Saturday, April 29, 2017

Why study Computer Security?


Defining Adversaries as Threats


Several aspects are important when studying and attempting to understand adversarial behavior. First, be careful in assuming you understand their objective. False flag or 5th column activities can muddy what appears to be a straightforward attack. Threat objectives are ultimately one of the hardest topics on which to achieve clarity. Continuing to understand adversaries would include knowledge of their capabilities. I would refer the reader back again to Fig. 14.1: DoD Cyber Adversary Tiers. Understanding that not all threats are equal, not all threat actors have similar skills, resources or abilities will help enable a more nuanced study and observation of this aspect of cyber security research. Contextualizing adversaries into whatever modalities you prefer (DoD tiers) common label (hacktivist, organized crime, nation-state, etc.) will all add more precision and fidelity that the overloaded, often inaccurate “hacker” label.
Dig Deeper: False Flags and 5th columns
False flags is a term from spycraft when one actor will plant or leave, indicators and evidence that they are associated with a different organization or country. This could be as simple as wearing a uniform of another country, or as complex as mimicking TTP, language, and stylistic details of another cyber actor. Similarly, the 5th column is a hidden element within an organization or contrary that covertly works to subvert the objectives of the host. This is akin to an organization or a group of insider threats.
In addition to understanding capabilities, adversary Tactics, Techniques, and Procedures can be studied to better understand how they operate, what their intentions are, and perhaps even attribute them to a specific organization. This line of inquiry requires, often, considerable information to be collected from the various IT systems throughout the adversary campaign. Models such as the Cyber Kill Chain, conceptualized by Lockheed Martin, can be used to collect information (some of which will be outside the victim network, and very hard to get) and the rest (inside) might be tampered on unavailable. Alternative approaches would include lurking on various criminal and semi criminal message boards, website, and darknet forums. Open source information is often provided to the public free of charge from commercial organizations and other researchers. Often the raw information is missing, but the information can be a reasonable starting point. Organizations with an appropriate risk tolerance can actually set up a Honeypot or Honeynet.22 This can be a very hard system to set up and integrate, but it can be an invaluable source of information. The key challenges are to ensure that the honeypot is of sufficient quality and realism so that sophisticated threats do not realize that they are not on a real system. However, you also do not want to allow any vital resources to be compromised or worse your systems to be used to compromise some other organization. Similarly, the integration of the honeynet into your operations network can be a technical challenge. For more details on Honeypots refer to Chapter 13, Instrumentation.
Research Methods for Cyber Security

Fundamental Cyber Security Work

Dig Deeper: Fundamental Cyber Security Work
As with every scientific field, there is research that is performed that is an inflection point for future research. Below is a list of seminal papers that will give you a solid foundation for cybersecurity research. This list includes research that had impacts that changed the way the field thought about topics. This list is not meant to be a list of just good research or interesting topics. A brief explanation of why the paper is seminal is provided per reference.
TitleAuthor(s)Seminality
Communication Theory of Secrecy SystemsClaude Shannon
• First formal statement of modern cryptography
• Defined secrecy system, cipher, and how to determine the strength of secrecy system from information theoretic perspective
The Protection of Information in Computer SystemsJerome H. Saltzer, and Michael D. Schroeder
• Introduces seminal secure design principles
• Descriptor-based protection systems
• Historical insights into computer security
Moore’s Law (Cramming More Components onto integrated circuits (1965) and Progress in Digital Integrated Electronics (1975))Gordon Moore
• Defined a model of processor development and progression
• Provided a way to project computing capabilities into the future
• A fundamental concept that has enabled the quantification of encryption security strength
New Directions in CryptographyWhitfield Diffie and Martin Hellman
• First idea for public-key cryptography
• Defined Diffie–Hellman key agreement protocol
A Method for Obtaining Digital Signatures and Public-Key CryptosystemsRon Rivest, Adi Shamir, and Leonard Adleman
• Defined RSA public-key system
• One of the most used public-key cryptographic systems
On Data Banks and Privacy Homomorphisms (1978)Ronald Rivest, Leonard Adleman, and Michael Dertouzos
• First paper defined homomorphic encryption
Fully Homomorphic Encryption Using Ideal Lattices (2009)Craig Gentry
• Second paper defined the first practical fully homomorphic encryption scheme
The Byzantine Generals ProblemLeslie Lamport, Robert Shostak, and Marshall Pease
• Theoretical exploration of agreement under adversarial threat
• Defined limitations of trust in redundant systems
• Does not solve the common vulnerability challenge
Smashing the Stack for Fun and ProfitAleph One (Elias Levy)
• First widespread introduction to buffer overflows
• Step-by-step discussion of the vulnerability and shell code
• Exploration of the implications
On the Security of Public-Key ProtocolsDanny Dolev and Andrew Yao
• Theoretical exploration of attacks on public key protocols
• Defined Dolev-Yao threat model that has become the threat model used for cryptographic protocols
A Computer Virus and a Cure for Computer VirusFred Cohen
• First definition of a virus
• Proof of undecidability of detecting a virus (counterproof) by mapping to halting problem
The Foundations of Computer Security: We Need SomeDonald Good
• Essay to complain about lack of strong foundations for engineering in computer security (cybersecurity not a concept yet)
• Surveyed how theoretically secure systems are not really secure
• Proclaimed we need more theories before being able to engineer “secure” systems
Programming Satan’s ComputerRoss Anderson and Roger Needham
• Theoretical exploration of timing, ordering, and oracle attacks
• Define principles for developing security protocols for integrity and authenticity using cryptography
The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion DetectionStefan Axelsson
• Theoretical explanation of the problems we have with IDS
• With extreme ratio of noise to signal (attacks=black swan events) even if you have a 100% detector you still need extremely low false-positive rate to not be inundated with false-positive detections
Red Pill (2004)Joanna Rutkowska
• Red pill demonstrated a method to detect that you were running as a guest virtual machine
• Blue pill demonstrated malware becoming a hypervisor to running OS dynamically
Introducing the Blue Pill (2006)
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million PasswordsJoseph Bonneau
• Study that shows that regardless of subpopulation everyone choose equivalently weak passwords
• An attacker is better off using a global password list

Friday, April 28, 2017

Live Phishing Education Slides

This template (or one like it created by you and your team!) can be used when auto-directing users after a live phishing campaign, as well as for normal instruction.

You’ve Been Hacked!

But it’s OK...and it was only a quiz (the real test is from an attacker). (Click the arrows for more info!) What Just Happened, and Why? Did you know: real attackers are making these same attempts all the time against our network?

We’d rather help ourselves become stronger before the attackers can help themselves to our patients’ data. No matter how many advanced technical hurdles internet security puts in place, the best defense is always an alert member of the team (you!).

Classroom is theory—treating that first patient wasn’t. It’s better to practice when it’s safe. 

Social Engineering 101(0101)

Computers are black and white, on or off; humans aren’t, so unfortunately we present a better target to attackers:

RSA (security company) hacked in 2011 via email

HBGary (security company) hacked 2011 via reused passwords, email

Google/Adobe—hacked, operation Aurora 2010

So It’s OK That You Were Exploited (This Time)

If people who work for computer technology companies—some of which specialize in security—fall for attacks, it’s to be expected that you would fall for similar attacks as well.

We get better with practice; this is an opportunity for that practice.

No Blame, No Shames, Just...

You work for a healthcare organization where listening and trusting people is a priority! That’s good!

...but social engineering plays on your good nature and trust by building rapport (“I love our patients, too!”), making a request (“Password, please!”), and often faking urgency (“The CEO/CIO/CNO all want this done now!”).

A Few Strategies for Next Time

If you aren’t expecting an email from someone (even if you know them), don’t click the links or open the attachment.

If you think it might be work-related, reply to the person and ask for more specifics.

If a website is asking for personal information (like your password), and you don’t recognize the site, call the IT helpdesk.

Because There Will Be a Next Time

If the site looks correct, make sure that it is a secure site (https:// in the URL bar, look for the lock).

If Something Feels Funny

You just logged in, and you went immediately back to the login page.

The site doesn’t use HTTPS but requests a password.

You received an email from someone you don’t know or about a package you didn’t send.

A document that claims to have payroll information in it.

A greeting card as an attachment.

If Something Looks Funny

You open an attachment and you get a weird error, or the document doesn’t contain what it said it would.

You are prompted to turn on macros or install a driver update, or a new version of Flash player.

The website looks like ours, but the website address (URL) in the address bar looks different.

You find a USB thumb drive or a CD/DVD lying around.

If Something Sounds Funny

You get a call from “IT” and they ask for your username and password, or say they are working on a problem you have not reported.

A call from a new vendor who wants to know who our current vendor for xyz is (so they can call back and pose as being from that company).

A request from the “fire marshal” to look at the extension cords under your computer desk (should be with facilities).

You find a USB thumb drive or a CD/DVD lying around.

Feels, Looks, or Sounds Funny—Call the IS Helpdesk

If it is something normal, they can help you.

If it is not, they’ll escalate the issue so we can take swift, appropriate action and warn other users.

What If I Already Clicked the Link, or Opened the Attachment?

No blame, no shame, but please—CALL NOW!

The sooner your IT team knows, the sooner they can help you and prevent the issue from going farther.

What If I Didn’t Click the Link or Attachment?

If you think it looks suspicious, better safe than sorry.

Your IT team still needs to know about the possible threat to our patients’ protected health information (PHI).

Other users might not be as discerning.

The attacker might come back with something better next time.

Your IT Team Is Here for You!

Would you like a one-on-one session to talk about any of this information?

Do you lead a team who could benefit from this material?

If so, please contact the helpdesk at x1111 and let us know!

Phishing Program Rules

Some explanation and rules of the phishing program will help your users get excited and involved in the rewards program.

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

The IT team would like to present a new contest called “Something Smells Phishy!”

We’ll be putting on our hacker hats and trying to get you to fall for our security tests. While we won’t be trying to gather your credit card details, there are currently real hackers out in the world trying to get every bit of information they can.

They are the real bad guys and the whole point behind this campaign. Expect to see more training and key points to remember:

Don’t click links in emails.

Don’t open attachments that you aren’t expecting.

Never give your username/password to anyone.

If it smells phishy REPORT IT!

All of this is a training exercise and the more you learn, the safer we all are and the more chances you have to win some awesome prizes! Each time you report a legitimate phishing attempt (either from us or a real attacker) your name gets entered into the phish bowl for the following prizes!

Things that should be reported:

Suspicious emails trying to get your information (usernames, passwords, what software we use, banking info, etc).

Suspicious emails with attachments that you didn’t expect.

People attempting to access your computer that you haven’t authorized.

Bruce Schneier books

He is the author of over 12 books, including such early books as 1996’s
Applied Cryptography: Protocols, Algorithms and Source Code in C (https://
www.amazon.com/Applied-Cryptography-Protocols-Algorithms-Source
/dp/1119096723). He wrote a few other books on cryptography (including a
couple with Niels Ferguson), but Schneier also began to follow his long-time
interest in the larger reasons why computer security was not being improved.
The result was a series of books, each exploring the non-technical reasons
(trust, economics, sociology, and so on) for the continued weakness. They are
filled with easy-to-understand theory and elucidated by example stories. Here
are my favorite general-interest Schneier books:
■■ Secrets and Lies: Digital Security in a Networked World (https://www
.amazon.com/Secrets-Lies-Digital-Security-Networked/
dp/0471453803)
■■ Beyond Fear: Thinking Sensibly About Security in an Uncertain World (https://
www.amazon.com/Beyond-Fear-Thinking-Sensibly-Uncertain
/dp/0387026207)
■■ Liars and Outliers: Enabling the Trust that Society Needs to Thrive
(https://www.amazon.com/Liars-Outliers-Enabling-Society-Thrive
/dp/1118143302/)
■■ Data and Goliath: The Hidden Battles to Collect Your
Data and Control Your World (https://www.amazon.com
/Data-Goliath-Battles-Collect-Control/dp/039335217X/)

In math we trust - fighting against gerrymandering







The Alien Thriller Plot Generator - from Wired



Artificial Intelligence will help doctors do their jobs better - Lily Peng


Parisa Tabriz - keep humans safe.


Proxy server


Load Balancer


VPN concentrator


RIPv2




VTP



IPsec



Network Segmentation - not be a reason



T568A T568B


IPv6 Compression


MDF - Main Distribution Frame



Thursday, April 27, 2017

SLAAC

Perimeter Security Concerns.
Addressing. IPv6 is more flexible in its approach to dynamic addressing. Instead
of solely relying on DHCP, an IPv6 device can address itself through stateless address autoconfiguration (SLAAC). The host uses a unique identifier (typically its own Message Authentication Code (MAC) address) in addition to the Neighbor Discovery (ND) protocol to complete the automatic addressing. Since there is no authentication requirement, the GSD must prevent external devices from attempting to act as an internalrouter during the addressing process.
The significant increase of available addresses in any particular IPv6 network makes it infeasible to discover devices and network topology using traditional port scanning methodologies. By using the multicast listener discovery (MLD) protocol, an attacker can send a probe to the link-local multicast address (ff02::1) and listen for responses. The GSD must block this capability at the perimeter to prevent external devices from attempting to discover internal host sand topologies.


interface resets

—Repeated resets of the connection, resulting in lower-quality utilization; caused by an interface misconfiguration.


LACP

The IEEE 802.3ad standard supports

Link Aggregation Control Protocol (LACP). Unlike some of the older vendor-proprietary solutions, LACP supports automatic configuration and prevents an individual link from becoming a single point of failure. Specifically, with LACP, if a link fails, that link’s traffic is forwarded over a different link.

You can configure port channels on a Nexus switch statically, or dynamically via the Link
Aggregation Control Protocol (LACP), which can bundle multiple links into a single port channel as
well as help to detect link failures. LACP is a non-proprietary IEEE 802.1AX port channel
negotiation standard. After enabling it globally on the device, you can then enable LACP for each
channel by setting the channel mode for each interface to either active or passive. When a port is
configured for passive mode, it will respond to the LACP packets it receives, but it won’t initiate an
LACP negotiation. When a port is configured for active mode, the port initiates negotiations with
other ports by sending LACP packets.

split horizon

Distance-vector routing protocols typically use one of two approaches for preventing routing loops:

Split horizon: The split horizon feature prevents a route learned on one interface from being advertised back out of that same interface.
Poison reverse: The poison reverse feature causes a route received on one interface to be advertised back out of that same interface with a metric considered to be infinite.

Power monitoring - SNMP



ARP Cache Poisoning


ARP cache poisoning is usually a part of a man-in-the middle attack. The ARP cache
contains IP address to MAC address mappings that a device has learned through the ARP
process. One of the ways this cache can be poisoned is by pinging a device with a spoofed
IP address. In this way, an attacker can force the victim to insert an incorrect IP address
to MAC address mapping into its ARP cache. If the attacker can accomplish this with
two computers having a conversation, they can effectively be placed in the middle of the
transmission. After the ARP cache is poisoned on both machines, they will be sending data
packets to the attacker, all they while thinking they are sending them to the other member
of the conversation.

Yagi,




Remote Hybrid and Office work