BSidesROC 2016 - Holly Turner - How To Hug A Hacker

Preview:

Citation preview

How to Hug a Hacker(Lessons from Manufacturing)

Holly Turner, XeroxInformation Security Manager

CISSP, PMP, Six Sigma Black Belt

"My father taught me many things here — he taught me in this room. He taught me — keep your friends close but your enemies

closer.“

"Michael Corleone" in The Godfather Part II (1974)

• Mike Lynn, age 24, presented vulnerabilities in Cisco IOS at Black Hat in Vegas

https://www.blackhat.com/html/bh-blackpage/bh-blackpage-11092005.htmlhttps://www.schneier.com/blog/archives/2005/07/cisco_harasses.html

• Resigned from ISS, after being asked to ‘edit’ presentation content

• Lawsuit filed by Cisco, ISS

2005 “Ciscogate”

"No one really thought this …was possible, until Wednesday, so no one really looked to defend against it," [Mike]Lynn said. "A router is like any computer in that, when it has a vulnerability, you can hack it.“

Blowback - 1 http://www.securityfocus.com/news/11260

"The whole attempt at security through obscurity is amazing, especially when a big company like Cisco tries to keep a researcher quiet““ People are definitely going to want to find more vulnerabilities ... and now people aren't going to care to report things to Cisco.”Marc Maiffret, chief hacking officer for network protection firm eEye Digital Security

Blowback - 2 http://www.securityfocus.com/news/11260

"You have EULAs that tell people they can't reverse engineer and companies who are ready to levy the most severe penalties for anyone who breaks those agreements,“[Jennifer] Granick said. "It is time to begin to worry about the rights that companies are trying to take away from us.”

Blowback- 3 http://www.securityfocus.com/news/11260

EULA

• Processor• RAM, ROM, SDRAM• HD• NIC• Analog Fax Modem• Linux OS• Apache, Open SSL, Open LDAP, Samba,

Kerberos, PHP, Netsnmp

Say hello to my little friend.

• Brendan O’Connor, undergrad intern, presents “Vulnerabilities in embedded systems”

https://www.blackhat.com/presentations/bh-usa-06/BH-US-06-OConnor.pdf

Black Hat 2006

• Senior Security Advisor at Leviathan Security Group

• Juris Doctor, Law, University of Wisconsin, MSE Computer Science, Johns Hopkins

• CIPP/US, CIPP/G, CISSP, Certificate of Cloud Security Knowledge https://www.linkedin.com/in/ussjoin

Where is he now?

• Researchers at Columbia School of Engineering and Applied Science reverse engineer printer

• Software updates are not digitally signed and checked for authenticity

• Malware can replace OShttp://www.nbcnews.com/business/consumer/exclusive-millions-printers-open-devastating-hack-attack-researchers-say-f118851

Printers on Fire? 2012

• Dr. Ang Cui, CEO and chief scientist• Dr. Salvatore Stolfo, co-founder• Red Balloon Security

https://www.redballoonsecurity.com/ • Project Symbiote – software to defend

embedded devices, in HP devices

Where are they now?

• Andrei Costin, presentation on “Embedded Devices Security and Firmware Reverse Engineering”

https://www.blackhat.com/us-13/briefings.html#Costin

Black Hat 2013

More Security Bulletins

https://www.xerox.com/download/security/security-bulletin/2e639-4d7bcb40a048e/cert_XRX12-003_v1.13.pdf

• Co-founder at Firmware.RE• PhD from EURECOM/Telecom ParisTech• Google Security Hall of Fame• 12/29/2015 presentation on “(In)Security of

Embedded Devices' Firmware - Fast and Furious at Large Scale “

https://www.youtube.com/watch?v=Rum1e8ZJlys

Where is he now?

• Andrew Auernheimer, Weev, hacktivist claims ‘mass printer trolling’ sending an unauthorized document to printers on open, unsecured Internet connections.

• http://www.nytimes.com/2016/03/29/nyregion/hacker-weev-says-he-printed-anti-semitic-and-racist-fliers-at-colleges-across-us.html?_r=0

Fast forward, March 2016

• Self-Employed• Seeking Crowdfunding on Liberapay• Twitter – “Tons of Soviet bureaucracy. Submitted

my request for a 15 year residency. If you don't travel to Eastern Europe I'll see you when I'm 45”

https://www.linkedin.com/in/rabite

Where is he now?

How hugging works1. Contact

– Dedicated webpage.com/security– Technical Support, phone or email

2. Publication Pause – Negotiated time period for manufacturer to develop

patch, 60 to 90 days3. Acknowledgement

– Public recognition of researcher

Options:• Contest/Challenge• Payment/Bug Bounty

Questions?