37
Recent Trends in Cyber Security Ayoma Wijethunga WSO2, Platform Security Team

Recent Trends in Cyber Security

Embed Size (px)

Citation preview

Page 1: Recent Trends in Cyber Security

Recent Trends in Cyber Security

Ayoma WijethungaWSO2, Platform Security Team

Page 3: Recent Trends in Cyber Security

Agenda

Trends in Cyber Security:

[15%] Threat Statistics

[35%] Technical Overview of Top Threats

[05%] Education and Certifications

[10%] Individual Research Opportunities

[05%] Job Market

[10%] Local Communities

[20%] Q&A

Page 4: Recent Trends in Cyber Security

Threat Statistics

Page 5: Recent Trends in Cyber Security

References

Symantec - Internet Security Threat Report (VOLUME 21, APRIL 2016)

Hewlett Packard Enterprise Security Research - Cyber Risk Report 2016

Acunetix - Web Application Vulnerability Report 2016

McAfee Labs - 2016 Threats Predictions

WSO2 - Public Security Advisories

All available in public internet. Just a Google search away.

Page 6: Recent Trends in Cyber Security

Cyber Security - Rapid Expansion of the Landscape

Page 7: Recent Trends in Cyber Security

Cyber Security - Rapid Expansion of the Landscape

Page 8: Recent Trends in Cyber Security

Cyber Security - Data Breaches

https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/

Information is Beautiful: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Breach Lebel Index : http://breachlevelindex.com/top-data-breaches

Page 9: Recent Trends in Cyber Security

Cyber Security - Data Breaches

https://www.statista.com/statistics/267132/total-damage-caused-by-by-cyber-crime-in-the-us/

Page 10: Recent Trends in Cyber Security

Cyber Security - Data Breaches

Source: http://breachlevelindex.com/

Page 11: Recent Trends in Cyber Security

Cyber Security - Data Breaches

Source: http://breachlevelindex.com/

Page 12: Recent Trends in Cyber Security

Cyber Security - Technical Summary

Page 13: Recent Trends in Cyber Security

Cyber Security - Technical Summary

The severity of instances in the top 10 CVEs

Page 14: Recent Trends in Cyber Security

Cyber Security - Technical Summary

Page 15: Recent Trends in Cyber Security

Cyber Security - Mobile Applications

Page 16: Recent Trends in Cyber Security

Cyber Security - Mobile Applications

Page 17: Recent Trends in Cyber Security

Technical Discussionon Application Vulnerabilities

Page 18: Recent Trends in Cyber Security

XML Entity Expansion (billion laughs attack)

Vulnerable Scenario: Application parses an input XML and output a portion or a derivation of parser output.

<?xml version="1.0"?>

<!DOCTYPE lolz [

<!ENTITY lol "lol">

<!ELEMENT lolz (#PCDATA)>

<!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">

<!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;">

<!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;">

<!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;">

<!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;">

<!ENTITY lol6 "&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;">

<!ENTITY lol7 "&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;">

<!ENTITY lol8 "&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;">

<!ENTITY lol9 "&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;">

]>

<lolz>&lol9;</lolz>

Page 19: Recent Trends in Cyber Security

XML External Entity Injection

Vulnerable Scenario: Application parses an input XML and output a portion or a derivation of parser output.

<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE foo [ <!ELEMENT foo ANY > <!ENTITY xxe SYSTEM "file:///etc/passwd" >]><foo>&xxe;</foo>

Solution:factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);

factory.setFeature("http://xml.org/sax/features/external-general-entities”, false);

factory.setFeature("http://xml.org/sax/features/external-parameter-entities”, false);

Read more at: https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Prevention_Cheat_Sheet

Page 20: Recent Trends in Cyber Security

Cross Site Scripting

Description: User input is rendered without proper encoding, allowing attacker to execute malicious payload on browser.

<html>

<head><title><% request.getParameter(“title”) %></title></head>

<body>.....<body>

<html>

Solution:Use proper encoding [ https://github.com/OWASP/owasp-java-encoder ].

Read more at: https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet

Page 21: Recent Trends in Cyber Security

Cross Site Request Forgery

Description: Forcing unintentional action on a web application in which victim is currently authenticated.

Solution: CSRF protect all state changing operations

[ https://www.owasp.org/index.php/Category:OWASP_CSRFGuard_Project ].

Read more at: https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)

Source: http://www.slideshare.net/fykim/rest-security-with-jaxrs

Page 22: Recent Trends in Cyber Security

Cross Frame Forgery / Clickjacking

Description: Using multiple opaque layers (framing) with the intention of getting a user to perform an action on another page.

Solution: Set X-Frame-Options header properly. User frame busting scripts.

Read more at: https://www.owasp.org/index.php/Clickjacking

Source: http://computerexpertofindia.blogspot.com

Page 23: Recent Trends in Cyber Security

Server Side Request Forgery

Description: Evade firewall and other controls by using a vulnerable host and executing malicious requests using vulnerable host on internal network / servers.

Source https://blogs.mcafee.com/mcafee-labs/server-side-request-forgery-takes-advantage-vulnerable-app-servers/

Page 24: Recent Trends in Cyber Security

SQL Injection

Description: Inject malicious content into input values and manipulating SQL statements generated by the application, to perform an unintended action.

Statement stmt = conn.createStatement();ResultSet rs = stmt.executeQuery("SELECT 1 FROM customers WHERE username = '" + username + "' and password = '" + password + "'");What if “username” was 1' OR 1=1 --

SELECT 1 FROM customers WHERE username = '1’ OR 1=1 --' and password = 'abc’

Tools are widely available and risk is extremely high: SQLMap

Solution: Follow proper language specific guidelines or escape special characters in SQL statements (caution!). PreparedStatement pstmt = con.prepareStatement

("SELECT 1 FROM customers WHERE username = ? and password = ?);

Page 25: Recent Trends in Cyber Security

Improper / Inadequate Usage of HTTP Headers

All sensitive cookies should be HTTPOnly and Secure (Session Hijacking / Sensitive Information Leakage)

X-Frame-Options header should be properly defines (Clickjacking)

X-XSS-Protection header should be set to enable browser level filtering (XSS)

Access-Control-Allow-* headers should not be misused (Cross Domain Request)

Strict-Transport-Security should be set (Man in the middle)

Public-Key-Pins should be set (Man in the middle)

Content-Security-Policy / X-Content-Type-Options

Java Colombo Meetup SessionHTTP Security Headers - every Java developer must know https://docs.google.com/presentation/d/1YT8cHetOpo9Hh2yEA_s0cL5oK7ousL0DE9N-S6ewL04/edit?usp=sharing

Page 26: Recent Trends in Cyber Security

Education and Certifications

Page 27: Recent Trends in Cyber Security

Cyber Security - Education and Certifications EC -Council

EC-Council Certified Ethical Hacker

EC-Council Computer Hacking Forensic Investigator

EC-Council Licensed Penetration Tester

EC-Council Certified Secure Programmer

EC-Council Certified Security Specialist

ISC2

Certified Information Systems Security Professional

Certified Cloud Security Professional

Certified Cyber Forensics Professional

Certified Secure Software Lifecycle Professional

SANS GIAC

GPEN: GIAC Certified Penetration Tester

GWAPT: GIAC Web Application Penetration Tester

GSSP-JAVA: GIAC Secure Software Programmer - Java

Offensive Security

● Offensive Security Certified

Professional (100% practical

exams)● Offensive Security Wireless

Professional

● Offensive Security Certified

Expert

● Offensive Security Exploitation

Expert

● Offensive Security Web Expert

CompTIA Security +

This is just an unordered quick summary. Not intended as brand

promotion.

Page 28: Recent Trends in Cyber Security

Cyber Security - Education and Certifications

Search trend does not reflect every aspect.

OSCP is gaining popularity.

Page 29: Recent Trends in Cyber Security

Individual Research Opportunities

Page 30: Recent Trends in Cyber Security

Cyber Security - Individual Research Opportunities

https://www.facebook.com/whitehat

2,400+ valid submissions (2015)

$4.3 million cash awarded (2015)

800+ researchers around the world (2015)

https://www.google.com/about/appsecurity/reward-program/

$6 million cash awarded (2015)

Tomasz Bojarski found 70 bugs on Google in 2015

https://hackerone.com/

The Vulnerability Coordination & Bug Bounty Platform

https://bugcrowd.com/

Crowdsourced Application Security Testing

http://wso2.com/security

Get yourself listed: https://docs.wso2.com/display/Security/Acknowledgments

Page 31: Recent Trends in Cyber Security

Local Job Market

Page 32: Recent Trends in Cyber Security

Cyber Security - Local Job Market

WSO2

Platform Security Team initiated in December 2015

Dedicated team of 5 members

Trained security champion from each product team (~25)

Security checks integrated into CI/CD processes

Every commit goes through a static security analysis

Every build goes through a dynamic security analysis

Security awareness build up within internal engineering team (trainings / workshops)

Pearson Lanka (Pvt) Ltd

Looking for Application Security Engineer (26 September 2016): http://pearson.jobs/colombo-lka/c1-application-security-engineer/BECD35B8DCDC472680CD12A1551AA8B3/job/

SL CERT, TechCERT, PwC, Cryptogen Pvt Ltd, eCybersec

Every software or IT network service company will value cyber security knowledge and experience

Software Engineering + Security || Network Engineering + Security

Page 33: Recent Trends in Cyber Security

Local Communities

Page 34: Recent Trends in Cyber Security

http://www.meetup.com/Colombo-White-Hat-Security/

WSO2, Platform Security Team

http://www.meetup.com/colombo-security-meetup/

99X Technology

http://www.meetup.com/Colombo-Information-Technology-Security-Meetup-Group/

[start-up]

CAKE LABS

Cyber Security - Local Communities

https://www.facebook.com/ColomboWhiteHat

Page 35: Recent Trends in Cyber Security

Cyber Security - Colombo White Hat Security

July 28 - Meetup Launch (279 RSVPs and unexpected number of participants)

Introduction to "Colombo White Hat Security" by Tharindu Edirisinghe

“Wireless Network Security” by Ayoma Wijethunga

“White Hat News” by Milinda Wickramasinghe

Sep 29 - 2nd Meetup (Limited RSVPs - 150 RSVPs)

"Security Verification of Software" by Lt.Col. Dr. Chandana Gamage - Former Head of Department of Computer Science and Engineering and Senior Lecturer at University of Moratuwa

"Security Considerations on Linux Package Management" by Tharindu Edirisinghe

Bimonthly meetup (without a miss!!!)

Page 36: Recent Trends in Cyber Security

Cyber Security - Colombo White Hat Security

Page 37: Recent Trends in Cyber Security

Q&A