SlideShare a Scribd company logo
Internet security: a landscape of unintended consequences
Perimeter Security
Motte and Bailey Castles
www.primaryhomeworkhelp.co.uk/castles/motteandbailey.htm
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
+ “ActionScript”
+ RTMP (two way audio-video)
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Common Vulnerabilities and Exposures 2001-2019
1172
2001-2019 CVE reports
1172 Flash Player
1999 Internet Explorer
2033 Chrome
2442 Firefox
2001-2019 CVE reports
1172 Flash Player
1999 Internet Explorer
2033 Chrome
2442 Firefox
number is not significant indicator
Flash Player CVEs
Memory Safety CVEs
337 memory corruption
262 use after free
116 buffer overflow
35 integer overflow
17 out-of-bounds read
9 heap.overflow
8 null pointer dereference
5 double free
4 bounds checking
3 out of bounds memory read
3 improper memory access
2 out-of-bounds write
1 invalid pointer dereference
Memory Safety CVEs
337 memory corruption
262 use after free
116 buffer overflow
35 integer overflow
17 out-of-bounds read
9 heap.overflow
8 null pointer dereference
5 double free
4 bounds checking
3 out of bounds memory read
3 improper memory access
2 out-of-bounds write
1 invalid pointer dereference
“allows remote attackers to execute
arbitrary code via a crafted font”
“allows remote attackers to execute arbitrary
code via crafted streaming media”
“allows remote attackers
to execute arbitrary code
via a crafted SWF file”
long a = (long)b;
Unexpected Context
...spoof the address bar and possibly conduct
phishing attacks by re-opening the window to a
malicious Shockwave Flash application, then
changing the window location back to a trusted
URL while the Flash application is still loading
Microsoft Excel allows user-assisted
attackers to execute arbitrary javascript
and redirect users to arbitrary sites via an
Excel spreadsheet with an embedded
Shockwave Flash Player ActiveX Object,
which is automatically executed when
the user opens the spreadsheet.
...allows remote attackers
to cause victims to
unknowingly click on a link
or dialog via access
control dialogs disguised
as normal graphical
elements, as
demonstrated by hijacking
the camera or microphone
Unexpected Context ⇒ Parsing / Validation
not properly validate
malformed header overflow
type confusion
object confusion
does not verify a member element's size
wide characters
untrusted input
xml script
interpret jar: URLs
CRLF injection
modify HTTP headers
https://github.com/envoyproxy/envoy/issues/7728
Recent vulnerabilities in URL parsing...
https://go-review.googlesource.com/c/go/+/189258/
Recent vulnerabilities in URL parsing...
Your implementation is your API.
Your implementation is your API.
(not your docs)
The dark ages
Web is for content
Physical networks
Perimeter security
HTTPS is expensive
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
https://ehrintelligence.com/news/will-specializing-ehr-interfaces-solve-the-ehr-usability-problem
https://blog.se.com/building-management/2014/10/27/
can-physical-environment-big-data-make-big-difference-hospital/
https://blog.se.com/building-management/2017/09/27/four-digital-hospital-trends-leverage-iot/
The dark ages
Web is for content
Physical networks
Perimeter security
HTTPS is expensive
The modern era
PII + finance + real-world
Bot armies
Supply chain attacks
Cloud native
Ubiquitous crypto
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
Humans make errors.
The world is changing.
Fundamentals are the same.
Vulnerabilities
create
opportunity.
https://www.cio.com/article/2600345/11-steps-attackers-took-to-crack-target.html
https://www.cio.com/article/2600345/11-steps-attackers-took-to-crack-target.html
1. Install malware that steals credentials
2. Exploit a web application vulnerability
3. Steal access token from domain admins
4. Run code to find computers on the network
5.SQL database ⇒ 70M PII
6.PoS, custom malware ⇒ 40M credit cards
7. Create network share for stolen data
8. Exfiltrate data via FTP ⇒ success
8 vulnerabilities
https://www.cio.com/article/2600345/11-steps-attackers-took-to-crack-target.html
The initial penetration point is not the story, because
eventually you have to assume you're going to get breached...
You cannot assume otherwise. You have to be prepared and
have an incident response plan for what to do when you are
breached. The real problem arises when malware is able to
enable an attacker to penetrate deeper into the network."
— Tal Be'ery, Aorato Lead Researcher
https://www.cio.com/article/2600345/11-steps-attackers-took-to-crack-target.html
Plot to steal cryptocurrency foiled by npm security
Popular pattern
1. publish a “useful”
package
2. waiting until in use
by the target,
3. update to include
malicious code..
It now seems clear that the bug was created
intentionally to target Komodo’s version of Agama
wallet. A hacker spent several months making
useful contributions...before inserting the bug.
Eventually, the hacker added malicious code to an
update of a module that Komodo’s Agama was
already using.
— komodoplatform.com/update-agama-vulnerability
https://blog.npmjs.org/post/185397814280/plot-to-steal-cryptocurrency-foiled-by-the-npm
What’s new today?
Scale
Everything is connected
Real-world targets
Lessons learned
Secure is a verb, not an adjective.
Anything that can happen, will.
Don’t create new parser or new crypto,
unless you need to. Invent new things!
Lessons learned (practical tips)
Tools for testing, monitoring.
Memory safe languages / features
Contribute to open source dependencies
Checklists are an anti-pattern.
github.com/cncf/sig-security
before-you-ship.18f.gov/security
bestpractices.coreinfrastructure.org
@ultrasaurus

More Related Content

PPTX
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
PPT
Firewalls (Distributed computing)
PPTX
News bytes Oct-2011
PDF
Building & Hacking Modern iOS Apps
PDF
Abusing & Securing XPC in macOS apps
PDF
Operations Security - SF Bitcoin Hackday March 2015
PDF
Operations security (OPSEC)
PDF
Operations security - SyPy Dec 2014 (Sydney Python users)
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
Firewalls (Distributed computing)
News bytes Oct-2011
Building & Hacking Modern iOS Apps
Abusing & Securing XPC in macOS apps
Operations Security - SF Bitcoin Hackday March 2015
Operations security (OPSEC)
Operations security - SyPy Dec 2014 (Sydney Python users)

What's hot (18)

PDF
TRITON: The Next Generation of ICS Malware
PPTX
Web security-–-everything-we-know-is-wrong-eoin-keary
PDF
Advanced Malware Analysis
PDF
Wannacry | Technical Insight and Lessons Learned
ODP
Csrf not-all-defenses-are-created-equal
PPTX
CoinMiners are Evasive - BsidesTLV
PDF
The Hidden XSS - Attacking the Desktop & Mobile Platforms
PPTX
Shamoon attacks - Destructive malware targeting Middle East organizations
DOCX
Mydoom virus
PDF
20150616 NPO要知道的駭客攻擊手法
PPTX
Newsbytes_NULLHYD_Dec
PPT
My Doom Worm
PPTX
Threat landscape update: June to September 2017
PPTX
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
PDF
Building&Hacking modern iOS apps
PPT
Zotob Worm
PPTX
Dragonfly: Western energy sector targeted by sophisticated attack group
PPTX
Ransomware History and Monitoring Tips
TRITON: The Next Generation of ICS Malware
Web security-–-everything-we-know-is-wrong-eoin-keary
Advanced Malware Analysis
Wannacry | Technical Insight and Lessons Learned
Csrf not-all-defenses-are-created-equal
CoinMiners are Evasive - BsidesTLV
The Hidden XSS - Attacking the Desktop & Mobile Platforms
Shamoon attacks - Destructive malware targeting Middle East organizations
Mydoom virus
20150616 NPO要知道的駭客攻擊手法
Newsbytes_NULLHYD_Dec
My Doom Worm
Threat landscape update: June to September 2017
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
Building&Hacking modern iOS apps
Zotob Worm
Dragonfly: Western energy sector targeted by sophisticated attack group
Ransomware History and Monitoring Tips
Ad

Similar to Internet security: a landscape of unintended consequences (20)

PPTX
Securing Underprotected APIs - Deja vu Security
PDF
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
PDF
WebApp_to_Container_Security.pdf
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
ODP
Break it while you make it: writing (more) secure software
PPT
Security communication
PDF
Threats, Threat Modeling and Analysis
PPTX
Altitude SF 2017: Security at the edge
PDF
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
PDF
Invited Talk - Cyber Security and Open Source
PPTX
CyberSecurityppt. pptx
PDF
6 ways to hack your JavaScript application by Viktor Turskyi
PDF
Designing Secure APIs
PPTX
How to get along with HATEOAS without letting the bad guys steal your lunch?
PDF
Protecting Against Web App Attacks
PPTX
Exploitation techniques and fuzzing
PPTX
Buffer overflow attacks
PPTX
00. introduction to app sec v3
PPTX
Top Application Security Trends of 2012
PPT
Web Application Security
Securing Underprotected APIs - Deja vu Security
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
WebApp_to_Container_Security.pdf
RIoT (Raiding Internet of Things) by Jacob Holcomb
Break it while you make it: writing (more) secure software
Security communication
Threats, Threat Modeling and Analysis
Altitude SF 2017: Security at the edge
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Invited Talk - Cyber Security and Open Source
CyberSecurityppt. pptx
6 ways to hack your JavaScript application by Viktor Turskyi
Designing Secure APIs
How to get along with HATEOAS without letting the bad guys steal your lunch?
Protecting Against Web App Attacks
Exploitation techniques and fuzzing
Buffer overflow attacks
00. introduction to app sec v3
Top Application Security Trends of 2012
Web Application Security
Ad

More from Sarah Allen (20)

PPTX
RTMP: how did we get to now? (Demuxed 2019)
PDF
Communication is a Technical Skill
PPTX
Improving Federal Government Services
PPTX
Transparency Wins
PPTX
A Short History of Computers
PPTX
Making Software Fun
PPTX
Power of Transparency
PPTX
Designing for Fun
PDF
Ruby in the US Government for Ruby World Conference
PDF
Identities of Dead People
PDF
Let's pretend
PDF
3 Reasons Not to Use Ruby
PDF
Ruby Nation: Why no haz Ruby?
PDF
Why no ruby in gov?
PDF
People Patterns or What I learned from Toastmasters
PDF
Blazing Cloud: Agile Product Development
PDF
Crowdsourced Transcription Landscape
PDF
Lessons Learned Future Thoughts
PDF
Mobile Web Video
PPTX
Elementary Computer History
RTMP: how did we get to now? (Demuxed 2019)
Communication is a Technical Skill
Improving Federal Government Services
Transparency Wins
A Short History of Computers
Making Software Fun
Power of Transparency
Designing for Fun
Ruby in the US Government for Ruby World Conference
Identities of Dead People
Let's pretend
3 Reasons Not to Use Ruby
Ruby Nation: Why no haz Ruby?
Why no ruby in gov?
People Patterns or What I learned from Toastmasters
Blazing Cloud: Agile Product Development
Crowdsourced Transcription Landscape
Lessons Learned Future Thoughts
Mobile Web Video
Elementary Computer History

Recently uploaded (20)

PPTX
Digital Literacy And Online Safety on internet
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
innovation process that make everything different.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Introduction to Information and Communication Technology
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
artificial intelligence overview of it and more
Digital Literacy And Online Safety on internet
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PptxGenJS_Demo_Chart_20250317130215833.pptx
SAP Ariba Sourcing PPT for learning material
WebRTC in SignalWire - troubleshooting media negotiation
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Job_Card_System_Styled_lorem_ipsum_.pptx
innovation process that make everything different.pptx
QR Codes Qr codecodecodecodecocodedecodecode
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
international classification of diseases ICD-10 review PPT.pptx
Introduction to Information and Communication Technology
Tenda Login Guide: Access Your Router in 5 Easy Steps
SASE Traffic Flow - ZTNA Connector-1.pdf
artificial intelligence overview of it and more

Internet security: a landscape of unintended consequences