28
“Certified” apps: Are they really secure? JOSE L. QUIÑONES, BS MCSA, RHCSA, CEH, CPEH, CM2I, GCIH, GPEN

"Certified" apps, are they really secure? Break them or fix them, your choice!

Embed Size (px)

Citation preview

Page 1: "Certified" apps, are they really secure? Break them or fix them, your choice!

“Certified” apps: Are they really secure?JOSE L. QUIÑONES, BSMCSA, RHCSA, CEH, CPEH, CM2I, GCIH, GPEN

Page 2: "Certified" apps, are they really secure? Break them or fix them, your choice!

About me UPR School of Medicine – IT Director

Technical Instructor – CompTIA, Micro$oft, EC Council, Mile2

Obsidis Consortia, Inc. – President◦ Security BSides Puerto Rico – Organizer◦ Init6 - InfoSecurity User Group – Founder & Mentor

Page 3: "Certified" apps, are they really secure? Break them or fix them, your choice!

What is OC, Inc?◦ Obsidis Consortia, Inc. [OC, Inc.] is a non-profit organization that

promotes security awareness in the community and supports professional development of security professionals, students and enthusiasts in Puerto Rico.

◦ OC, Inc. has develop and is supporting initiatives like the Init6 Security User Group, Professional Training & Workshops, Network and Security Systems Simulation Scenarios, Community Outreach Program and Security B Sides Puerto Rico Conference.

Page 4: "Certified" apps, are they really secure? Break them or fix them, your choice!

Security B Sides Puerto Rico October 6th , 2016

PR Convention Center◦ San Juan, PR

http://bsidespr.org/2016/

#BsidesPR

@bsidespr

Page 5: "Certified" apps, are they really secure? Break them or fix them, your choice!

Disclaimer I am NOT a developer, I only dabble in scripting and my point of view is biased toward IT operations.

I am NOT an auditor, nor I care much about compliance for the sake of it.

I am NOT an expert in regulations but like many I have no choice in the matter.

I DO care a bout information security, privacy and making systems secure.

My experience with IT is mainly in the Healthcare, Education and SMB Industries.

I am not an “expert” nor pretend to be one. this presentation is based on my own personal experience with developers, deployments and the implementation of such systems. #nightmares

Page 6: "Certified" apps, are they really secure? Break them or fix them, your choice!
Page 7: "Certified" apps, are they really secure? Break them or fix them, your choice!

Dataloss

http://breachlevelindex.com/

Page 8: "Certified" apps, are they really secure? Break them or fix them, your choice!

These are not he hackers you are looking for!

Page 9: "Certified" apps, are they really secure? Break them or fix them, your choice!

Today’s price is the Data

Page 10: "Certified" apps, are they really secure? Break them or fix them, your choice!

What’s the surface area of an application? Client (FrontEnd)

◦ UX/UI◦ Web, Mobile, OS Binaries

Application/Business Logic◦ DB Engine◦ API Calls◦ Tasks

Data/Infrastructure◦ Caching◦ DB◦ File System

Page 11: "Certified" apps, are they really secure? Break them or fix them, your choice!

Application Vulnerabilities◦Affects home-brew, customized and packaged applications all the same

◦Usually have vulnerabilities as a result of poor coding, QA , deployment and administration

◦All apps are NOT created equal. Each application provides unique methods of attack it.

Page 12: "Certified" apps, are they really secure? Break them or fix them, your choice!

Common Errors◦ Buffer overflows

◦ Weak authentication and/or crypto

◦ Poor data validation

◦ Written errors or poor error checking

◦ Bad configurations

Page 13: "Certified" apps, are they really secure? Break them or fix them, your choice!

What can go wrong?

Page 14: "Certified" apps, are they really secure? Break them or fix them, your choice!

File Permissions◦ many (poorly written)

applications will break inheritance when saving files

◦ Modify contains every right that full control does, except for Change Permission and Take Ownership.

◦ Giving excessive permissions can give access to users

Page 15: "Certified" apps, are they really secure? Break them or fix them, your choice!

Network Access

Case: Dr. Alice & Patient Bob

◦ No special hardware was used, only a stock iPhone

◦ No special tools were used, only App Store applicacions

◦ Because of bad access confguration, Bob had access directly the Alice’s DB files

Page 16: "Certified" apps, are they really secure? Break them or fix them, your choice!

Temp Files• Temp files from editing,

configuration and installation tools can leave interesting information behind.

• Even if deleted these file scan be recovered.

Page 17: "Certified" apps, are they really secure? Break them or fix them, your choice!

Config Files

Page 18: "Certified" apps, are they really secure? Break them or fix them, your choice!

Powershell

Page 19: "Certified" apps, are they really secure? Break them or fix them, your choice!

PII/PHI exposed!

Page 20: "Certified" apps, are they really secure? Break them or fix them, your choice!

Password hashes exposed!

Page 21: "Certified" apps, are they really secure? Break them or fix them, your choice!

Encryption

Page 22: "Certified" apps, are they really secure? Break them or fix them, your choice!

GPU cryptanalysis

Page 23: "Certified" apps, are they really secure? Break them or fix them, your choice!

What about web/mobile Apps?

https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

Page 24: "Certified" apps, are they really secure? Break them or fix them, your choice!

What can we do?◦ Enforce a strong password policy◦ Use strong encryption with up to date encryption standards◦ Use strong, salted hashing algorythms◦ Secure messaging (encrypt & tunnel)◦ Secure data at rest (whole disk encryption, file encryption and obfuscation)◦ Stored procedures and parameterized queries for DB access◦ Input Validation, Use fuzzers and automatic code review tools.◦ Use restrictions, triggers and alerts on your DB◦ Enable audit trails and log everything (success / failure)◦ Use monitoring tools (Sysmon, Regmon, Windows ADK , ZAP) to learn how to

application works

Page 25: "Certified" apps, are they really secure? Break them or fix them, your choice!

What else?DevOps!Integrate IT operations into the development cycle.

Page 26: "Certified" apps, are they really secure? Break them or fix them, your choice!

THE PHOENIX PROJECT: A NOVEL ABOUT IT, DEVOPS, AND HELPING YOUR BUSINESS WIN

http://itrevolution.com/books/phoenix-project-devops-book/

Page 27: "Certified" apps, are they really secure? Break them or fix them, your choice!
Page 28: "Certified" apps, are they really secure? Break them or fix them, your choice!

Thanks!

https://codefidelio.org

[email protected]

@josequinones