pushing in, leaving a present, and pulling out slowly without anyone noticing

110
Iftach Ian Amit | September 2011 www.security-art.com All rights reserved to Security Art ltd. 2002-2011 Pushing in, leaving a present and pulling out without anybody noticing Iftach Ian Amit VP Consulting DC9723 CSA-IL Board member IL-CERT Visionary Tuesday, September 20, 11

Upload: iftach-ian-amit

Post on 15-Jan-2015

2.709 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 2: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

whoami

• Not certified

• VP Consulting at Security-Art

• Hacker, researcher, developer

• I like crime, and war :-)

• DC9723, PTES, IL-CERT, IAF

2

Tuesday, September 20, 11

Page 3: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Agenda

3

Tuesday, September 20, 11

Page 4: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Agenda

3

Tuesday, September 20, 11

Page 5: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Agenda

3

Tuesday, September 20, 11

Page 6: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Agenda

3

Tuesday, September 20, 11

Page 7: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

1. Infiltration

• Technical factors

• Human factors

• Command & Control in loosely connected environments

4

Tuesday, September 20, 11

Page 8: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical

5

Tuesday, September 20, 11

Page 9: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical• Exploits! of what???

5

Tuesday, September 20, 11

Page 10: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical• Exploits! of what???

• Web, FTP, mail, SSL-VPN...

5

Tuesday, September 20, 11

Page 11: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical• Exploits! of what???

• Web, FTP, mail, SSL-VPN...

• Will only get you the basic stuff

5

Tuesday, September 20, 11

Page 12: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical• Exploits! of what???

• Web, FTP, mail, SSL-VPN...

• Will only get you the basic stuff

• 3rd party tools used (LinkedIn, SalesForce, SaaS applications)...

5

Tuesday, September 20, 11

Page 13: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical• Exploits! of what???

• Web, FTP, mail, SSL-VPN...

• Will only get you the basic stuff

• 3rd party tools used (LinkedIn, SalesForce, SaaS applications)...

• Harder to get *although nice to have as reproducible on many targets

5

Tuesday, September 20, 11

Page 14: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical

The problem:

Small attack surface

6

Tuesday, September 20, 11

Page 15: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical

7

Tuesday, September 20, 11

Page 16: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical• How about them windows?

7

Tuesday, September 20, 11

Page 17: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical• How about them windows?

• Win XP still the dominantly deployed OS on clients (both in corporate and government settings)

7

Tuesday, September 20, 11

Page 18: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical• How about them windows?

• Win XP still the dominantly deployed OS on clients (both in corporate and government settings)

• Win 7 is no big deal

7

Tuesday, September 20, 11

Page 19: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical• How about them windows?

• Win XP still the dominantly deployed OS on clients (both in corporate and government settings)

• Win 7 is no big deal

7

Tuesday, September 20, 11

Page 20: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Technical• How about them windows?

• Win XP still the dominantly deployed OS on clients (both in corporate and government settings)

• Win 7 is no big deal

• Attack surface is much broader (spell Adobe, Symantec, WinZip, AOL, Mozilla, etc...)

7

Tuesday, September 20, 11

Page 21: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

8

Tuesday, September 20, 11

Page 22: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human• Not as in “I got your guy and I want

$1,000,000 to set him free”

8

Tuesday, September 20, 11

Page 23: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human• Not as in “I got your guy and I want

$1,000,000 to set him free”

• More like “dude, check out the pics from the conference we went to last month. Wicked!”

8

Tuesday, September 20, 11

Page 24: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human• Not as in “I got your guy and I want

$1,000,000 to set him free”

• More like “dude, check out the pics from the conference we went to last month. Wicked!”

• “did you get my memo with the new price-list <link to .xls file>”

8

Tuesday, September 20, 11

Page 25: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human• Not as in “I got your guy and I want

$1,000,000 to set him free”

• More like “dude, check out the pics from the conference we went to last month. Wicked!”

• “did you get my memo with the new price-list <link to .xls file>”

• You get the idea...

8

Tuesday, September 20, 11

Page 26: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011

Infiltration - Human

9

Tuesday, September 20, 11

Page 27: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011

Infiltration - Human

9

Tuesday, September 20, 11

Page 28: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011

Infiltration - Human

9

Tuesday, September 20, 11

Page 29: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

10

Tuesday, September 20, 11

Page 30: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

10

• eMails, web links, phishing...

Tuesday, September 20, 11

Page 31: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

10

• eMails, web links, phishing...

• Works like a charm!

Tuesday, September 20, 11

Page 32: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

10

• eMails, web links, phishing...

• Works like a charm!

• And can be mostly automated

Tuesday, September 20, 11

Page 33: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

10

• eMails, web links, phishing...

• Works like a charm!

• And can be mostly automated

• SET to the rescue

Tuesday, September 20, 11

Page 34: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

10

• eMails, web links, phishing...

• Works like a charm!

• And can be mostly automated

• SET to the rescue

Tuesday, September 20, 11

Page 35: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

11

And... being nice/nasty/obnoxious/needy always helps!

Tuesday, September 20, 11

Page 36: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

11

And... being nice/nasty/obnoxious/needy always helps!

Tuesday, September 20, 11

Page 37: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

11

And... being nice/nasty/obnoxious/needy always helps!

Tuesday, September 20, 11

Page 38: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

11

And... being nice/nasty/obnoxious/needy always helps!

Tuesday, September 20, 11

Page 39: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Infiltration - Human

11

And... being nice/nasty/obnoxious/needy always helps!

Tuesday, September 20, 11

Page 40: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

2. Data Targeting & Acquisition

• Weaponizing commercial tools

• Creating “APT” capabilities

• But first - targeting...

12

Tuesday, September 20, 11

Page 41: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Step 1: Basic IntelWhat is the target “willing” to tell about itself?

13

Tuesday, September 20, 11

Page 42: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Step 1: Basic IntelWhat is the target “willing” to tell about itself?

13

Tuesday, September 20, 11

Page 43: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Tuesday, September 20, 11

Page 44: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Tuesday, September 20, 11

Page 45: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Tuesday, September 20, 11

Page 46: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Tuesday, September 20, 11

Page 47: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011 15

Tuesday, September 20, 11

Page 48: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011 15

Tuesday, September 20, 11

Page 49: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Select your target wisely

And then craft your payload :-)

16

Tuesday, September 20, 11

Page 50: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Not as expensive as you think

• ZeuS: $3000-$5000

• SpyEye: $2500-$4000

• Limbo: $500-$1500

17

Tuesday, September 20, 11

Page 51: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Not as expensive as you think

• ZeuS: $3000-$5000

• SpyEye: $2500-$4000

• Limbo: $500-$1500

17

Tuesday, September 20, 11

Page 52: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Not as expensive as you think

• ZeuS: $3000-$5000

• SpyEye: $2500-$4000

• Limbo: $500-$1500

17

Tuesday, September 20, 11

Page 53: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Not as expensive as you think

• ZeuS: $3000-$5000

• SpyEye: $2500-$4000

• Limbo: $500-$1500

17

FREE!

Tuesday, September 20, 11

Page 54: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Just make sure to pack

18

Experienced travelers know the importance of packing properly

Tuesday, September 20, 11

Page 55: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Just make sure to pack

18

Experienced travelers know the importance of packing properly

Tuesday, September 20, 11

Page 56: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

And set measurable goals

• File servers

• Databases

• File types

• Gateways (routes)

• Printers

19

Tuesday, September 20, 11

Page 57: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

From mass infection to APT

20

Mass infection:5-6 days before

detection

APT:5-6 months before

detection

Tuesday, September 20, 11

Page 58: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

From mass infection to APT

20

Mass infection:5-6 days before

detection

APT:5-6 months before

detection

Tuesday, September 20, 11

Page 59: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

From mass infection to APT

20

Mass infection:5-6 days before

detection

APT:5-6 months before

detection

Frequent updates No* updates* Almost

Tuesday, September 20, 11

Page 60: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

From mass infection to APT

21

PATIENCEMass infection:5-6 days before

detection

APT:5-6 months before

detection

Frequent updates No* updates* Almost

Tuesday, September 20, 11

Page 61: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Internet

Control?• What happens when you

are so far behind?

• Just use your friends (peers)

• Expect a one-way command scheme.

• Exfiltration is a different animal...

22

3rd partyYou!

Target

Tuesday, September 20, 11

Page 62: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Internet

Control?• What happens when you

are so far behind?

• Just use your friends (peers)

• Expect a one-way command scheme.

• Exfiltration is a different animal...

22

3rd partyYou!

Target

Tuesday, September 20, 11

Page 63: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Internet

Control?• What happens when you

are so far behind?

• Just use your friends (peers)

• Expect a one-way command scheme.

• Exfiltration is a different animal...

22

3rd partyYou!

Target

Tuesday, September 20, 11

Page 64: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Internet

Control?• What happens when you

are so far behind?

• Just use your friends (peers)

• Expect a one-way command scheme.

• Exfiltration is a different animal...

22

3rd partyYou!

Target

Tuesday, September 20, 11

Page 65: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Internet

Control?• What happens when you

are so far behind?

• Just use your friends (peers)

• Expect a one-way command scheme.

• Exfiltration is a different animal...

22

3rd partyYou!

Target

Tuesday, September 20, 11

Page 66: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Internet

Control?• What happens when you

are so far behind?

• Just use your friends (peers)

• Expect a one-way command scheme.

• Exfiltration is a different animal...

22

3rd partyYou!

Target

Tuesday, September 20, 11

Page 67: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Internet

Control?• What happens when you

are so far behind?

• Just use your friends (peers)

• Expect a one-way command scheme.

• Exfiltration is a different animal...

22

3rd partyYou!

Target

Tuesday, September 20, 11

Page 68: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

3. Exfiltration

• Avoiding DLP

• Avoiding IPS/IDS egress filters

• Encryption

• Archiving

• Additional techniques

23

Tuesday, September 20, 11

Page 69: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

24

Tuesday, September 20, 11

Page 70: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

24

Tuesday, September 20, 11

Page 71: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

How about them SSLs?

• Cool.

• Although sometimes may be intercepted

• Pesky content filters...

25

Tuesday, September 20, 11

Page 72: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

So...

26

-----BEGIN PGP MESSAGE-----Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

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jN3t-----END PGP MESSAGE-----

Tuesday, September 20, 11

Page 73: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Still “too detectable”

27

Tuesday, September 20, 11

Page 74: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Still “too detectable”

27

hQMOA1jQIm6UkL4eEAv/W3r/eYLUmqRNi/Jegt72lK6qdBiBfkg9PZ5YKql9CUZpFGnVk029K3gEVcrA4k7w2aOtP7tYKRF8v4yrZQ9GZ7eXzR7+Tbf1g+7dveH6U8BfBHo8LRovj5OlGghrvpyKYRPIf/NAgzL2G8dyi/FVB0YB4J7/4x0YFEalQHaLiKyt/gkikyV92njPJ6tPm2sdKUqUHSb20r9AdowZ0VVRrWwdRgUhdNXajjwcbH1BjVuSGilw8MnmQkmJAT+TAFkTqC9fjiwtnNMNANJbo2Z36RqsAcKbhVh1eMA7ev0pUakpTm4xN64syk/1DEc0VHFbanAreTV3tCbUUIoPQDFGFpiu3oS6/089oUvRtBBbC5p6leYKEnDllcGWAomRSiYBFWjTca/DIw43QIW/lmdBnwcWLuQmDCmwr3HuhEaOmqfOhdgaxM4GuVdJCDdwXzwpuaPElCd18weH2XNzudLdeRKN+wjl/4D6bIo+038BcLeiSyhWrMFB7mKSmEzQufQUDACFamtMCn9YOo3mgo+YYk505qhIDLNwZXqyVUqOHvIGvu7gzuNwUdY5idLqsGEs0K0xVwYntTKUh61tNS/HDfNTVm4Y3p8M88JHhcg7npY5gJuhWuHkgp2CTsQT+gRjthm3l3AlnIvAfuC5uWLMsjA4sCw2FRDOARxrN9El8maX/vCxN9aB3dK4S9MSGJ5HhaYpTfpc9CdFkFryzb2sFWfW85nSzNo7dVFCy0jmSr19o4Jsfj0J0izS3MeGYYz5NSsfBz+6o/IYURL3OXrm4DuJNHY0DvVbYqSQRRx3o2S+uZekwXwYsqpei/f/sYo875p5NeX3g62zgjy2Vly+n58WaZWoHb5Y0QCxNfpjdcAQ3tuZQaUvlqrkQeSRxKXD7pxlHdwHDgfvw01RU8NsMkfsBoTZY27BjFvIg5S/pv9O6IznXaJu9jRWDj6tvSypx8X2iiVgtSHYahlqEUH1RusAMCILkx0DydCvUud/qRbTYcnkVVgA8ojeDoVpp3AabRrSmgEAOwW6M0KvnSuMKniLIKe7kolqGjEuLAx7s5KgmMHfNki5dYWvQzHv03ID9UG+uW6o54BnsajEVe2EcYTPT+8pg2bCxnMElK0ds9Isqvf2Kx4kqO0qMeJG1II2zfAFqmMiTMtgA2CZ0Y42hA/bQK/CCM8QVo9JcGn3Jf6N0X1TVob7xDo/fkRROHv74dIh2Kxa0SH8iGdb4kI==jN3t

Tuesday, September 20, 11

Page 75: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Much better• Throws in some additional encodings

• And an XOR for old time’s sake

• And we are good to go...

• 0% detection rate

28

Tuesday, September 20, 11

Page 76: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011 29

Resistance is futile

Tuesday, September 20, 11

Page 77: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

But you have no network

• They killed 80, 443, 53 and cut the cable to the interwebs!

• Go old-school!

30

Tuesday, September 20, 11

Page 78: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Kill some trees

31

Tuesday, September 20, 11

Page 79: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

To shred or not to shred?

32

Tuesday, September 20, 11

Page 80: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

To shred or not to shred?

32

Tuesday, September 20, 11

Page 81: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011

Yeah, good ol’e DD...

33

Tuesday, September 20, 11

Page 82: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone Home

Tuesday, September 20, 11

Page 83: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP?

Tuesday, September 20, 11

Page 84: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP? Excellent!

Tuesday, September 20, 11

Page 85: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP? Excellent!

Target a handset/switch

Tuesday, September 20, 11

Page 86: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP? Excellent!

Target a handset/switch

Tuesday, September 20, 11

Page 87: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP? Excellent!

Target a handset/switch

Set up a public PBXOR a conference callOR a voicemail box

Tuesday, September 20, 11

Page 88: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP? Excellent!

Target a handset/switch

Set up a public PBXOR a conference callOR a voicemail box

Tuesday, September 20, 11

Page 89: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP? Excellent!

Target a handset/switch

Set up a public PBXOR a conference callOR a voicemail box

Collect your data

Tuesday, September 20, 11

Page 90: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP? Excellent!

Target a handset/switch

Set up a public PBXOR a conference callOR a voicemail box

Collect your data

Tuesday, September 20, 11

Page 91: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP? Excellent!

Target a handset/switch

Set up a public PBXOR a conference callOR a voicemail box

Collect your data

Encode

Tuesday, September 20, 11

Page 92: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP? Excellent!

Target a handset/switch

Set up a public PBXOR a conference callOR a voicemail box

Collect your data

Encode

Tuesday, September 20, 11

Page 93: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Back to hi-tech (?)

34

ET Phone HomeGot VOIP? Excellent!

Target a handset/switch

Set up a public PBXOR a conference callOR a voicemail box

Collect your data

Encode

Call, leave a message, don’t expect to be called back...

Tuesday, September 20, 11

Page 94: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Voice exfiltration demo

35

Tuesday, September 20, 11

Page 95: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Voice exfiltration demo

35

Tuesday, September 20, 11

Page 96: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Voice exfiltration demo

35

Tuesday, September 20, 11

Page 97: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Voice exfiltration demo

35

Tuesday, September 20, 11

Page 98: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Voice exfiltration demo

35

Tuesday, September 20, 11

Page 99: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Voice exfiltration demo

35

Tuesday, September 20, 11

Page 100: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

36

Tuesday, September 20, 11

Page 101: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Killing paper isn’t nice• Fax it!

• Most corporations have email-to-fax services

• heard of the address [email protected] ?

• Just send any document (text, doc, pdf) to it and off you go with the data...

37

Tuesday, September 20, 11

Page 102: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Conclusions

• Available controls

• Information flow path mapping

• Asset mapping and monitoring

38

Tuesday, September 20, 11

Page 103: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Controls

• Start with the human factor

• Then add technology

39

Tuesday, September 20, 11

Page 104: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

Controls

• Start with the human factor

• Then add technology

39

Tuesday, September 20, 11

Page 105: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

• Where people leave data

• Hint - spend time with developers.

• “Hack” the business process

• Test, test again, and then test. Follow with a surprise test!

40

Tuesday, September 20, 11

Page 106: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011

Map your assets

41

“be true to yourself, not to what you believe things should look like”

Old chinese proverb

Tuesday, September 20, 11

Page 107: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011

And monitor them!

42

They are YOUR assetsafter all

No reason to beshy about it...

And remember to add honey...

Tuesday, September 20, 11

Page 108: Pushing in, leaving a present, and pulling out slowly without anyone noticing

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | September 2011

2 tips for monitoring

43

• Pre-infiltration - social media

• Check out SocialNet for Maltego from packetninjas.net... :-)

• Post-infoltration - ALL your channels

• Yes - VoIP is one of them. Record, transcribe, feed to DLP. Simple as that.

Tuesday, September 20, 11

Page 109: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011

Then...

44

TEST SOME MORE

For hints/guides see: www.pentest-standard.org

Tuesday, September 20, 11

Page 110: Pushing in, leaving a present, and pulling out slowly without anyone noticing

I f tach Ian Amit | September 2011

All rights reserved to Security Art ltd. 2002-2011

Questions?

45

Thank you! Whitepapers:www.security-art.com

Too shy to ask [email protected]

Need your daily chatter?twitter.com/iiamit

Data modulation Exfil POC:http://code.google.com/p/

data-sound-poc/

Tuesday, September 20, 11