcybersecurity cases, such as the international Phish Phry case that was uncovered inOctober2009.EG-CERThassupportedseveralstakeholderswithinthegovernment,

  • 8/2/2019 Security Kaizen 41

    23/31

    Securitykaizen MagazineInterviews43 Interviews 44

    www.bluekaizen.org

    and the ICT and the financial sectors in dealing with a variety of security incidents,includingDDOSattacks,hackingandwebdefacement.Itisworthnotingthatin2009-

    2010, the NTRA launched a national comprehensive cybersecurity training programprovidedthroughthewellknownSANSinstitute,resultinginthecertificationof179ICT

    professionals across 38 entities in the governmental sector, ICT and CSP companies,banking and financial sector, and academic institutions. Of course, EG-CERTs staffare among the graduates of that program, with some of them receiving multiple SANScertificates with high scores.

    Moataz: Many Security Professionals are wondering why, till now, EGCERT doesnt havea website or a published phone number to contact them incase of a cyber incident

    or a security query?

    Dr Sherif: EG-CERT will launch their website soon, but in the meantime they can bereached through the NTRA.

    Moataz: Why CERT is under the NTRA? Are they only focused on telecom sector? Whatabout the other sectors like banking, oil & gas..?

    Dr Sherif: EG-CERT is the first cornerstone towards a comprehensive approach for na-tional Critical Information Infrastructure/CyberSecurity Strategy. Such a strategy willcover critical sectors, including the ones that you mentioned above.

    Moataz: Does EGCERT or any other entity in the government have clear Security Aware-ness Program targeting public users like university students, different government em-ployees and others?

    As mentioned above, this needs to be part of a comprehensive national strategy

    Moataz: In your opinion, why the Egyptian Government websites were attacked soeasily during the 25th of January Revolution and do we have any kind of Audit on the

    governments sites?

    Dr Sherif: Governmental websites are hosted by a variety of providers (in-house, ISPs,etc.), and in some cases the providers and/or the developers do not pay enough at-tention to security concerns, which makes some websites vulnerable to cyber attacks.As I mentioned above, we need a comprehensive cybersecurity national strategy.Moreover, we also need to enhance/amend the regulatory framework relating to op-erational requirements for public and governmental information systems.

    Moataz: I received many comments from the Egyptian Security Community that theydont feel the progress of Information Security in Egypt. In your opinion, is that becauseof the lack of publications about MCIT achievements in that field or because of thelack of achievements itself?

    Dr Sherif: As I mentioned above, MCIT has launched the CERT (at the NTRA) and thePKI ROOT CA (at ITIDA), and has supported a comprehensive national cybersecu-rity training program for 220 professionals in 38 entities in the government, and theICT and the financial sectors. MCIT and its affiliates (ITIDA, NTRA, NTI, ITI) have alsosupported and organized several events and training workshops, such as HackerHalted (by EC Council) and other worldwide leading cybersecurity specialists. Weunderstand that cybersecurity threats are increasing and the expectations of ourcybersecurity community are also growing. So as security professionals, whether inthe government or in the private sector or in the academia, we need to increaseour coordinated efforts to further the national cybersecurity agenda, and to expandour outreach to the general public, and to lobby with decision makers in all sectors.

    Moataz: In the last couple of months, there were a lot of discussions regarding theelectronic voting and its security, what is your opinion about it and Is it doable inEgypt or not ?

    Dr Sherif: The use of ICT in the voting process will definitely enhance the citizens ex-perience and facilitate participation in the democratic transformation in Egypt.In this regard, ITIDA hosted a group of about 100 ICT professionals to analyzethe worldwide best practice and advise the government on a comprehensiveapproach for ICT-enhanced voting. Several meetings took place in Marchthrough April 2011, with over 40 contributed documents exchanged and an-alyzed. The final recommendations were presented to the Cabinet of Minis-ters, and some recommendations were taken into consideration. However, westill have a long way to go and there are many opportunities to further enhancethe voting process using ICTs, whether inside the polling stations or in the case ofremote e-voting for expats.

    Moataz: Today, Egypt and the Middle East had a lot of Hacking incidents, why wedont have a big competition to the security community to challenge their skills and

    get them to the white hat community instead of the black one especially for theteenagers?

    Dr Sherif: Great idea! I suggest that you take the lead, and let us know how we cansupport this initiative.

    Moataz: What is your opinion about security kaizen magazine and Cairo securitycamp initiatives especially after conducting the first capture the flag competition inEgypt?

    Dr Sherif: I enjoyed the security camp, at least the part that I attended. I also like theidea of the competition. Keep up the good work!

    ByMoa

    tazSalah

  • 8/2/2019 Security Kaizen 41

    24/31

    Information Security is definedas protecting information and the sys-tems that hold and support them directlyfrom unauthorized use, access, disclo-sure, disruptions, modification and de-struction. Any organization irrespective oftheir size and number utilize the followingmechanisms for practicing and improv-ing their information security posture. Themechanisms utilized are People, Processand TechnologyThe only common factor as seen fromthe diagram is that people manage bothprocess and technology. Therefore everyemployee permanent, temporary, con-tractor, business partner, vendor etc has

    information security roles and responsi-

    Figure 1

    bilities to be fulfilled. It is therefore imper-ative that the entire workforce receivessufficient and good quality informationregarding security responsibilities. Infor-mation security awareness is extremelycritical to any organization security strat-egy and supporting security operations.In spite of the importance of making endusers aware of their roles and responsi-bilities in reference to security only 64%of US organizations, 48 % of UK organi-zationsand59%ofIndianorganizations

    conduct security awareness programs inspite of the many regulations that makeit mandatory. Many of the security inci-dents that resulted in Millions of dollarsin penalties and loss of reputation could

    have been prevented by proper securityawareness and training. This paper notonly focuses on end users but also on thetechnical users and the senior manage-ment which are generally missed out.

    Whatvalue does information securityawareness and education deliver? Hav-ing a comprehensive and mature infor-mation security educational program willresult in better health of the organizationin terms of security as well as the organi-zational health. Let us now tabulate someof the risks that involve people factor andinvolves people which can be preventedby effective awareness programs.

    Constructing mature information security

    awareness and educational models

    Securitykaizen MagazineBest Practice45

    Best

    From the above table it is clear that Security awareness and training needs to be impartedto all members of the organization. Let us now see how an information security awarenessprogram is constructed.

    Risk Seed ThreatsMediumof threat

    Impact

    HumanResources

    SocialEngineering

    Phones, Instant messen-gers, posits.box muffing

    Loss of Customerintimacy.

    HumanResources

    Passworddisclosure Risk Seed

    Loss of reputation,financial penalties.

    HumanResources

    Insecure software codingleading to various vulner-

    abilities.

    Internal developmentenvironment

    Loss of CIA and can alsolead to Financial impacts

    Pillars of Information Security

    awareness and education:Right People, Management Commitmentand Information security policies form thepillars of an effective security awareness

    and education program.

    Information security policies:Have well articulated and updated in-formation security policies in place thatsupport the vision and mission of the or-ganization. Keep them current in line withthe evolving threats and have a reviewevery month by an Internal IT team. Havethis review circulated to the senior man-agement. This will ensure that the policiesare updated and are being viewed bysenior management thereby generating

    buy in.

    Management Commitment:Get Management Commitment beforegoing ahead with a plan such as this. Amature enterprise wide security aware-ness program increases the security pos-ture as well as the internal communica-tion posture of the organization which willhelp foster cross functional effectivenessand bring in a healthy working culture.Highlight to them the above advantagesand get their nod. Getting their nod alsosends positive signals across the enter-prise that the management is seriouslycommitted to improving and maintain-ing security.

    Right People:This is the number 1 ingredient for anyorganizational success. Having the rightpeople on the team makes all the dif-ference for making any plan/strategyhighly successful. Always hire people byconducting a good background checkfor positions that require no experience.When hiring for senior/mid level positionsmake sure that people are cross checkedacross on all areas such as Education,Employment, Previous Employer Refer-ences, groups, conferences, publica-tions, personal history and check if theyare committed towards excellence. This

    forms the ground for building the plan.

    Form a team:After having the right people on board,

    you will have to form a Core Commit-tee involving and comprising membersacross the various business units. Theteam structure is very vital for success

    and is discussed below in greater detail.

    Core Committee members:The core committee members shouldcomprise heads of members of all busi-ness sections. This will ensure that theirsupport is there which is very vital fora successful awareness program. TheCISO/Corresponding person who is re-sponsible for security should also be partof the Core Committee.

    Best Practice 46www.bluekaizen.org

  • 8/2/2019 Security Kaizen 41

    25/31

    Identify Needs:Not all users are equal. This phase will also identify the training needs of each and every individualmapped to their responsibilities handled by them. Training needs are assessed vis-a-vis responsibili-ties and impacts that can be caused by the responsibilities. Map responsibilities to system expo-sure, impact, and training needs. A simple matrix that can be used is shown below.

    Since we go by the saying not all users are the same, the knowledge of each and every users interms of security awareness, system expertise and computer knowledge are assessed individuallythrough pre-assessment questionnaires developed by the Information Security Awareness cham-pions. The information security awareness questionnaire should be prepared keeping in mind thenormal end user to the advanced user. IT specific assessment questionnaires should be preparedfor IT personnel and their knowledge on various domains tested periodically. It is recommended touse web based assessments through the organization intranet portal site for easy collection andimprovements. This will also help us analyze gaps and improve knowledge levels of users. Based onanswers collected and personal interviews with people classify their training needs and knowledgelevels. Have them documented as per the sample format given below. The basic purpose of thesample report is to organize the article and provide an idea and is not intended to be compre-hensive.

    Security Awareness Champions group:Security awareness champions group should be formed which will include senior members acrossthe business. People to be included in this group should exhibit at the least the following qualities:

    1. Knows the business: The person selected as awareness champions should have a sound knowl-edge on business process. This will be very vital when mapping security risks with new process/policies/strategies of the organization.

    2. Competent in their selected field: The person selected should be competent in his/her chosenfield. This will ensure that he has the respect of his team members and peers which will be veryeffective for putting forth ideas in place.

    3. Respected by peers: People chosen as awareness champions should be respected by peers

    in their respective departments. This will ensure team commitment as a person of such caliber willhave his voice heard and respected across his team members.

    4. Effective Communicator: People should exhibit effective/extraordinary communication skills.These people should be conversant and fluent in one or more languages. Examples include aperson conversant in English and fluent in his native language say (Arabic), this will ensure thatthe diversity factor in organizations has been taken care of.

    Security Awareness focus Group:This group should consist of members across departments who are committed towards excel-lence and are keen to add value to the organization. These people should have the option ofgetting promoted as awareness champions as part of their commitment towards informationsecurity awareness.IT awareness group:This group will cater specifically to the Information Technology department. This will include seniormembers within the department and will keep a track of training requirements needed by the de-partmental people. This group will also measure the success of the trainings given to IT personnel.Formation of the team and team members should be done involving HR, Customer Service, I T andother sections and should have the approval of 3/4 of the core committee members. A samplehierarchical chart is given below for a reference. (Fig 2)

    Securitykaizen MagazineBest Practice47

    End user Security awareness Model: Figure 3

    Best Practice 48www.bluekaizen.org

    Figure 2

    Core Committee MembersAll Section Heads/SeniorMembers of All Sections

    Information Security FocusGroups

    IT Awareness GroupsInformation Security Cham-

    pions

  • 8/2/2019 Security Kaizen 41

    26/31

    Needs Assessment Report:

    Securitykaizen MagazineBest Practice49

    EmployeeID

    Responsi-bilities

    System ex-posure Impact

    TrainingNeeds

    KnowledgeLevel

    1234 PayrollProcessingFair Loss ofConfiden-

    tiality andintegrity

    Basic Advanced

    891Floatingpurchasetenders

    FairPoor qualityequipments, leading tofinancial loss

    Intermedi-ate Basic

    5678

    Solving cus-tomer relatedissues through

    Phone calls,Emails andService desksystem

    Good

    Loss of avail-ability, socialengineer-ing that

    could leadto financialimpacts andloss of repu-tation.

    Advanced Intermedi-ate

    We will describe clearly on what it means by basic, Intermediate and advanced.Basic Training: Primarily for users whose ignorance can cause the least impact on the organiza-ion and their resources. Impact causes negligible financial loss and zero loss of reputation andntegrity.ntermediate Training: For users whose ignorance can cause some damage to the organizationand its resources, but does not cause much financial loss and does not damage the reputationof the organization.Advanced Training: For users whose ignorance can cause significant financial loss and damageof reputation thereby affecting customer intimacy and credibility.Develop and Deliver: After doing a need assessment. Plan, Develop and Deliver security aware-

    ness and educational programs across the enterprise. Each process has been described in detailbelow.Develop: This step involves gathering available training resources such as people, content anddevelopment of training material. The training material should be developed with the following

    points in mind by the security awareness champions and security awareness focus groups.

    - How do we want users to react/follow?- What skills do we want the users to learn and apply?- Will this content reach out effectively?

    There is series of materials available that requires to be imparted to each and every person in theorganization, based on their responsibilities and level of knowledge that is needed, the scope ofwhich is too large to be discussed here. IT service champions in consultations with focus groups

    must ensure that necessary areas have been taken care of. Classify topics required for each level.

    Best Practice 50www.bluekaizen.org

    Face to Face

    DeliveryMethod

    Review of Secu-rity policies and

    acceptance

    Topics

    TrainingNeeds

    TrainingNeeds

    New hires andAnnual

    Schedule/Frequency

    Everybody

    Audience

    Face to Face,Bulletins andhandbooks

    IncidentManagementBasic Bi Monthly Help DeskUsers

    Face to Face,Bulletins

    LaptopSecurity

    Basic Quarterly Laptop users

    After comprehensive designing and planning, deliver the plan to the end users based ontheir training needs that have been assessed through various mediums that are available in anorganization. The training plan and methods should be ratified by Core Committee, awarenesschampions and focus groups. General topics ranging from basic to intermediate can be givenby Information security focus groups\Awareness champions whereas advanced topics should bedelivered solely by information security champions selected from the IT department.Evaluate and Improvise: Ideally after delivering the content, the end users must be evaluatedunder controlled environment to check if they have comprehended the topics properly. A postassessment report template has to be prepared to see if the outcome of the training is as desired.The Assessor must also get inputs from the candidate to see what can be improved in terms ofcontent, presentation etc. All collections if done online will be easy to comprehend and deliverbetter results in future. Benchmark the current performance and continually improvise it for ma-

    tured results.

    Sample Assessment and Improvisation Report Template of

    Content and Assessor:

    DeliveryMethod

    Webinar

    Face to Faceand Webinar

    Content

    5678

    5678

    Presenter ID

    1234

    1234

    Remarks of candidate

    Points can be split furtherwhich will help us compre-

    hend better.

    Webinar was good but the pre-senter gave fewer examples inrelation to password security.

  • 8/2/2019 Security Kaizen 41

    27/31

    Sample Candidate Assessment and ImprovisationTemplate:

    Securitykaizen MagazineBest Practice51

    Passwordpolicy

    Performanceand remarks

    Webinar

    Average perfor-mance, need to havea one on one sessionto make him excel.

    Face to Faceand Webinar

    Optimum performance

    must educate the user

    through bulletins and

    targeted Email to helphim Excel. Next exami-

    nation to be conducted

    next month same date.

    Topics PerformanceScore

    WirelessSecurity 60 percent

    Passwordpolicy 80 percent

    Employee ID

    1234

    5678

    The post assessment reports are stored in a repository accessible to all the security awarenesschampions, Core Committee members and focus groups. This will ensure that continual improvisa-ion happens on a regular basis. The security champions can also develop a Department BasedGrading system to check which department per forms best and recognize them through internalnewsletters. This will certainly improve the organizational health in terms of security and perfor-mance.nformation security education does not end with End users as is the case most organizations do,heir own IT department also needs to be educated on a continual basis to keep them updatedwith the latest compliance regulations, evolving threats. The process has been described above.

    Identify Gaps:The CISO/IT manager and the Information security personnel must conduct regular audits on theirdepartment people to check if they are equipped with the knowledge to handle evolving threats,knowledgeable on new standards, current trends etc. A needs assessment is conducted through

    needs assessment as described for end users.

    Invest in Education materials: The organization must invest in good quality edu-cational materials that are available for IT people such as ISSA, ISACA, ISC2, I EEE etc. By Investingin these journals and educational materials the organization is certainly bound to increase thelearning curve of their IT people which will result in better codes, process improvements etc. Thesejournals pave the way for identifying an effective needs assessment.Plan, Develop, Deliver, Assess and Improve: After conducting a needs assessment, check to seewhether internal people are qualified enough to fill the gap or not. If so prepare content and plandelivery methods for educating them. In some cases it becomes necessary to bring in external

    expertise to train our people. In such cases depending on budgetary constraints train the seniormembers/a group, and retrain them asking them to train other members. This way knowledge isresonated throughout the organization. Document the training, assess those using internal feed-backs and keep them improvising continually. IT based security educational needs must be donebi monthly for better quality to keep in line with evolving threats and regulations.

    Security Awareness Model for ITpersonnel: Figure 4

    Best Practice 52www.bluekaizen.org

    ContinualImprovement

    IdentifyGaps

    Assess andBenshmark

    Plan, DevelopAnd Deliver

    ConclusionInformation Security awareness and education is continuous and continual. With proper manage-ment support, right people ,good team formation and involving all business units in the processwe get their commitment which will ensure a successful security awareness and education to oneand all in the organization going beyond security education and awareness to increasing crossfunctional effectiveness and organizational health.

    Referenceshttp://www.pwc.com/en_GX/gx/information-security-survey/pdf/pwcsurvey2010_report.pdfcsrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf.

    I am a founding member of ISSA UAE and a working committee member of International CyberEthics . CEH,ABRCCIP, ISO 27001 LA,

    Vinoth Sivasubramanian

  • 8/2/2019 Security Kaizen 41

    28/31

    Securitykaizen MagazineBest Practice53 Best Practice 54

    www.bluekaizen.org

    veryday software vulnerabilities and their exploitation threaten the user information system andomputing experience. Often, common applications like word processing, media players, browsernd its extensions are used to reap the rich benefits for personal and professional productivity, be-omes the target of these threats. A significant problem lies in the way these vulnerabilities are ex-loited, which requires no user interaction, as they gets downloaded and executed simply by visitingmalicious website or opening a malicious downloaded document. A normal user wouldnt haveny clue of what components of the browser or the running application is being exploited either for

    nstallation of malware for vicious purpose or for propagation of malware to other systems.ser and Enterprise rarely patch these third party products due to numerous factors like lack of avail-bility of tools, half cooked or broken patching process, lack of security governance and organiza-onal culture. The frequency of zero day attacks is on raise for the client side applications accord-ng to various vulnerability intelligence companies worldwide including IBM X-Force Threat reports.ccording to SANS report The Top Cyber Security risks the un-patched client-side software is on the

    op priority number one from the rest of the risks. It is interesting and frustrating to note that some ofhe vendors havent patched the zero day vulnerabilities reported two years ago according to SANSeport.

    is a well known fact that signature based Anti malware detection and removals technology prod-cts are losing the war as these technologies cant keep up with the wide variety of malware ands variants being produced on daily basis. The only solution which holds promise is to address theseulnerabilities at the very heart of the operating systems to counter various attacks exploiting thenderlying operating system mechanisms. Microsoft recently released Enhanced Mitigation Experi-nce Toolkit (referred to as EMET) version 2.0.0.3 in November 2010 for its fleet of client and serverperating systems including Windows XP, Windows VISTA, Windows 7, Windows Server 2003 and 2008.

    Enhanced Mitigation Experience

    Toolkit (EMET)

    At the time of release, EMET was not supported by Microsoft. For the enterprise environments EMETsMSI format can be deployed either manually or by existing software deployment delivery mecha-nism/tool.

    The success of EMET really depends on the acceptability of this tool in the user community andits wider deployment. The demand for its support forced Microsoft to support the EMET. Also, muchneeded feature for the success of this technology in enterprise market segment would be man-ageability of EMET by the group policy, without which chances of EMET deployment in enterprisemarket are dull. EMET will be another layer of defense in the defense in depth strategy in nearfuture to mitigate or in worse cases delay exploits being successful on the target systems.

    EMET mitigation tool looks really nifty due to the controls offered at the very root of the exploitstaking on the Microsoft platform like stack overflow and address randomization. EMET offers miti-gation techniques such as dynamic Data Execution Prevention (DEP is enabled by default on IE8),Structured Exception Handler Overwrite Protection (SEHOP), Heap Spray Allocation, Null Page Al-location, Export Address Allocation Table Access Filtering and Mandatory Address Space Layout

    Randomization. EMET kit offer granularity up to the single process. For more details of this mitigationtool and how does it work, please refer to EMET user guide (see the reference list at the end of thisarticle). It will be prudent to enrol browsers, Acrobat Reader, flash players in the EMET to preventexploitation of this application while surfing web sites.

    Supported systemsEMET 2.0 supports the following operating systems and service pack levels:Client Operating Systems:WindowsXPservicepacks3andaboveWindowsVistaservicepack1andabove

    Windows7allservicepacks

    Server Operation Systems:WindowsServer2003servicepack1andabove

    WindowsServer2008allservicepacksWindowsServer2008R2allservicepacks

    Configuration of EMETEMET can be configured using the graphical interface or by the commands.

    Listing 1 - Main EMET configuration windowswith the options per process and system wideconfiguration.After you install EMET, you will need to specifyhow much protection to provide. Click on theconfigure system button as shown in listing 1. This

    will open a new window as shown in listing 2.

  • 8/2/2019 Security Kaizen 41

    29/31

    Securitykaizen MagazineBest Practice55 Best Practice 58

    www.bluekaizen.org

    Listing 2 - System configurationNext click on the configure applicationbutton and screen in listing 3 will come. Inthis, you can add application by clickingadd button, this would protect the addedapplications. Finally, reboot your device

    for changes to take place.

    ReferencesIBMX-ForceThreatReport-www-935.ibm.com/services/us/iss/xforce/trendreportsMicrosoftSecurityReport-www.microsoft.com/security/sir/default.aspxEMETmitigatesAdobeAcrobatReaderexploit-www.itwire.com/business-it-news/security/41804-microsofts-emet-mitigates-ado-

    e-acrobat-reader-attacksHereisthevideofromtheEMETdevelopers-http://technet.microsoft.com/en-us/security/ff859539.aspxEMET user guide - http://blogs.technet.com/cfs-filesystemfile.ashx/__key/CommunityServer-Components-PostAttach-

    ments/00-03-35-03-78/Users-Guide.pdfSomeproofinsupportofEMETpreventingexploitsonIE6,7and8- http://blogs.technet.com/b/srd/archive/2010/11/03/dep-emet-rotect-against-attacks-on-the-latest-internet-explorer-vulnerability.aspxMoreproofofAcrobatreaderzerodayexploitsbeingblockedfromexecution- http://www.ditii.com/2010/09/10/enhanced-miti-

    gation-experience-emet-2-0-toolkit-blocks-adobe-reader-and-acrobat-zero-day-exploit/ Downloadlink incaseyou wish totry EMET onyourlab orhomedevices- www.microsoft.com/downloads/en/details.

    aspx?FamilyID=c6f0a6ee-05ac-4eb6-acd0-362559fd2f04

    Listing 3 - Application configurationMET is really a good control initiative at the

    undamental causes of vulnerabilities in Micro-oft products and promises another defensen depth layer for protecting the informationystems. As user acceptance and demand forMET raises, we will see further development

    of these tools for its integration via group pol-cy. It will be good to see this tool being fullyupported and managed via group policy in

    near future. Needless to say, this mitigationneeds to be tested for deployment in the pro-duction environment as it may break existingapplication compatibilities therefore produc-on implementation will require extensive test-ng before it can be deployed. Again, EMETcould serve as another layer in the defencedepth strategy.

    I hold the CISSP, CISM, SANS GCIH and FCNSAcertificates.I work for a top tier managed ser-vice provider in Sydney, Australia

    Naveen Sharma

  • 8/2/2019 Security Kaizen 41

    30/31

    Best PracticeSecuritykaizen Magazine

    59

  • 8/2/2019 Security Kaizen 41

    31/31