Top Banner
Iftach Ian Amit | November 2011 www.security-art.com All rights reserved to Security Art ltd. 2002-2011 Advanced Data Exfiltration The way Q would have done it Iftach Ian Amit VP Consulting DC9723 CSA-IL Board member IL-CERT Visionary
152

Advanced Data Exfiltration The Way Q Would Have Done It

Nov 06, 2014

Download

Technology

SOURCE Barcelona 2011 - Iftach Ian Amit
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 2: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 3: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 4: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 5: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 6: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 7: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 8: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 9: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 10: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 11: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 12: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Page 13: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Agenda

3

Page 14: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Agenda

3

Page 15: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Agenda

3

Page 16: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Agenda

3

Page 17: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

4

Page 18: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

5

Page 19: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

5

Page 20: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

5

Page 21: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

5

Page 22: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

5

Page 23: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Page 24: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Page 25: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Page 26: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Page 27: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Page 28: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Page 29: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Page 30: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Page 31: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Page 32: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Page 33: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Page 34: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Page 35: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Page 36: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 8

Page 37: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 8

Page 38: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 8

Page 39: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 8

Page 40: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

Page 41: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

• eMails, web links, phishing...

Page 42: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

• eMails, web links, phishing...

• Works like a charm!

Page 43: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

• eMails, web links, phishing...

• Works like a charm!

• And can be mostly automated

Page 44: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

• eMails, web links, phishing...

• Works like a charm!

• And can be mostly automated

• SET to the rescue

Page 45: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

• eMails, web links, phishing...

• Works like a charm!

• And can be mostly automated

• SET to the rescue

Page 46: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

10

And... being nice/nasty/obnoxious/needy always helps!

Page 47: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

10

And... being nice/nasty/obnoxious/needy always helps!

Page 48: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

10

And... being nice/nasty/obnoxious/needy always helps!

Page 49: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

10

And... being nice/nasty/obnoxious/needy always helps!

Page 50: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

10

And... being nice/nasty/obnoxious/needy always helps!

Page 51: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

11

Page 52: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

11

Page 53: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Page 54: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Page 55: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Page 56: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Page 57: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Page 58: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Page 59: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Page 60: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

12

Page 61: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

12

Page 62: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

12

Page 63: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

What is the target “willing” to tell about itself?

13

Page 64: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

What is the target “willing” to tell about itself?

13

Page 65: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

What is the target “willing” to tell about itself?

13

Page 66: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Page 67: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Page 68: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Page 69: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Page 70: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 15

Page 71: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 15

Page 72: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Select your target wisely

And then craft your payload :-)

16

Page 73: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

17

Page 74: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

17

Page 75: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

17

Page 76: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

17

Page 77: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

17

Page 78: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• ZeuS: $3000-$5000

• SpyEye: $2500-$4000

• Limbo: $500-$1500

17

Page 79: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• ZeuS: $3000-$5000

• SpyEye: $2500-$4000

• Limbo: $500-$1500

17

FREE!

Page 80: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

18

Page 81: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

18

Page 82: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

18

Experienced travelers know the importance of packing properly

Page 83: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

18

Experienced travelers know the importance of packing properly

Page 84: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• File servers

• Databases

• File types

• Gateways (routes)

• Printers

19

Page 85: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

20

Mass infection:5-6 days before

detection

APT:5-6 months before

detection

Page 86: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

20

Mass infection:5-6 days before

detection

APT:5-6 months before

detection

Page 87: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

20

Mass infection:5-6 days before

detection

APT:5-6 months before

detection

Frequent updates No* updates* Almost

Page 88: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

21

PATIENCEMass infection:5-6 days before

detection

APT:5-6 months before

detection

Frequent updates No* updates* Almost

Page 89: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Page 90: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Page 91: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Page 92: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Page 93: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Page 94: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Page 95: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Page 96: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

23

Page 97: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

23

Page 98: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

24

Page 99: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

24

Page 100: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

24

Page 101: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

So...

25

-----BEGIN PGP MESSAGE-----Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

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jN3t-----END PGP MESSAGE-----

Page 102: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Still “too detectable”

26

Page 103: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Still “too detectable”

26

hQMOA1jQIm6UkL4eEAv/W3r/eYLUmqRNi/Jegt72lK6qdBiBfkg9PZ5YKql9CUZpFGnVk029K3gEVcrA4k7w2aOtP7tYKRF8v4yrZQ9GZ7eXzR7+Tbf1g+7dveH6U8BfBHo8LRovj5OlGghrvpyKYRPIf/NAgzL2G8dyi/FVB0YB4J7/4x0YFEalQHaLiKyt/gkikyV92njPJ6tPm2sdKUqUHSb20r9AdowZ0VVRrWwdRgUhdNXajjwcbH1BjVuSGilw8MnmQkmJAT+TAFkTqC9fjiwtnNMNANJbo2Z36RqsAcKbhVh1eMA7ev0pUakpTm4xN64syk/1DEc0VHFbanAreTV3tCbUUIoPQDFGFpiu3oS6/089oUvRtBBbC5p6leYKEnDllcGWAomRSiYBFWjTca/DIw43QIW/lmdBnwcWLuQmDCmwr3HuhEaOmqfOhdgaxM4GuVdJCDdwXzwpuaPElCd18weH2XNzudLdeRKN+wjl/4D6bIo+038BcLeiSyhWrMFB7mKSmEzQufQUDACFamtMCn9YOo3mgo+YYk505qhIDLNwZXqyVUqOHvIGvu7gzuNwUdY5idLqsGEs0K0xVwYntTKUh61tNS/HDfNTVm4Y3p8M88JHhcg7npY5gJuhWuHkgp2CTsQT+gRjthm3l3AlnIvAfuC5uWLMsjA4sCw2FRDOARxrN9El8maX/vCxN9aB3dK4S9MSGJ5HhaYpTfpc9CdFkFryzb2sFWfW85nSzNo7dVFCy0jmSr19o4Jsfj0J0izS3MeGYYz5NSsfBz+6o/IYURL3OXrm4DuJNHY0DvVbYqSQRRx3o2S+uZekwXwYsqpei/f/sYo875p5NeX3g62zgjy2Vly+n58WaZWoHb5Y0QCxNfpjdcAQ3tuZQaUvlqrkQeSRxKXD7pxlHdwHDgfvw01RU8NsMkfsBoTZY27BjFvIg5S/pv9O6IznXaJu9jRWDj6tvSypx8X2iiVgtSHYahlqEUH1RusAMCILkx0DydCvUud/qRbTYcnkVVgA8ojeDoVpp3AabRrSmgEAOwW6M0KvnSuMKniLIKe7kolqGjEuLAx7s5KgmMHfNki5dYWvQzHv03ID9UG+uW6o54BnsajEVe2EcYTPT+8pg2bCxnMElK0ds9Isqvf2Kx4kqO0qMeJG1II2zfAFqmMiTMtgA2CZ0Y42hA/bQK/CCM8QVo9JcGn3Jf6N0X1TVob7xDo/fkRROHv74dIh2Kxa0SH8iGdb4kI==jN3t

Page 104: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Much better• Throws in some additional encodings

• And an XOR for old time’s sake

• And we are good to go...

• 0% detection rate

27

Page 105: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 28

Resistance is futile

Page 106: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

29

Page 107: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

29

80

44353

Page 108: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

29

80

44353

Page 109: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Kill some trees

30

Page 110: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

31

Page 111: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

31

Page 112: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011

Good ol’e DD...

32

Page 113: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

33

Page 114: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

33

Page 115: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

33

1 0 1 0

1/2 byte=

16 values

Page 116: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

33

1 0 1 0

1/2 byte=

16 values

Page 117: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

33

1 0 1 0

1/2 byte=

16 values

Page 118: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Page 119: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Page 120: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Page 121: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Page 122: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Page 123: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Page 124: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Page 125: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Page 126: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 35

Page 127: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 35

Page 128: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 35

1 0 1 0

Page 129: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Page 130: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Page 131: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Page 132: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Page 133: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Page 134: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Page 135: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

37

Page 136: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Killing paper isn’t nice• Fax it!

• Most corporations have email-to-fax services

• heard of the address [email protected] ?

• Just send any document (text, doc, pdf) to it and off you go with the data...

38

Page 137: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Conclusions

39

Page 138: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Conclusions

39

Page 139: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Conclusions

39

Page 140: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Conclusions

39

Page 141: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• Start with the human factor

• Then add technology

40

Page 142: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• Start with the human factor

• Then add technology

40

Page 143: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• Where people leave data

• Hint - spend time with developers.

• “Hack” the business process

• Test, test again, and then test. Follow with a surprise test!

41

Page 144: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• Where people leave data

• Hint - spend time with developers.

• “Hack” the business process

• Test, test again, and then test. Follow with a surprise test!

41

Page 145: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 42

“be true to yourself, not to what you believe things should look like”

Old chinese proverb

Page 146: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 42

“be true to yourself, not to what you believe things should look like”

Old chinese proverb

Page 147: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 43

They are YOUR assetsafter all

No reason to beshy about it...

And remember to add honey...

Page 148: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

44

Page 149: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

44

Page 150: Advanced Data Exfiltration The Way Q Would Have Done It

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

44

Page 151: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 45

TEST SOME MORE

For hints/guides see: www.pentest-standard.org

Page 152: Advanced Data Exfiltration The Way Q Would Have Done It

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011

Questions?

46

Thank you! Whitepapers:www.security-art.com

Too shy to ask [email protected]

Need your daily chatter?twitter.com/iiamit

Data modulation Exfil POC:http://code.google.com/p/

data-sound-poc/