$HOME Sweet $HOME SANSFIRE Edition

75
$HOME Sweet $HOME SANSFIRE 2016 - Xavier Mertens

Transcript of $HOME Sweet $HOME SANSFIRE Edition

Page 1: $HOME Sweet $HOME SANSFIRE Edition

$HOME Sweet $HOME

SANSFIRE 2016 - Xavier Mertens

Page 2: $HOME Sweet $HOME SANSFIRE Edition

$ cat ~/whoami.xml<profile> <real_name>Xavier Mertens</real_name> <day_job>Freelance Security Guy</day_job> <night_job>Hacker, Blogger</night_job> <![CDATA[ www.truesec.be blog.rootshell.be isc.sans.edu www.brucon.org ]]></profile>

Page 3: $HOME Sweet $HOME SANSFIRE Edition

$ cat ~/.profile

• I like (your) data

• Playing “Active Defense”

• I prefer t-shirts than ties

• Geek and gadgets over!

Page 4: $HOME Sweet $HOME SANSFIRE Edition

$ cat ~/disclaimer.txt

“The opinions expressed in this presentation are those of the speaker and do not necessarily reflect those of past, present employers, partners or customers.”

Page 5: $HOME Sweet $HOME SANSFIRE Edition

$HOME Sweet $HOME

Page 6: $HOME Sweet $HOME SANSFIRE Edition

$HOME Sweet $HOME

Page 7: $HOME Sweet $HOME SANSFIRE Edition

Agenda

• A Revolution Entered Our Homes

• Internet of Nightmares

• Mitigations

• Conclusions

Page 8: $HOME Sweet $HOME SANSFIRE Edition
Page 9: $HOME Sweet $HOME SANSFIRE Edition
Page 10: $HOME Sweet $HOME SANSFIRE Edition
Page 11: $HOME Sweet $HOME SANSFIRE Edition

Fidonet: 2:291/715.9

Aminet: 39:120/201.9

Page 12: $HOME Sweet $HOME SANSFIRE Edition

BBS Fidonet UUCP IP (SLIP) “Broadband” Mobile

What’s next?

Page 13: $HOME Sweet $HOME SANSFIRE Edition

Today?

• More bandwidth at home that when I started to work for ISP’s (1996)

• SLA @ home (Kids complaint when offline)

Page 14: $HOME Sweet $HOME SANSFIRE Edition

Today?

Page 15: $HOME Sweet $HOME SANSFIRE Edition

Today?

Page 16: $HOME Sweet $HOME SANSFIRE Edition

$DATA

• Family pictures

• Administrative docs (taxes, insurances, invoices)

• Medias (MP3, movies, books)

• $YOU

Page 17: $HOME Sweet $HOME SANSFIRE Edition

Before:

Internet LAN

Fire

wal

l

Ingress Traffic

Page 18: $HOME Sweet $HOME SANSFIRE Edition

Today:

Internet LAN

Fire

wal

l

Egress Traffic

Page 19: $HOME Sweet $HOME SANSFIRE Edition

IoT Botnet

Page 20: $HOME Sweet $HOME SANSFIRE Edition

IoT Botnet

Source: https://www.emaze.com/@AIFFFTIO/IoT-Health-ppt

Page 21: $HOME Sweet $HOME SANSFIRE Edition
Page 22: $HOME Sweet $HOME SANSFIRE Edition
Page 23: $HOME Sweet $HOME SANSFIRE Edition
Page 24: $HOME Sweet $HOME SANSFIRE Edition

Google Too!

More info: https://developers.google.com/brillo/

Page 25: $HOME Sweet $HOME SANSFIRE Edition

Agenda

• A Revolution Entered Our Homes

• Internet of Terrors

• Mitigations

• Conclusions

Page 26: $HOME Sweet $HOME SANSFIRE Edition

Resistance is Futile!

Page 27: $HOME Sweet $HOME SANSFIRE Edition

Growing Attack Surface

Page 28: $HOME Sweet $HOME SANSFIRE Edition
Page 29: $HOME Sweet $HOME SANSFIRE Edition

“Smart”?

“having or showing a quick-witted intelligence”

Page 30: $HOME Sweet $HOME SANSFIRE Edition

TrueSec 30

Smart Devices? Really?

Page 31: $HOME Sweet $HOME SANSFIRE Edition

Smart-ization…

Adding a communication module to an objectdoesn’t make it “smart”…

Page 32: $HOME Sweet $HOME SANSFIRE Edition

TrueSec 32

Page 33: $HOME Sweet $HOME SANSFIRE Edition

TrueSec 33

Page 34: $HOME Sweet $HOME SANSFIRE Edition

What is the differencebetween…

Page 35: $HOME Sweet $HOME SANSFIRE Edition
Page 36: $HOME Sweet $HOME SANSFIRE Edition
Page 37: $HOME Sweet $HOME SANSFIRE Edition
Page 38: $HOME Sweet $HOME SANSFIRE Edition
Page 39: $HOME Sweet $HOME SANSFIRE Edition

Sensors Software Connectivity Bigdata

VulnerabilityExploit MitM PrivacyAbuse

Page 40: $HOME Sweet $HOME SANSFIRE Edition

OWASP

• Insecure Web Interface

• Insufficient Authentication/Authorization

• Insecure Network Services

• Lack of Transport Encryption

• Privacy Concerns

• Insecure Cloud Interface

• Insecure Mobile Interface

• Insufficient Security Configurability

• Insecure Software/Firmware

• Poor Physical Security

Page 41: $HOME Sweet $HOME SANSFIRE Edition

Developers…

Page 42: $HOME Sweet $HOME SANSFIRE Edition
Page 43: $HOME Sweet $HOME SANSFIRE Edition

We already fail to patch regular computers…

… what about IoT devices?

Page 44: $HOME Sweet $HOME SANSFIRE Edition

TrueSec 44

SecurityFeatures

Ease of Use

Page 45: $HOME Sweet $HOME SANSFIRE Edition

TrueSec

Agenda

• A Revolution Entered Our Homes

• Internet of Terrors

• Mitigations

• Conclusions

45

Page 46: $HOME Sweet $HOME SANSFIRE Edition
Page 47: $HOME Sweet $HOME SANSFIRE Edition

<warning> This section focuses on devices connected

to your IP home network </warning>

Page 48: $HOME Sweet $HOME SANSFIRE Edition

Rule #0

• Think twice: “Do you really need this device?”

• Agreed… very difficult for the most of us!

Page 49: $HOME Sweet $HOME SANSFIRE Edition

• What is the MAC address of the device?

• What are the network requirement? (DNS, NTP, SNMP, Syslog)

• What are the open ports required? To which IP address(es)?

• Can the device be upgraded?

• Are firmwares signed?

• Can we backup/restore the config?

Rule #1

Page 50: $HOME Sweet $HOME SANSFIRE Edition

Rule #2

• Assign a fixed DHCP lease to known devices

host myflattv { hardware ethernet aa:bb:cc:dd:ee:ff; fixed-address 192.168.1.100; option routers 192.168.1.1; default-lease-time 3600; }

Page 51: $HOME Sweet $HOME SANSFIRE Edition

Rule #3

• Implement an egress filter

• Any:Any to Any:Any, Drop & Log

• Allow only required traffic (see rule #1)

Page 52: $HOME Sweet $HOME SANSFIRE Edition

Rule #4

• Segmentation

Page 53: $HOME Sweet $HOME SANSFIRE Edition

Rule #5

• Use a local resolvers (DNS queries) and log

Page 54: $HOME Sweet $HOME SANSFIRE Edition

Rule #6

• Disable unsafe protocols like SSDP/UPnP

• Risk of DDoS (amplification attack)

Page 55: $HOME Sweet $HOME SANSFIRE Edition

Rule #7

• Capture the traffic from unknown devices(http://blog.rootshell.be/2015/03/17/the-lack-of-network-documentation/)

Page 56: $HOME Sweet $HOME SANSFIRE Edition

Rule #8

• Be offensive!

• Know your enemy

Page 57: $HOME Sweet $HOME SANSFIRE Edition

Hardware

Page 58: $HOME Sweet $HOME SANSFIRE Edition

Hardware

Page 59: $HOME Sweet $HOME SANSFIRE Edition

TrueSec

Topology

59

Ethernet Switch

Router

Server

Device1 Device2

Firewall

Page 60: $HOME Sweet $HOME SANSFIRE Edition

Software Shopping

Page 61: $HOME Sweet $HOME SANSFIRE Edition

Commercial $olution$

PA200, Sophos UTM Home Edition, <insert your preferred $VENDOR>

Page 62: $HOME Sweet $HOME SANSFIRE Edition

TrueSec

Virtualize!

62

KVM (“Kernel-based Virtual Machine”), VirtualBox,ESX, XenServer, …

Page 63: $HOME Sweet $HOME SANSFIRE Edition

Security Onion

Security Onion is a Linux distro for intrusiondetection, network security monitoring, and log

management. Core components are: Snort,Suricata, Bro, OSSEC, Sguil,

Squert, Snorby, ELSA, Xplico, NetworkMiner, andmany other security tools.

Page 64: $HOME Sweet $HOME SANSFIRE Edition

Security Onion

Page 65: $HOME Sweet $HOME SANSFIRE Edition

Security Onion

Page 66: $HOME Sweet $HOME SANSFIRE Edition

Security Onion

Page 67: $HOME Sweet $HOME SANSFIRE Edition

pfSense

The pfSense project is a free networkfirewall distribution, based on the FreeBSDoperating system with a custom kernel and

including third party free software packages foradditional functionality.

pfSense software, with the help of the packagesystem, is able to provide the same functionality

or more of common commercial firewalls

Page 68: $HOME Sweet $HOME SANSFIRE Edition

pfSense

Page 69: $HOME Sweet $HOME SANSFIRE Edition

Keep an Eye on ARP

• arpwatch is a nice tool to track new/changing MAC addresses

Apr 17 11:36:03 shiva arpwatch: new station 10.90.14.85 34:a3:95:c5:d2:e5 eth0

Page 70: $HOME Sweet $HOME SANSFIRE Edition

Keep an Eye on ARP

Page 71: $HOME Sweet $HOME SANSFIRE Edition

Next Level…

Detecting Suspicious Devices On-The-Fly!

(https://isc.sans.edu/forums/diary/Guest+diary+Detecting+Suspicious+Devices+OnTheFly/18993)

Page 72: $HOME Sweet $HOME SANSFIRE Edition

Next Level…

• Inspect HTTP(S) traffic for suspicious data, vulnerabilities (who said “hacking”?)

• MitM, ettercap, sslstrip, BurpSuite

Page 73: $HOME Sweet $HOME SANSFIRE Edition

Agenda

• A Revolution Entered Our Homes

• Internet of Terrors

• Mitigations

• Conclusions

Page 74: $HOME Sweet $HOME SANSFIRE Edition

5 Tips to Keep in Mind

• IoT is there and will(is) invade(ing) our homes

• Think “IoT” == “Computers” (same issues)

• Smart != Safe

• Tools exists to control them

• Ask yourself: “Do I need it?”

Page 75: $HOME Sweet $HOME SANSFIRE Edition

Thank you!

@xme

[email protected]

[email protected]