44con 2104 - lessons learned from black hat's infrastructure, conan dooley

34
Lessons Learned: Black Hat’s Infrastructure THE TWEETS MUST FLOW September 11, 2014

Upload: 44con

Post on 29-Nov-2014

166 views

Category:

Technology


1 download

DESCRIPTION

44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley Let’s take a quick trip across the sea to the halls of Black Hat. What made the training network tick? How was it created, who was attacking the network, and how was it defended? How do you keep the wired training network up and reliable when you have nearly two thousand people hammering on it? What tricks kept the wireless running for all those tweets?

TRANSCRIPT

Page 1: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

Lessons Learned:Black Hat’s InfrastructureTHE TWEETS MUST FLOW

September 11, 2014

Page 2: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

25,000 DNS PACKETSIN 4 SECONDS BY ONE CLASSROOM

Page 3: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

3

Then: Technical Engineer & Volunteer Director @ Black Hat

Now: Security Analyst @ Bishop Fox

Twitter: @conandooley

HOW DID I GET HERE?

Who am I?

Page 4: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

4

Introduction

Black Hat • Good to talk at; also good to talk about!

Entertain• I have some stories

Lessons Learned• There were some great security lessons learned

Going Meta• Experience at Black Hat as it relates to the problems I see

in security

LET’S TALK ABOUT YOU AND ME

Page 5: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

5

Owning Things

• Black Hat is owned by UBM

Technical Staff

• Usually one person, supporting everything

• Sometimes two – those were the good days

Security Basics

• Segment everything

• Redundancy

• Keep it simple

24/7/365 ON CALL

Supporting Infrastructure

Page 6: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

6

This cloud is dark because of all the black hats

Firewalls in High Availability Mode

Switches with lots of VLANs

It’s BSD and virtualized BSD all the way down

PRETTY PICTURES

Supporting Infrastructure

Page 7: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

EVENTSUSA! USA! USA! USA! (OH, AND EUROPE, AND ABU DHABI, AND…)

Page 8: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

8

Volunteers

• Approximately 75 people willing to work insane hours

• Wouldn’t be possible without them

Attendees

• Nearly 10,000 attendees: Elevate tweets, not privileges

Trainings

• 1500 Wired Students: Ready to chew gum and pop shells

Presenters

• Yes, my live demo requires Internet!

HACKIN’ AROUND THE WORLD, BUT MOSTLY IN THE DESERT

Overview

Page 9: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

9

Assumptions made about Black Hat’s on-site network:

• It’s stacked deep with 0days! • Second most hostile network in the world …

Security must be the top priority at Black Hat!

SOME SAY…

Black Hat’s Event Network

Page 10: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

LOL (FIND PICTURE)

Page 11: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

11

Why would a media company care about security?

• None of their other events need security!

Security Priorities the Business Cares About

• Don’t get the registration database owned

• Protect the CFP platform

• Avoid Brand Damage

• That’s it, right?

The Reality of it All

Page 12: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

12

Linksys Routers

• Every classroom, blessed with their own tiny blue protector

Switches

• 10/100 is all any honest network needs

Artisanal, Bespoke Cables

• Handmade with love

• Welcome Volunteer, here’s a roll of cable, some ends, and a punch down tool!

LITTLE BOXES MADE OF TICKY TACKY

Blue Boxes

Page 13: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

THE ENTIRE WORLD IS FIRE (FIND PICTURE)

Page 14: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

THANKFULLY, I WASN’T AROUND THENBUT I DID HELP FIX IT…

Page 15: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

15

STILL KEEPING IT SIMPLE

Keep Calm and Segment Your Network

SOHO? More like SO NO

• Replaced Linksys boxes with Soekris 6501

OpenBSD

• Reliable

• Simple

• Does nothing (except what you tell it to)

Quality of Service

• PF and ALTQ

Page 16: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

16

Classrooms

Soekris 6501 per Classroom

Hotel Switches

…Gateway laptop?

PRETTY PICTURES, A CAVEMAN COULD DO IT EDITION

Design

Page 17: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

17

LIKE FISHER PRICE, BUT WITH MORE USB ADAPTERS

Baby’s First NOC

Laptop Gateway

• Quad Core

• Battery Backup

• Plenty of USB Ports…good for 10/100 USB adapters

Physical Setup

• Cardboard Walls

• Power Strip

• Table

• Sometimes the lock would jam – impossible to pick

Page 18: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

THREAT MAUDLINSHOULD HAVE BEEN MORE OPTIMISTIC

Page 19: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

19

Nope.

Definitely not.

Strict no ski mask policy.

Block them all.

SHOW ME YOUR HACKING HAT

External Attackers

Page 20: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

20

No mask policy: still good

Everyone’s gottalive somewhere…

100% successful defense through intimidation and/or yelling

BEWARE OF PEOPLE WEARING MASKS OF THEIR OWN FACE

Internal Attackers

Page 21: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

21

FORMALIZE!

A Simple Threat Model and Mitigations

External Attackers

• Blocked

Bad Students

• Limited to their classrooms or the Internet

Bad Attendees

• Could be jerks on the wireless – accepted risk

• No access to physical networks without breaking something

Other Network Attackers

• Press – VLANs and isolation plus warnings

• Staff – Access controlled

• Registration – Access controlled

Page 22: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

22

BACK TO BASICS

Controlled Hostility

Monitor

• Know where you’re down

• Helps you yell at the right people

Wireless

• Auto-smoosh rogue APs

• Pineapple the world

• Pineapple: Spoof networks wireless devices have connected to previously

• No one cares as long as the Internet works

Page 23: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

BLACK HAT: HACKERS BEHAVING NICELY

Page 24: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

GOOD DESIGNCOULDN’T TELL YOU WHAT IT IS, BUT I KNOW IT WHEN I SEE IT

Page 25: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

25

Principals

• Keep it Simple – Yes. Still.

• Know your networks –Drop everything that doesn’t belong

• Segment – Put like with like

• Control Physical Access –No USB access, no random drops

• Repeatable – Automate everything you can

Implementation

• No Services – Exposed as little as possible

• Dropped it, it was hot –94% traffic dropped at the gateway

• Smart Segments – Break it for your class, they’ll yell at you for me

• Protect your ports –Ethernet, USB

• YERP

STILL NOT TIRED OF KEEPING IT SIMPLE

Design Goals

Page 26: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

26

• Simple Tool – Everyone’s reinvented this wheel, but YOLO

• Pushes Preset Configurations – You knew what you wanted, right?

• Brain Dead Operation – No sleep is standard, and you don’t want to screw it up in front of everyone

WELL, MOSTLY

YERP: YERP, Everything Runs Perfectly

Page 27: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

27

Use it:

clone git repo

fab yerp.deploy_config:config=<config file location> -H <targets>

http://github.com/conandooley/yerp

HOW DID I GET HERE, I AM NOT GOOD WITH COMPUTERS

YERP: YERP, Everything Runs Perfectly

Page 28: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

28

People are generally pretty good

Designed to be secure or non-functional

Technical failures had a far more significant impact

Biggest technical problem? State table exhaustion

OUTCOMES ARE IMPORTANT

End Results

Page 29: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

ENOUGH ABOUT BLACK HATWE’RE GOING META

Page 30: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

30

Security is never a priority – Let’s learn to live with that.

Training failed, people demanded refunds – Had to happen to be taken seriously. Why?

That jammed lock – Who would actually be stopped by that?

You’ve got advantages – What are they? Wear them out.

You own this – Know what lives on your network and verify.

They only care about the business – So learn enough to show the concerns via business cases

WELL, I WROTE THEM DOWN FOR YOU

Remember Those Things I Said to Remember?

Page 31: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

31

• Listen to your Users – There are many ways to give them what they want, find the secure ways

• Understand What They Need – If you know what they want, chances are there is a way to do it securely

• Create Secure Defaults – Make security choices for them when you can

• Educate – When you do have to make life more difficult, explain why

• Link security to outcomes – Define consequences, show how they happen

• Prioritize – Let’s figure out what makes a difference, and work on that first

ONE SIZE NEVER FITS ALL

Build Security Into Operations

Page 32: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

32

• Get out of the comfort zone – We’ve made some impact over the years but nowhere near enough

• Learn to Market Ourselves – We’re struggling with effective communication, we need to fix that

• Define Language – What does “breach” really mean?

• Common knowledge is flawed – The common solution is quick, easy, and almost always wrong

• Let’s make friends everywhere – More different, unique people caring about security is great

• Impact and outcomes – An honest conversation needs to happen

NOW WE ARE ALL SPACE CADETS

Going More Meta Again

Page 33: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

QUESTIONS?

Page 34: 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

Thank You!