Top Banner
Preparing for the Next Shellshock
14
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Preparing for the Next Shellshock

Preparing for the Next Shellshock

Page 2: Preparing for the Next Shellshock

Jen AndreThreat Stack Co-Founder & Chief Scientist @fun_cuddles

Page 3: Preparing for the Next Shellshock

0

2000

4000

6000

8000

1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

0-1 1-2 2-3 3-4 4-5 5-6 6-7 7-8 8-9 9-10

Vulnerabilities by Score 1999 - 2014

7439

source: http://www.cvedetails.com/

Page 4: Preparing for the Next Shellshock

How and What

Shellshock

Page 5: Preparing for the Next Shellshock

The details

Page 6: Preparing for the Next Shellshock

At a Glance

• 6 CVEs

• Initial report (CVE-2014-6271), CVE-2014-627, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187

• ??? Vendors/Tools Affected

Page 7: Preparing for the Next Shellshock

Lessons LearnedQuestion What We Know

Prevention Is a Myth

Monitor Everything in Real Time

Page 8: Preparing for the Next Shellshock

The myth of the “many eyes” trope?

?

Page 9: Preparing for the Next Shellshock

"To put these exponential numbers into perspective, we’re about to transition from an Internet the size of a golf ball to an Internet the size of the sun." Marc Goodman, Global Security Futurist

Page 10: Preparing for the Next Shellshock

Continuous Delivery & You

Page 11: Preparing for the Next Shellshock

How To PrepareUnderstand Your Responsibility

Uncover New Threats

Protect Customer Data w/ Continuous Monitoring

Page 12: Preparing for the Next Shellshock

Day ZeroA walk through day zero, with the proper safeguards in place

Page 13: Preparing for the Next Shellshock

• The Setup

• 1 VM running vulnerable version of bash shell with real-life Nagios cgi-bin exploit.

• Threat Stack installed.

• The Investigation

• See how the exploit works, and attack is detected without signatures

• The Response

• How to track down impact.

Page 14: Preparing for the Next Shellshock

Get Started Today!Request a Demo

threatstack.com/demo.html

Start a trial

threatstack.com/signup.html