Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...Priyanka Aash
We, Keen Security Lab of Tencent, have successfully implemented two remote attacks on the Tesla Model S/X in year 2016 and 2017. Last year, at Black Hat USA, we presented the details of our first attack chain. At that time, we showed a demonstration video of our second attack chain, but without technical aspects. This year, we are willing to share our full, in-depth details on this research.
In this presentation, we will explain the inner workings of this technology and showcase the new capability that was developed in the Tesla hacking 2017. Multiple 0-days of different in-vehicle components are included in the new attack chain.
We will also present an in-depth analysis of the critical components in the Tesla car, including the Gateway, BCM(Body Control Modules), and the Autopilot ECUs. For instance, we utilized a code-signing bypass vulnerability to compromise the Gateway ECU; we also reversed and then customized the BCM to play the Model X "Holiday Show" Easter Egg for entertainment.
Finally, we will talk about a remote attack we carried out to successfully gain an unauthorized user access to the Autopilot ECU on the Tesla car by exploiting one more fascinating vulnerability. To the best of our knowledge, this presentation will be the first to demonstrate hacking into an Autopilot module.
Real World Application Threat Modelling By ExampleNCC Group
This document provides an overview of threat modeling a virtual appliance called the Djigzo Email Encryption Gateway. It describes a process for enumerating the technologies, interfaces, and functionality of the appliance without initial knowledge. This includes getting shell access, mapping listening ports, reviewing processes, and examining the database. Next, it creates high-level and low-level dataflow diagrams. Finally, it develops an initial threat model by brainstorming threats against different interfaces like the web interface, admin console, and mail transfer agent. The presentation concludes that thorough threat modeling requires deep security knowledge and significant effort to understand risks and verify mitigations.
"This workshop is for pentesters, security researchers or someone looking to get into IoT security but is reluctant due to the wide range of technologies involved and plethora of different tools. While it does require a considerable amount of knowledge in the domain, it is not as difficult as you may think. In this workshop we will introduce you to some of the important concepts and EXPLIoT framework in a very simple way that can be used for the various IoT attack vectors. The primary focus of this workshop is to introduce the attendees to the open source IoT Security Testing and Exploitation Framework - EXPLIoT (https://gitlab.com/expliot_framework/expliot) and enable them to use as well as extend it by writing plugins for new IoT based exploits and analysis test cases. It’s a flexible and extendable framework that would help the security community in writing quick IoT test cases and exploits. The objectives of the framework are:
1. Easy to use
2. Extendable
3. Support for hardware, radio and IoT protocol analysis
EXPLIoT currently supports the following protocols which can be utilized for writing new plugins/exploits:
1. Radio – BLE , Zigbee
2. Network – MQTT, CoAP, DICOM, MODBUS, MDNS, NMAP, TCP, UDP
3. Hardware – CAN, SPI, I2C, UART, JTAG
This talk would give attendees a first-hand view of the functionality, how to use it and how to write plugins to extend the framework."
Jagadeesh Parameswaran, Microsoft
Rahul Sachan, Microsoft
Windows Defender Advanced Threat Protection (WDATP) gives defenders unparalleled visibility into the enterprise. And Azure Advanced Threat Protection (AATP) gives the power to monitor attacks on the Domain Controllers and user identities. Come spend an hour with us as we pull back the covers and go through detailed examples of real attacks that we saw as we defended the Microsoft corporate environment using WDATP & AATP.
Jugal Parikh, Microsoft
Holly Stewart, Microsoft
Humans are susceptible to social engineering. Machines are susceptible to tampering. Machine learning is vulnerable to adversarial attacks. Singular machine learning models can be “gamed” leading to unexpected outcomes.
In this talk, we’ll compare the difficulty of tampering with cloud-based models and client-based models. We then discuss how we developed stacked ensemble models to make our machine learning defenses less susceptible to tampering and significantly improve overall protection for our customers. We talk about the diversity of our base ML models and technical details on how they are optimized to handle different threat scenarios. Lastly, we’ll describe suspected tampering activity we’ve witnessed using protection telemetry from over half a billion computers, and whether our mitigation worked.
Cansecwest - The Death of AV defence in depthThierry Zoller
The document discusses vulnerabilities in antivirus software. It notes that antivirus software has a large attack surface due to parsing thousands of file formats and being programmed in unmanaged languages. While antivirus vendors claim their software implements defense in depth, the document argues this is not truly the case as the software itself is left unprotected. It provides examples of bypassing antivirus detection by exploiting flaws in how the software parses file formats. The authors advocate that vendors should flag files they cannot fully scan as "unscanned" rather than reporting them as clean.
Integrate Security into DevOps - SecDevOpsUlf Mattsson
1.Security Controls Must Be Programmable and Automated Wherever Possible
2.Implement a Simple Risk and Threat Model for All Applications
3.Scan Custom Code, Applications and APIs
4.Scan for OSS Issues in Development
5.Treat Scripts/Recipes/Templates/Layers as Sensitive Code
6.Measure System Integrity and Ensure Correct Configuration at Load
7.Use Whitelisting on Production Systems, Including Container-Based Implementations
8.Assume Compromise; Monitor Everything; Architect for Rapid Detection and Response
9.Lock Down Production Infrastructure and Services
10.Tokenization and Payment Processing
Bryan Owen of OSIsoft at S4x15 OTDay.
Bryan shows how to harden a Windows Services generically and then specifically to a service used by OSIsoft's PI Server
This document discusses program security for Android apps. It begins with an introduction of the speaker and covers topics like Android architecture, app threat models, app components like activities and intents, data storage security, cryptography, injection attacks, and reverse engineering defenses. The document provides examples of real security issues from apps like LinkedIn and Pandora and offers tips to defend against various threats like improper data handling, insecure communication, and client-side injection.
IoT Malware: Comprehensive Survey, Analysis Framework and Case StudiesPriyanka Aash
This document provides an overview of a study on IoT malware. It discusses the challenges of analyzing IoT malware due to platform heterogeneity. It outlines the methodology used, which included collecting malware samples, metadata, and reports. Metadata and surveys of vulnerabilities and malware families are presented. The document describes a sandbox for dynamic analysis of IoT malware and provides example reports. It includes two case studies on the Hydra exploit and issues with metadata. Key takeaways focus on the importance of metadata analysis and improving vulnerability management and defense for IoT security.
This document discusses malware collection and analysis conducted at the DSNSLab at NCTU. It introduces the lab director, Professor Xie Zhiping, and outlines the lab's research areas including malware analysis, virtual machines, digital forensics, and network security. It then provides an overview of the Secmap platform for automated malware analysis and collection. Methods of malware collection discussed include disk forensics, web crawling, shared repositories, email, and honeypots.
This document summarizes three papers related to data compression and network security. The first paper studies how improper implementation of data decompression in network services can enable denial-of-service attacks. It identifies 12 categories of flaws and evaluates popular services finding 10 vulnerabilities. The second paper proposes the Bohatei system to improve defense against DDoS attacks using SDN/NFV. It presents a hierarchical decomposition approach and proactive tag-based steering. The third paper examines data compression as a source of security issues, studying past attacks like zip bombs and analyzing pitfalls in design, implementation, specification and configuration of compression in network services.
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
This document discusses the dangers of using algorithms in cybersecurity. It makes three key points:
1) Algorithms make assumptions about the data that may not always be valid, and they do not take important domain knowledge into account.
2) Throwing algorithms at security problems without proper understanding of the data and algorithms can be dangerous and lead to failures.
3) A Bayesian belief network approach that incorporates domain expertise may be better suited for security tasks than purely algorithmic approaches. It allows modeling relationships between different factors and computing probabilities.
The path of secure software by Katy AntonDevSecCon
This document discusses 10 controls (C1 through C10) for developing secure software. Each control is described in 1-2 pages and addresses how it mitigates many of the top 10 risks from the OWASP list, including injection, XSS, sensitive data exposure, access control issues, and more. Specific techniques are provided, such as query parameterization to prevent SQL injection, output encoding to prevent XSS, validating all input, secure authentication and authorization practices, encrypting data, and centralized error handling.
The document discusses security best practices, focusing on the Microsoft Security Development Lifecycle (SDL). The SDL is a 6-month iterative process that includes threat modeling, secure coding guidelines, code reviews, testing, and response. It aims to integrate security into all phases of development. Key SDL principles discussed are attack surface reduction, basic privacy, threat modeling, defense in depth, least privilege, and secure defaults.
Niek Timmers, Riscure B.V.
Cristofaro Mune, Independent Embedded Security Consultant
Fault injection attacks have been historically perceived as high-end attacks not available to most hackers. They used to require expensive tooling and a mysterious mix of skills which resulted them being out of reach for even the most skilled attackers. These days are over as low-cost fault injection tooling is changing the capabilities of the hacking masses at a rapid pace.
Historically, fault injection attacks are used to break cryptographic implementation (e.g. Differential Fault Analysis) or bypassing security checks like performed by a pin verification function. However, nothing prevents them to be used on richer systems like embedded devices or IoT devices. Fault injection attacks can be used to change the intended behavior of hardware and software, due, among the others, to corrupted memory reads and instructions execution.
In this talk we show that fault injection attacks and, more specifically, voltage fault injection, allow escalating privileges from an unprivileged context, in absence of logically exploitable software vulnerabilities. This is demonstrated using practical examples where the control flow of the Linux kernel is influenced in order to gain root privileges. All practical examples are performed on a fully patched Linux operating system, executed by a fast and feature rich System-on-Chip. A live demonstration of Fault Injection is part of the talk.
Domain 4: Communication and Network Security - Review
Application Layer TCP/IP Protocols and Concepts, Layer 1 Network Cabling, LAN Technologies and Protocols, LAN Physical NetworkTopologies, WAN Technologies and Protocols, Network Devices and Protocols and Network Attacks
This document summarizes three papers presented at an S&P 2012 security conference session on system security. The first paper proposes a framework to eliminate backdoors from response-computable authentication systems. The second paper discusses replacing the standard program loader with a secure loader to prevent attacks on software-based fault isolation. The third paper presents a technique called ReDebug for finding unpatched code clones in entire OS distributions.
Slide Deck Class Session 10 – FRSecure CISSP Mentor ProgramFRSecure
This document summarizes session #10 of a CISSP mentor program. It reviews topics in domains 4 and 5, including network scanning tools, wireless LANs, remote access, access control concepts, authentication methods, single sign-on, and identity lifecycle processes. Quizzes are given on domain 4 topics. Discussions also cover protocols like RADIUS, Diameter, Kerberos, and TACACS/TACACS+, as well as single sign-on implementations and access review procedures.
Many projects start out with the intention of staying single license FOSS projects. As your project grows, reality hits: some components or files may need to use different licenses than originally anticipated. There are many reasons why this can happen: you may need to interface with projects of another license, you may want to import code from other projects or your developers may not understand the subtleties of the licenses in use. Besides the obvious challenges of managing mixed license FOSS projects, such as license compatibility and tracking what licenses you use, you are running the risk of exposing your project to unintended consequences.
This talk will explore unintended consequences, risks and best practices using some examples from the recent history of the Xen Project. In particular we will cover:
Refactoring can lead to licensing changes: best practices and unintended consequences when importing code from elsewhere.
Making code archeology easy from a licensing perspective and why it is important.
A worked example of a license change of a key component: process, pain points, their causes and how they could have been avoided
The perils of LGPL/GPL vX (or Later): the unintended consequences of not providing pre-defined copyright headers in your source base
We will conclude with a summary of lessons and best practices from both the Xen Project and a quick overview of how usage of SPDX and other tools may help you.
This document summarizes a CISSP mentor program session on security assessment and testing. It includes a 10 question quiz on topics like regression testing, fuzzing, static vs dynamic testing, and types of penetration testing. It also discusses a scenario about hiring a security firm to conduct a security assessment and penetration test of a bank's new web application. Key points covered include using a "flag" file instead of real data in a penetration test, the benefits of partial knowledge vs zero knowledge tests, and the proper response if an active compromise is discovered during a test.
SCYBER addresses an urgent need in cybersecurity training by developing the skills needed to proactively detect and combat cyber threats. The course spends 60% of time in hands-on labs where students monitor, analyze, and respond to actual cyber attacks. It teaches 4 major competencies - monitoring security events, configuring detection/alarming, analyzing traffic for threats, and appropriately responding to incidents. Key differentiators include being system agnostic, lab-heavy, teaching an inside-out approach, ease of entry for security professionals, and helping students understand why things are threats.
The document discusses various topics related to computer security including threats, cryptography, user authentication, attacks, and protection mechanisms. It covers symmetric and public key cryptography, digital signatures, password authentication, and biometrics. It also discusses viruses, intrusions, covert channels, and multilevel security models. The goal is to provide an overview of fundamental concepts in computer and network security.
Security software products are not immune to vulnerabilities. The document discusses vulnerabilities found in Symantec Messaging Gateway, F5 BIG-IP, AppliCure dotDefender WAF, and Sophos Web Protection Appliance that allowed unauthorized access or code execution on the devices. Exploiting vulnerabilities in security software is common due to weaknesses being found in the software itself or misconfigurations of services running on the devices.
The Finest Penetration Testing Framework for Software-Defined NetworksPriyanka Aash
Software-Defined Networking (SDN) is getting attention for the next-generation networking today. The key concept of SDN is to decouple the control logic from the traditional network devices so that network developers can design innovative network functions in a more flexible and programmable way. However, SDN is not always bringing advantages to us. Security experts have constantly raised security concerns about SDN, and some vulnerabilities have been uncovered in the real world. If SDN is not secure, how can we measure the security level of SDN environments?
In this talk, we introduce a powerful penetration testing tool for SDN called DELTA, which is officially supported by Open Networking Foundation (ONF). First, DELTA can automate diverse published attack scenarios against various SDN components from testing to evaluating. Also, to discover unknown vulnerabilities that may exist in SDN, DELTA leverages a blackbox fuzzing technique that randomizes different control flows in SDN. It enables us to systemically reveal unknown security issues rather than the empirical and ad-hoc methods that most previous studies use. By using DELTA, anyone can easily and thoroughly test not only popular open source SDN controllers (i.e., ONOS, OpenDaylight, Floodlight, and Ryu), but also SDN-enabled switches (i.e., OpenvSwitch, HP, and Pica8) in the real world.
We will show nine new attack cases that have been found by DELTA but never been announced before.
Also, we will discuss:
- What control flows are in SDN, and why those are important as a key feature compared to the traditional networks.
- What key components and workflow of DELTA to attack the real SDN components.
- Which nine new attack cases have been discovered by DELTA, and we will demonstrate it. For example, one of the new attacks violates the table condition, leading to the black hole of handling packets in the switch.
Domain 4: Communication and Network Security - Review
Network Architecture and Design, Fundamentals, OSI Model, TCP/IP Model and Encapsulation (speaking of which)
The Hacking Games - Operation System Vulnerabilities Meetup 29112022lior mazor
Our technology, work processes, and activities all are depend based on Operation Systems to be safe and secure. Join us virtually for our upcoming "The Hacking Games - Operation System Vulnerabilities" Meetup to learn how hacker can compromise Operation System, bypass AntiVirus protection layer and exploiting Linux eBPF.
This document discusses program security for Android apps. It begins with an introduction of the speaker and covers topics like Android architecture, app threat models, app components like activities and intents, data storage security, cryptography, injection attacks, and reverse engineering defenses. The document provides examples of real security issues from apps like LinkedIn and Pandora and offers tips to defend against various threats like improper data handling, insecure communication, and client-side injection.
IoT Malware: Comprehensive Survey, Analysis Framework and Case StudiesPriyanka Aash
This document provides an overview of a study on IoT malware. It discusses the challenges of analyzing IoT malware due to platform heterogeneity. It outlines the methodology used, which included collecting malware samples, metadata, and reports. Metadata and surveys of vulnerabilities and malware families are presented. The document describes a sandbox for dynamic analysis of IoT malware and provides example reports. It includes two case studies on the Hydra exploit and issues with metadata. Key takeaways focus on the importance of metadata analysis and improving vulnerability management and defense for IoT security.
This document discusses malware collection and analysis conducted at the DSNSLab at NCTU. It introduces the lab director, Professor Xie Zhiping, and outlines the lab's research areas including malware analysis, virtual machines, digital forensics, and network security. It then provides an overview of the Secmap platform for automated malware analysis and collection. Methods of malware collection discussed include disk forensics, web crawling, shared repositories, email, and honeypots.
This document summarizes three papers related to data compression and network security. The first paper studies how improper implementation of data decompression in network services can enable denial-of-service attacks. It identifies 12 categories of flaws and evaluates popular services finding 10 vulnerabilities. The second paper proposes the Bohatei system to improve defense against DDoS attacks using SDN/NFV. It presents a hierarchical decomposition approach and proactive tag-based steering. The third paper examines data compression as a source of security issues, studying past attacks like zip bombs and analyzing pitfalls in design, implementation, specification and configuration of compression in network services.
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
This document discusses the dangers of using algorithms in cybersecurity. It makes three key points:
1) Algorithms make assumptions about the data that may not always be valid, and they do not take important domain knowledge into account.
2) Throwing algorithms at security problems without proper understanding of the data and algorithms can be dangerous and lead to failures.
3) A Bayesian belief network approach that incorporates domain expertise may be better suited for security tasks than purely algorithmic approaches. It allows modeling relationships between different factors and computing probabilities.
The path of secure software by Katy AntonDevSecCon
This document discusses 10 controls (C1 through C10) for developing secure software. Each control is described in 1-2 pages and addresses how it mitigates many of the top 10 risks from the OWASP list, including injection, XSS, sensitive data exposure, access control issues, and more. Specific techniques are provided, such as query parameterization to prevent SQL injection, output encoding to prevent XSS, validating all input, secure authentication and authorization practices, encrypting data, and centralized error handling.
The document discusses security best practices, focusing on the Microsoft Security Development Lifecycle (SDL). The SDL is a 6-month iterative process that includes threat modeling, secure coding guidelines, code reviews, testing, and response. It aims to integrate security into all phases of development. Key SDL principles discussed are attack surface reduction, basic privacy, threat modeling, defense in depth, least privilege, and secure defaults.
Niek Timmers, Riscure B.V.
Cristofaro Mune, Independent Embedded Security Consultant
Fault injection attacks have been historically perceived as high-end attacks not available to most hackers. They used to require expensive tooling and a mysterious mix of skills which resulted them being out of reach for even the most skilled attackers. These days are over as low-cost fault injection tooling is changing the capabilities of the hacking masses at a rapid pace.
Historically, fault injection attacks are used to break cryptographic implementation (e.g. Differential Fault Analysis) or bypassing security checks like performed by a pin verification function. However, nothing prevents them to be used on richer systems like embedded devices or IoT devices. Fault injection attacks can be used to change the intended behavior of hardware and software, due, among the others, to corrupted memory reads and instructions execution.
In this talk we show that fault injection attacks and, more specifically, voltage fault injection, allow escalating privileges from an unprivileged context, in absence of logically exploitable software vulnerabilities. This is demonstrated using practical examples where the control flow of the Linux kernel is influenced in order to gain root privileges. All practical examples are performed on a fully patched Linux operating system, executed by a fast and feature rich System-on-Chip. A live demonstration of Fault Injection is part of the talk.
Domain 4: Communication and Network Security - Review
Application Layer TCP/IP Protocols and Concepts, Layer 1 Network Cabling, LAN Technologies and Protocols, LAN Physical NetworkTopologies, WAN Technologies and Protocols, Network Devices and Protocols and Network Attacks
This document summarizes three papers presented at an S&P 2012 security conference session on system security. The first paper proposes a framework to eliminate backdoors from response-computable authentication systems. The second paper discusses replacing the standard program loader with a secure loader to prevent attacks on software-based fault isolation. The third paper presents a technique called ReDebug for finding unpatched code clones in entire OS distributions.
Slide Deck Class Session 10 – FRSecure CISSP Mentor ProgramFRSecure
This document summarizes session #10 of a CISSP mentor program. It reviews topics in domains 4 and 5, including network scanning tools, wireless LANs, remote access, access control concepts, authentication methods, single sign-on, and identity lifecycle processes. Quizzes are given on domain 4 topics. Discussions also cover protocols like RADIUS, Diameter, Kerberos, and TACACS/TACACS+, as well as single sign-on implementations and access review procedures.
Many projects start out with the intention of staying single license FOSS projects. As your project grows, reality hits: some components or files may need to use different licenses than originally anticipated. There are many reasons why this can happen: you may need to interface with projects of another license, you may want to import code from other projects or your developers may not understand the subtleties of the licenses in use. Besides the obvious challenges of managing mixed license FOSS projects, such as license compatibility and tracking what licenses you use, you are running the risk of exposing your project to unintended consequences.
This talk will explore unintended consequences, risks and best practices using some examples from the recent history of the Xen Project. In particular we will cover:
Refactoring can lead to licensing changes: best practices and unintended consequences when importing code from elsewhere.
Making code archeology easy from a licensing perspective and why it is important.
A worked example of a license change of a key component: process, pain points, their causes and how they could have been avoided
The perils of LGPL/GPL vX (or Later): the unintended consequences of not providing pre-defined copyright headers in your source base
We will conclude with a summary of lessons and best practices from both the Xen Project and a quick overview of how usage of SPDX and other tools may help you.
This document summarizes a CISSP mentor program session on security assessment and testing. It includes a 10 question quiz on topics like regression testing, fuzzing, static vs dynamic testing, and types of penetration testing. It also discusses a scenario about hiring a security firm to conduct a security assessment and penetration test of a bank's new web application. Key points covered include using a "flag" file instead of real data in a penetration test, the benefits of partial knowledge vs zero knowledge tests, and the proper response if an active compromise is discovered during a test.
SCYBER addresses an urgent need in cybersecurity training by developing the skills needed to proactively detect and combat cyber threats. The course spends 60% of time in hands-on labs where students monitor, analyze, and respond to actual cyber attacks. It teaches 4 major competencies - monitoring security events, configuring detection/alarming, analyzing traffic for threats, and appropriately responding to incidents. Key differentiators include being system agnostic, lab-heavy, teaching an inside-out approach, ease of entry for security professionals, and helping students understand why things are threats.
The document discusses various topics related to computer security including threats, cryptography, user authentication, attacks, and protection mechanisms. It covers symmetric and public key cryptography, digital signatures, password authentication, and biometrics. It also discusses viruses, intrusions, covert channels, and multilevel security models. The goal is to provide an overview of fundamental concepts in computer and network security.
Security software products are not immune to vulnerabilities. The document discusses vulnerabilities found in Symantec Messaging Gateway, F5 BIG-IP, AppliCure dotDefender WAF, and Sophos Web Protection Appliance that allowed unauthorized access or code execution on the devices. Exploiting vulnerabilities in security software is common due to weaknesses being found in the software itself or misconfigurations of services running on the devices.
The Finest Penetration Testing Framework for Software-Defined NetworksPriyanka Aash
Software-Defined Networking (SDN) is getting attention for the next-generation networking today. The key concept of SDN is to decouple the control logic from the traditional network devices so that network developers can design innovative network functions in a more flexible and programmable way. However, SDN is not always bringing advantages to us. Security experts have constantly raised security concerns about SDN, and some vulnerabilities have been uncovered in the real world. If SDN is not secure, how can we measure the security level of SDN environments?
In this talk, we introduce a powerful penetration testing tool for SDN called DELTA, which is officially supported by Open Networking Foundation (ONF). First, DELTA can automate diverse published attack scenarios against various SDN components from testing to evaluating. Also, to discover unknown vulnerabilities that may exist in SDN, DELTA leverages a blackbox fuzzing technique that randomizes different control flows in SDN. It enables us to systemically reveal unknown security issues rather than the empirical and ad-hoc methods that most previous studies use. By using DELTA, anyone can easily and thoroughly test not only popular open source SDN controllers (i.e., ONOS, OpenDaylight, Floodlight, and Ryu), but also SDN-enabled switches (i.e., OpenvSwitch, HP, and Pica8) in the real world.
We will show nine new attack cases that have been found by DELTA but never been announced before.
Also, we will discuss:
- What control flows are in SDN, and why those are important as a key feature compared to the traditional networks.
- What key components and workflow of DELTA to attack the real SDN components.
- Which nine new attack cases have been discovered by DELTA, and we will demonstrate it. For example, one of the new attacks violates the table condition, leading to the black hole of handling packets in the switch.
Domain 4: Communication and Network Security - Review
Network Architecture and Design, Fundamentals, OSI Model, TCP/IP Model and Encapsulation (speaking of which)
The Hacking Games - Operation System Vulnerabilities Meetup 29112022lior mazor
Our technology, work processes, and activities all are depend based on Operation Systems to be safe and secure. Join us virtually for our upcoming "The Hacking Games - Operation System Vulnerabilities" Meetup to learn how hacker can compromise Operation System, bypass AntiVirus protection layer and exploiting Linux eBPF.
The document discusses challenges for incorporating security practices into agile development and proposes a "Security Toolbox" to help development teams identify and mitigate security risks through the use of accepted security knowledge bases and guidance mapped to specific architectural elements. The toolbox is intended to minimize "Security Debt" by predicting security issues upfront and providing acceptance tests and estimates to integrate security into sprint planning and product backlogs. An example is provided of how the toolbox could be applied to help three development teams implement a secure online comment system.
10 Reasons Your Software Sucks 2014 - Tax Day Edition!Caleb Jenkins
Based on years of consulting, and working with some of the largest (and smallest) software companies in the world.. these are the 10 practices that if you started doing today, would drastically improve the quality and delivery of your software! Also, be sure to hang around afterwards in the Open Spaces area.. Caleb will be around to discuss any of the areas from his talk in more detail. It’s going to be great time!
Topics hit on: Object Oriented Principals, SOLID Coding, Security Concerns, Software Patterns, Automated Testing, Source Control - Branching and Merging Strategies, Continuous Integration, Agile | Scrum | XP | Lean, Team Dynamics, Continually Learning
Secure development in .NET with EPiServer SolitaJoona Immonen
The document discusses secure development practices for .NET applications. It covers topics like threat modeling, hosting perspectives, and continuous integration tools. The presenter recommends that developers take on security testing roles and provides an "onion model" to conceptualize defense in depth strategies with tools mapped at different layers. Continuous security is emphasized through the development lifecycle.
This document provides a high-level summary of a course on secure programming. It discusses whether secure programming is more of an art or a science, and describes different software engineering maturity levels. It also briefly outlines several topics that will be covered in the course, including secure design principles, security requirements, software development processes, and the role of cryptography.
Domain 3: Security Engineering
Virtualization and Distributed Computing
System Vulnerabilities, Threats and Countermeasures
Cornerstone Cryptographic Concepts
History of Cryptography
Types of Cryptography
Cryptographic Attacks
Implementing Cryptography
The document discusses a presentation about Certified Ethical Hacking. It begins by asking if computer hacking can be ethical and if one can be certified in it. It then explains that ethical hacking involves using hacking skills to test an organization's security defenses for vulnerabilities, with the organization's authorization. The rest of the document outlines the Certified Ethical Hacking certification program, including what is covered in the training course and exam. It provides examples of hacking tools and techniques taught as well as sample exam questions. The presentation emphasizes that ethical hacking is just one part of managing security risks and that there is no single solution to security issues.
This document discusses vulnerabilities in antivirus software. It begins by noting that over 165 vulnerabilities have been reported in antivirus software in the past 4 years according to the US National Vulnerability Database. It then examines why antivirus software is a target for attackers, including that users have blind faith in it and its error-prone nature in processing many file formats. The document outlines techniques used to find vulnerabilities, including source code audits, reverse engineering, and fuzzing. It also looks at exploiting found vulnerabilities, such as through weak permissions. The overall aim is to raise awareness of security issues in antivirus products.
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
Security is in crisis and it needs a new way to move forward. This talk from Nov 2018, Houston ISSA meeting discusses the tooling needed to rise to the demands of devops and devsecops.
The document discusses various topics related to computer security including cryptography, user authentication, attacks, and protection mechanisms. It covers basics like symmetric and public key cryptography. It discusses authentication using passwords, physical objects, and biometrics. Common attacks include those from inside and outside the system like trojan horses, logic bombs, and buffer overflows. The document also covers network security threats like viruses, their impact, and techniques for antivirus protection. Trusted systems and formal security models are discussed along with multilevel security and covert channels.
What it feels like to live in a Security Enabled DevOps WorldKarun Chennuri
Security in DevOps world - Evolving frameworks. Cluster Hardening best practices. Automation pipelines for managing infrastructure and PaaS. Continuous Security and DevOps Maturity Model.
Overcoming Security Challenges in DevOpsAlert Logic
This document discusses taking a DevOps approach to security. It outlines how DevOps practices like automation, immutable infrastructure, and infrastructure as code can improve an organization's security posture by reducing vulnerabilities and ensuring consistent configurations. It also addresses some of the challenges of integrating security into DevOps environments and proposes moving towards software-defined security models that provide real-time visibility, automatic protection, and continuous assessment.
VB2013 - Security Research and Development FrameworkAmr Thabet
That's my presentation in VB2013 in Berlin, Germany ... talking about a new development framework for security
it's created for writing security tools, malware analysis tools and network tools
All organizations want to go faster and decrease friction in their cloud software delivery pipeline. Infosec has an opportunity to change their classic approach from blocker to enabler. This talk will discuss hallmarks of CI/CD and some practical examples for adding security testing across different organizations. The talk will cover emergent patterns, practices and toolchains that bring security to the table.
Presented at OWASP NoVA, Sept 25th, 2018
This presentation explores how busting software bugs does more than ensure the reliability and performance of your software—it helps ensure application security.
Topics covered include:
How AppSec processes are really quality processes
How software bugs are really security vulnerabilities
How to apply coding standards as part of a continuous testing process to prevent defects from affecting the safety, security, and reliability of your applications
*Metamorphosis* is a biological process where an animal undergoes a dramatic transformation from a juvenile or larval stage to a adult stage, often involving significant changes in form and structure. This process is commonly seen in insects, amphibians, and some other animals.
Exploring Substances:
Acidic, Basic, and
Neutral
Welcome to the fascinating world of acids and bases! Join siblings Ashwin and
Keerthi as they explore the colorful world of substances at their school's
National Science Day fair. Their adventure begins with a mysterious white paper
that reveals hidden messages when sprayed with a special liquid.
In this presentation, we'll discover how different substances can be classified as
acidic, basic, or neutral. We'll explore natural indicators like litmus, red rose
extract, and turmeric that help us identify these substances through color
changes. We'll also learn about neutralization reactions and their applications in
our daily lives.
by sandeep swamy
The ever evoilving world of science /7th class science curiosity /samyans aca...Sandeep Swamy
The Ever-Evolving World of
Science
Welcome to Grade 7 Science4not just a textbook with facts, but an invitation to
question, experiment, and explore the beautiful world we live in. From tiny cells
inside a leaf to the movement of celestial bodies, from household materials to
underground water flows, this journey will challenge your thinking and expand
your knowledge.
Notice something special about this book? The page numbers follow the playful
flight of a butterfly and a soaring paper plane! Just as these objects take flight,
learning soars when curiosity leads the way. Simple observations, like paper
planes, have inspired scientific explorations throughout history.
INTRO TO STATISTICS
INTRO TO SPSS INTERFACE
CLEANING MULTIPLE CHOICE RESPONSE DATA WITH EXCEL
ANALYZING MULTIPLE CHOICE RESPONSE DATA
INTERPRETATION
Q & A SESSION
PRACTICAL HANDS-ON ACTIVITY
Multi-currency in odoo accounting and Update exchange rates automatically in ...Celine George
Most business transactions use the currencies of several countries for financial operations. For global transactions, multi-currency management is essential for enabling international trade.
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schoolsdogden2
Algebra 1 is often described as a “gateway” class, a pivotal moment that can shape the rest of a student’s K–12 education. Early access is key: successfully completing Algebra 1 in middle school allows students to complete advanced math and science coursework in high school, which research shows lead to higher wages and lower rates of unemployment in adulthood.
Learn how The Atlanta Public Schools is using their data to create a more equitable enrollment in middle school Algebra classes.
Understanding P–N Junction Semiconductors: A Beginner’s GuideGS Virdi
Dive into the fundamentals of P–N junctions, the heart of every diode and semiconductor device. In this concise presentation, Dr. G.S. Virdi (Former Chief Scientist, CSIR-CEERI Pilani) covers:
What Is a P–N Junction? Learn how P-type and N-type materials join to create a diode.
Depletion Region & Biasing: See how forward and reverse bias shape the voltage–current behavior.
V–I Characteristics: Understand the curve that defines diode operation.
Real-World Uses: Discover common applications in rectifiers, signal clipping, and more.
Ideal for electronics students, hobbyists, and engineers seeking a clear, practical introduction to P–N junction semiconductors.
Geography Sem II Unit 1C Correlation of Geography with other school subjectsProfDrShaikhImran
The correlation of school subjects refers to the interconnectedness and mutual reinforcement between different academic disciplines. This concept highlights how knowledge and skills in one subject can support, enhance, or overlap with learning in another. Recognizing these correlations helps in creating a more holistic and meaningful educational experience.
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...Celine George
Analytic accounts are used to track and manage financial transactions related to specific projects, departments, or business units. They provide detailed insights into costs and revenues at a granular level, independent of the main accounting system. This helps to better understand profitability, performance, and resource allocation, making it easier to make informed financial decisions and strategic planning.
How to manage Multiple Warehouses for multiple floors in odoo point of saleCeline George
The need for multiple warehouses and effective inventory management is crucial for companies aiming to optimize their operations, enhance customer satisfaction, and maintain a competitive edge.
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetSritoma Majumder
Introduction
All the materials around us are made up of elements. These elements can be broadly divided into two major groups:
Metals
Non-Metals
Each group has its own unique physical and chemical properties. Let's understand them one by one.
Physical Properties
1. Appearance
Metals: Shiny (lustrous). Example: gold, silver, copper.
Non-metals: Dull appearance (except iodine, which is shiny).
2. Hardness
Metals: Generally hard. Example: iron.
Non-metals: Usually soft (except diamond, a form of carbon, which is very hard).
3. State
Metals: Mostly solids at room temperature (except mercury, which is a liquid).
Non-metals: Can be solids, liquids, or gases. Example: oxygen (gas), bromine (liquid), sulphur (solid).
4. Malleability
Metals: Can be hammered into thin sheets (malleable).
Non-metals: Not malleable. They break when hammered (brittle).
5. Ductility
Metals: Can be drawn into wires (ductile).
Non-metals: Not ductile.
6. Conductivity
Metals: Good conductors of heat and electricity.
Non-metals: Poor conductors (except graphite, which is a good conductor).
7. Sonorous Nature
Metals: Produce a ringing sound when struck.
Non-metals: Do not produce sound.
Chemical Properties
1. Reaction with Oxygen
Metals react with oxygen to form metal oxides.
These metal oxides are usually basic.
Non-metals react with oxygen to form non-metallic oxides.
These oxides are usually acidic.
2. Reaction with Water
Metals:
Some react vigorously (e.g., sodium).
Some react slowly (e.g., iron).
Some do not react at all (e.g., gold, silver).
Non-metals: Generally do not react with water.
3. Reaction with Acids
Metals react with acids to produce salt and hydrogen gas.
Non-metals: Do not react with acids.
4. Reaction with Bases
Some non-metals react with bases to form salts, but this is rare.
Metals generally do not react with bases directly (except amphoteric metals like aluminum and zinc).
Displacement Reaction
More reactive metals can displace less reactive metals from their salt solutions.
Uses of Metals
Iron: Making machines, tools, and buildings.
Aluminum: Used in aircraft, utensils.
Copper: Electrical wires.
Gold and Silver: Jewelry.
Zinc: Coating iron to prevent rusting (galvanization).
Uses of Non-Metals
Oxygen: Breathing.
Nitrogen: Fertilizers.
Chlorine: Water purification.
Carbon: Fuel (coal), steel-making (coke).
Iodine: Medicines.
Alloys
An alloy is a mixture of metals or a metal with a non-metal.
Alloys have improved properties like strength, resistance to rusting.
A measles outbreak originating in West Texas has been linked to confirmed cases in New Mexico, with additional cases reported in Oklahoma and Kansas. The current case count is 817 from Texas, New Mexico, Oklahoma, and Kansas. 97 individuals have required hospitalization, and 3 deaths, 2 children in Texas and one adult in New Mexico. These fatalities mark the first measles-related deaths in the United States since 2015 and the first pediatric measles death since 2003.
The YSPH Virtual Medical Operations Center Briefs (VMOC) were created as a service-learning project by faculty and graduate students at the Yale School of Public Health in response to the 2010 Haiti Earthquake. Each year, the VMOC Briefs are produced by students enrolled in Environmental Health Science Course 581 - Public Health Emergencies: Disaster Planning and Response. These briefs compile diverse information sources – including status reports, maps, news articles, and web content– into a single, easily digestible document that can be widely shared and used interactively. Key features of this report include:
- Comprehensive Overview: Provides situation updates, maps, relevant news, and web resources.
- Accessibility: Designed for easy reading, wide distribution, and interactive use.
- Collaboration: The “unlocked" format enables other responders to share, copy, and adapt seamlessly. The students learn by doing, quickly discovering how and where to find critical information and presenting it in an easily understood manner.
CURRENT CASE COUNT: 817 (As of 05/3/2025)
• Texas: 688 (+20)(62% of these cases are in Gaines County).
• New Mexico: 67 (+1 )(92.4% of the cases are from Eddy County)
• Oklahoma: 16 (+1)
• Kansas: 46 (32% of the cases are from Gray County)
HOSPITALIZATIONS: 97 (+2)
• Texas: 89 (+2) - This is 13.02% of all TX cases.
• New Mexico: 7 - This is 10.6% of all NM cases.
• Kansas: 1 - This is 2.7% of all KS cases.
DEATHS: 3
• Texas: 2 – This is 0.31% of all cases
• New Mexico: 1 – This is 1.54% of all cases
US NATIONAL CASE COUNT: 967 (Confirmed and suspected):
INTERNATIONAL SPREAD (As of 4/2/2025)
• Mexico – 865 (+58)
‒Chihuahua, Mexico: 844 (+58) cases, 3 hospitalizations, 1 fatality
• Canada: 1531 (+270) (This reflects Ontario's Outbreak, which began 11/24)
‒Ontario, Canada – 1243 (+223) cases, 84 hospitalizations.
• Europe: 6,814
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingCeline George
The Accounting module in Odoo 17 is a complete tool designed to manage all financial aspects of a business. Odoo offers a comprehensive set of tools for generating financial and tax reports, which are crucial for managing a company's finances and ensuring compliance with tax regulations.
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingCeline George
Ad
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulalongkorn University, Thailand)
1. Introduction to
DevOps and DevOpsSec
with Secure Design
Krerk Piromsopa, Ph.D.
Directory of Comp. Eng. Program
Computer Engineering
Chulalongkorn University
2. Overview
What is DevOps?
What is DevOpsSec?
What is Security?
(Brief) History of Cyber Security.
What have we learned?
Challenges
3. What is DevOps?
Software development
methodology
Combination of
software development
(Dev)
information technology
operations (Ops)
4. How and Why?
Shorten systems
development life cycle
(SDLC)
Automation and event
monitoring at all steps of
the software build
5. BuzzWords
Agile - SDLC release software faster and more frequent
> Continuous Integration & Continuous Delivery
ArchOps - DevOps, but starting from architecture
DataOps - DevOps for Data Analytics
WinOps - DevOps for Microsoft-centric system
DevSecOps (or DevOpsSec) - DevOps with IT Security
6. Tools and Skills required
Code
Build
Test
Package
Release
Config
Monitor
i.redd.it
16. History of Security
As people formed early
communities, the issue of
physical security emerged.
the oldest known lock is a
4,000 year old Egyptian
lock
17. Security vs. Privacy
a hacker is able to
compromise a computer
system and find out that
a person
is a homosexual
or
is infected with a bad
decease.
Security or Privacy ?
20. Security Components
Authentication
“Who are you? Are you really the person whom you claim to be?”
Authorization
“Do you have the authority to do what you are trying to do?”
Accounting (Auditing)
“What did you do?” the AAA of Security
21. Cerberus or Kerberos (Greek Κέρβερος, Kerberos, "demon of the pit") was the hound of Hades, a monstrous
three-headed dog with a snake for a tail (sometimes said to have 50 or 100 heads) called a hellhound.
22. Supporting Concepts
Integrity
Integrity (n) “the quality or state of being complete or undivided”
Validation of Input
“All input is evil until proven otherwise”
Software Engineering & Threat Modeling
“Threat modeling is a method of addressing and documenting
the security risks associated with an application.”
23. The forth A
Integrity is sometime referred as Authenticity—hence it
is sometime mentioned as the forth “A” of security
components.
How can we preserve the integrity of data?
24. What have we learned?
Authentication
Authorization
Confidentiality
Integrity
Availability
Auditing
25. What is secure by design?
Plan more than just
functionality
(Plan for Security)
Attack Surface
Reduction
Threats & Risk
Modeling
26. Sample of “Secure by Design”
Simple Login Program
Prog 1. Prog 2. Prog 3.
Input [login name]
Fetch [saved password]
If no entry then
exit
Input [password]
Compare passwords.
If valid then
start session
else
exit
End if
Input [login name]
Input [password]
Fetch [saved password]
If no entry then
exit
Compare passwords.
If valid then
start session
else
exit
End if
Input [login name]
Input [password]
Fetch [saved password]
If no entry then
[saved password] <-
random
Compare passwords.
If valid then
start session
else
exit
End if
27. Prog 1.
Input [login name]
Fetch [saved password]
If no entry then
exit
Input [password]
Compare passwords.
If valid then
start session
else
exit
End if
login:
username
…..
login:
28. Prog 2.
Input [login name]
Input [password]
Fetch [saved password]
If no entry then
exit
Compare passwords.
If valid then
start session
else
exit
End if
login:
username
Password:
*********
…..
login:
29. Prog 3.
Input [login name]
Input [password]
Fetch [saved password]
If no entry then
[saved password] <- random
Compare passwords.
If valid then
start session
else
exit
End if
login:
username
Password:
*********
…..
login:
34. Copyright Microsoft Corp. 2004
34
Secure Design
Reduce Attack Surface
Defense in Depth
Least Privilege
Secure Defaults
35. Copyright Microsoft Corp. 2004
35
Defense in Depth (MS03-007)
Windows Server 2003 Unaffected
The underlying DLL (NTDLL.DLL)
not vulnerable Code fixed during the Windows Security Push
Even if it was running IIS 6.0 doesn’t have WebDAV enabled by default
Even if it did have
WebDAV enabled
Default maximum URL length (16kb) prevented
exploitation (>64kb needed)
Even if it was vulnerable IIS 6.0 not running by default on
Windows Server 2003
Even if it there was an
exploitable buffer overrun
Would only ‘network service’ privileges – commensurate
with a normal user
Even if the buffer was
large enough
Process halts rather than executes malicious code,
due to buffer-overrun detection code (-GS)
36. Copyright Microsoft Corp. 2004
36
Secure Defaults
Less code running by default = less stuff to attack by
default
Slammer & CodeRed would not have happened if
the features were not enabled by default
Reduces the urgency to deploy security fixes
A ‘critical’ may be rated ‘important’
Defense in depth removes single points of failure
Reduces the need for customers to ‘harden’ the
product
Reduces your testing workload
Reduce your attack surface early!
37. Copyright Microsoft Corp. 2004
37
Attack Surface Reduction (ASR)
Ideas
Service: Autostart SYSTEM
TCP/UDP
TCP/UDP
TCP/UDP
38. Copyright Microsoft Corp. 2004
38
Turn off less-used ports
Service: Autostart SYSTEM
TCP/UDP
TCP/UDP
TCP/UDP
43. Copyright Microsoft Corp. 2004
43
Harden ACLs
Service: Manual NetService
TCP only
Everyone (Full Control)
Admin (Full Control)
Everyone (Read)
Service (RW)
44. Copyright Microsoft Corp. 2004
44
Increased Attack Surface
means
Increased Security Scrutiny…
• On by default
• Running as SYSTEM
• Open, unauth TCP socket
• Off by default
• Running with least priv
• Open, TCP socket
limited to local subnet
45. Threat Modeling
Think like a bad guy..
(but do not be a bad guy yourself)
What will a bad guy do to
your software/system?
Some slides from Microsoft’s faculty summit 2004.
47. Copyright Microsoft Corp. 2004
47
Threat Analysis
Secure software starts with understanding
the threats
Threats are not vulnerabilities
Threats live forever, they are the attacker’s
goal(s)
Threat
AssetMitigation
Vulnerability
49. Copyright Microsoft Corp. 2004
49
Determining Threat Types
Each element in
the DFD is
susceptible to
one or more
threat types
1.0
5.0
2.0.
3.0
4.0
10.0
8.0
6.0
11.0 9.0
7.0
STRI
DE
STRI
DE
STRI
DE
TID
TID
TID
TID
TID
TID
SR
SR
50. Copyright Microsoft Corp. 2004
50
Threat Tree Format
Threat
Condition Condition
Condition Condition
Condition Condition Condition
‘And’ clause
‘Or’ clause
51. Copyright Microsoft Corp. 2004
51
Threat Tree Pattern Examples
Spoofing
Obtain legitimate credentials Falsify Credentials
Leverage insufficient
authentication
Weak
storage
Weak
transit
Guessed Equivalence
Predictable
Credentials
Server
Client
Downgrade
authentication
Weak change
management
Secure Channel
Non-secure
channel
No Authentication System
Null
Credentials
Spoofing Interactor
or Process
Tampering Threats
Against Auth Process
Tampering/
Information
Disclosure Threats
against data flows
52. Copyright Microsoft Corp. 2004
52
Threat Tree Pattern Examples
Thinking Like a Security Pro!
Obtain legitimate credentials
Falsify Credentials
Leverage insufficient
authentication
Weak
storage
Weak
transit
Guessed
Equivalence
Predictable
Credentials
Server Client
Downgrade
authenticationWeak change
management
Null
Credentials
Secure Channel
Non-secure channel
No Authentication System
Tampering /
Information
Disclosure
Threats against
data flows
There is an
authentication
system, so this
threat tree
doesn’t apply
Where are the
password stored on
the server?
Are credentials
stored on the client?
If so, how? Mac
clients often store
passwords in
aliases, etc.
How are
credentials
transmitted
to the
server?
How are
credentials
changed?
Is there more
than one
authentication
method, and if so,
is it negotiable?
Are there
password quality
features?
Are there agency
relationships? What if
the client is acting as a
server itself? Can a
request to user1 (in its
server role) cause it to
automatically
authenticate as a
client?
Are null
credentials
possible?
Are the credentials a
function of the username?
Client address? Time?
Spoofing User
Tampering Threats
Against Auth Process
53. Copyright Microsoft Corp. 2004
53
Calculating Risk with
Numbers
DREAD etc.
Very subjective
Often requires the analyst be a security
expert
On a scale of 0.0 to 1.0, just how likely is it that an
attacker could access a private key?
Where do you draw the line?
Do you fix everything above 0.4 risk and leave
everything below as “Won’t Fix”?
54. Copyright Microsoft Corp. 2004
54
Mitigation Techniques
Threat Mitigation Feature
Spoofing Authentication
Tampering Integrity
Repudiation Nonrepudiaton
Information Disclosure Confidentiality
Denial of Service Availability
Elevation of Privilege Authorization
Attend “Secure Design Principles”
55. Copyright Microsoft Corp. 2004
55
☑
No design is complete without a threat model!
☑
Follow anonymous data paths☑
Every threat needs a security test plan
☑
Check all information disclosure threats – are they
privacy issues?☑
Be wary of elevated processes
☑
Use the threat modeling tool
Threat Model Checklist
threat
asset
vuln
56. Summary
Every design should be secure from the ground up.
(SecureDesign)
DevOpsSec = incorporate security into systems
development life cycle.