Top Banner
ISE Proprietary HACKERS & ATTACK ANATOMY Ted Harrington, Executive Partner | [email protected]
44
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

H A C K E R S & A T T A C K A N A T O M Y

Ted Harrington, Executive Partner | [email protected]

Page 2: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

Why is this important?

ISE Proprietary

Page 3: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

Attacks

III. Security vs. Functionality

ISE Confidential - not for distribution

I. Assets vs. Perimeters

About ISE

II. Black Box vs. White Box IV. Build In vs. Bolt On

Page 4: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 5: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 6: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 7: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

About ISE

ISE Proprietary

Analysts

• White box

Perspective

• Hackers; Cryptographers; RE

Research

• Routers; NAS; Healthcare

Customers

• Companies w/ valuable assets to protect

Exploits

• iPhone; Android; Ford; Exxon; Diebold

Page 8: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 9: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 10: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

I. Secure Assets, Not Just Perimeters

ISE Proprietary

Page 11: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

I. Secure Assets, Not Just Perimeters

Traditional Attacks Traditional Defenses

1

1

ISE Proprietary

Page 12: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

I. Secure Assets, Not Just Perimeters

1

2

ISE Proprietary

Page 13: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

I. Secure Assets, Not Just Perimeters

1

3

ISE Proprietary

Page 14: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 15: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

II. Black Box Penetration Tests == Good

ISE Proprietary

Page 16: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

II. Black Box Penetration Tests == Good

ISE Proprietary

White box vulnerability assessment == GOOD!

Page 17: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

II. Black Box vs. White Box

ISE Proprietary

• Access Level

• Black Box

• White Box

• Evaluation Types

• Penetration Test

• Vulnerability Assessment

Page 18: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

II. Black Box vs. White Box

ISE Proprietary

Black Box Perspective

Page 19: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

II. Black Box vs. White Box

ISE Proprietary

White Box Perspective

Page 20: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

II. Black Box vs. White Box

ISE Proprietary

Page 21: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

II. Black Box vs. White Box

ISE Proprietary

Black Box

2 mo. / 200 hrs.

4 potential issues

1 confirmed

none

no recommendations

very low

200+ hrs.

White Box

2 mo. / 200 hrs.

11 confirmed

10 confirmed

21+ mitigation strategies

high

~9 hrs.

~9 hrs.

Time/cost

Severe issues

Other issues

Results

Completeness/Confidence

Cost/issue

Cost/solution

8

Page 22: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 23: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

SOHO Routers: Outcomes

ISE Proprietary

Goals Results

10 13

Any Remote, Local, Both

>30% 100% Broken

Models

Attacks

Compromise

Page 24: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 25: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 26: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 27: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

III. Security vs. Functionality

ISE Proprietary

Page 28: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

III. Security vs. Functionality

ISE Proprietary

EMBARRASSINGLY OVERSIMPLIFIED CORPORATE STRUCTURE

SALES IT HR ...

IT FUNCTIONALITY IT SECURITY

Page 29: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

III. Security vs. Functionality

ISE Proprietary

EMBARRASSINGLY OVERSIMPLIFIED CORPORATE STRUCTURE

SALES IT HR SECURITY

IT FUNCTIONALITY IT SECURITY

Page 30: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

III. Security vs. Functionality

ISE Proprietary

CONFLICT IS GOOD!

Page 31: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

III. Security vs. Functionality

ISE Proprietary

Page 32: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

I. Security Separated From Functionality

ISE Confidential - not for distribution

Page 33: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

I. Security Separated From Functionality

ISE Confidential - not for distribution

Page 34: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

I. Security Separated From Functionality

ISE Confidential - not for distribution

Page 35: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 36: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Proprietary

Page 37: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Confidential - not for distribution

Page 38: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

ISE Confidential - not for distribution

Page 39: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

IV. “Build It In,” Not “Bolt It On”

ISE Proprietary

Page 40: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

IV. “Build It In,” Not “Bolt It On”

ISE Proprietary

Page 41: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

IV. “Build It In,” Not “Bolt It On”

ISE Proprietary

REQUIREMENTS

DESIGN

IMPLEMENTATION

TESTING

DEPLOYMENT

MAINTENANCE

Determine business &

user needs

Define architecture

Coding

System testing

Customer roll-out

Resolve bugs

Develop threat model

Design defense in depth

Audit code

White box vulnerability

assessment

Configuration Guidance

Iteration Hardening

Page 42: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

IV. “Build It In,” Not “Bolt It On”

ISE Proprietary

Built In

90%

- - -

1x

Bolted On

100%

- - -

25x : application

300x : infrastructure

Assessment cost

Assessment overhead

Mitigation cost / issue

Page 43: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

Get Involved

ISE Proprietary

Page 44: Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

Ted Harrington Executive Partner

[email protected]

ISE Proprietary