from your pocket to your heart and back

66
From Your Pocket, to Your Heart, and Back Cyber Security in the Financial and Healthcare Industries, and How They Affect Homeland Security Ian Amit, Director of Services

Upload: iftach-ian-amit

Post on 15-Jan-2015

254 views

Category:

Business


0 download

DESCRIPTION

Cyber Security in the Financial and Healthcare Industries, and How They Affect Homeland Security

TRANSCRIPT

Page 1: From your Pocket to your Heart and Back

From Your Pocket, to Your Heart, and Back

Cyber Security in the Financial and Healthcare Industries, and How They Affect Homeland Security!!Ian Amit, Director of Services

Page 2: From your Pocket to your Heart and Back

Hi!

Page 3: From your Pocket to your Heart and Back
Page 4: From your Pocket to your Heart and Back
Page 5: From your Pocket to your Heart and Back
Page 6: From your Pocket to your Heart and Back
Page 7: From your Pocket to your Heart and Back
Page 8: From your Pocket to your Heart and Back
Page 9: From your Pocket to your Heart and Back
Page 10: From your Pocket to your Heart and Back
Page 11: From your Pocket to your Heart and Back
Page 12: From your Pocket to your Heart and Back
Page 13: From your Pocket to your Heart and Back
Page 14: From your Pocket to your Heart and Back
Page 15: From your Pocket to your Heart and Back

Always remember that you are absolutely unique.!Just like everyone else.!

Margaret Mead

Page 16: From your Pocket to your Heart and Back

Part I !

Where we look at some examples

Page 17: From your Pocket to your Heart and Back

Wireless Network Penetration Testing Services

Confidential. Proprietary. [18]

Detailed Findings Tables

#RAPCON–1 Unauthenticated RAP Console Leaks IPSec Configuration

Device(s) RAP Console

Category Information Disclosure

Testing Method Black Box (Hardware)

Tools Used Firefox

Likelihood Medium (3)

Impact High (4)

Total Risk Rating High (12)

Effort to Fix Medium

Threat and Impact

The RAP Console is unauthenticated and displays information about the access point. Figure 1 shows a screenshot of the RAP Console home page.

Figure 1: Unauthenticated RAP Console

On the Diagnostics tab it is possible to view the conn_log, sapd_debug, dmseg, and rapper debug logs. The rapper debug log will log the PAP Username:

IKE_EXAMPLE: Starting up IKE server

Page 18: From your Pocket to your Heart and Back

Wireless Network Penetration Testing Services

Confidential. Proprietary. [18]

Detailed Findings Tables

#RAPCON–1 Unauthenticated RAP Console Leaks IPSec Configuration

Device(s) RAP Console

Category Information Disclosure

Testing Method Black Box (Hardware)

Tools Used Firefox

Likelihood Medium (3)

Impact High (4)

Total Risk Rating High (12)

Effort to Fix Medium

Threat and Impact

The RAP Console is unauthenticated and displays information about the access point. Figure 1 shows a screenshot of the RAP Console home page.

Figure 1: Unauthenticated RAP Console

On the Diagnostics tab it is possible to view the conn_log, sapd_debug, dmseg, and rapper debug logs. The rapper debug log will log the PAP Username:

IKE_EXAMPLE: Starting up IKE server

Wireless Network Penetration Testing Services

Confidential. Proprietary. [19]

setup_tunnel Initialized Timers IKE_init: completed after (0.0) (pid:16341) time:1999-12-31 16:37:53 seconds. Before getting PSK PSK:****** User:xiaobo1 Pass:******

A more serious information disclosure is the “Generate & save support file” option available on the home page of the RAP Console. The support.tgz file contained 73 files, including the ikepsk, pappasswd, and papuser files, as shown in Figure 2.

Figure 2: Contents of support.tgz

These files contain the encrypted IPSec pre-shared key, and the unique username and the encrypted password for this access point.

An attacker who has gained physical access to the access point or access to the RAP Console for the access point would be able to recover the credentials used by the access point to establish a VPN back to the controller. The credentials are encrypted with a static key, which can be easily decrypted.

Recommendations

The RAP Console has no security model. Disable it if possible.

Page 19: From your Pocket to your Heart and Back
Page 20: From your Pocket to your Heart and Back

What’s the problem there?

Page 21: From your Pocket to your Heart and Back

Medical or Financial?

What’s the problem there?

Page 22: From your Pocket to your Heart and Back

Medical or Financial?

What’s the problem there?

Who cares?

Page 23: From your Pocket to your Heart and Back

Medical or Financial?

What’s the problem there?

Who cares?

Page 24: From your Pocket to your Heart and Back
Page 25: From your Pocket to your Heart and Back
Page 26: From your Pocket to your Heart and Back
Page 27: From your Pocket to your Heart and Back
Page 28: From your Pocket to your Heart and Back
Page 29: From your Pocket to your Heart and Back
Page 30: From your Pocket to your Heart and Back

Fairly unique to healthcare, right?!Need to provide people access to medical facilities…

Kind’a like a financial institution needs to provide customers access to facilities, and their money…

Page 31: From your Pocket to your Heart and Back
Page 32: From your Pocket to your Heart and Back
Page 33: From your Pocket to your Heart and Back
Page 34: From your Pocket to your Heart and Back

ASSETSTraditionally protected?

Mapping all access paths?

Mapping all storage locations?

Secondary? Tertiary?…

Page 35: From your Pocket to your Heart and Back
Page 36: From your Pocket to your Heart and Back
Page 37: From your Pocket to your Heart and Back

Human Resources

What can it tell on your organization?

Business plans?

Access to resources?

Motivation (i.e. opportunity…)

Page 38: From your Pocket to your Heart and Back

Part II !

Where we try to connect MORE dots

Page 39: From your Pocket to your Heart and Back
Page 40: From your Pocket to your Heart and Back
Page 41: From your Pocket to your Heart and Back

The single biggest problem in communication is the illusion that it has taken place.!

George Bernard Shaw

Page 42: From your Pocket to your Heart and Back

Homeland security? Critical Infrastructure!

Page 43: From your Pocket to your Heart and Back

Homeland security? Critical Infrastructure!

Page 44: From your Pocket to your Heart and Back

Homeland security? Critical Infrastructure!

Page 45: From your Pocket to your Heart and Back

Homeland security? Critical Infrastructure!

Page 46: From your Pocket to your Heart and Back

Homeland security? Critical Infrastructure!

Page 47: From your Pocket to your Heart and Back

Part III !

Where we “disprove” what we just learned :-P

Page 48: From your Pocket to your Heart and Back

Always remember that you are absolutely unique. !Just like everyone else.!

Margaret Mead

Remember this?:

Page 49: From your Pocket to your Heart and Back

Always remember that you are absolutely unique. !Just like everyone else.!

Margaret Mead

Remember this?:

Page 50: From your Pocket to your Heart and Back

We can't solve problems by using the same kind of thinking we used when we created them!

Albert Einstein

Page 51: From your Pocket to your Heart and Back

Yes, you do need your!own special way of dealing!with your security posture.

Page 52: From your Pocket to your Heart and Back

What makes me “tick”?

• What can take the business down?!

!

• Who is involved???

Page 53: From your Pocket to your Heart and Back

vs.

Product Centric Threat/Asset Centric

Page 54: From your Pocket to your Heart and Back

Let that last one sit there for a second…

Product Centric Threat/Asset Centric

Page 55: From your Pocket to your Heart and Back

Let that last one sit there for a second…

Product Centric Threat/Asset Centric

Page 56: From your Pocket to your Heart and Back

Let that last one sit there for a second…

Produc RiskProduct Centric Threat/Asset Centric

Page 57: From your Pocket to your Heart and Back

Let that last one sit there for a second…

Produc Risk

Zero lateral knowledge transfer Peer knowledge transfer

Product Centric Threat/Asset Centric

Page 58: From your Pocket to your Heart and Back

Let that last one sit there for a second…

Produc Risk

Zero lateral knowledge transfer Peer knowledge transfer

Zero self learning (experience) Improves with practice

Product Centric Threat/Asset Centric

Page 59: From your Pocket to your Heart and Back

Let that last one sit there for a second…

Produc Risk

Zero lateral knowledge transfer Peer knowledge transfer

Zero self learning (experience) Improves with practice

Based on lab threats Based on real (relevant) threats

Product Centric Threat/Asset Centric

Page 60: From your Pocket to your Heart and Back

Let that last one sit there for a second…

Produc Risk

Zero lateral knowledge transfer Peer knowledge transfer

Zero self learning (experience) Improves with practice

Based on lab threats Based on real (relevant) threats

“Industry Best Practice” Tailored for YOUR practice

Product Centric Threat/Asset Centric

Page 61: From your Pocket to your Heart and Back

Product / Event

Risk / Asset

Vertical

Lateral

Page 62: From your Pocket to your Heart and Back

Product / Event

Risk / Asset

Vertical

Lateral

Page 63: From your Pocket to your Heart and Back

We all know the “how” !

Start asking “why”!

Page 64: From your Pocket to your Heart and Back

We all know the “how” !

Start asking “why”!

Page 65: From your Pocket to your Heart and Back
Page 66: From your Pocket to your Heart and Back

Thank YOU! !

@iiamit