The Dark Side of Security
Jarrod Overson - @jsoverson - Shape Security
Not this dark side…
… the darkness that hides the unknown
Traditional web security is like flossing.
Deep down we know we should care,
but it's difficult to see if the effort is paying off.
OWASP Top 10
A1 – Injection
A2 – Broken Authentication and Session Management
A3 – Cross-Site Scripting (XSS)
A4 – Insecure Direct Object References
A5 – Security Misconfiguration
A6 – Sensitive Data Exposure
A7 – Missing Function Level Access Control
A8 – Cross-Site Request Forgery (CSRF)
A9 – Using Known Vulnerable Components
A10 – Unvalidated Redirects and Forwards
OWASP Automated Threats
OAT-020 Account Aggregation OAT-006 Expediting
OAT-019 Account Creation OAT-004 Fingerprinting
OAT-003 Ad Fraud OAT-018 Footprinting
OAT-009 CAPTCHA Bypass OAT-005 Scalping
OAT-010 Card Cracking OAT-011 Scraping
OAT-001 Carding OAT-016 Skewing
OAT-012 Cashing Out OAT-013 Sniping
OAT-007 Credential Cracking OAT-017 Spamming
OAT-008 Credential Stuffing OAT-002 Token Cracking
OAT-015 Denial of Service OAT-014 Vulnerability Scanning
Our user-friendly APIs enable our attackers
Not just these APIs
The APIs we expose unintentionally.
The APIs we expose unintentionally.
The APIs we expose unintentionally.
The Dark Side of Security
The Dark Side of Security
The Dark Side of Security
It's more than just massive breaches
from large companies, too.
It's small continuous, streams of exploitable data
When you read about breaches, what do you do?
Even if you have the most secure site in the world,
we don't protect against legitimate user logins.
If your users were robots,
could you tell?
The Dark Side of Security
What percentage of traffic is from bots?
92%
( Current record for automation against a login page, via Shape Security )
What percentage of traffic is from bots?
Why?
Do you… For example
Store a type of currency? actual money, point values, gift cards
Sell goods? physical, digital, services
Have unique PII? health care, social networks
Have user generated content? forums, social networks, blogs, comments
Have time sensitive features? tickets, flash sales, reservations
Pay for digitally validated behavior? ad clicks, reviews, "uber for X"
If you have value, there is value in exploiting you.
But we have captchas!
But captchas don't work.
Estimated 200 million+ hours spent
every year deciphering squiggly letters.
Luis Von Ahn, creator of captcha
*
*
Services have been made making captcha bypass even easier.
Services have been made making captcha bypass even easier.
Ever wonder where these ads go?
There's big money in "Work from Home Data Entry" jobs
So we seek alternatives.
Some rely on simple behavior analysis
Some rely on kittens
Some rely on a love for death metal
Some are very high profile
How?
They use a lot of the same tools we already use.
The Dark Side of Security
The Dark Side of Security
The Dark Side of Security
The Dark Side of Security
The Dark Side of Security
The Dark Side of Security
Once you detect an attacker, they are easy to block.
Right?
One attacker from one machine
can be blocked by IP.
Many attackers sound dangerous but
aren't as common as they are made out to be.
One attacker using proxies to
look like thousands of users across the globe
is difficult to detect and block.
Spikes of traffic across many IPs are normal, except when they aren't
The devices themselves leave fingerprints
And tools are made to leave no fingerprints
Lots of tools.
The Dark Side of Security
We can't patch our way through this.
How would you react if you went from …
Legitimate traffic
To this
Automation detected and blocked
Legitimate traffic
Automation detected and blocked
Legitimate traffic
To this
Automation detected and blocked
Legitimate traffic
To this
To get an idea, search for :
• <your company, service, or CMS> fullz
• <your company, service, or CMS> sentrymba
• <your company, service, or CMS> carding
• <your company, service, or CMS> <tool> tutorial
Not sure if you have a problem?
The Dark Side of Security
Jarrod Overson - @jsoverson - Shape Security

More Related Content

PDF
The Life of Breached Data & The Dark Side of Security
PDF
Shape Security @ WaffleJS October 16
PDF
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
PDF
Server-Side Second Factors: Approaches to Measuring User Authenticity
PPTX
2018 Hacked Website Trends
PPTX
Email attacks and shimming attack
PPT
Beyond The Norm: Building Secure Websites
PPTX
Tune in for the Ultimate WAF Torture Test: Bots Attack!
The Life of Breached Data & The Dark Side of Security
Shape Security @ WaffleJS October 16
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Server-Side Second Factors: Approaches to Measuring User Authenticity
2018 Hacked Website Trends
Email attacks and shimming attack
Beyond The Norm: Building Secure Websites
Tune in for the Ultimate WAF Torture Test: Bots Attack!

Similar to The Dark Side of Security (20)

PDF
The life of breached data and the attack lifecycle
PDF
How Credential Stuffing is Evolving - PasswordsCon 2019
PDF
Os Nightingale
PDF
Beyond The Padlock: New Ideas in Browser Security UI
PDF
The State of Credential Stuffing and the Future of Account Takeovers.
PPTX
Introduction to application security (Arabic)
PPTX
Identity and Access Management - RSA 2017 Security Foundations Seminar
PPTX
What Makes Web Applications Desirable For Hackers
PDF
Things that go bump on the web - Web Application Security
PDF
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
PDF
Web Application Security Testing Guide | Secure Web Apps
PPTX
The Ins, Outs, and Nuances of Internet Privacy
PPTX
17 00 distil rami
PPTX
Security testing for web developers
PDF
AI is Hacking You - Digital Workplace Conference Australia 2024
PDF
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
PPTX
2012: The End of the World?
PPTX
Believe It Or Not SSL Attacks
PPTX
We cant hack ourselves secure
KEY
Do it-yourself-audits
The life of breached data and the attack lifecycle
How Credential Stuffing is Evolving - PasswordsCon 2019
Os Nightingale
Beyond The Padlock: New Ideas in Browser Security UI
The State of Credential Stuffing and the Future of Account Takeovers.
Introduction to application security (Arabic)
Identity and Access Management - RSA 2017 Security Foundations Seminar
What Makes Web Applications Desirable For Hackers
Things that go bump on the web - Web Application Security
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
Web Application Security Testing Guide | Secure Web Apps
The Ins, Outs, and Nuances of Internet Privacy
17 00 distil rami
Security testing for web developers
AI is Hacking You - Digital Workplace Conference Australia 2024
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
2012: The End of the World?
Believe It Or Not SSL Attacks
We cant hack ourselves secure
Do it-yourself-audits
Ad

More from Jarrod Overson (16)

PDF
Practical WebAssembly with Apex, wasmRS, and nanobus
PDF
AppSecCali - How Credential Stuffing is Evolving
PDF
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
PDF
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...
PDF
Deepfakes - How they work and what it means for the future
PDF
How to Reverse Engineer Web Applications
PDF
Graphics Programming for Web Developers
PDF
JavaScript and the AST
PDF
ES2015 workflows
PDF
Maintainability SFJS Sept 4 2014
PDF
Idiot proofing your code
PDF
Riot on the web - Kenote @ QCon Sao Paulo 2014
PDF
Managing JavaScript Complexity in Teams - Fluent
PDF
Real World Web components
PDF
Managing JavaScript Complexity
PDF
Continuous Delivery for the Web Platform
Practical WebAssembly with Apex, wasmRS, and nanobus
AppSecCali - How Credential Stuffing is Evolving
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...
Deepfakes - How they work and what it means for the future
How to Reverse Engineer Web Applications
Graphics Programming for Web Developers
JavaScript and the AST
ES2015 workflows
Maintainability SFJS Sept 4 2014
Idiot proofing your code
Riot on the web - Kenote @ QCon Sao Paulo 2014
Managing JavaScript Complexity in Teams - Fluent
Real World Web components
Managing JavaScript Complexity
Continuous Delivery for the Web Platform
Ad

Recently uploaded (20)

PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PDF
Course Overview and Agenda cloud security
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
Reading as a good Form of Recreation
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
Internet Safety for Seniors presentation
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
Paper The World Game (s) Great Redesign.pdf
PPTX
MY PRESENTATION66666666666666666666.pptx
PPTX
Partner to Customer - Sales Presentation_V23.01.pptx
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PDF
Exploring The Internet Of Things(IOT).ppt
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
PPTX
Cyber Hygine IN organizations in MSME or
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
Alethe Consulting Corporate Profile and Solution Aproach
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Course Overview and Agenda cloud security
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Layers_of_the_Earth_Grade7.pptx class by
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Reading as a good Form of Recreation
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Internet Safety for Seniors presentation
The-Importance-of-School-Sanitation.pptx
Paper The World Game (s) Great Redesign.pdf
MY PRESENTATION66666666666666666666.pptx
Partner to Customer - Sales Presentation_V23.01.pptx
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
Exploring The Internet Of Things(IOT).ppt
AI AppSec Threats and Defenses 20250822.ppsx
Cyber Hygine IN organizations in MSME or
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Alethe Consulting Corporate Profile and Solution Aproach

The Dark Side of Security