data mining a mountain of zero-day...

40
Data Mining a Mountain of Vulnerabilities Chris Wysopal HITB Kuala LumpurOctober 10, 2012

Upload: others

Post on 13-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Data Mining a Mountain of Vulnerabilities

Chris Wysopal

HITB Kuala Lumpur– October 10, 2012

Page 2: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

10 Biggest Breaches of 2011

2

Page 3: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Why so many application related breaches?

Question:

Who would release a product riddled with security problems simply to make money?

Answer:

Pretty much every vendor out there.

- Andrew Hay, Senior Security Analyst

Page 4: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Building a Secure Application

Even educated developers make mistakes

It is difficult but easier than in the past

Automation can detect and point to about 2/3 of the top vulnerability categories

It’s a dereliction of duty to not perform adequate security testing before shipping

4

Page 5: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Waterholing trend

Attackers increasing vectors for breaching perimeter security:

Bribe insider

Removeable media (USB. The floppy is back)

Email attachment

Compromised website: the waterhole.

RSA recently reported on VOHO campagin

Could waterholes overtake spearphishing?

5

Page 6: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

So let’s mine some data!

6

Page 7: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

The Data Set

Applications from over 300 commercial and US government customers

Scanned 9,910 applications over past 18 months

Ranged in size from 100KB to 6GB

Software was pre-release and in production

Internally built, outsourced, open source, and commercial ISV code

7

Page 8: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

8

▸ Industry vertical

▸ Application supplier (internal, third-party, etc.)

▸ Application type

▸ Assurance level

▸ Language

▸ Platform

Application Metadata

▸ Scan number

▸ Scan date

▸ Lines of code

▸ Flaw type

Scan Data

▸ Flaw counts

▸ Flaw percentages

▸ Application count

▸ Risk-adjusted rating

▸ First scan acceptance rate

▸ Time between scans

▸ Days to remediation

▸ Scans to remediation

▸ CWE/SANS Top25 (pass/fail)

▸ OWASP Top Ten (pass/fail)

▸ Custom policies

Application Security Metrics

Page 9: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

9

Page 10: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

10

The latent

Vulnerabilies

vs.

The Attacks

Page 11: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Top 5 Attacked Web Application Vulnerabilities

11

Page 12: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Let’s take a

closer look

at the

numbers

Page 13: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

13

Page 14: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

14

Page 15: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

15

Page 16: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

16

Page 17: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Top 3 Vulnerabilities by Language

17

Page 18: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Top 3 Vulnerabilities by Language

18

Page 19: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Different developers deliver different vulns

19

Page 20: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Different industries accept different vulns

20

Vulnerability distribution by industry

Page 21: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Are

DEVELOPERs

making any

progress at

eradicating

cross-site

scripting or

sql

injection?

Page 22: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

22

Page 23: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

23

Page 24: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Dare we ask,

How is the

U.S.

government

sector doing?

Page 25: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

25

Page 26: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

What

percentage of

WEB

applications

fail OWASP

TOP TEN?

a) 34%

b) 57%

c) 86%

d) 99%

Page 27: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

27

Page 28: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

28

Page 29: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Who is

holding their

software

vendors

accountable?

Page 30: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

30

Enterprise Industries

Page 31: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

31

3rd Party Application Purpose

Page 32: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

33

Page 33: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

34

Page 34: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

So I hear

you can run

applications

on smart

phones?

Page 35: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

37

Distribution by industry Distribution by supplier type

Page 36: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

38

Percentage of Android Apps Affected

Page 37: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

39

Percentage of iOS Apps Affected

Page 38: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

When given an

exam on

application

security

fundamentals,

over half of

developers…

a) Receive an A

b) Receive a B or worse

c) Receive a C or worse

d) Fail (receive a D or F)

Page 39: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

42

Page 40: Data Mining a Mountain of Zero-Day Vulnerabilitiesconference.hackinthebox.org/hitbsecconf2012kul... · Building a Secure Application Even educated developers make mistakes It is difficult

Chris Wysopal

[email protected]

@weldpond