SlideShare a Scribd company logo
Vienna, October 16-17 2017
We hired hackers to hack us;
A case study about cloud-based authentication and
security in IBM Connections
Robert Farstad
@robertfarstad
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
PLATINUM	SPONSORS	
GOLD	SPONSORS	
SILVER	SPONSORS	
BRONZE	SPONSORS
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
This session…
…is mainly for you tech-people.
But very useful for everyone to see. Might be an eye-
opener.
No talk about:
•  What IBM Connections is…
•  What IBM Cnx can give you…
•  No ROI talk, what so ever!
•  How to use IBM Cnx!!
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
This session…
…is a case study where I will show you
•  an integration with Auth0.
•  how we hired hackers to hack us.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Vienna, October 16-17 2017
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Vienna, October 16-17 2017
The customer
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
The customer -
•  Political party, won the election 2017, second time in a row.
•  Norways Prime Minister is Høyres leader.
•  60.000 members
•  Was a white-space customer.
•  Now: Connections + Docs + Sametime
•  IBM Reference Customer.
•  Security is a priority, more and more.
•  Election year = hacking attempts.
•  We hacked them first!
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
- cloud based authentication
Høyre used Auth0 for all websites.
Requirement for them to become a Connections
customer was:
•  Authentication integration with Auth0!
•  è POC – Item Consulting developed a TAI
mechanism towards Auth0.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Vienna, October 16-17 2017
What is Auth0?
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
- cloud based authentication
You can connect any application.
•  Custom credentials: username + passwords
•  Social network logins:
•  Google, Facebook, Twitter, and any OAuth2, OAuth1 or OpenID
Connect provider.
•  Enterprise directories:
•  LDAP, Google Apps, Office 365, ADFS, AD, SAML-P, WS-
Federation, etc.
•  Passwordless systems:
•  Touch ID, one time codes on SMS, or email.
•  Supports several 2-factor solutions.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
•  JSON Web Token
•  Secure API: (TLS v1.2, AES_128_GCM and uses
ECDHE_RSA as the key exchange mechanism. )
•  Extensible admin tool.
•  Monitoring, (#logins, where from, who fails, hack
attempts, alarms.)
•  Blocking
•  Logs
•  Synced with Høyres back-end member system via
MSSQL DB, securely!
- cloud based authentication
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
- cloud based authentication
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
- cloud based authentication
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
+ TAI
•  Item developed a WebSphere Application
•  TAI – Trust Association Interceptors.
•  èLTPA after authenticated
•  New Auth0 login page.
•  Logout pages are modified
•  Logs out of Auth0
•  Logs out of Websphere
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Devices used
Login	occurs	from:	
•  Browsers	
•  Apps	
•  Desktop	plugins.	
	
Technically,	the	login	procedures	are	
quite	different.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Web-browsers
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Apps + Plugins
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Tivoli Directory server - TDS
◘  FREE/Bundled	LDAP	server	for	IBM	Connections	
◘  Standard	setup	between	WebSphere	and	TDS	
◘  Import	of	users	via	TDI/SDI	to	TDS.	
◘  From	MSSQL	Database	–	over	site2site	vpn.	
◘  Imports	only	the	most	relevant	fields	
Name,	email,	mobile,	position,	company,	department
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Tivoli Directory server – TDS + PTA
◘  Password	field	in	TDS	is	blank!	
◘  PTA	is	triggered.	
◘  What	is	PTA?	
◘  Pass	Through	Authentication	
◘  PTA	is	configured	to	search	in	
alternative	LDAP	source.	
◘  The	password	is	stored	in	Auth0	
◘  Our	PTA	source	is	TDI	/	SDI	
◘  TDI	calls	the	TAI	application	–	gets	
response	code	200	if	OK.	
◘  è	logged	in
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
What is TDI/SDI?
◘ Tivoli	Directory	Integrator	/	Security	Directory	Integrator	
◘ Data	manipulation	system,	limitless	possibilities.	
◘ Eclipse	based	– Javascript	coding.	
◘ Used	to	move,	consolidate,	manipulate	data.	
◘ Used	in	Connections	for	profile	data	import.	
◘ Best	tool	ever,	once	you´ve	learned	the	jift	of	the	gui	and	
debugger.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
TDI – acting as an LDAP server.
◘ Simulates	an	LDAP	server	
◘ Gets	attempted	username	and	password	from	TDS	PTA.	
◘ Credentials	è	WebSphere	Auth0login	app.	
◘ WAS	app	è	REST	lookup	to	Auth0	API.	
◘ Gets	return	code	OK	or	NOT_OK.	
◘ TDI	receives	same	code	from	the	WAS	app.	
◘ TDS	PTA	receives	same	code	from	TDI.	
◘ TDI	runs	multiple	instances	–	Can	handle	large	load.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
TDI – acting as an LDAP server.
Simple	code	–	extremely	powerful!
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
TDI – acting as an LDAP server.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Did	they	get	in?	
We	hired	hackers
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
What	they	tested	
Login	
attempts	
SSL	+		
headers	
Apps	
Stolen	
laptop	
Me!	Sensitive	
information
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
	SSL	tests	
www.ssllabs.com	 Grade	was	bad	 After	hardening	
SSLChipersSuite,	honorChipersOrder	and	SSLV2	
+V3	disabling.	TLS	only
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
	SSL	tests	–	http	config	for	Grade	A	
SSLEnable	
SSLProtocolEnable	TLS	
SSLProtocolDisable	SSLv2	SSLv3	
#	Disable	SSLCompression	->	CRIME	ATTACK	
SSLCompression	off	
#Prefer	ECDHE-RSA	ciphers	
SSLCipherSpec	ALL	NONE	
SSLCipherSpec	TLSv12	TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256	
SSLCipherSpec	TLSv12	TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256	
SSLCipherSpec	TLSv12	TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384	
SSLCipherSpec	TLSv12	TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384	
SSLCipherSpec	ALL	TLS_RSA_WITH_AES_128_GCM_SHA256	
SSLCipherSpec	ALL	TLS_RSA_WITH_AES_256_GCM_SHA384	
SSLCipherSpec	ALL	TLS_RSA_WITH_AES_128_CBC_SHA256	
SSLCipherSpec	ALL	TLS_RSA_WITH_AES_256_CBC_SHA256	
#	Enabling	this	3	ciphers	mean	A-	rating	on	ssllabs	
SSLCipherSpec	ALL	TLS_RSA_WITH_AES_128_CBC_SHA	
SSLCipherSpec	ALL	TLS_RSA_WITH_AES_256_CBC_SHA	
SSLCipherSpec	ALL	SSL_RSA_WITH_3DES_EDE_CBC_SHA
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
	Headers	
securityheaders.io	 Grade	was	bad	 After	hardening	
HTTP	config	to	achieve	Grade	A:	
Header	always	set	Strict-Transport-Security	"max-age=31536000;	includeSubDomains;	preload”	
Header	set	Referrer-Policy	"same-origin”	
Header	set	X-Content-Type-Options	"nosniff”	
Header	set	X-XSS-Protection	"1;	mode=block”	
Header	set	X-Frame-Options	"DENY”	
Header	set	X-Frame-Options	SAMEORIGIN
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
The	Mobile	App	
Decompile	
• Android	app	is	decompilable	
• Broken	down	to	study	code	
Test	
• Tried	every	url	found	in	code	
Result	
• Found	no	insecurities!	
• But	MITM	attacks	were	possible!
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
MITM	-	Man-in-the-middle	attack	
An	employee	is	out	traveling	and	
connects	to	a	public	network	such	as	
a	hotel	or	airport	WIFI.		
	
But	instead,	connects	to	a	hackers	
wifi	hotspot.	
Then	clicks	on	“Continue”….	
	
He/she	will	give	the	hacker	running	a	
MITM	attack,	full	visibility	over	the	
traffic.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
MITM	-	Man-in-the-middle	attack
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
MITM	-	Man-in-the-middle	attack	
mobile-config.xml	has	the	solution	for	
the	connections	app.	
	
Don´t	press	“Continue”!.	Tell	your	
admins	to	fix	it.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Demo	time	
The	demo	consisted	of	showing	a	
MITM	attack	+	username/password	
“cluster	bomb”	attack	using	free	tool	
Burp	Suite.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Accident	waiting	to	happen
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
What	did	they	find	when	they	got	in?	
Stolen	Laptop	Scenario
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Stolen	Laptop	Scenario	
•  Not	hard	to	find	password	on	PC	
•  Once	in,	passwords	to	sites	are	
normally	stored	in	browser.	
•  Saved	wifi	hotspots	gives	hackers	
GPS	coordinates	=>	can	drive	up	
alongside	your	company's	building	
and	connect.	
•  Hackers	found	sensitive	
information	open	to	all	of	the	IBM	
Connections	users.	
Don´t	expose	login	information	
available	to	everyone!
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
They	hacked	me!	
Or	at	least,	they	tried	to…
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
They	hacked	me!	
•  They	knew	who	I	was.	
•  Googled	me,	found	my	blog.	
•  In	one	of	the	screenshots,	a	
password	was	censored.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
They	hacked	me!	
I	was	a	weak	link…	
How	hard	is	it	for	hackers	to	find	IT	
staff	at	your	company?	
	LinkedIn	search…	Google	search…	
	
Google	is	both	your	friend	and	your	
enemy.	
•  Bad	censoring!!	
•  Found	6	out	of	9	chars	by	
matching	font,	size	and	studied	
curves.
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Avoid	stress
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
•  Mask/hide	better!	
•  Hackers	are	clever	
bastards.	
•  Hackers	has	A	LOT	of	
free	time.	
•  Implement	2-factor	
authorization	
mechanism,	like	Auth0	
•  Hide	your	stuff.	
•  Once	again:	Hackers	are	
clever	bastards.	
•  Lockout	policy	–	i.e.	5	
attempts	=>	locked	out…	
Hackers	has	tools	for	that!	
•  Train	your	users!
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
Useful	links:	
Check	SSL:	https://ssllabs.com	
Check	Headers:	https://securityheaders.io	
Analyze	CSP:	https://report-uri.io/home/analyse	
What	can	your	browser	support?	http://caniuse.com/#search=referrer%20policy	
	
Auth0	multi-factor	authentication:	https://auth0.com/docs/multifactor-authentication	
	
Burp	Suite:	https://portswigger.net/burp	
	
Ethical	Hacker	Certification:	https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/	
	
My	blog:	http://blog.robertfarstad.com	
Twitter:	https://www.twitter.com/robertfarstad	
Item	Consulting:	https://www.item.no
We hired hackers to hack us; A case study about cloud-based authentication and security in IBM Connections
Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
PLATINUM	SPONSORS	
GOLD	SPONSORS	
SILVER	SPONSORS	
BRONZE	SPONSORS

More Related Content

PDF
Developing Enterprise Collaboration in the Cognitive Era
PPTX
The Pink road – Dorothy’s journey through an all pink wonderland
PPTX
Building cognitive apps with Watson Work Services
PPTX
Calling all Developers: Building Connections Apps and Integrating with Pink
PPTX
Project Pink Note – New Note Editor Based on IBM Docs Technology
PPTX
Announcing the Connections Cloud Catalog: How to Get new Apps fresh out of th...
PDF
Pink Apps for Everyone: Introducing LiveGrid
PPTX
IBM Connections Middleware – Connecting Blue/Green and PINK
Developing Enterprise Collaboration in the Cognitive Era
The Pink road – Dorothy’s journey through an all pink wonderland
Building cognitive apps with Watson Work Services
Calling all Developers: Building Connections Apps and Integrating with Pink
Project Pink Note – New Note Editor Based on IBM Docs Technology
Announcing the Connections Cloud Catalog: How to Get new Apps fresh out of th...
Pink Apps for Everyone: Introducing LiveGrid
IBM Connections Middleware – Connecting Blue/Green and PINK

What's hot (20)

PPTX
How IBM Watson Workspace is bringing cognitive conversations to the Mears Group
PDF
Rostelecom Social Platform (100,000+ employees)
PPTX
Get plugged with Connections!
PDF
How to attract more users – The evolving story of the Eurapco IBM Connections...
PPTX
Social Connections take team collaboration to the next level with IBM Watson ...
PDF
Creating innovative and exceptional business value in ATLAS Company using IBM...
PPTX
IBM Connections Customizer – A Whole New World of Possibilities
PPTX
Reboot 2.0: How’s Your Digital Transformation Journey Going?
PPTX
“Why Connections, Spark or Box?” made simple
PPTX
Top 5 Challenges of Social Business Adaptation & How to Resolve Them Effectively
PPTX
IBM Connections Cloud extreme customization
PDF
Customization & Extensibility in IBM Connections Pink
PDF
Using Watson Work Services Java SDK
PPTX
The next wave of change
PDF
Five Steps to Successful Adoption of IBM Connections in your Organisation
PDF
Social Connections 12. We hired hackers to hack us
PDF
Future of Collaboration
PDF
AppFusions – Drive better outcomes and increased collaboration, engagement, a...
PDF
The Collaboration Decathlon
PPTX
App dev and partner ecosystem for pink social connections 2017
How IBM Watson Workspace is bringing cognitive conversations to the Mears Group
Rostelecom Social Platform (100,000+ employees)
Get plugged with Connections!
How to attract more users – The evolving story of the Eurapco IBM Connections...
Social Connections take team collaboration to the next level with IBM Watson ...
Creating innovative and exceptional business value in ATLAS Company using IBM...
IBM Connections Customizer – A Whole New World of Possibilities
Reboot 2.0: How’s Your Digital Transformation Journey Going?
“Why Connections, Spark or Box?” made simple
Top 5 Challenges of Social Business Adaptation & How to Resolve Them Effectively
IBM Connections Cloud extreme customization
Customization & Extensibility in IBM Connections Pink
Using Watson Work Services Java SDK
The next wave of change
Five Steps to Successful Adoption of IBM Connections in your Organisation
Social Connections 12. We hired hackers to hack us
Future of Collaboration
AppFusions – Drive better outcomes and increased collaboration, engagement, a...
The Collaboration Decathlon
App dev and partner ecosystem for pink social connections 2017

Similar to We hired hackers to hack us; A case study about cloud-based authentication and security in IBM Connections (15)

PDF
IBM Connections REST-API Waltz
PPTX
The World of Team Space Tools: Watson Workspace vs. Slack, Teams, Skype, and ...
PPTX
Turning the IBM Collaboration Ecosystem Pink
PPTX
IBM Connections 6 Component Pack
PPTX
Writing your first Watson Work application, and why you’d want to
PDF
Top 5 Challenges of Social Business Adaptation & How to Resolve Them Effectively
PDF
IBM Connections vs. Office 365 – Episode III
PDF
Data Science Weekend 2017. Intento. Machine to Machine Communication in the ...
PPTX
Two wrongs don’t make a right – Troubleshooting Connections
PDF
SocCnx11 - Two wrongs don't make a right - Troubleshooting Connections
PPTX
Soccnx11 Two wrongs don't make a right - Troubleshooting Connections
PPTX
IBM Connections REST API Hip-Hop
PDF
Developing IBM Connections Community Apps using Domino
PDF
An Introduction to Blockchain Technology
PPTX
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
IBM Connections REST-API Waltz
The World of Team Space Tools: Watson Workspace vs. Slack, Teams, Skype, and ...
Turning the IBM Collaboration Ecosystem Pink
IBM Connections 6 Component Pack
Writing your first Watson Work application, and why you’d want to
Top 5 Challenges of Social Business Adaptation & How to Resolve Them Effectively
IBM Connections vs. Office 365 – Episode III
Data Science Weekend 2017. Intento. Machine to Machine Communication in the ...
Two wrongs don’t make a right – Troubleshooting Connections
SocCnx11 - Two wrongs don't make a right - Troubleshooting Connections
Soccnx11 Two wrongs don't make a right - Troubleshooting Connections
IBM Connections REST API Hip-Hop
Developing IBM Connections Community Apps using Domino
An Introduction to Blockchain Technology
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey

More from LetsConnect (20)

PDF
Installing Component Pack 6.0.0.6
PPTX
Oh $h@# - How to deal with emotional outbursts and hate in social situations
PPTX
It is not About Connections vs Office 365 - You can have the best of the both...
PPTX
Using ibm connections to enhance university courses
PPTX
IBM Connections 6.0 CR3 New Features
PDF
10 years of IBM Connections
PDF
IBM Collaboration Framework in action: Customer success stories
PDF
Design for the Digital Workspace
PDF
New Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
PDF
Power up your Salesforce Opportunities by using IBM Watson Workspace as your ...
PDF
There is nothing more practical than a good theory
PDF
Kubernetes Basics for Connections Admins
PDF
Intelligent Collaboration driving Digital Transformation
PDF
IBM Connections - Have it YOUR Way!
PDF
You Get What You Give
PDF
Building Custom ibm Watson Workspace Templates to make you and your team more...
PDF
ICS INtegration with Node-RED and Open Source
PDF
Communities as the fundament of social learning
PDF
It's not IBM or O365 - Integrate and Embrace
PDF
Running Microservices in Production with IBM
Installing Component Pack 6.0.0.6
Oh $h@# - How to deal with emotional outbursts and hate in social situations
It is not About Connections vs Office 365 - You can have the best of the both...
Using ibm connections to enhance university courses
IBM Connections 6.0 CR3 New Features
10 years of IBM Connections
IBM Collaboration Framework in action: Customer success stories
Design for the Digital Workspace
New Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
Power up your Salesforce Opportunities by using IBM Watson Workspace as your ...
There is nothing more practical than a good theory
Kubernetes Basics for Connections Admins
Intelligent Collaboration driving Digital Transformation
IBM Connections - Have it YOUR Way!
You Get What You Give
Building Custom ibm Watson Workspace Templates to make you and your team more...
ICS INtegration with Node-RED and Open Source
Communities as the fundament of social learning
It's not IBM or O365 - Integrate and Embrace
Running Microservices in Production with IBM

Recently uploaded (20)

PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
How to Get Business Funding for Small Business Fast
PPTX
Lecture (1)-Introduction.pptx business communication
PPT
Chapter four Project-Preparation material
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
How to Get Funding for Your Trucking Business
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPT
Data mining for business intelligence ch04 sharda
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PPTX
5 Stages of group development guide.pptx
PDF
Chapter 5_Foreign Exchange Market in .pdf
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
Principles of Marketing, Industrial, Consumers,
DOC-20250806-WA0002._20250806_112011_0000.pdf
How to Get Business Funding for Small Business Fast
Lecture (1)-Introduction.pptx business communication
Chapter four Project-Preparation material
HR Introduction Slide (1).pptx on hr intro
How to Get Funding for Your Trucking Business
340036916-American-Literature-Literary-Period-Overview.ppt
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
New Microsoft PowerPoint Presentation - Copy.pptx
Data mining for business intelligence ch04 sharda
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Reconciliation AND MEMORANDUM RECONCILATION
5 Stages of group development guide.pptx
Chapter 5_Foreign Exchange Market in .pdf
Euro SEO Services 1st 3 General Updates.docx
WRN_Investor_Presentation_August 2025.pdf
Power and position in leadershipDOC-20250808-WA0011..pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Ôn tập tiếng anh trong kinh doanh nâng cao
Principles of Marketing, Industrial, Consumers,

We hired hackers to hack us; A case study about cloud-based authentication and security in IBM Connections

  • 1. Vienna, October 16-17 2017 We hired hackers to hack us; A case study about cloud-based authentication and security in IBM Connections Robert Farstad @robertfarstad
  • 2. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 PLATINUM SPONSORS GOLD SPONSORS SILVER SPONSORS BRONZE SPONSORS
  • 3. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 This session… …is mainly for you tech-people. But very useful for everyone to see. Might be an eye- opener. No talk about: •  What IBM Connections is… •  What IBM Cnx can give you… •  No ROI talk, what so ever! •  How to use IBM Cnx!!
  • 4. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 This session… …is a case study where I will show you •  an integration with Auth0. •  how we hired hackers to hack us.
  • 5. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Vienna, October 16-17 2017
  • 6. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Vienna, October 16-17 2017 The customer
  • 7. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 The customer - •  Political party, won the election 2017, second time in a row. •  Norways Prime Minister is Høyres leader. •  60.000 members •  Was a white-space customer. •  Now: Connections + Docs + Sametime •  IBM Reference Customer. •  Security is a priority, more and more. •  Election year = hacking attempts. •  We hacked them first!
  • 8. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 - cloud based authentication Høyre used Auth0 for all websites. Requirement for them to become a Connections customer was: •  Authentication integration with Auth0! •  è POC – Item Consulting developed a TAI mechanism towards Auth0.
  • 9. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Vienna, October 16-17 2017 What is Auth0?
  • 10. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 - cloud based authentication You can connect any application. •  Custom credentials: username + passwords •  Social network logins: •  Google, Facebook, Twitter, and any OAuth2, OAuth1 or OpenID Connect provider. •  Enterprise directories: •  LDAP, Google Apps, Office 365, ADFS, AD, SAML-P, WS- Federation, etc. •  Passwordless systems: •  Touch ID, one time codes on SMS, or email. •  Supports several 2-factor solutions.
  • 11. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 •  JSON Web Token •  Secure API: (TLS v1.2, AES_128_GCM and uses ECDHE_RSA as the key exchange mechanism. ) •  Extensible admin tool. •  Monitoring, (#logins, where from, who fails, hack attempts, alarms.) •  Blocking •  Logs •  Synced with Høyres back-end member system via MSSQL DB, securely! - cloud based authentication
  • 12. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 - cloud based authentication
  • 13. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 - cloud based authentication
  • 14. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 + TAI •  Item developed a WebSphere Application •  TAI – Trust Association Interceptors. •  èLTPA after authenticated •  New Auth0 login page. •  Logout pages are modified •  Logs out of Auth0 •  Logs out of Websphere
  • 15. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Devices used Login occurs from: •  Browsers •  Apps •  Desktop plugins. Technically, the login procedures are quite different.
  • 16. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Web-browsers
  • 17. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Apps + Plugins
  • 18. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Tivoli Directory server - TDS ◘  FREE/Bundled LDAP server for IBM Connections ◘  Standard setup between WebSphere and TDS ◘  Import of users via TDI/SDI to TDS. ◘  From MSSQL Database – over site2site vpn. ◘  Imports only the most relevant fields Name, email, mobile, position, company, department
  • 19. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Tivoli Directory server – TDS + PTA ◘  Password field in TDS is blank! ◘  PTA is triggered. ◘  What is PTA? ◘  Pass Through Authentication ◘  PTA is configured to search in alternative LDAP source. ◘  The password is stored in Auth0 ◘  Our PTA source is TDI / SDI ◘  TDI calls the TAI application – gets response code 200 if OK. ◘  è logged in
  • 20. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 What is TDI/SDI? ◘ Tivoli Directory Integrator / Security Directory Integrator ◘ Data manipulation system, limitless possibilities. ◘ Eclipse based – Javascript coding. ◘ Used to move, consolidate, manipulate data. ◘ Used in Connections for profile data import. ◘ Best tool ever, once you´ve learned the jift of the gui and debugger.
  • 21. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 TDI – acting as an LDAP server. ◘ Simulates an LDAP server ◘ Gets attempted username and password from TDS PTA. ◘ Credentials è WebSphere Auth0login app. ◘ WAS app è REST lookup to Auth0 API. ◘ Gets return code OK or NOT_OK. ◘ TDI receives same code from the WAS app. ◘ TDS PTA receives same code from TDI. ◘ TDI runs multiple instances – Can handle large load.
  • 22. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 TDI – acting as an LDAP server. Simple code – extremely powerful!
  • 23. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 TDI – acting as an LDAP server.
  • 24. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Did they get in? We hired hackers
  • 25. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 What they tested Login attempts SSL + headers Apps Stolen laptop Me! Sensitive information
  • 26. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 SSL tests www.ssllabs.com Grade was bad After hardening SSLChipersSuite, honorChipersOrder and SSLV2 +V3 disabling. TLS only
  • 27. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 SSL tests – http config for Grade A SSLEnable SSLProtocolEnable TLS SSLProtocolDisable SSLv2 SSLv3 # Disable SSLCompression -> CRIME ATTACK SSLCompression off #Prefer ECDHE-RSA ciphers SSLCipherSpec ALL NONE SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 SSLCipherSpec ALL TLS_RSA_WITH_AES_128_GCM_SHA256 SSLCipherSpec ALL TLS_RSA_WITH_AES_256_GCM_SHA384 SSLCipherSpec ALL TLS_RSA_WITH_AES_128_CBC_SHA256 SSLCipherSpec ALL TLS_RSA_WITH_AES_256_CBC_SHA256 # Enabling this 3 ciphers mean A- rating on ssllabs SSLCipherSpec ALL TLS_RSA_WITH_AES_128_CBC_SHA SSLCipherSpec ALL TLS_RSA_WITH_AES_256_CBC_SHA SSLCipherSpec ALL SSL_RSA_WITH_3DES_EDE_CBC_SHA
  • 28. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Headers securityheaders.io Grade was bad After hardening HTTP config to achieve Grade A: Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload” Header set Referrer-Policy "same-origin” Header set X-Content-Type-Options "nosniff” Header set X-XSS-Protection "1; mode=block” Header set X-Frame-Options "DENY” Header set X-Frame-Options SAMEORIGIN
  • 29. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 The Mobile App Decompile • Android app is decompilable • Broken down to study code Test • Tried every url found in code Result • Found no insecurities! • But MITM attacks were possible!
  • 30. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 MITM - Man-in-the-middle attack An employee is out traveling and connects to a public network such as a hotel or airport WIFI. But instead, connects to a hackers wifi hotspot. Then clicks on “Continue”…. He/she will give the hacker running a MITM attack, full visibility over the traffic.
  • 31. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 MITM - Man-in-the-middle attack
  • 32. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 MITM - Man-in-the-middle attack mobile-config.xml has the solution for the connections app. Don´t press “Continue”!. Tell your admins to fix it.
  • 33. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Demo time The demo consisted of showing a MITM attack + username/password “cluster bomb” attack using free tool Burp Suite.
  • 34. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Accident waiting to happen
  • 35. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 What did they find when they got in? Stolen Laptop Scenario
  • 36. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Stolen Laptop Scenario •  Not hard to find password on PC •  Once in, passwords to sites are normally stored in browser. •  Saved wifi hotspots gives hackers GPS coordinates => can drive up alongside your company's building and connect. •  Hackers found sensitive information open to all of the IBM Connections users. Don´t expose login information available to everyone!
  • 37. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 They hacked me! Or at least, they tried to…
  • 38. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 They hacked me! •  They knew who I was. •  Googled me, found my blog. •  In one of the screenshots, a password was censored.
  • 39. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 They hacked me! I was a weak link… How hard is it for hackers to find IT staff at your company? LinkedIn search… Google search… Google is both your friend and your enemy. •  Bad censoring!! •  Found 6 out of 9 chars by matching font, size and studied curves.
  • 40. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Avoid stress
  • 41. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 •  Mask/hide better! •  Hackers are clever bastards. •  Hackers has A LOT of free time. •  Implement 2-factor authorization mechanism, like Auth0 •  Hide your stuff. •  Once again: Hackers are clever bastards. •  Lockout policy – i.e. 5 attempts => locked out… Hackers has tools for that! •  Train your users!
  • 42. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017
  • 43. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 Useful links: Check SSL: https://ssllabs.com Check Headers: https://securityheaders.io Analyze CSP: https://report-uri.io/home/analyse What can your browser support? http://caniuse.com/#search=referrer%20policy Auth0 multi-factor authentication: https://auth0.com/docs/multifactor-authentication Burp Suite: https://portswigger.net/burp Ethical Hacker Certification: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/ My blog: http://blog.robertfarstad.com Twitter: https://www.twitter.com/robertfarstad Item Consulting: https://www.item.no
  • 45. Social Connections 11 Chicago, June 1-2 2017Social Connections 12 Vienna, October 16-17 2017 PLATINUM SPONSORS GOLD SPONSORS SILVER SPONSORS BRONZE SPONSORS