Commercial Attack Tools Team BAM! Scott Amack, Everett Bloch, Maxine Major.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
Web Filtering and Deep Packet Inspection Artyom Churilin Tallinn University of Technology 2011.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
APPLICATION SUBMISSION MADE EASY. How it all Started One of the largest life insurance companies in the country asked CRL if we could provide an easy.
A unique way to connect your extension cords without the traditional problems.
System Security Scanning and Discovery Chapter 14.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Hands-On Ethical Hacking and Network Defense
International Distribution Direct foreign investment –Perform all distribution functions on your own through ownership of distributors/retailers Foreign.
Vulnerability Testing Approach Prepared By: Phil Cheese Nov 2008.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Security and Penetration Testing
Browser Exploitation Framework (BeEF) Lab
Chapter 3 Applications Software: Getting the Work Done.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
1 Presentation ISS Security Scanner & Retina by Adnan Khairi
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 2 Installing Windows Server 2008.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Plan Introduction What is Cloud Computing?
Norman SecureSurf Protect your users when surfing the Internet.
Team BAM! Scott Amack, Everett Bloch, Maxine Major.
Ashita Srivastava ISM High Five Corporations Chain of fast food restaurants Using Windows XP for clients and Windows Server 2008 Needs a robust.
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
The FlexTraining Total E-Learning Solution
WINDOWS 10 What’s New? What’s Different?. Who Are We? Cody Pierson Marketing Manager Prophet Business Group Tim Robinson IT Manager Prophet Business Group.
Pen testing to ensure your security
ShopKeeper was designed from the ground up to manage your entire fleet maintenance operations … from 1 user to 100, including full security features that.
Information Systems Security Computer System Life Cycle Security.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Why Johnnys' Network got Owned by Evil Hackers Bent on World Domination and Johnny.
Online Goods and Services. Topics Online Shops and Physical Goods Online Shops and Physical Goods Booking Systems Banking Education and Training Gaming.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Chapter 2 – Software Part A. Definition Computer is made up of two components Hardware Physical components Software Instructions for the computer Two.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
The Microsoft Baseline Security Analyzer A practical look….
Security Planning and Administrative Delegation Lesson 6.
Nobody’s Unpredictable Ipsos Portals. © 2009 Ipsos Agenda 2 Knowledge Manager Archway Summary Portal Definition & Benefits.
Cyber Security Nevada Businesses Overview June, 2014.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
American Eagle Computer Products Presented by: Gwen Mascarenas June 23, 1999.
ITGS Application Software, pt. 3. ITGS Business Software Alliance (BSA) and Federation Against Software Theft (FAST) –Represent software companies and.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
CSCE 548 Secure Software Development Security Operations.
Websense SLP (Software Licensing Program) Sherri Conover Websense Business Unit Manager March 17, 2010.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Built atop SharePoint Online, WorkPoint 365 Offers a Project and Case Management Solution to Boost Business Productivity and Deliver Governance OFFICE.
Windows Small Business Server 2003 R2 Powering Small Businesses.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
SharePoint ShortUrl and SharePoint Document Merge SharePoint and Office 365 Add-ins to Increase Productivity and Improve User Adoption! OFFICE 365 APP.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
History of Windows Operating System. Windows 1.0 Debuted in 1985 First version of Windows that was set up to use bitmap displays and mouse pointing devices.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Documents. Process. Data. Payables
Performing Risk Analysis and Testing: Outsource or In-house
Critical Security Controls
Information Security Session October 24, 2005
LP+365 App Transforms Office 365 into a Learning Management System That Promotes Digital Literacy and Encourages All Students to Develop Together OFFICE.
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
Technology Convergence
Server Management and Automation Windows Server 2012 R2
Presentation transcript:

Commercial Attack Tools Team BAM! Scott Amack, Everett Bloch, Maxine Major

Overview Why Commercial? Why Commercial? Uses Uses Good Good Evil Evil Tool Comparisons Tool Comparisons Demo Demo Considerations Considerations

Why Commercial? (When freeware is just as good) Additional functionality for professional environments Additional functionality for professional environments Advanced reporting Advanced reporting Audit logs Audit logs All-in-one suites All-in-one suites Professionally maintained & supported Professionally maintained & supported

Why Commercial? More immediate protection More immediate protection Exploits (and vulnerability awareness) made available before freeware Exploits (and vulnerability awareness) made available before freeware “black-hat hackers typically rely on other tool kits that are less focused on research and more focused on swift, illegal break-ins.“ (Canberra Times)

Who Uses These Tools? Aerospace industry Aerospace industry Universities / Education Universities / Education E-commerce E-commerce Energy & Utilities Energy & Utilities Financial Services Financial Services Healthcare Healthcare Manufacturing Manufacturing Security Consulting Security Consulting … and several unnamed “major federal U.S. agencies” … and several unnamed “major federal U.S. agencies”

Commercial Hacking Commercial not always Ethical Commercial not always Ethical Not all entities willing to pay large amounts of money for these tools want to use them ethically. Not all entities willing to pay large amounts of money for these tools want to use them ethically. Many foreign governments buy & use these tools unethically on their people and other countries. Many foreign governments buy & use these tools unethically on their people and other countries. Not all hacking tools are “good” Not all hacking tools are “good” Marketed as “lawful intercept tools” Marketed as “lawful intercept tools” Can violate human rights Can violate human rights "Corporate Enemies of the Internet” – identified by Reporters Without Borders "Corporate Enemies of the Internet” – identified by Reporters Without Borders

Five Corporate Enemies of the Internet 2013 Gamma Group (U.K.) Gamma Group (U.K.) trovicor (Germany) trovicor (Germany) HackingTeam (Italy) HackingTeam (Italy) Amesys (France) Amesys (France) Blue Coat Systems (U.S.) Blue Coat Systems (U.S.)

Five Corporate Enemies of the Internet 2013 Company: Gamma (UK) Product: FinFisher (FinSpy) Company: Gamma (UK) Product: FinFisher (FinSpy) Commercial surveillance software suite Commercial surveillance software suite Used to target Bahraini activists (May 2012) Used to target Bahraini activists (May 2012) During the fall of Egypt’s Pres. Murbarak, dissidents found FinFisher marketed to Egypt’s secret police (July 2002) During the fall of Egypt’s Pres. Murbarak, dissidents found FinFisher marketed to Egypt’s secret police (July 2002) Discovered iTunes Flaw that allowed third parties to use iTunes update to install unauthorized programs. Discovered in not patched until Nov Discovered iTunes Flaw that allowed third parties to use iTunes update to install unauthorized programs. Discovered in not patched until Nov 2011.

Five Corporate Enemies of the Internet 2013 Company: trovicor (Germany) Product: trovicor Monitoring Center Company: trovicor (Germany) Product: trovicor Monitoring Center Communication interception: “collect, retain, analyse and distribute voice and data communication as well as historical data.” (trovicor) Communication interception: “collect, retain, analyse and distribute voice and data communication as well as historical data.” (trovicor) Enabled Bahrain’s royal family to spy on news providers and arrest them. Enabled Bahrain’s royal family to spy on news providers and arrest them. Work with Iran Work with Iran

Company: HackerTeam (Italy) Product: Da Vinci Company: HackerTeam (Italy) Product: Da Vinci “For Governmental LEAs and Agencies ONLY.” “For Governmental LEAs and Agencies ONLY.” Five Corporate Enemies of the Internet 2013

Company: Blue Coat (California) Product: PacketShaper. Company: Blue Coat (California) Product: PacketShaper. Filtering and censorship devices for countries such as Syria and Burma. Filtering and censorship devices for countries such as Syria and Burma. “Deep Packet Inspection (DPI) products developed by Blue Coat made it possible for the regime to spy on dissidents and netizens throughout the country, and to arrest and torture them.” “Deep Packet Inspection (DPI) products developed by Blue Coat made it possible for the regime to spy on dissidents and netizens throughout the country, and to arrest and torture them.”

Five Corporate Enemies of the Internet 2013 Company: Amesys (France) Product: EAGLE System Company: Amesys (France) Product: EAGLE System EAGLE spyware sold to Libya while Muammar Gaddafi was in power EAGLE spyware sold to Libya while Muammar Gaddafi was in power “mass surveillance system used to spy on dissidents, journalists, activists, and political opponents.” “mass surveillance system used to spy on dissidents, journalists, activists, and political opponents.” “ do not have responsibility for how their tools are used once sold” “ do not have responsibility for how their tools are used once sold” Accused of selling to Morocco and Qatar Accused of selling to Morocco and Qatar EAGLE System sold to Nexa Technologies (2013) EAGLE System sold to Nexa Technologies (2013)

A Comparison Core Impact vs. Immunity Canvas “… penetration-testing frameworks that provide discovery tools, exploit code for remote and local vulnerabilities, remote agents, and other handy- dandy gadgets for exploring and exploiting a network.”

A Comparison Core Impact  $25,000/year per seat  Created around 1997  About 1650 Commercial-Grade exploits created in-house  User is denied the ability to create or import external exploits  Usable by almost anyone with basic computer knowledge Immunity Canvas  $3,101/year for a 10-seat license  Created around 2002  Over 490 exploits, about 4 added every month  Ability for user to create custom exploits  Intended for people with a good understanding of computers and exploits

A Comparison Core Impact  Intuitive and very easy to use GUI interface, “point and shoot” functionality  Requires little to no networking/programming knowledge  Each attack has a setup (Wizard) that walks through the entire process of setting up and exploiting a system, local or on a network  Offers no Command Line Interface

A Comparison Immunity Canvas Simple yet robust GUI for initiating attacks on targets Simple yet robust GUI for initiating attacks on targets Simple three panel display makes for easy navigation and informative results Simple three panel display makes for easy navigation and informative results Offers a Command Line Interface in addition to the GUI Offers a Command Line Interface in addition to the GUI

A Comparison Core Impact  Won Secure Enterprise’s Tester’s Choice award for best penetration testing framework due to its flexibility and ease of use Immunity Canvas  Free tutorial videos and documentation available on immunity web page

Commercial Metasploit Advantages of Pro: Advantages of Pro: “Smart” exploitation “Smart” exploitation Password auditing Password auditing Penetration test reporting Penetration test reporting Team workflow automation Team workflow automation Social engineering Social engineering Web app scanning Web app scanning Web interface Web interface Network discovery Network discovery

Commercial Metasploit Pricing Pricing $5000 initial purchase per year, per seat $5000 initial purchase per year, per seat Renewal rates depend on licensing agreement with Rapid7 Renewal rates depend on licensing agreement with Rapid7

Commercial Metasploit DEMONSTRATION Windows 7 Windows XP SP2 Ubuntu 8.04 (image provided by Metasploit)

Conclusions Commercial != Ethical Commercial != Ethical Cost of commercial tools is prohibitively expensive for individuals. Cost of commercial tools is prohibitively expensive for individuals. Commercial software is highly beneficial for professional pen. testing organizations. Commercial software is highly beneficial for professional pen. testing organizations.

In Summary Why Commercial? Why Commercial? Commercial Tools & Ethics Commercial Tools & Ethics “Five corporate enemies of the internet” “Five corporate enemies of the internet” Comparison of Tools Comparison of Tools Core Impact vs. Immunity Canvas Core Impact vs. Immunity Canvas Demonstration Demonstration Metasploit Pro Metasploit Pro Conclusions Conclusions

References Scanner/LANguard-Network-Security-Scanner.shtml Scanner/LANguard-Network-Security-Scanner.shtml kits-fuel-cyber-arms-race bvb.html kits-fuel-cyber-arms-race bvb.html exposed/ exposed/ ful_intercept_vendor_hackingteam/ ful_intercept_vendor_hackingteam/