SlideShare a Scribd company logo
#RSAC
Julian Cohen
Intelligent
Application Security
@HockeyInJune
#RSAC
Julian Cohen | @HockeyInJune
Product Security | Flatiron Health
Previously
Application Security | Financial Services
Vulnerability Researcher | Defense Industry
Penetration Tester | Boutique Consultancy
Adjunct Professor | New York University
#RSAC
Parallel
Industry
Anecdote
#RSAC
Tonsillectomies in 1930
“It is a little difficult to believe that among the mass of
tonsillectomies performed to-day all subjects for
operation are selected with true discrimination, and
one cannot avoid the conclusion that there is a
tendency for the operation to be performed as a
routine prophylactic ritual for no particular reason and
with no particular result.”
http://ije.oxfordjournals.org/content/37/1/9.full
#RSAC
Mammary Artery Ligations in 1955
“Both the patients who did have their mammary
arteries constricted and those who didn’t reported
immediate relief from their chest pain. In both groups
the relief lasted about three months—and then
complaints about chest pain returned. Meanwhile,
electrocardiograms showed no difference between
those who had undergone the real operation and those
who got the placebo operation.”
Predictably Irrational, Dan Ariely, 2009
#RSAC
Modern Security Medicine
Doctors were recommending the procedure and
patients were having the procedure,
regardless of its effectiveness
The expected results of the procedure did
not match with the actual results,
but no one noticed or changed anything
#RSAC
Penetration Testing
#RSAC
The Status Quo
Penetration Testers are our experts
Methodologies built from experience and intuition
Application Security programs focused on fixing bugs
Continuous loop of discovering and fixing issues
Organizations continue to get owned
#RSAC
Penetration Testing Considered Harmful
Haroon Meer, 2010, 44CON
Limited Scope
Bad Testers
Poor OPSEC
The penetration testing industry a market for lemons
http://blog.thinkst.com/p/penetration-testing-considered-harmful.html
http://www.econ.yale.edu/~dirkb/teach/pdf/akerlof/themarketforlemons.pdf
#RSAC
Penetration Testing Market Survey
http://eprints.lancs.ac.uk/74275/1/Penetration_testing_online_2.pdf
#RSAC
http://eprints.lancs.ac.uk/74275/1/Penetration_testing_online_2.pdf
#RSAC
Average Penetration Test
Results depend on which testers are available
Results depend on your tester’s mood
Results depend on your kick-off call
Results depend on your scope
Testers focused on writing a “Nice Report”
Testers focused on discovering cool vulnerabilities
#RSAC
Pentests Avoid Highly Likely Attacks
Penetration Testing Considered Harmful
Haroon Meer, 2010, 44CON
http://blog.thinkst.com/p/penetration-testing-considered-harmful.html
#RSAC
The Wrong Things In The Right Places
Penetration testing avoids highly likely attacks because
the vulnerabilities that our penetration testers and
our application security engineers find are not
the vulnerabilities that real attackers find
#RSAC
Attackers
#RSAC
Everything You Know Is Wrong
Defenders make bad assumptions about attackers
Defenders do not understand attackers
Defenders are not profiling attackers correctly
And that’s why the attackers keep winning
#RSAC
Attacker Fallacies
Resourced Attackers
Intelligent Attackers
http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
http://blog.trailofbits.com/2013/05/20/writing-exploits-with-the-elderwood-kit-part-2/
#RSAC
Attacker Fallacies
Motivated Attackers
Dumb Attackers
https://www2.fireeye.com/rs/fireye/images/rpt-apt28.pdf
https://en.wikipedia.org/wiki/Operation_Aurora
#RSAC
Insight From Offense
All attackers are resource constrained
Resourced constrained attackers favor
low-overhead attacks
Low-overhead requires good scalability
#RSAC
Attacker Playbooks
Attackers that have multiple targets care about
repeatability and scalability
#RSAC
Operational Efficiency
Playbooks depend on:
Who their targets are
Intended success rate
How fast they need to convert
#RSAC
Attackers operate like
efficient businesses
• Experts at the top
• Employees are cheap and
complete simple tasks
• Employees who don't
meet their goals are fired
• Inefficient organizations
fail quickly
Penetration testers
operate like hobbyists
• All employees are experts
• Employees are expensive
• Employees who do not
produce are hard to fire
• Organizations that do not
produce do not fail
• Customers rarely care
about output
#RSAC
Attackers
In defense, we mistake attacker efficiency for inadequacy
We are not being effective against certain attackers
because we don’t understand how they operate
#RSAC
Complexity of Solution
If you don't like the game, hack the playbook…
Peiter “Mudge” Zatko, 2011, Everywhere
http://www.slideshare.net/scovetta/2011-11-07-cyber-colloquium-zatko
#RSAC
Attacker Cost Graph
Attacker “Math” 101
Dino Dai Zovi, 2011, SOURCE Boston, Summercon
https://www.trailofbits.com/resources/attacker_math_101_slides.pdf
#RSAC
Case Study: Syrian Electronic Army
Also: Lizard Squad and Anonymous
Politically-motivated, low-resourced attackers
DNS hijacking by phishing DNS providers
DDoS attacks with custom software
Website defacing on shared hosting providers
Conclusion: No web vulnerabilities used
http://news.harvard.edu/gazette/story/2013/08/hack-attacks-explained/
http://www.infowar-monitor.net/2011/06/syrian-electronic-army-disruptive-attacks-and-hyped-targets/
#RSAC
Case Study: Elderwood
Also: PLA Unit 61398
State-sponsored, well-resourced attackers
Mostly low reliability Internet Explorer bugs
ASLR/DEP bypasses with Microsoft Office/Java
Exploits delivered via phishing and watering holes
Conclusion: Web vulnerabilities only when needed
http://blog.trailofbits.com/2013/05/14/writing-exploits-with-the-elderwood-kit-part-1/
http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
#RSAC
Case Study: ShadowCrew
Also: Other organized crime groups
Financially-motivated, well-resourced attackers
Credit card data theft via SQL injection
Typically targets one website at a time
Scaled poorly with tools like sqlmap and havij
Conclusion: One web vulnerability used at a time
http://www.wired.com/2010/03/tjx-sentencing/
#RSAC
Observations
Real attackers don’t attack web applications (mostly)
These vulnerabilities are not scalable and repeatable
Attackers focus on inexpensive, but effective methods
The only application security threat is sqlmap
(sqlmap is not much of a threat)
#RSAC
http://momentum.partners/docs/Cybersecurity_Market_Review_Q4_2015.pdf
New Security Strategy
#RSAC
Lockheed Martin’s Intrusion Kill Chain
Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin, Ph.D.
6th International Conference Information Warfare and Security (ICIW 11)
http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf
#RSAC
Attacker Emulation
Identify
Attackers
Profile
Attackers
Obtain Key
Tactics
Rebuild
Playbook
Replay
Playbook
Utilize
Results
#RSAC
Step 4: Rebuild Playbook
Run sqlmap against your web applications
#RSAC
Results
Repeatable
Precise
Practical
Effective
#RSAC
Threat “Intelligence”
Instead of ephemeral information like IP addresses,
MD5 hashes, and other indicators of compromise, we
should be collecting and sharing indelible information
on techniques and procedures
#RSAC
Free Business Ideas
Intelligence on attacker tactics and procedures
Attack emulation service
Which attacker groups I am vulnerable to
Identify
Attackers
Profile
Attackers
Obtain Key
Tactics
Rebuild
Playbook
Replay
Playbook
Utilize
Results
#RSAC
Conclusion
The security industry lacks a focus on accurate attacker
methodologies during assessments
#RSAC
Future Work
We are only discussing application security
The same techniques can be applied to:
Infrastructure Security and Lateral Movement
Client-Side Security and Endpoint Security
Reconnaissance and Social Engineering (Phishing)
#RSAC
Attacker Emulation Example: RSA
Identify Attackers:
Economic Espionage
Strategic Espionage
Profile Attackers:
State-Sponsored
Well-Resourced
Obtain Key Tactics:
Phishing
Watering Hole
Client-Side Exploitation
Rebuild Playbook:
Public Reconnaissance
Phishing Campaigns
Client-Side Exploitation
Replay Playbook:
Launch Attack
Utilize Results:
Exploit Mitigation
Sandboxing
Execution Tree Analysis
#RSAC
Thanks
Justin Berman
Nicholas Arvanitis
Chris Sandulow
Stuart Larsen
Spencer Jackson
Dino Dai Zovi
Nick Freeman
Brandon Edwards
#RSAC
We’re Hiring!
security@flatiron.com

More Related Content

PDF
Introduction and a Look at Security Trends
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PDF
DON'T Use Two-Factor Authentication...Unless You Need It!
PDF
Rise of the Hacking Machines
PPTX
New Paradigms for the Next Era of Security
PDF
Evidence-Based Security: The New Top Five Controls
PDF
Final presentation january iia cybersecurity securing your 2016 audit plan
PPTX
Cybersecurity: How to Use What We Already Know
Introduction and a Look at Security Trends
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
DON'T Use Two-Factor Authentication...Unless You Need It!
Rise of the Hacking Machines
New Paradigms for the Next Era of Security
Evidence-Based Security: The New Top Five Controls
Final presentation january iia cybersecurity securing your 2016 audit plan
Cybersecurity: How to Use What We Already Know

What's hot (20)

PDF
The Incident Response Playbook for Android and iOS
PPTX
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
PDF
Pulling our-socs-up
PPTX
Cyber Defense Matrix: Reloaded
PDF
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
PPTX
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
PPTX
LIFT OFF 2017: Transforming Security
PPTX
Debunking the Hacker Hype: The Reality of Widespread Blackouts
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
The Diamond Model for Intrusion Analysis - Threat Intelligence
PDF
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
PPT
The Changing Security Landscape
PDF
Insights from-NSAs-cybersecurity-threat-operations-center
PPTX
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
PPTX
IOT Security FUN-damental
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
PPTX
LIFT OFF 2017: Ransomware and IR Overview
PDF
Pactera - Cloud, Application, Cyber Security Trend 2016
PDF
Hacking Cracking 2008
PPTX
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
The Incident Response Playbook for Android and iOS
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
Pulling our-socs-up
Cyber Defense Matrix: Reloaded
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
LIFT OFF 2017: Transforming Security
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Cyber threat intelligence: maturity and metrics
The Diamond Model for Intrusion Analysis - Threat Intelligence
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
The Changing Security Landscape
Insights from-NSAs-cybersecurity-threat-operations-center
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
IOT Security FUN-damental
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
LIFT OFF 2017: Ransomware and IR Overview
Pactera - Cloud, Application, Cyber Security Trend 2016
Hacking Cracking 2008
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Ad

Similar to Intelligent Application Security (20)

PDF
Implementing a comprehensive application security progaram - Tawfiq
PPTX
Cybersecurity fundamental
PDF
Insecure trends in web technologies 2009
PPTX
Appsec2013 assurance tagging-robert martin
DOCX
Charan Resume
PPTX
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
PDF
Applied cognitive security complementing the security analyst
PDF
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
PPTX
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
PDF
AOA_Report_TrapX_AnatomyOfAttack-MEDJACK
PPTX
First line of defense for cybersecurity : AI
PPTX
Designing Trustworthy AI: A User Experience Framework at RSA 2020
PDF
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
PDF
Top 13 hacking software for beginners.pdf
PDF
Fighting malware - keeping your Intellectual Property safe
PDF
Big Bang Theory: The Evolution of Pentesting High Security Environments
DOCX
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
PPTX
Introduction to cyber security
PPTX
Threat Check for Struts Released, Equifax Breach Dominates News
PDF
Securing the “Weakest Link”
Implementing a comprehensive application security progaram - Tawfiq
Cybersecurity fundamental
Insecure trends in web technologies 2009
Appsec2013 assurance tagging-robert martin
Charan Resume
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Applied cognitive security complementing the security analyst
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
AOA_Report_TrapX_AnatomyOfAttack-MEDJACK
First line of defense for cybersecurity : AI
Designing Trustworthy AI: A User Experience Framework at RSA 2020
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Top 13 hacking software for beginners.pdf
Fighting malware - keeping your Intellectual Property safe
Big Bang Theory: The Evolution of Pentesting High Security Environments
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
Introduction to cyber security
Threat Check for Struts Released, Equifax Breach Dominates News
Securing the “Weakest Link”
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
MIND Revenue Release Quarter 2 2025 Press Release
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
Encapsulation_ Review paper, used for researhc scholars
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectroscopy.pptx food analysis technology
Big Data Technologies - Introduction.pptx
Review of recent advances in non-invasive hemoglobin estimation

Intelligent Application Security

  • 2. #RSAC Julian Cohen | @HockeyInJune Product Security | Flatiron Health Previously Application Security | Financial Services Vulnerability Researcher | Defense Industry Penetration Tester | Boutique Consultancy Adjunct Professor | New York University
  • 4. #RSAC Tonsillectomies in 1930 “It is a little difficult to believe that among the mass of tonsillectomies performed to-day all subjects for operation are selected with true discrimination, and one cannot avoid the conclusion that there is a tendency for the operation to be performed as a routine prophylactic ritual for no particular reason and with no particular result.” http://ije.oxfordjournals.org/content/37/1/9.full
  • 5. #RSAC Mammary Artery Ligations in 1955 “Both the patients who did have their mammary arteries constricted and those who didn’t reported immediate relief from their chest pain. In both groups the relief lasted about three months—and then complaints about chest pain returned. Meanwhile, electrocardiograms showed no difference between those who had undergone the real operation and those who got the placebo operation.” Predictably Irrational, Dan Ariely, 2009
  • 6. #RSAC Modern Security Medicine Doctors were recommending the procedure and patients were having the procedure, regardless of its effectiveness The expected results of the procedure did not match with the actual results, but no one noticed or changed anything
  • 8. #RSAC The Status Quo Penetration Testers are our experts Methodologies built from experience and intuition Application Security programs focused on fixing bugs Continuous loop of discovering and fixing issues Organizations continue to get owned
  • 9. #RSAC Penetration Testing Considered Harmful Haroon Meer, 2010, 44CON Limited Scope Bad Testers Poor OPSEC The penetration testing industry a market for lemons http://blog.thinkst.com/p/penetration-testing-considered-harmful.html http://www.econ.yale.edu/~dirkb/teach/pdf/akerlof/themarketforlemons.pdf
  • 10. #RSAC Penetration Testing Market Survey http://eprints.lancs.ac.uk/74275/1/Penetration_testing_online_2.pdf
  • 12. #RSAC Average Penetration Test Results depend on which testers are available Results depend on your tester’s mood Results depend on your kick-off call Results depend on your scope Testers focused on writing a “Nice Report” Testers focused on discovering cool vulnerabilities
  • 13. #RSAC Pentests Avoid Highly Likely Attacks Penetration Testing Considered Harmful Haroon Meer, 2010, 44CON http://blog.thinkst.com/p/penetration-testing-considered-harmful.html
  • 14. #RSAC The Wrong Things In The Right Places Penetration testing avoids highly likely attacks because the vulnerabilities that our penetration testers and our application security engineers find are not the vulnerabilities that real attackers find
  • 16. #RSAC Everything You Know Is Wrong Defenders make bad assumptions about attackers Defenders do not understand attackers Defenders are not profiling attackers correctly And that’s why the attackers keep winning
  • 17. #RSAC Attacker Fallacies Resourced Attackers Intelligent Attackers http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf http://blog.trailofbits.com/2013/05/20/writing-exploits-with-the-elderwood-kit-part-2/
  • 18. #RSAC Attacker Fallacies Motivated Attackers Dumb Attackers https://www2.fireeye.com/rs/fireye/images/rpt-apt28.pdf https://en.wikipedia.org/wiki/Operation_Aurora
  • 19. #RSAC Insight From Offense All attackers are resource constrained Resourced constrained attackers favor low-overhead attacks Low-overhead requires good scalability
  • 20. #RSAC Attacker Playbooks Attackers that have multiple targets care about repeatability and scalability
  • 21. #RSAC Operational Efficiency Playbooks depend on: Who their targets are Intended success rate How fast they need to convert
  • 22. #RSAC Attackers operate like efficient businesses • Experts at the top • Employees are cheap and complete simple tasks • Employees who don't meet their goals are fired • Inefficient organizations fail quickly Penetration testers operate like hobbyists • All employees are experts • Employees are expensive • Employees who do not produce are hard to fire • Organizations that do not produce do not fail • Customers rarely care about output
  • 23. #RSAC Attackers In defense, we mistake attacker efficiency for inadequacy We are not being effective against certain attackers because we don’t understand how they operate
  • 24. #RSAC Complexity of Solution If you don't like the game, hack the playbook… Peiter “Mudge” Zatko, 2011, Everywhere http://www.slideshare.net/scovetta/2011-11-07-cyber-colloquium-zatko
  • 25. #RSAC Attacker Cost Graph Attacker “Math” 101 Dino Dai Zovi, 2011, SOURCE Boston, Summercon https://www.trailofbits.com/resources/attacker_math_101_slides.pdf
  • 26. #RSAC Case Study: Syrian Electronic Army Also: Lizard Squad and Anonymous Politically-motivated, low-resourced attackers DNS hijacking by phishing DNS providers DDoS attacks with custom software Website defacing on shared hosting providers Conclusion: No web vulnerabilities used http://news.harvard.edu/gazette/story/2013/08/hack-attacks-explained/ http://www.infowar-monitor.net/2011/06/syrian-electronic-army-disruptive-attacks-and-hyped-targets/
  • 27. #RSAC Case Study: Elderwood Also: PLA Unit 61398 State-sponsored, well-resourced attackers Mostly low reliability Internet Explorer bugs ASLR/DEP bypasses with Microsoft Office/Java Exploits delivered via phishing and watering holes Conclusion: Web vulnerabilities only when needed http://blog.trailofbits.com/2013/05/14/writing-exploits-with-the-elderwood-kit-part-1/ http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
  • 28. #RSAC Case Study: ShadowCrew Also: Other organized crime groups Financially-motivated, well-resourced attackers Credit card data theft via SQL injection Typically targets one website at a time Scaled poorly with tools like sqlmap and havij Conclusion: One web vulnerability used at a time http://www.wired.com/2010/03/tjx-sentencing/
  • 29. #RSAC Observations Real attackers don’t attack web applications (mostly) These vulnerabilities are not scalable and repeatable Attackers focus on inexpensive, but effective methods The only application security threat is sqlmap (sqlmap is not much of a threat)
  • 31. #RSAC Lockheed Martin’s Intrusion Kill Chain Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin, Ph.D. 6th International Conference Information Warfare and Security (ICIW 11) http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf
  • 33. #RSAC Step 4: Rebuild Playbook Run sqlmap against your web applications
  • 35. #RSAC Threat “Intelligence” Instead of ephemeral information like IP addresses, MD5 hashes, and other indicators of compromise, we should be collecting and sharing indelible information on techniques and procedures
  • 36. #RSAC Free Business Ideas Intelligence on attacker tactics and procedures Attack emulation service Which attacker groups I am vulnerable to Identify Attackers Profile Attackers Obtain Key Tactics Rebuild Playbook Replay Playbook Utilize Results
  • 37. #RSAC Conclusion The security industry lacks a focus on accurate attacker methodologies during assessments
  • 38. #RSAC Future Work We are only discussing application security The same techniques can be applied to: Infrastructure Security and Lateral Movement Client-Side Security and Endpoint Security Reconnaissance and Social Engineering (Phishing)
  • 39. #RSAC Attacker Emulation Example: RSA Identify Attackers: Economic Espionage Strategic Espionage Profile Attackers: State-Sponsored Well-Resourced Obtain Key Tactics: Phishing Watering Hole Client-Side Exploitation Rebuild Playbook: Public Reconnaissance Phishing Campaigns Client-Side Exploitation Replay Playbook: Launch Attack Utilize Results: Exploit Mitigation Sandboxing Execution Tree Analysis
  • 40. #RSAC Thanks Justin Berman Nicholas Arvanitis Chris Sandulow Stuart Larsen Spencer Jackson Dino Dai Zovi Nick Freeman Brandon Edwards