Top Banner
CONFIDENCE CONFERENCE Analyzing Security Findigns the Easy Way 6 years later… SECCUBUS This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
69

CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

Jul 28, 2015

Download

Software

PROIDEA
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Analyzing Security Findigns the Easy Way6 years later…

SECCUBUS

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0

International License.

Page 2: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Frank Breedijk• Security Officer at Schuberg Philis• (Official) Security dude since 2000• Author of Seccubus

Coordinates:• [email protected] • https://www.linkedin.com/in/seccubus• @Seccubus on Twitter

Glenn ten Cate• Mission Critical Engineer Security at Schuberg Philis• Security Dude• Author of Security Knowledge Framework

Coordinates:• gtencate@schubergphilis• https://nl.linkedin.com/pub/glenn-ten-cate/3b/11a/

117

WHO ARE WE?

Page 3: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Frustration

Being challanged

To make my life easier

WHY DID I START THE SECCUBUS PROJECT?

Y ? A CC NC ND image by Tehmina Goskarhttps://www.flickr.com/photos/13114254@N00/119475590/

Page 4: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

C. Lueless

Mission:• Mission: Perform a bi-weekly vulnerability scan of all

our public IP addresses

B. Rightlad

A STORY ABOUT TWO GUYS

These and all non-attributed photos of Frank Breedijk are taken by Jan Jacob Bos

Page 5: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

C. LUELESS – TAKES A CLASSIC APPROACH

Page 6: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

GETTING UP WAY TO EARLY…

Page 7: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… STARTING THE SCANNER IN THE MAINTENANCE WINDOW…

Page 8: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… WAITING …

Page 9: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… ANALYSIS

Page 10: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Scanners are written for consultants, not operations

Scanners need to make a tradeoff between false positives and false negatives

Most scanners produce an awfull lot of output

Scanning takes time, tools are poorly automated

WHAT IS C. LUELESS’ PROBLEM?

Page 11: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

B. RIGHTLAD CHOOSES SECCUBUS

Page 12: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

CONFIGURATION IN THE MORNING

Page 13: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… GO HOME …

Page 14: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… RELAX …

Page 15: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… THE SCAN RUNS AT NIGHT …

Image: Orion's Umbra, a CC NC image from jahdakinebrah's photostream

Page 16: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… IN THE MORNING …

Page 17: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… ANALYZE AND REMEDIATE

Page 18: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

WHAT HAPPENED UNDER THE HOOD?

Do-scan

Nessus/scan Nessus

.nessus files

nessus2ivilIvil file

Load ivilDatabase

Page 19: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

ALL ABOUT STATUS

New

Open

No issue

Page 20: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Is the work in balance with the profit?

BALANCE

A fine balance a CC NC ND Image by Anish B Georgehttps://www.flickr.com/photos/22199070@N00/3311106984/

Page 21: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

TWO WEEKS LATER

Image: 1/365, a CC NC ND image from cubedude27's photostream

Page 22: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

C. LUELESS – TAKES A CLASSIC APPROACH

Page 23: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

GETTING UP WAY TO EARLY…

Page 24: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… STARTING THE SCANNER IN THE MAINTENANCE WINDOW…

Page 25: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… WAITING …

Page 26: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… ANALYSIS

Page 27: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

WAS IT REALLY WORTH IT?

Page 28: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

B. RIGHTLAD CHOOSES SECCUBUS

Page 29: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… GO HOME …

Page 30: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… RELAX …

Page 31: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… THE SCAN RUNS AT NIGHT …

Image: Half Moon, a CC NC ND image from za3tooor's photostream

Page 32: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… IN THE MORNING …

Page 33: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… ANALYZE AND REMEDIATE

Page 34: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

ALL ABOUT STATUS

New

Open

No issue

ChangedGone

ClosedMasked

Page 35: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Don’t bother users with non-actionable findings

OK IS OK…

Woo a CC NC SA image by Rick Harrisonhttps://www.flickr.com/photos/81851211@N00/2682663297/

Page 36: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

ANOTHER TWO WEEKS PASS…

Image: Cosas hechas, a CC ND image from srgblog's photostream

Page 37: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

C. LUELESS – TAKES A CLASSIC APPROACH

Page 38: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

GETTING UP WAY TO EARLY…

Page 39: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… STARTING THE SCANNER IN THE MAINTENANCE WINDOW…

Page 40: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… WAITING …

Page 41: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… ANALYSIS

Page 42: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

B. RIGHTLAD CHOOSES SECCUBUS

Page 43: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… GO HOME …

Page 44: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… RELAX …

Page 45: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… THE SCAN RUNS AT NIGHT …

Image: Himalayan Moonrise, a CC NC ND image from swamysk's photostream

Page 46: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… IN THE MORNING …

Page 47: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

… ANALYZE AND REMEDIATE

Page 48: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Succubus

In-Seccubus

Seccubus

WHAT IS IN A NAME?

Page 49: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Monthly Seccubus runs means:

Scans are scheduled via crontab

Only the findings that need attention get it

Less errors due to less repetitave work.

The amount of effort is proportional to the amount of changes

Risk is proportional to the amount of changes

SO…

Page 50: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

COMPARE

Image: Apples & Oranges - They Don't Compare, a CC image from thebusybrain's

photostream

Page 51: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

REDUCE

Image: Slimmer, a CC NC ND image from mkmabus's photostream

Page 52: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

6 YEARS AGO…

Page 53: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

ULTIMATE GOAL

Image: StuttgargoalRobin, a CC image from dankamminga's photostream

Page 54: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Name Seccubus chosen here at Confidence

Added new scanners

Wrote a new GUI

SECCUBUS HAS EVOLVEDMedusa

SSLyze

Page 55: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Intermediate Vulnerability Information Language

Intermediate format that allows tools to interface and exchange findings

A LITTLE IVIL GOES A LONG WAY

Image: EVIL a CC NC SA image from krazydad's photostream

Page 56: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

It does not try to capture everything

It does not try to fit each case

The specification is not 63 pages

Simple to read

Simple to write

Simple to use

Simple License (MIT)

Easy to integrate new tools into Seccubus

IVIL

Page 57: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Joined Schuberg Philis 2 years ago

Main focus: Web Application Security

We need to integrate this into our pipeline

ENTER GLENN

Enter here a CC NC ND image by Anne Petersenhttps://www.flickr.com/photos/60258967@N00/4183985730/

Page 58: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Breaches are moving from layer 3 to layer 7

There’s only so many security dudes to drive the tools

Integrate into continuous delivery

WHY?

Page 59: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Google’s web application security scanner

Open Source

Noisy

Not very subtile

Not production safe!

FIRST WIN: SKIPFISH

Skip w/ fish a CC NC ND image by AlBakkerhttps://www.flickr.com/photos/45213160@N00/206944920/

Page 60: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Open source

Like Burp but free (as in speech)

Actively developed and maintained

OWASP Flag Ship Project

SECOND WIN: OWASP ZAP

IEEE Scrum a CC NC SA image by Jim Carsonhttps://www.flickr.com/photos/44124442504@N01/2208956607/

Page 61: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Help developers write better code

Enable Security by Design• Knowledge system for risk analysis

Code Securely• Code examples

Check code before commit• OWASP Application Security Verification Standard

Newly adopted as OWASP Project

SECURITY KNOWLEDGE FRAMEWORK

Moving Hacks a CC NC SA image by Brian Sawyerhttps://www.flickr.com/photos/45609637@N00/229360390/

Page 62: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Coding• Perl• Angular

Requirements• What do you want

Testers• Challenge the quality of our crack ;)

Documentation• Help us get new users

Users

SECCUBUS CAN USE YOUR HELP

Image: Hang On, a CC NC ND image from brraveheart's photostream

Page 63: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

First public preview of new interface

SNEAK PREVIEW

"Celebs" a cc by nc sa licensed photo by Nick Sherman: http://flickr.com/photos/nicksherman/4145966095/

Page 64: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate
Page 65: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate
Page 66: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate
Page 67: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

New user interface (RSN)

Start/schedule scans from the GUI

Integration with Security Knowledge Framework

Add user/rights management

Track issues as well as findings

Reporting

More???

ROADMAP

Albany NY 1950 a CC image by davidhttps://www.flickr.com/photos/23465812@N00/6877290919/

Page 68: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

www.seccubus.com

QUESTIONS

Image: What now?, a CC ND image from laurenclose's photostream

Page 69: CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

CONFIDENCE CONFERENCE

Frank Breedijk• Security Officer at Schuberg Philis• (Official) Security dude since 2000• Author of Seccubus

Coordinates:• [email protected] • https://www.linkedin.com/in/seccubus• @Seccubus on Twitter

Glenn ten Cate• Mission Critical Engineer Security at Schuberg Philis• Security Dude• Author of Security Knowledge Framework

Coordinates:• gtencate@schubergphilis• https://nl.linkedin.com/pub/glenn-ten-cate/3b/11a/

117

WHO ARE WE?