Important stuff...
- Toilets are behind the green doors
- WiFi: ditmerVisitor
Statistics
- 55+ employees
- 6 times gazelle
- 7300 cups of coffee pr. months
Customers & Products
- SBSYS (ESDH)
- ditmerFlex
- LetDialog
- Wide range of webprojects
Who am I?
- Stefan Daugaard Poulsen
- Aarhus, Denmark
- AP in computer science
- CISSP
- Jack of many trades at ditmer a/s
- Developer
- Consultant
- Infrastructure
- Security
- ...but not management
What do we think security is?
Hacking WOPR - War Operation Plan Response - US military
Passwords?
- Reuse
- Weak
- Written on the wall
2015 study showed 59% of americans reuse passwords
Cracking facts
It used to be hard
Oldsk00l stats
- 6 chars using all printable chars
- 735.091.890.625 (95^6) different combinations
- 29 years in 1979
Longer passwords wasn't always a proportional better solution
WinXP LanMan compatibility split the password into two hashes
26^7 + 26^7 instead of 26^14
Longer passwords
- 15 chars takes a while...
- 463.291.230.159.753.366.058.349.609.375 (95^15) different combinations
- 41.973.910.103 years (with the 2012 setup)
HTTPS?
- Does it solve everything?
We all know but does our mother?
When is it insecure?
Other?
Missing authentication
Config left overs
Allowing non-secure content
Is it only software and hardware?
C is for cookie...
or was it Confidentiality
Least privilege
Encryption
I is for ice...
yes it is Integrity
Transactions
Consistency/Quality of data
A is for alcohol
it should be Availability
Always up
There when you need it
Preservation of confidentiality, integrity and availability of information.
ISO/IEC 27000:2009
The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability
CNSS 2010
Committee on National Security Systems
- Governance
- Risk Management
- Compliance
Too fluffy!
Business continuity
Disaster recovery
Threat categories
- Human
- Natural
- Technical
- Physical
- Environmental
- Operational
Natural = Fire, flood
Environmental = utility etc
Operational = Process
Qualify likelihood
- Skill
- High skill level required
- Low or no skill required
- Ease of Access
- Very difficult to do
- Very simple to do
- Incentive
- High incentive
- Low incentive
- Resource
- Requires expensive or rare equipment
- No resources required
Does not fit all threats
Consequence
- Insignificant
- Minor
- Low - Minor business impact, some loss of confidence
- Moderate
- Medium - Business is interrupted, loss of confidence
- Major
- High - Business is disrupted, major loss of confidence
- Catastrophic
- High - Business cannot continue
The people factor
- Political
- Morale
- Cultural / Religious
Anonymous
Panama papers
Financially
$80 Million hack
Hiding crime
Steganography
Samples
- Hacking Team
- Office of Personnel Management
- Estimated 21.5 million records stolen
- Panama Papers
- 11.5 million documents leaked
- 2.6 TB of data leaked
- BeautifulPeople
- Slack
Sometimes it is evil intent other times it's lack of procedure or actually following the procedure
OPM hack is suspected to be done by China
Beautiful People was discovered by a researcher
Slack exposed teams based on an email entry
What could you face?
- Hacking
- Exploiting
- Phising
- Social engineering
- DDoS
Attack vectors
- Old hardware
- Vulnerabilities
- Human errors
- Lack of procedure
What we already
should be doing
- SQL Injection
- Broken Authentication / Session Management
- XSS
- Direct Object Reference
- Security Misconfiguration
- Sensitive Data Exposure
- Missing Function Level Access Control
- CSRF
- Vulnerable components
- Unvalidated redirects
Rumors says it's part of the leak of Panama papers
Don't tell too much
- X-AspNet-Version
- X-Powered-By
- X-AspNetMvc-Version
- Server
MitM
- Public WiFi
- Guest WiFi
- WiFi addicts
People will do anything for free WiFi
~Niall Merrigan
What we need to be aware of
- Content-Security-Policy
- HTTP Strict Transport Security
- Public Key Pinning
- X-Frame-Options
- X-Xss-Protection
- X-Content-Type-Options
Trust on first use!
CSP - Approves sources
HSTS - Stay on HTTPS
PKP - SSL on drugs
XFO - Who can frame you
Remember
- Security is never done
- Always think about security
- Don't forget privacy
- Don't wait to the last sprint
- Pentesting doesn't show everything
- You might just be the tool
- You have an obligation to do good