<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.srevilak.net/wiki/index.php?action=history&amp;feed=atom&amp;title=Security_B-Sides_Boston_-_5%2F18%2F2013</id>
	<title>Security B-Sides Boston - 5/18/2013 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.srevilak.net/wiki/index.php?action=history&amp;feed=atom&amp;title=Security_B-Sides_Boston_-_5%2F18%2F2013"/>
	<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Security_B-Sides_Boston_-_5/18/2013&amp;action=history"/>
	<updated>2026-04-04T00:03:32Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://www.srevilak.net/wiki/index.php?title=Security_B-Sides_Boston_-_5/18/2013&amp;diff=70&amp;oldid=prev</id>
		<title>SteveR at 03:11, 16 February 2014</title>
		<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Security_B-Sides_Boston_-_5/18/2013&amp;diff=70&amp;oldid=prev"/>
		<updated>2014-02-16T03:11:37Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 23:11, 15 February 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l637&quot;&gt;Line 637:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 637:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In cars, bluetooth connections are usually protected by trivial&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In cars, bluetooth connections are usually protected by trivial&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;passwords, like &amp;quot;1111&amp;quot;.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;passwords, like &amp;quot;1111&amp;quot;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category: Notes]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>SteveR</name></author>
	</entry>
	<entry>
		<id>https://www.srevilak.net/wiki/index.php?title=Security_B-Sides_Boston_-_5/18/2013&amp;diff=66&amp;oldid=prev</id>
		<title>SteveR: initial revision</title>
		<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Security_B-Sides_Boston_-_5/18/2013&amp;diff=66&amp;oldid=prev"/>
		<updated>2014-02-15T23:07:08Z</updated>

		<summary type="html">&lt;p&gt;initial revision&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;See http://bsidesboston.com/ and http://www.securitybsides.com for background&lt;br /&gt;
on Security B-sides conferences.&lt;br /&gt;
&lt;br /&gt;
= Keynote: Privacy as Identity =&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Dr. Geer&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The speaker works with a company called Inqtel. Inqtel is an&lt;br /&gt;
investment firm whose funding comes by way of the US intelligence&lt;br /&gt;
community. One of their companies was Keyhole, now Google&lt;br /&gt;
Earth. They&amp;#039;re headquartered in DC, with a local office in Waltham.&lt;br /&gt;
&lt;br /&gt;
Technology changes very quickly. So quickly, that the implications of&lt;br /&gt;
new technologies cannot be reflected in policy prior to&lt;br /&gt;
adoption. Policy struggles to keep up. This isn&amp;#039;t a bad thing. We live&lt;br /&gt;
in a free society; you&amp;#039;re allowed to do anything that isn&amp;#039;t explicitly&lt;br /&gt;
forbidden. The alternative is authoritariansm, where you&amp;#039;re only&lt;br /&gt;
allowed to do things that are explicitly permitted.&lt;br /&gt;
&lt;br /&gt;
You don&amp;#039;t need laws to prevent the impossible. But things that were&lt;br /&gt;
impossible a few years ago are possible today. The rate of change&lt;br /&gt;
isn&amp;#039;t just about technology; it&amp;#039;s about the implications of new&lt;br /&gt;
technology.&lt;br /&gt;
&lt;br /&gt;
There are around 25 congressional bills that deal with cybersecurity,&lt;br /&gt;
most of which you wouldn&amp;#039;t like.&lt;br /&gt;
&lt;br /&gt;
We have so many laws that all enforcement is selective. See Harvey&lt;br /&gt;
Silvergate&amp;#039;s book Three Felonies a Day. Given our current laws, the&lt;br /&gt;
average person commits three felonies a day, whether they realize it&lt;br /&gt;
or not.&lt;br /&gt;
&lt;br /&gt;
NSTIC: National Stratgies for Trusted Identies in Cyberspace. The&lt;br /&gt;
people who wrote this legislation are concerned with attribution. They&lt;br /&gt;
consider privacy a problem.&lt;br /&gt;
&lt;br /&gt;
The internet was built on the end-to-end principle. The network is&lt;br /&gt;
nothing more than a transmission mechanism; it doesn&amp;#039;t enforce&lt;br /&gt;
policy. All policy enforcement takes place at the endpoints.&lt;br /&gt;
&lt;br /&gt;
When reading public policy documents, always start with the&lt;br /&gt;
definitions. Most of the substance is in the definitions. The&lt;br /&gt;
definitions will give you a good sense of what the rest of the policy&lt;br /&gt;
is about.&lt;br /&gt;
&lt;br /&gt;
At the moment, technology isn&amp;#039;t out of our control. Someday, it could&lt;br /&gt;
be.&lt;br /&gt;
&lt;br /&gt;
Tomorrow night, 60 minutes will air a segment on reidentification&lt;br /&gt;
technologies. It&amp;#039;s worth watching. If you&amp;#039;re unique in any way, then&lt;br /&gt;
you can probably be identified.&lt;br /&gt;
&lt;br /&gt;
The world&amp;#039;s corpus of data is doubling every 30 months. This rate of&lt;br /&gt;
increase surpasses improvements in storage, and improvements in&lt;br /&gt;
bandwidth.&lt;br /&gt;
&lt;br /&gt;
Punctuated Equilibrium: period of relative calm, punctuated by periods&lt;br /&gt;
of rapid change.&lt;br /&gt;
&lt;br /&gt;
Many of our security problems started when Microsoft included a free&lt;br /&gt;
TCP/IP stack in Windows 3. They took an operating system that was&lt;br /&gt;
designed for a single user, and exposed it to the rest of the&lt;br /&gt;
world. On the internet, every sociopath is your next door neighbor.&lt;br /&gt;
&lt;br /&gt;
In the last five years, vulnerability research has gone from being a&lt;br /&gt;
hobby to a full time job.  When it was a hobby, your &amp;quot;income&amp;quot; was&lt;br /&gt;
recognition (for finding a new exploit), and new exploits were&lt;br /&gt;
announced shortly after discovery. Today, exploit discovery is&lt;br /&gt;
motivated by profit, and new exploits aren&amp;#039;t announced as&lt;br /&gt;
quickly. When you&amp;#039;re paid to find exploits, you don&amp;#039;t share.&lt;br /&gt;
&lt;br /&gt;
Intrusion prevention is probably a lost cause. Intrusion toleration is&lt;br /&gt;
a more tractible approach.&lt;br /&gt;
&lt;br /&gt;
The US could corner the world market for cyber vulnerabilities if it&lt;br /&gt;
wanted to. The cost to buy this things is barely a drop in the&lt;br /&gt;
bucket. We should do this, and we should make all of the&lt;br /&gt;
vulnerabilities public. This would empty everyone&amp;#039;s warehouse of&lt;br /&gt;
exploits. If we keep exploits secret, then other countries will too,&lt;br /&gt;
and everyone will be sitting on their own little nuclear arsenal of&lt;br /&gt;
zero-day vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Many computer security laws only address what you&amp;#039;ve done; they&lt;br /&gt;
completely ignore the issue of intent. That&amp;#039;s a major departure from&lt;br /&gt;
our legal tradition.&lt;br /&gt;
&lt;br /&gt;
The practice of law is the search for analogy.&lt;br /&gt;
&lt;br /&gt;
Denial of service attacks can be purchased rather cheaply.&lt;br /&gt;
&lt;br /&gt;
Washington is relying on ISPs and other service providers to enforce&lt;br /&gt;
their laws. They&amp;#039;ve deputized many of the companies, often against&lt;br /&gt;
their will. Instead of deputies, service providers should be treated&lt;br /&gt;
as common carriers.&lt;br /&gt;
&lt;br /&gt;
Lately, there are been discussions about a potential back door in&lt;br /&gt;
Skype. What motivation would Microsoft have for putting a back door in&lt;br /&gt;
Skype. Some country probably insisted on it. That&amp;#039;s the downside of&lt;br /&gt;
doing business internationally; you&amp;#039;ll have to conform to a lot of&lt;br /&gt;
different laws.&lt;br /&gt;
&lt;br /&gt;
Recording everything is cheaper than recording things selectively. To&lt;br /&gt;
security professionals, &amp;quot;how long has this been going on?&amp;quot; is often&lt;br /&gt;
more important than &amp;quot;who is doing this?&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
According to the Cyber Security Confidence Index (?) risk tends to go&lt;br /&gt;
up month over month, but the types of risks move around. This index is&lt;br /&gt;
compiled from a list of surveys, solicited to security professionals.&lt;br /&gt;
&lt;br /&gt;
Most firms don&amp;#039;t know what data they have. If you don&amp;#039;t know what data&lt;br /&gt;
you have, then how do you go about protecting it?&lt;br /&gt;
&lt;br /&gt;
The average zero-day exploit is in use for 300 days before becoming&lt;br /&gt;
public knowledge.&lt;br /&gt;
&lt;br /&gt;
The ability to observe is increasing rapidly. We can do facial&lt;br /&gt;
recognition at 500 meters and iris recognition at 50 meters. We also&lt;br /&gt;
have the ability to identify people by reading their cell phone&lt;br /&gt;
acclerometers (we all walk a little differently). Once you have&lt;br /&gt;
observability, how far is the leap to identifiability.&lt;br /&gt;
&lt;br /&gt;
The speaker prefers the following definition of security: security is&lt;br /&gt;
the absense of unmitigated surprise. Along similar lines, privacy is&lt;br /&gt;
where you&amp;#039;ve retained the capacity to misrepresent yourself.&lt;br /&gt;
&lt;br /&gt;
All security technologies are dual use. Any technology can be used for&lt;br /&gt;
offsensive or defensive means.&lt;br /&gt;
&lt;br /&gt;
What will you own in five years? You can&amp;#039;t will (for example) your&lt;br /&gt;
iTunes collection to a friend, because you don&amp;#039;t own it. Your entire&lt;br /&gt;
iTunes collection is licensed. Who owns your face? If all of your mail&lt;br /&gt;
is stored in GMail, then who owns that?&lt;br /&gt;
&lt;br /&gt;
The most important things are usually uninteresting. The most&lt;br /&gt;
interesting things are usually unimportant.&lt;br /&gt;
&lt;br /&gt;
= Cloudy Weather: How Secure is the Cloud? = &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Dan Stolts&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The speaker&amp;#039;s web site is http://itproguru.com. He also maintains&lt;br /&gt;
http://bostonusergroups.org.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on Microsoft Azure, but many of the issues we&amp;#039;ll&lt;br /&gt;
discuss are common to all cloud providers.&lt;br /&gt;
&lt;br /&gt;
Thinking about putting your data in the cloud? Here are some factors&lt;br /&gt;
to consider:&lt;br /&gt;
&lt;br /&gt;
* Confidentiality. Who can see your data?&lt;br /&gt;
* Integrity. Once you&amp;#039;ve stored data in the cloud, how can you be sure it isn&amp;#039;t changed?&lt;br /&gt;
* Availability&lt;br /&gt;
* Risk management and compliance&lt;br /&gt;
&lt;br /&gt;
Moving data to the cloud involves some customer accountability. For example, you&amp;#039;ll want&lt;br /&gt;
to choose a better password than &amp;quot;password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
In a multi-tenant system, who can read your data? At the cloud provider, who has access&lt;br /&gt;
to your data? There&amp;#039;s inherently some level of trust involved.&lt;br /&gt;
&lt;br /&gt;
Google&amp;#039;s cloud policy: Your data is our data.&lt;br /&gt;
&lt;br /&gt;
Microsoft&amp;#039;s cloud policy: Your data is your data.&lt;br /&gt;
&lt;br /&gt;
Windows Azure complies with SSAE-16, EU-US Safe Harbor, ISO 27001:2005, and several other certification programs. See the Windows Azure Trust Center for more information about Microsoft&amp;#039;s privacy, transparency, and compliance policies.&lt;br /&gt;
&lt;br /&gt;
When you store data with a cloud provider, you need to understand their policies, and you&lt;br /&gt;
need to decide whether (or how much) you trust them.&lt;br /&gt;
&lt;br /&gt;
Security considerations:&lt;br /&gt;
&lt;br /&gt;
* Physical data center security and monitoring&lt;br /&gt;
&lt;br /&gt;
* Network. Firewall and packet filtering. Azure does automatic, on the fly network changes as new systems are spun up. This prevents tenants from accessing each other&amp;#039;s network segments. Tenants should not be able to tweak network security settings.&lt;br /&gt;
&lt;br /&gt;
* Host. Azure dedicates specific cores to specific tenants. This prevents tenants from watching each other&amp;#039;s CPU activity.&lt;br /&gt;
&lt;br /&gt;
* Applications. The issues of trust and policy apply when choosing applications, as much as they apply when choosing cloud providers.&lt;br /&gt;
&lt;br /&gt;
* Data and Database. Store keys and data in different places.&lt;br /&gt;
&lt;br /&gt;
Is the cloud secure? Yes, if&lt;br /&gt;
&lt;br /&gt;
* You trust the cloud provider&amp;#039;s certifications&lt;br /&gt;
&lt;br /&gt;
* You trust your users&lt;br /&gt;
&lt;br /&gt;
* You trust your cryptography implementations&lt;br /&gt;
&lt;br /&gt;
Question: How do the security models differ between Amazon EC2 and Azure?&lt;br /&gt;
&lt;br /&gt;
That&amp;#039;s a long discussion, because there are a lot of differences.&lt;br /&gt;
&lt;br /&gt;
Question: Does Azure&amp;#039;s trust center allow you to store key encryption&lt;br /&gt;
keys in an external service?&lt;br /&gt;
&lt;br /&gt;
I think so, but I&amp;#039;ll have to double-check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Plunder, Pillage, and Print = &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Deral Heiland&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
This talk is about information discovery and extraction from embedded&lt;br /&gt;
devices, such as printers, routers, switches, and power distribution&lt;br /&gt;
units.&lt;br /&gt;
&lt;br /&gt;
Embedded devices are plagued by security issues: default passwords are&lt;br /&gt;
never changed, poor product design, lack of patch management.&lt;br /&gt;
&lt;br /&gt;
What information can you obtain from embedded devices? The most useful&lt;br /&gt;
things are: information about other network hosts, user credentials,&lt;br /&gt;
and SNMP community strings.&lt;br /&gt;
&lt;br /&gt;
See http://foofus.net&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Pen Test Story #1&amp;#039;&amp;#039;&amp;#039;. This story comes from a penetration testing&lt;br /&gt;
engagement. We were trying to obtain A/D credentials from the client&amp;#039;s&lt;br /&gt;
network. The client was very proactive about security, and tried to&lt;br /&gt;
follow best practices. Machines were all running current versions of&lt;br /&gt;
windows, security patches were up to date, and users didn&amp;#039;t have&lt;br /&gt;
administrative access on their local machines.&lt;br /&gt;
&lt;br /&gt;
We found a couple of (Canon) printers that still had default&lt;br /&gt;
passwords. These printers were configured to use the client&amp;#039;s active&lt;br /&gt;
directory server. The printers also had several address books. These&lt;br /&gt;
address books contained domain usernames, and clear-text passwords.&lt;br /&gt;
&lt;br /&gt;
Why does a printer need an LDAP addressbook? Good question.&lt;br /&gt;
&lt;br /&gt;
Canon IR address books store passwords in clear-text. Canon IRadv&lt;br /&gt;
printers encrypt passwords during address book export. However,&lt;br /&gt;
there&amp;#039;s a configuration option to turn off the encryption. Aside from&lt;br /&gt;
a configuration option, you can turn off encryption via HTTP POST. And&lt;br /&gt;
address book export is a response to an HTTP POST to the printer&amp;#039;s&lt;br /&gt;
admin interface. The POST contains a parameter called enc. Changing&lt;br /&gt;
enc=2 to enc=0 gets you clear-text passwords.&lt;br /&gt;
&lt;br /&gt;
Lesson: if you have a multi-function printer, be sure to change the&lt;br /&gt;
default password.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Pen Test Story #2&amp;#039;&amp;#039;&amp;#039;. Our goal is to steal all of the client&amp;#039;s&lt;br /&gt;
Active Directory credentials, and use them to escalate our privileges.&lt;br /&gt;
&lt;br /&gt;
Network file shares are a good place to collect information. Sometimes&lt;br /&gt;
you&amp;#039;ll find backup firewall configurations. Or, if you know the right&lt;br /&gt;
community strings, you can extract configurations via SNMP.&lt;br /&gt;
&lt;br /&gt;
APC devices can be a good way to obtain community strings. The default&lt;br /&gt;
password is apc/apc, and many people forget to change it.&lt;br /&gt;
&lt;br /&gt;
You should use different community strings in different security&lt;br /&gt;
levels. For example, your office firewall and your APC PDU have&lt;br /&gt;
different security levels.&lt;br /&gt;
&lt;br /&gt;
APC devices are in every data center. If you hack into one, you have&lt;br /&gt;
the ability to power down hardware.&lt;br /&gt;
&lt;br /&gt;
Over the last few years of doing security engagements, we&amp;#039;ve found&lt;br /&gt;
that embedded device vulnerabilities have become more common.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Pen Test Story #3&amp;#039;&amp;#039;&amp;#039;. Newer printers have the ability to do LDAP&lt;br /&gt;
authentication. If you can get into one of these printers, set up an&lt;br /&gt;
`evil&amp;#039; LDAP server, and tell the printer that `evil&amp;#039; is its LDAP&lt;br /&gt;
directory. Some printers will send clear-text passwords to&lt;br /&gt;
`evil&amp;#039;. This is called a pass-back attack.&lt;br /&gt;
&lt;br /&gt;
Sharp printers can be configured to use plaintext (LDAP)&lt;br /&gt;
authentication. Unauthenticated users have the ability to make this&lt;br /&gt;
change.&lt;br /&gt;
&lt;br /&gt;
Leasing companies are an attack vector. Companies that lease printers&lt;br /&gt;
also service them.  These companies tend to use the same passwords&lt;br /&gt;
everywhere. If you know a password that works at one site, it will&lt;br /&gt;
probably work at other sites.&lt;br /&gt;
&lt;br /&gt;
At the very least, multi-function printers will give you a list of&lt;br /&gt;
usernames. Once you have this list, start searching through file&lt;br /&gt;
shares. You&amp;#039;d be surprised at how often you&amp;#039;ll find a document with&lt;br /&gt;
passwords.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Praeda&amp;#039;&amp;#039;&amp;#039;. Praeda is an embedded device information harvesting&lt;br /&gt;
tool. See http://github.  com/percx/praeda.&lt;br /&gt;
&lt;br /&gt;
Praeda has profiles for around 72 devices, and we&amp;#039;d welcome&lt;br /&gt;
contributions of new device profiles.&lt;br /&gt;
&lt;br /&gt;
Question: Have you ever tried to get information out of data stored on&lt;br /&gt;
the printer (e.g., the printer&amp;#039;s hard drive).&lt;br /&gt;
&lt;br /&gt;
We haven&amp;#039;t tried. But you can get some interesting things out of&lt;br /&gt;
scanners. Lots of offices provide employees with cheap personal&lt;br /&gt;
scanners, and employees sometimes leave sensitive documents on the&lt;br /&gt;
scanner bed. If you can get into the scanner, you can get a copy of&lt;br /&gt;
whatever&amp;#039;s on the scanner bed.&lt;br /&gt;
&lt;br /&gt;
Most printers take firmware upgrades via the print port (e.g., port&lt;br /&gt;
9300), and none of them verify the integrity of the upgrades. With&lt;br /&gt;
some manufacturers, it&amp;#039;s very easy to embed malware in a printer&lt;br /&gt;
firmware upgrade, and the printer is happy to let you install it.&lt;br /&gt;
&lt;br /&gt;
Every device that plugs into your network has a web interface. That&lt;br /&gt;
should be your first attack vector.&lt;br /&gt;
&lt;br /&gt;
= Security Change Call for Volunteers = &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Oliver Day&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Security Change is a non-profit that does security consulting to&lt;br /&gt;
agents of change. Who are agents of change? They&amp;#039;re the people trying&lt;br /&gt;
to make a difference in the world.&lt;br /&gt;
&lt;br /&gt;
Our web site is http://securingchange.org.&lt;br /&gt;
&lt;br /&gt;
Many non-profits don&amp;#039;t have a security budget. They fall below the&lt;br /&gt;
security poverty line.&lt;br /&gt;
&lt;br /&gt;
Security change uses a &amp;quot;pay what you can&amp;quot; model. We&amp;#039;re trying to lower&lt;br /&gt;
the security poverty line. Many small non-profits have as many&lt;br /&gt;
adversaries as large well-funded organizations.&lt;br /&gt;
&lt;br /&gt;
We need volunteers in order to offer pro-bono security work. For&lt;br /&gt;
example, to run automated vulnerability scans against the non-profit&amp;#039;s&lt;br /&gt;
web site, then sit down with the organization&amp;#039;s director and explain&lt;br /&gt;
the results. We need people to do this kind of work.&lt;br /&gt;
&lt;br /&gt;
In the non-profit space, security issues often require creative&lt;br /&gt;
solutions - not the typical things you&amp;#039;d do in a large&lt;br /&gt;
corporation. For example, a robust backup strategy might be the most&lt;br /&gt;
cost-effective countermeasure.&lt;br /&gt;
&lt;br /&gt;
We also need incident response people (e.g., when an NGO&amp;#039;s web site is&lt;br /&gt;
hacked by an adversary). This is the most common security incident&lt;br /&gt;
that we see.&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;re planning to develop a backup service, inspired by the EFF&amp;#039;s&lt;br /&gt;
mirroring site. In version 1, we&amp;#039;ll make a copy of your web site as&lt;br /&gt;
static HTML pages. Version 2 will be a more thorough backup system.&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;re also thinking about creating a security operations center, and&lt;br /&gt;
offering forensic log analysis.&lt;br /&gt;
&lt;br /&gt;
We started this organization in October 2012, and we have three&lt;br /&gt;
clients so far. The mechanics of becoming a non-profit have taken a&lt;br /&gt;
lot of time.&lt;br /&gt;
&lt;br /&gt;
We have 14 volunteers. We&amp;#039;re asking for minimum commitment of one hour&lt;br /&gt;
per month.&lt;br /&gt;
&lt;br /&gt;
We want to assign two volunteers per client, so they can cover for&lt;br /&gt;
each other.&lt;br /&gt;
&lt;br /&gt;
Question: Are there organizations that you won&amp;#039;t work with?&lt;br /&gt;
&lt;br /&gt;
Yes. Hate-based groups are out. Political groups are tricky. It&lt;br /&gt;
depends on who volunteers do and do not want to work with.&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to volunteer, contact us at&lt;br /&gt;
volunteer@securitychange.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Good Enough Isn&amp;#039;t Anymore: the Value of Hitting Rock Bottom =&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Josh Corman&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
No one changes until the pain of maintaining inertia is greater than&lt;br /&gt;
the pain of changing.&lt;br /&gt;
&lt;br /&gt;
We spend a lot of money on signature-based anti-virus products, and&lt;br /&gt;
those are becoming less and less effective.&lt;br /&gt;
&lt;br /&gt;
State-sponsored espionage is very common to those in the security&lt;br /&gt;
world.&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;re getting better, but we&amp;#039;re getting worse faster.&lt;br /&gt;
&lt;br /&gt;
Burnout is becoming more and more common in the infosec world. The&lt;br /&gt;
Maslock stress index measures fatigue, cynicism, and perceived&lt;br /&gt;
self-efficacy. Infosec people are off the charts in the first two&lt;br /&gt;
categories.&lt;br /&gt;
&lt;br /&gt;
When protecting assets, it&amp;#039;s important to consider replaceability&lt;br /&gt;
(i.e., how easily can the asset be replaced). Credit cards are highly&lt;br /&gt;
replaceable, yet we spend a ton of effort protecting them.&lt;br /&gt;
&lt;br /&gt;
Our dependence on software and IT is growing faster than our ability&lt;br /&gt;
to secure it. For example, the first SQL injection attacks appeared 14&lt;br /&gt;
years ago. SQL injection attacks are still a problem today.&lt;br /&gt;
&lt;br /&gt;
A lot of embedded devices are directly connected to the internet, and&lt;br /&gt;
completely unsecured.&lt;br /&gt;
&lt;br /&gt;
Today, we have cars with vulnerable, unpatchable, operating systems.&lt;br /&gt;
&lt;br /&gt;
Try this exercise for 24 hours: when talking, replace the word&lt;br /&gt;
&amp;quot;software&amp;quot; with &amp;quot;vulnerability&amp;quot;, and replace &amp;quot;connected&amp;quot; with&lt;br /&gt;
&amp;quot;exposed&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Vendors don&amp;#039;t need to be ahead of security threats. They just need to&lt;br /&gt;
be ahead of the buyers.&lt;br /&gt;
&lt;br /&gt;
HD Moore&amp;#039;s law: the power of a script kiddie doubles every day.&lt;br /&gt;
&lt;br /&gt;
When doing vulnerability assessments, the adversary makes all the&lt;br /&gt;
difference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= The Future of Drones and the Impact on Infosec = &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Andrew Clare&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
We tend to think of drones as being for military use. In the next few&lt;br /&gt;
years, expect to see more non-military uses. For example, searching&lt;br /&gt;
for lost people (search and rescue), crop dusting, tracking weather,&lt;br /&gt;
finding poachers, cleanup of nuclear disasters, journalism, and&lt;br /&gt;
wildlife studies.&lt;br /&gt;
&lt;br /&gt;
halab.mit.edu: human and automation labs.&lt;br /&gt;
&lt;br /&gt;
Some research focuses on making it easier to humans to control&lt;br /&gt;
unmanned vehicles. We&amp;#039;re enhancing vehicle autonomy, but we&amp;#039;re also&lt;br /&gt;
increasing vulnerability.&lt;br /&gt;
&lt;br /&gt;
There&amp;#039;s research in operating UAVs in GPS-denied environments. For&lt;br /&gt;
example, drones that can fly inside underground parking garages. The&lt;br /&gt;
drone has to learn its way around. There&amp;#039;s also research in&lt;br /&gt;
miniaturization: flying drones that are the size of a quarter.&lt;br /&gt;
&lt;br /&gt;
An expected time line for non-military UAV deployment:&lt;br /&gt;
&lt;br /&gt;
* Within 5 years: agriculture, low altitude photography&lt;br /&gt;
* 5-7 years: Self-driving cars and passenger trains.&lt;br /&gt;
* 10+ years: cargo delivery&lt;br /&gt;
* 20+ years: unmanned commercial flights, personal flying cars.&lt;br /&gt;
&lt;br /&gt;
Certification is a challenge. How do you certify complex automation&lt;br /&gt;
systems?  Who&amp;#039;s ultimately responsible for what UAVs do? The operator?&lt;br /&gt;
The computer? The company that developed the UAV? The engineer(s) that&lt;br /&gt;
wrote the UAV software?&lt;br /&gt;
&lt;br /&gt;
Infosec issues affecting UAVs:&lt;br /&gt;
&lt;br /&gt;
* GPS spoofing&lt;br /&gt;
* Hacking control links&lt;br /&gt;
* Supply chain security (who made the parts that were used to build the UAV?)&lt;br /&gt;
* Interaction between unmanned vehicles&lt;br /&gt;
* Relying on automation systems before we have the ability to secure them&lt;br /&gt;
&lt;br /&gt;
Question: Are the precedents for UAVs technology systems?&lt;br /&gt;
&lt;br /&gt;
Fly-by-wire might be a predecessor, but it&amp;#039;s not quite the&lt;br /&gt;
same. Fly-by-wire operates on a closed system. UAVs are exposed on&lt;br /&gt;
standard networks.&lt;br /&gt;
&lt;br /&gt;
Question: What about regulation?&lt;br /&gt;
&lt;br /&gt;
The FAA is required to attempt to integrate UAV regulation by&lt;br /&gt;
2014. Some local communities are passing their own laws.  As the&lt;br /&gt;
technology becomes more popular, anti-UAV measures will probably&lt;br /&gt;
become more widespread.&lt;br /&gt;
&lt;br /&gt;
Question: What about other governments?&lt;br /&gt;
&lt;br /&gt;
Many other countries are ahead of us in UAV implementation. For example, Canada, Japan,&lt;br /&gt;
Russia, India, and the United Kingdom.&lt;br /&gt;
&lt;br /&gt;
Comment: Cost savings was a huge motivation for the military use of UAVs. Keeping&lt;br /&gt;
people out of risky situations was another motivation.&lt;br /&gt;
&lt;br /&gt;
UAVs can be used to analyze networks. For example, by reading electromagnetic energy&lt;br /&gt;
emissions from wires.&lt;br /&gt;
There&amp;#039;s a conflict of interest in UAV security. Security costs money, which goes against the&lt;br /&gt;
goal of making low-cost UAVs.&lt;br /&gt;
&lt;br /&gt;
Question: Why has there been more adoption outside the US than inside the US?&lt;br /&gt;
&lt;br /&gt;
Regulatory factors are the biggest reason. We also have a more complex airspace inside the&lt;br /&gt;
United States. Our military has done more work than other countries, but the military can&lt;br /&gt;
control the airspace.&lt;br /&gt;
&lt;br /&gt;
Comment: The NTHSB has asked for money to research vulnerabilities in automotive&lt;br /&gt;
computers. A lot of technology is feature-driven, without being secure.&lt;br /&gt;
&lt;br /&gt;
Three states allow autonomous vehicle testing. Some people jam the GPS systems in their&lt;br /&gt;
cars. This would be a major problem for precision GPS systems in self-driving vehicles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= The State of Privacy and Proper Planning for the Future = &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Jeff Northrop&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
In 1890, Judge Louis Brandeis published one of the first articles&lt;br /&gt;
about the loss of privacy to technology. Camera were the technology in&lt;br /&gt;
question. Similar arguments were made with the advent of audio and&lt;br /&gt;
video recording.&lt;br /&gt;
&lt;br /&gt;
In 1967, Alan Westin wrote about the risks of privacy loss due to&lt;br /&gt;
computers. He saw loss of privacy coming from data correlation. He&lt;br /&gt;
also helped push forward the Privacy Act of 1974. In 1974, the main&lt;br /&gt;
fear involved what the government would do with your personal data.&lt;br /&gt;
&lt;br /&gt;
In 1998, we saw passage of the EU Data Directive. It&amp;#039;s a set of&lt;br /&gt;
suggested regulations that gives citizens a lot of control over their&lt;br /&gt;
own data.&lt;br /&gt;
&lt;br /&gt;
Forrester research produces a heat map of privacy laws. Europe is&lt;br /&gt;
hot. The US is cold, on par with Russia, and only slightly warmer than&lt;br /&gt;
China.&lt;br /&gt;
&lt;br /&gt;
Today, we have a menagerie of privacy laws, both at the federal and&lt;br /&gt;
state level. There are 25 congressional bills on the internet. Nearly&lt;br /&gt;
all of them have some privacy component.&lt;br /&gt;
&lt;br /&gt;
Question: How difficult is compliance with EU regulations?&lt;br /&gt;
&lt;br /&gt;
It&amp;#039;s an entirely different creature. The EU Data Directive was a&lt;br /&gt;
framework, rather than a set of regulations.&lt;br /&gt;
&lt;br /&gt;
Security and privacy does not equal compliance. For example, there&amp;#039;s a&lt;br /&gt;
social mobile app called Path. Path was mining data from mobile phone&lt;br /&gt;
address books. The FTC issued a judgment against them, and Path has to&lt;br /&gt;
undergo 20 years of regular privacy audits. Google Street view was&lt;br /&gt;
fined $7 million, and required to do public education on security and&lt;br /&gt;
privacy. Neither Path nor Google overtly broke any law, but they&lt;br /&gt;
violated general expectations of privacy.&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;ve had advances in data analytics, and consumers feel they are&lt;br /&gt;
losing control of the personal information. This is a source of&lt;br /&gt;
tension, and there&amp;#039;s no solution yet.&lt;br /&gt;
&lt;br /&gt;
We share personal information in a lot of ways: phones, shopping&lt;br /&gt;
cards, EZ passes. The primary uses of data are okay. Secondary and&lt;br /&gt;
tertiary uses are the problem.&lt;br /&gt;
&lt;br /&gt;
Comment: I think people are not paying attention to what they&amp;#039;re&lt;br /&gt;
doing, in terms of EULAs, etc.&lt;br /&gt;
&lt;br /&gt;
Facebook actually gives you a fair amount of control, but not everyone&lt;br /&gt;
takes advantages of those controls.&lt;br /&gt;
&lt;br /&gt;
Question: How many people here read privacy policies?&lt;br /&gt;
&lt;br /&gt;
Around 5 of 25 people raise their hands.&lt;br /&gt;
&lt;br /&gt;
Comment: A key challenge with privacy policies is keeping track of&lt;br /&gt;
third parties that you&amp;#039;ve shared data with, and being able to retract&lt;br /&gt;
data from those third parties.&lt;br /&gt;
&lt;br /&gt;
NIST 800-53 covers information security and privacy controls for&lt;br /&gt;
government agencies.  That might be relevant here.&lt;br /&gt;
&lt;br /&gt;
On one hand, consumers fear the proliferation of their PI. On the&lt;br /&gt;
other hand, technology makes it easier to store data, and to do&lt;br /&gt;
analytics. PII is the fuel that makes analytics run.  Reducing fear&lt;br /&gt;
and allowing innovation to move forward is a major challenge.&lt;br /&gt;
&lt;br /&gt;
To get privacy right, we need transparency and accountability.&lt;br /&gt;
&lt;br /&gt;
What does a privacy program entail? Typically a Chief Privacy officer,&lt;br /&gt;
a team, and a vision. Internal privacy teams are focused on risk&lt;br /&gt;
management. This is a form of security management. Set your metrics,&lt;br /&gt;
and measure how well you&amp;#039;re doing.&lt;br /&gt;
&lt;br /&gt;
Cyber insurance is useful. It can help you cover the cost of a data&lt;br /&gt;
breach. You should have plans for resolving data and privacy breaches.&lt;br /&gt;
&lt;br /&gt;
Question: Is the advancement of privacy complicated by customer&lt;br /&gt;
misconceptions?&lt;br /&gt;
&lt;br /&gt;
Meaningful transparency is the hardest part, and the most important&lt;br /&gt;
part.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= The Noob Persistent Threat = &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Allison Nixon and Brandon Levene&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
:Some people just need a high-five. In the face. With a chair.&lt;br /&gt;
&lt;br /&gt;
What is the Noob persistent threat? It&amp;#039;s usually script&lt;br /&gt;
kiddies. They&amp;#039;re 14-18 years old, and the bottom feeders in the&lt;br /&gt;
criminal landscape. They generally have a low level of technology&lt;br /&gt;
skills.&lt;br /&gt;
&lt;br /&gt;
There are web sites that sell DDoS services. Others will sell&lt;br /&gt;
credentials, or root kits. Many of these are just scams.&lt;br /&gt;
&lt;br /&gt;
Carder shops are market places to buy credit card numbers. Type&lt;br /&gt;
&amp;quot;Credit Card CCV&amp;quot; in your favorite search engine, and see what comes&lt;br /&gt;
up.&lt;br /&gt;
&lt;br /&gt;
Booter shells are DDoS for hire sites. They&amp;#039;re often used to target&lt;br /&gt;
gaming web sites, or whatever your average 15 year old wants to get&lt;br /&gt;
back at. Some booter shells use IaaS servers to amplify DDoS&lt;br /&gt;
attacks. Oddly, nearly all booter shell sites accept payment via&lt;br /&gt;
paypal. 70% of booter shells run on cloudflare.&lt;br /&gt;
&lt;br /&gt;
It&amp;#039;s not unusual for noobs to use booter shell sites to attack other&lt;br /&gt;
booter shell sites.  Question: can booter shells be used to attack&lt;br /&gt;
smartphones?&lt;br /&gt;
&lt;br /&gt;
Theoretically, yes. Practically, no.&lt;br /&gt;
&lt;br /&gt;
See http://bit.ly/12iqEn1 for source code to one booter shell site.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Blucat: Netcat for Bluetooth = &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Joseph Cohen&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The Blucat project was inspired by netcat.&lt;br /&gt;
&lt;br /&gt;
Bluetooth URLs contain a protocol, a bluetooth address (which looks&lt;br /&gt;
like a MAC address), and a channel number.&lt;br /&gt;
&lt;br /&gt;
rfcomm is the most common protocol. b4spp, the bluetooth serial port&lt;br /&gt;
protocol, is also common.&lt;br /&gt;
&lt;br /&gt;
When probing, the first step is network discovery: what devices are in&lt;br /&gt;
range, and what services are they advertising?&lt;br /&gt;
&lt;br /&gt;
Once you discover a bluetooth address, you can scan the device&amp;#039;s list&lt;br /&gt;
of channels (there are around 30 of them). The device might offer&lt;br /&gt;
services that it&amp;#039;s not advertising.&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;ve found that some mobile phones accept AT commands over bluetooth.&lt;br /&gt;
&lt;br /&gt;
Blucat is java based. It uses a popular bluetooth stack, and it&amp;#039;s&lt;br /&gt;
compatible with many devices.&lt;br /&gt;
&lt;br /&gt;
Linux has a bluetooth stack called bluez.&lt;br /&gt;
&lt;br /&gt;
Once you&amp;#039;ve paired an android phone, it&amp;#039;s very easy to get a root&lt;br /&gt;
shell over bluetooth. The lesson here: be very careful about what you&lt;br /&gt;
pair with.&lt;br /&gt;
&lt;br /&gt;
In cars, bluetooth connections are usually protected by trivial&lt;br /&gt;
passwords, like &amp;quot;1111&amp;quot;.&lt;/div&gt;</summary>
		<author><name>SteveR</name></author>
	</entry>
</feed>