SlideShare a Scribd company logo
Feeding the Virtual Patch Pipeline
July 9, 2019
Cody Wood – Security Engineer, Signal Sciences
Introduction
Cody Wood
Security Software Engineer
Signal Sciences
@sprkyco
• Previously earth mining operations
(because apparently “miner” means data
or cryptocoin)
• Whitehat security, PCI Stuff,
NBCUniversal, Rapid7
• AppSec, Python, GoLang
• https://sprky.co
Application Security Challenges
(We Know What You’re Up Against)
Web App Attacks Are the #1 Source of Data Breaches
Incumbent Products Aren’t Solving the Problem
Less Than 5% of
data center security budgets
are spent on AppSec
Web App Attacks
POS Intrusions
Miscellaneous Errors
Privilege Misuse
Cyber-Espionage
Everything Else
Payment Card Skimmers
Physical Theft / Loss
Crimeware
Denial Of Service
908
525
197
172
155
125
86
1
49
56
20
%
10
%
40
%
30
%
Percent of Breaches
Sources: Gartner, Verizon
The Security Problem
You Can’t Secure
New App Tech with
Legacy App Sec
Account Takeover
Direct Object Reference
Forceful Browsing
Feature Abuse
Evasion Techniques
Subdomain Takeover
Misconfiguration
• Legacy WAFs focus on the
same threats as 15 years ago
• False positives result from generic
signatures without context
• Rarely used in blocking mode
OWASP Injection
Attacks
Real-World Problems
Signal Sciences:
Next-gen WAF and RASP
Defensive Technology
Designed to increase security and maintain
site reliability without sacrificing speed or
scale while unifying the efforts of
engineering, security and operations.
Active Protection Everywhere
Any App
Cloud Containers, PaaS
& Serverless
Web Servers & Languages
Gateways & Proxies
Any Attack
OWASP Injection Attacks
PLUS:
Application DDoS
Brute Force Attacks
Application Abuse & Misuse
Account Takeover
Bad Bots
Virtual Patching
Any DevOps Toolchain
INCLUDING:
Generic Webhooks & Any Custom
Tools via Full RESTFul/JSON API
Onto Virtual Patching
Virtual Patch Pipeline
“JARVIS” Behind The Scenes DIY
The SigSci Approach to
Automating Virtual Patch
Triage, Develop, and Deploy
Generalized Methodology for
Developing a Virtual Patch
Building Your Own
Detections
• TEMPORARY
• Mistakes happen
• Helpful in “Constrained” Business
Conditions
• Reliant on public information
• Bypasses are difficult to detect
Duct Tape...
Virtual Patch Pipeline
“Jarvis”
Sciencing
• Find => “CVE”
• Copy
• Paste
• Replace
▪ CVEXXXXXXXX
▪ CVE-XXXX-XXXX
• With
▪ CVE-0day-mageddon
• Write rule
• Push to master and deploy!
▪ No, but seriously we do at SigSci
Section 31
Jupyter Notebooks ❤🐍 run during post virtual patch deploy
• Number of Corps/Sites Enabled
• Boilerplate for further analysis
• Exclude burpsuite, nessus, and other scanners
• Scrape results for unique payloads, bitcoin miners for example
• Proactive false positive identification
• Cross customer cve exploit activity patterns, threat intel 🤷
And now...
CVE-2017-12615
Apache Tomcat - JSP Upload Bypass / Remote
Code Execution
16
Q&A
Thank you!

More Related Content

PDF
Mobile Application Security Threats through the Eyes of the Attacker
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
PDF
BeyondCorp New York Meetup: Closing the Adherence Gap
PPTX
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
PDF
Guy Podjarmy - Secure Node Code
PPTX
Web security: concepts and tools used by attackers
PPTX
Solnet dev secops meetup
PPTX
PLNOG23 - Paweł Rzepa - Attacking AWS: the full cyber kill chain
Mobile Application Security Threats through the Eyes of the Attacker
Elizabeth Lawler - Devops, security, and compliance working in unison
BeyondCorp New York Meetup: Closing the Adherence Gap
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
Guy Podjarmy - Secure Node Code
Web security: concepts and tools used by attackers
Solnet dev secops meetup
PLNOG23 - Paweł Rzepa - Attacking AWS: the full cyber kill chain

What's hot (20)

PDF
Reducing Risk of Credential Compromise at Netflix
PPTX
PPTX
Owasp mobile top 10
PPTX
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
PDF
[OPD 2019] Governance as a missing part of IT security architecture
PPTX
Basics of getting Into Bug Bounty Hunting
PDF
Owasp Mobile Top 10 - M7 & M8
PDF
Activated Charcoal - Making Sense of Endpoint Data
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Top Azure security fails and how to avoid them
PPTX
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
PDF
BeyondCorp: Closing the Adherence Gap
PDF
Owasp Top 10 (M-10 : Lack of Binary Protection) | Null Meet
PPTX
Android Application Penetration Testing - Mohammed Adam
PDF
Hijacking Softwares for fun and profit
PDF
Dev secops on the offense automating amazon web services account takeover
PPTX
SPI Dynamics web application security 101
PPTX
How an Attacker "Audits" Your Software Systems
PDF
Building Security Controls around Attack Models
Reducing Risk of Credential Compromise at Netflix
Owasp mobile top 10
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
[OPD 2019] Governance as a missing part of IT security architecture
Basics of getting Into Bug Bounty Hunting
Owasp Mobile Top 10 - M7 & M8
Activated Charcoal - Making Sense of Endpoint Data
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Top Azure security fails and how to avoid them
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
BeyondCorp: Closing the Adherence Gap
Owasp Top 10 (M-10 : Lack of Binary Protection) | Null Meet
Android Application Penetration Testing - Mohammed Adam
Hijacking Softwares for fun and profit
Dev secops on the offense automating amazon web services account takeover
SPI Dynamics web application security 101
How an Attacker "Audits" Your Software Systems
Building Security Controls around Attack Models
Ad

Similar to Feeding the Virtual Patch Pipeline (20)

PPTX
Top Application Security Trends of 2012
PDF
SQL Injection - The Unknown Story
PDF
iOS Application Security.pdf
PPTX
Continuous security: Bringing agility to the secure development lifecycle
PPTX
Outpost24 webinar - Api security
PDF
Top Application Security Threats
PDF
Realities of Security in the Cloud
PDF
Luis Grangeia IBWAS
PDF
IBWAS 2010: Web Security From an Auditor's Standpoint
PPTX
A DevOps Guide to Web Application Security
PDF
Web Application Security Testing Guide | Secure Web Apps
PPTX
Java application security the hard way - a workshop for the serious developer
PDF
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
PDF
CSS17: Houston - Protecting Web Apps
PDF
How to find Zero day vulnerabilities
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PDF
Web Security - Introduction v.1.3
PDF
Web Security - Introduction
PPTX
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
PPTX
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Top Application Security Trends of 2012
SQL Injection - The Unknown Story
iOS Application Security.pdf
Continuous security: Bringing agility to the secure development lifecycle
Outpost24 webinar - Api security
Top Application Security Threats
Realities of Security in the Cloud
Luis Grangeia IBWAS
IBWAS 2010: Web Security From an Auditor's Standpoint
A DevOps Guide to Web Application Security
Web Application Security Testing Guide | Secure Web Apps
Java application security the hard way - a workshop for the serious developer
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
CSS17: Houston - Protecting Web Apps
How to find Zero day vulnerabilities
Essentials of Web Application Security: what it is, why it matters and how to...
Web Security - Introduction v.1.3
Web Security - Introduction
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
PPTX
Vulnerability Discovery in the Cloud
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
PDF
A New Year’s Ransomware Resolution
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
Don't Panic! Effective Incident Response
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
PDF
Monitoring Serverless Applications with Datadog
PDF
Deliver your App Anywhere … Publicly or Privately
PPTX
Securing medical apps in the age of covid final
PDF
How to Build a Healthy On-Call Culture
PPTX
The Evolving Role of the Developer in 2021
PDF
Service Mesh: Two Big Words But Do You Need It?
PPTX
Secure Data Sharing in OpenShift Environments
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Modernizing on IBM Z Made Easier With Open Source Software
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Next Generation Vulnerability Assessment Using Datadog and Snyk
Vulnerability Discovery in the Cloud
2021 Open Source Governance: Top Ten Trends and Predictions
A New Year’s Ransomware Resolution
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Don't Panic! Effective Incident Response
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Monitoring Serverless Applications with Datadog
Deliver your App Anywhere … Publicly or Privately
Securing medical apps in the age of covid final
How to Build a Healthy On-Call Culture
The Evolving Role of the Developer in 2021
Service Mesh: Two Big Words But Do You Need It?
Secure Data Sharing in OpenShift Environments
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Encapsulation theory and applications.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Machine Learning_overview_presentation.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A comparative analysis of optical character recognition models for extracting...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
OMC Textile Division Presentation 2021.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Programs and apps: productivity, graphics, security and other tools
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
TLE Review Electricity (Electricity).pptx
Encapsulation theory and applications.pdf
1. Introduction to Computer Programming.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Machine Learning_overview_presentation.pptx
A comparative study of natural language inference in Swahili using monolingua...
Digital-Transformation-Roadmap-for-Companies.pptx

Feeding the Virtual Patch Pipeline

  • 1. Feeding the Virtual Patch Pipeline July 9, 2019 Cody Wood – Security Engineer, Signal Sciences
  • 2. Introduction Cody Wood Security Software Engineer Signal Sciences @sprkyco • Previously earth mining operations (because apparently “miner” means data or cryptocoin) • Whitehat security, PCI Stuff, NBCUniversal, Rapid7 • AppSec, Python, GoLang • https://sprky.co
  • 3. Application Security Challenges (We Know What You’re Up Against)
  • 4. Web App Attacks Are the #1 Source of Data Breaches Incumbent Products Aren’t Solving the Problem Less Than 5% of data center security budgets are spent on AppSec Web App Attacks POS Intrusions Miscellaneous Errors Privilege Misuse Cyber-Espionage Everything Else Payment Card Skimmers Physical Theft / Loss Crimeware Denial Of Service 908 525 197 172 155 125 86 1 49 56 20 % 10 % 40 % 30 % Percent of Breaches Sources: Gartner, Verizon
  • 5. The Security Problem You Can’t Secure New App Tech with Legacy App Sec Account Takeover Direct Object Reference Forceful Browsing Feature Abuse Evasion Techniques Subdomain Takeover Misconfiguration • Legacy WAFs focus on the same threats as 15 years ago • False positives result from generic signatures without context • Rarely used in blocking mode OWASP Injection Attacks Real-World Problems
  • 6. Signal Sciences: Next-gen WAF and RASP Defensive Technology Designed to increase security and maintain site reliability without sacrificing speed or scale while unifying the efforts of engineering, security and operations.
  • 7. Active Protection Everywhere Any App Cloud Containers, PaaS & Serverless Web Servers & Languages Gateways & Proxies Any Attack OWASP Injection Attacks PLUS: Application DDoS Brute Force Attacks Application Abuse & Misuse Account Takeover Bad Bots Virtual Patching Any DevOps Toolchain INCLUDING: Generic Webhooks & Any Custom Tools via Full RESTFul/JSON API
  • 9. Virtual Patch Pipeline “JARVIS” Behind The Scenes DIY The SigSci Approach to Automating Virtual Patch Triage, Develop, and Deploy Generalized Methodology for Developing a Virtual Patch Building Your Own Detections
  • 10. • TEMPORARY • Mistakes happen • Helpful in “Constrained” Business Conditions • Reliant on public information • Bypasses are difficult to detect Duct Tape...
  • 13. Sciencing • Find => “CVE” • Copy • Paste • Replace ▪ CVEXXXXXXXX ▪ CVE-XXXX-XXXX • With ▪ CVE-0day-mageddon • Write rule • Push to master and deploy! ▪ No, but seriously we do at SigSci
  • 14. Section 31 Jupyter Notebooks ❤🐍 run during post virtual patch deploy • Number of Corps/Sites Enabled • Boilerplate for further analysis • Exclude burpsuite, nessus, and other scanners • Scrape results for unique payloads, bitcoin miners for example • Proactive false positive identification • Cross customer cve exploit activity patterns, threat intel 🤷
  • 16. CVE-2017-12615 Apache Tomcat - JSP Upload Bypass / Remote Code Execution 16
  • 17. Q&A