bsidesroc 2016 - holly turner - how to hug a hacker

23
How to Hug a Hacker (Lessons from Manufacturing) Holly Turner, Xerox Information Security Manager CISSP, PMP, Six Sigma Black Belt

Upload: bsidesroc

Post on 11-Feb-2017

265 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

How to Hug a Hacker(Lessons from Manufacturing)

Holly Turner, XeroxInformation Security Manager

CISSP, PMP, Six Sigma Black Belt

Page 2: BSidesROC 2016 - Holly Turner - How To Hug A Hacker
Page 3: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

"My father taught me many things here — he taught me in this room. He taught me — keep your friends close but your enemies

closer.“

"Michael Corleone" in The Godfather Part II (1974)

Page 4: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

• Mike Lynn, age 24, presented vulnerabilities in Cisco IOS at Black Hat in Vegas

https://www.blackhat.com/html/bh-blackpage/bh-blackpage-11092005.htmlhttps://www.schneier.com/blog/archives/2005/07/cisco_harasses.html

• Resigned from ISS, after being asked to ‘edit’ presentation content

• Lawsuit filed by Cisco, ISS

2005 “Ciscogate”

Page 5: BSidesROC 2016 - Holly Turner - How To Hug A Hacker
Page 6: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

"No one really thought this …was possible, until Wednesday, so no one really looked to defend against it," [Mike]Lynn said. "A router is like any computer in that, when it has a vulnerability, you can hack it.“

Blowback - 1 http://www.securityfocus.com/news/11260

Page 7: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

"The whole attempt at security through obscurity is amazing, especially when a big company like Cisco tries to keep a researcher quiet““ People are definitely going to want to find more vulnerabilities ... and now people aren't going to care to report things to Cisco.”Marc Maiffret, chief hacking officer for network protection firm eEye Digital Security

Blowback - 2 http://www.securityfocus.com/news/11260

Page 8: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

"You have EULAs that tell people they can't reverse engineer and companies who are ready to levy the most severe penalties for anyone who breaks those agreements,“[Jennifer] Granick said. "It is time to begin to worry about the rights that companies are trying to take away from us.”

Blowback- 3 http://www.securityfocus.com/news/11260

EULA

Page 9: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

• Processor• RAM, ROM, SDRAM• HD• NIC• Analog Fax Modem• Linux OS• Apache, Open SSL, Open LDAP, Samba,

Kerberos, PHP, Netsnmp

Say hello to my little friend.

Page 10: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

• Brendan O’Connor, undergrad intern, presents “Vulnerabilities in embedded systems”

https://www.blackhat.com/presentations/bh-usa-06/BH-US-06-OConnor.pdf

Black Hat 2006

Page 12: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

• Senior Security Advisor at Leviathan Security Group

• Juris Doctor, Law, University of Wisconsin, MSE Computer Science, Johns Hopkins

• CIPP/US, CIPP/G, CISSP, Certificate of Cloud Security Knowledge https://www.linkedin.com/in/ussjoin

Where is he now?

Page 13: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

• Researchers at Columbia School of Engineering and Applied Science reverse engineer printer

• Software updates are not digitally signed and checked for authenticity

• Malware can replace OShttp://www.nbcnews.com/business/consumer/exclusive-millions-printers-open-devastating-hack-attack-researchers-say-f118851

Printers on Fire? 2012

Page 14: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

• Dr. Ang Cui, CEO and chief scientist• Dr. Salvatore Stolfo, co-founder• Red Balloon Security

https://www.redballoonsecurity.com/ • Project Symbiote – software to defend

embedded devices, in HP devices

Where are they now?

Page 15: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

• Andrei Costin, presentation on “Embedded Devices Security and Firmware Reverse Engineering”

https://www.blackhat.com/us-13/briefings.html#Costin

Black Hat 2013

Page 16: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

More Security Bulletins

https://www.xerox.com/download/security/security-bulletin/2e639-4d7bcb40a048e/cert_XRX12-003_v1.13.pdf

Page 17: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

• Co-founder at Firmware.RE• PhD from EURECOM/Telecom ParisTech• Google Security Hall of Fame• 12/29/2015 presentation on “(In)Security of

Embedded Devices' Firmware - Fast and Furious at Large Scale “

https://www.youtube.com/watch?v=Rum1e8ZJlys

Where is he now?

Page 18: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

• Andrew Auernheimer, Weev, hacktivist claims ‘mass printer trolling’ sending an unauthorized document to printers on open, unsecured Internet connections.

• http://www.nytimes.com/2016/03/29/nyregion/hacker-weev-says-he-printed-anti-semitic-and-racist-fliers-at-colleges-across-us.html?_r=0

Fast forward, March 2016

Page 19: BSidesROC 2016 - Holly Turner - How To Hug A Hacker
Page 20: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

• Self-Employed• Seeking Crowdfunding on Liberapay• Twitter – “Tons of Soviet bureaucracy. Submitted

my request for a 15 year residency. If you don't travel to Eastern Europe I'll see you when I'm 45”

https://www.linkedin.com/in/rabite

Where is he now?

Page 21: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

How hugging works1. Contact

– Dedicated webpage.com/security– Technical Support, phone or email

2. Publication Pause – Negotiated time period for manufacturer to develop

patch, 60 to 90 days3. Acknowledgement

– Public recognition of researcher

Options:• Contest/Challenge• Payment/Bug Bounty

Page 23: BSidesROC 2016 - Holly Turner - How To Hug A Hacker

Questions?