Presentation on theme: "Hacking The Framework Nimrod Luria Head Of Consulting Services, 2Bsecure. Security MVP.NET Security User Group Leader. Microsoft affiliate consultant."— Presentation transcript:
Hacking The Framework Nimrod Luria Head Of Consulting Services, 2Bsecure. Security MVP.NET Security User Group Leader. Microsoft affiliate consultant. Nimrod@2Bsecure.co.il
High Low 1980198519901995 2001 password guessing password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools Attackers Intruder Knowledge Attack Sophistication “stealth” / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools binary encryption Source: CERT/CC (used w/o permission & modified “Can you say ‘fair use?’ Sure, I knew you could.” IHO Fred Rogers ) Attack sophistication vs. Intruder Technical Knowledge
Warm Up - Demo Why you shouldn’t use Custom validator
Why should we be aware of security? 1st Scenario : In my current smart card company, most of the information stored within our SDK are highly confidential. We do not want our SDK to be manipulated by our competitors. 2nd Scenario : You took a year to write a software and in the process consumed a lot of resources and time for its development. Then you sell your software, you find that all your hard work in past 12 months were easily manipulated. Therefore, steps must be taken to ensure this does not happen. 3rd Scenario : One day, my manager came to me and asked me this question. Questions: Are.NET assemblies that secure? Answer: Nothing is secure, but all we can do is to try to make things harder for a hacker.
Don’t trust the Registry Back in 1990s, you may have noticed that some shareware programs implements this kind of verification technique. When you install the software, it will create a key in the Windows registry. Basically what it does, is stores the serial number inside the registry as either a plain text or encrypted version. Yes, I have seen people placing plain text in registry. So when your program runs, it will check the registry to verify the existence that particular key. If you have a wrong serial number or that particular key is not there, it will prompt you an error. Right now I will try to simulate this verification technique in C# step by step.
Demo Manipulating The Registry Listening with RegMon
Let’s Change the code How to use ILdasm and ILasm to manipulate the code. Type ildasm CrackingIL.exe /out=CrackingIL.il Open CrackingIL.il with any text editor Just remove all the codes from IL_0000 to IL_0075.(Clean FrmSecureApp_Load event) type 'ilasm CrackingIL.il'. You are done !
protect your.NET assemblies from being tampered Strong Name key is a RSA 1024 bit encryption, and to break it is not that easy at all. You need to have huge computing power to get that private key. Why Strong Name??
Strong Name, is it strong enough ? It did not encrypt my codes nor did it hide my codes from decompilers such as.NET Reflector. It isn't even related to obfuscation. So then what is Strong Name for? Some marketing tool to convince the public that the assemblies it protects is secure?
What people doing in the industry ? Your superior comes to you and asks you to implement a Strong Name key in your assemblies. And then when you reply, why Strong Name, they would say this is what other people are doing in the industry; we should follow them as well.
How to break Strong Name.NET Assemblies Questions: Question : Is Strong Name key secure? Answer : Yes, Strong Name key uses RSA 1024 bit encryption. Question : Is Strong Name key breakable? Answer : If you have enough computing power, time and knowledge on how to break RSA, the answer is yes. Question : Can Strong Name key be removed from.NET assemblies? Answer : Yes, it can be removed very easily if you know how.
Demo Removing the signature. Tempering the code.
Hijacking.NET type members defined with a private access modifier are not actually private Even though the method is private, calling clients can still set the state of the object whenever they want using reflection.
Solutions To make sure that only trusted assemblies are calling your assembly you can use StrongNameIdentityPermission Class You should use sn.exe –o to get the signature. You can use imperative or declarative checks. _ Public Class myClass... _ Public Class myClass...
Encrypt Your code ReactorCryptKey Preemptive.NET obfuscation
In Got We Trust ! Don’t trust any code. Use sandbox to test downloaded code or 3 rd party assemblies. Use CAS Follow the least privilege principle. Review your code. Test your applications for security.
Your consent to our cookies if you continue to use this website.