Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris...

22
Chris Wysopal BruCON ‘17

Transcript of Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris...

Page 1: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

Chris Wysopal BruCON ‘17

Page 2: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

22

How did we get here?

We made trouble.

Page 3: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

3

Page 4: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

4

The Seminal Event

“Improving the Security of Your Site by Breaking Into It”

By Dan Farmer and Weitse Venema, 1993

Page 5: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

55

Hackers Made Information Security a Participatory Sport

Page 6: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

66

The First Hacker Tools

Crack – Alec Muffett - 1991Targets guessable passwords

SATAN – Dan Farmer & Weitse Venema - 1995Targets misconfiguration

Netcat – Hobbit - 1996Network swiss army knife

Page 7: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

77

Hacker Information Resources

Bugtraq

Page 8: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

8

Hackers Write Commercial Security Software

Page 9: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

99

Improve the Security of Your Productby Breaking Into It

Page 10: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

10

Product companies selling security features

Identity & Access ManagementEncryptionFirewalls

Accountancies selling compliance

SAS 70NIST 80-153

Page 11: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

11

Page 12: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

12

In 2000 Launched @stake security consultancy

• We conducted our own vulnerability research

• We built our own attack/testing tools

• We secured applications by breaking into them

• Others soon followed:

– Guardent (acquired by Verisign)

– Foundstone (acquired by McAfee)

The L0pht+

Dan Geer

Page 13: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

13

Remember the Microsoft SDLC

Page 14: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

14

What did we teach them?

• How to threat model• How to exploit heap overflows• How to fuzz software• Built their first fuzzer – SPIKE• How to use SysInternals Process Explorer

to find attack surface• Now Microsoft SDLC is the reference for

the industry – literally, ISO 27034

Page 15: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

15

Modern Security Era Is Born 2003 -

Penetration testing is a requirement.

Companies have a product security response team.

Development teams use hacker techniques for security Testing. Look to Microsoft as a model.

And later came Bug Bounties!

Page 16: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

16 © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES

Fast forward to

2017

Page 17: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

17

•Nation States pretend to be criminal hackers

Page 18: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

1818

Stripe Veracode IBMGrandIdeaStudio

And Hackers are now Insiders

Page 19: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

1919

But we are OLD insiders

We need the next generation to keep making trouble

Page 20: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

2020

Make me nervous!

Page 21: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

2121

Security Champions

Page 22: Chris Wysopal BruCON ‘17files.brucon.org/2017/008_Chris_Wysopal_How_Hackers_Changes_S… · Chris Wysopal BruCON ‘17. 2 How did we get here? We made trouble. 3. 4 The Seminal

22

Weld Pond/Chris Wysopal

[email protected]

@weldpond