<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>Cатсн²² (in)sесuяitу / ChrisJohnRiley</title>
	<atom:link href="https://c22blog.wordpress.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://c22blog.wordpress.com</link>
	<description>Because we&#039;re damned if we do, and we&#039;re damned if we don&#039;t!</description>
	<lastBuildDate>Sun, 06 Nov 2022 17:49:45 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<site xmlns="com-wordpress:feed-additions:1">1599597</site><cloud domain='c22blog.wordpress.com' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<image>
		<url>https://secure.gravatar.com/blavatar/770e6edec9ad46dc256a0b6e899831fffce8cefdfab8133d02c4f1a8365cab33?s=96&#038;d=https%3A%2F%2Fs0.wp.com%2Fi%2Fbuttonw-com.png</url>
		<title>Cатсн²² (in)sесuяitу / ChrisJohnRiley</title>
		<link>https://c22blog.wordpress.com</link>
	</image>
	<atom:link rel="search" type="application/opensearchdescription+xml" href="https://c22blog.wordpress.com/osd.xml" title="Cатсн²² (in)sесuяitу / ChrisJohnRiley" />
	<atom:link rel='hub' href='https://c22blog.wordpress.com/?pushpress=hub'/>
	<item>
		<title>[DeepSec 2015]50 Shades of WAF</title>
		<link>https://c22blog.wordpress.com/2015/11/19/deepsec-201550-shades-of-waf/</link>
		
		<dc:creator><![CDATA[ChrisJohnRiley]]></dc:creator>
		<pubDate>Thu, 19 Nov 2015 16:26:40 +0000</pubDate>
				<category><![CDATA[Conference]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[deepsec]]></category>
		<guid isPermaLink="false">http://blog.c22.cc/?p=28476</guid>

					<description><![CDATA[Mastodon 50 Shades of WAF &#8211; Exemplified at Barracuda &#38; Sucuri Ashar Javed (Hyundai AutoEver Europe GmbH) This talk will present 50 (25*2) bypasses of Barracuda and Sucuri&#8217;s WAF default signatures that deal with Cross-Site Scripting (XSS). 150,000 organizations worldwide including Fortune 1000 companies are using Barracuda while around 10,000 web applications are behind Sucuri&#8217;s [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a rel="me" href="https://infosec.exchange/@ChrisJohnRiley">Mastodon</a><br />
<a href="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png"><img data-attachment-id="28070" data-permalink="https://c22blog.wordpress.com/2014/11/20/deepsec-2014-the-measured-cso-alex-hutton/deepseclogo/" data-orig-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" data-orig-size="262,55" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="DeepSecLogo" data-image-description="" data-image-caption="" data-medium-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" data-large-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" class="wp-image-28070 size-full alignright" style="margin:10px;" src="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=630" alt="DeepSecLogo"   srcset="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png 262w, https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=150&amp;h=31 150w" sizes="(max-width: 262px) 100vw, 262px"></a></p>
<p><a href="https://deepsec.net/speaker.html#PSLOT213">50 Shades of WAF &#8211; Exemplified at Barracuda &amp; Sucuri</a><br />
Ashar Javed (Hyundai AutoEver Europe GmbH)</p>
<blockquote><p>This talk will present 50 (25*2) bypasses of Barracuda and Sucuri&#8217;s WAF default signatures that deal with Cross-Site Scripting (XSS). 150,000 organizations worldwide including Fortune 1000 companies are using Barracuda while around 10,000 web applications are behind Sucuri&#8217;s cloud-based WAF. The XSS bypasses we will present in this talk are also applicable to other WAFs. All bypasses were responsibly reported to the vendors and most of them were fixed. Further, we will show XSS in Barracuda&#8217;s admin interface and in their web application. Finally, we will present one unfixed bypass of Barracuda and Sucuri and will see how quickly vendors will react to fix it, given it will make thousands of sites vulnerable.</p></blockquote>
<h3>&nbsp;Barracuda</h3>
<p>150,000 organizations use Barracuda Networks technology.</p>
<p>Over 10 months&nbsp;during 2014/2015 Barracuda had 7 updates of their ruleset, none of which included XSS. 6 months after that, they released 5 updates and 1 firmware patch that included fixes for XSS issues. Updating is hard, meaning there are a lot of WAFs out there that are letting XSS attacks through.</p>
<p>How to detect Barracuda&#8230; if you see this message, then you&#8217;re looking at Barracuda:</p>
<blockquote><p>The specified URL cannot be found</p></blockquote>
<p>After testing the regular expressions used to detect XSS, their was a number of XSS discovered.</p>
<h4>Event Handlers</h4>
<p>4 separate regexes handling event handlers.</p>
<p>Large number of event handlers missing, and the ones in the regex are hard-coded (for logging and tracking purposes).</p>
<ul>
<li>ontoggle</li>
<li>onsearch</li>
<li>onlaungaugechange</li>
<li>oncuechange</li>
<li>ondragexit</li>
<li>&#8230;</li>
</ul>
<p>Moving to a more generic event handler detection e.g. on(.*) would catch these.</p>
<p>However, even if the event handler was detected it was bypassable. However the logic didn&#8217;t allow for backtick (`) which is supported in some browsers. It was also possible to bypass by injecting a newline between the equals and quotes (onclick=%0A&#8221;stuff&#8221;). This was due to the use of &#8220;.&#8221; in the regex, which matches anything except a newline.</p>
<p>meta tags where also treated differently, resulting in a number of ways of bypassing the filters. The same issues existed in a number of html tags.</p>
<p>Some other issues that cause bypasses:</p>
<ul>
<li>Tags &lt; 10 chars</li>
<li>Tags alphanumeric</li>
<li>Tags are closed properly</li>
<li>Data URI JS injection (resulted in multiple issues)</li>
<li>expression</li>
</ul>
<p>All these Regexes work together to detect issues. However these are not always turned on. They need to activated, and whitelisting specific checks may have a knock-on effect in other areas where mutliple regexes are needed for detection.</p>
<p>Constant tweaks to the payload and complexity of the regexes results in false positives. The knock-on effect of this is disabling of protections, which lowers overall the level of security.</p>
<p>Some of the bypasses effected the BarracudaNetworks.com login page and stored XSS in their main admin interface.</p>
<p><strong><em>Takeaway</em></strong>: Updated to 1.102 version and apply the firmware patch 8.0.1</p>
<h3>Sucuri</h3>
<p>Cloud-based WAF&#8230; priced cheaper than a takeaway pizza.</p>
<p>Sucuri offers a bug bounty (through <a href="https://hackerone.com/sucuri" target="_blank">HackerOne</a>) on bypasses.</p>
<p>A large number of bypasses using encoding, backticks, unclosed tags, VBscript&#8230;</p>
<p>Blocked all onmouse*, onkey*, and many many more. Blacklists are a zero sum game.</p>
<p>Blocking of script tags appeared work well, however &lt;script%2fsrc was a workable bypass technique. There&#8217;s always new bypasses, and almost an endless way to bypass the protections given enough time.</p>
<h3>Conclusion</h3>
<p>WAFs are not the only protection layer. It can be an extra layer, but not the only defense.</p>
<p><strong>Links:</strong></p>
<ul>
<li>Presentation <a href="https://deepsec.net/speaker.html#PSLOT213" target="_blank">Abstract</a></li>
<li>Ashar Javed&nbsp;<a href="@soaj1664ashar" target="_blank">Twitter</a></li>
</ul>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28476</post-id>
		<media:content url="https://0.gravatar.com/avatar/37074c21dd813b3edcaa5d040fca6abd2fb9ab5a6a6d0ee87e906ccaed60f0d7?s=96&#38;d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">ChrisJohnRiley</media:title>
		</media:content>

		<media:content url="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" medium="image">
			<media:title type="html">DeepSecLogo</media:title>
		</media:content>
	</item>
		<item>
		<title>[DeepSec 2015] File Format Fuzzing in Android &#8211; Giving a Stagefright to the Android Installer</title>
		<link>https://c22blog.wordpress.com/2015/11/19/deepsec-2015-file-format-fuzzing-in-android-giving-a-stagefright-to-the-android-installer/</link>
		
		<dc:creator><![CDATA[ChrisJohnRiley]]></dc:creator>
		<pubDate>Thu, 19 Nov 2015 11:48:54 +0000</pubDate>
				<category><![CDATA[Conference]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[deepsec]]></category>
		<guid isPermaLink="false">http://blog.c22.cc/?p=28395</guid>

					<description><![CDATA[File Format Fuzzing in Android &#8211; Giving a Stagefright to the Android Installer Alexandru Blanda (Intel Corporation)  The presentation focuses on revealing a fuzzing approach that can be used to uncover different types of vulnerabilities inside multiple core system components of the Android OS. The session will be targeted on exposing the general idea behind this approach and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png"><img data-attachment-id="28070" data-permalink="https://c22blog.wordpress.com/2014/11/20/deepsec-2014-the-measured-cso-alex-hutton/deepseclogo/" data-orig-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" data-orig-size="262,55" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="DeepSecLogo" data-image-description="" data-image-caption="" data-medium-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" data-large-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" class="wp-image-28070 size-full alignright" style="margin:10px;" src="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=630" alt="DeepSecLogo"   srcset="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png 262w, https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=150&amp;h=31 150w" sizes="(max-width: 262px) 100vw, 262px" /></a></p>
<p><a href="https://deepsec.net/speaker.html#PSLOT199">File Format Fuzzing in Android &#8211; Giving a Stagefright to the Android Installer</a><br />
<em>Alexandru Blanda (Intel Corporation)</em></p>
<blockquote><p> The presentation focuses on revealing a fuzzing approach that can be used to uncover different types of vulnerabilities inside multiple core system components of the Android OS. The session will be targeted on exposing the general idea behind this approach and how it applies to several real-life targets from the Android OS, with examples of actual discovered vulnerabilities. These vulnerabilities affect critical components of the Android OS and the audience will have the opportunity to learn about the way they were discovered and possible exploit scenarios. The most important targets that will be included in the talk: the Android APK installer and the Stagefright media framework.</p></blockquote>
<h3></h3>
<p>An approach that can be used for file-format fuzzing on Android</p>
<h3>File Format Fuzzing</h3>
<p>First steps in file format fuzzing:</p>
<ul>
<li>Data Generation</li>
<li>Log process (Execute Tests)</li>
<li>Triage mechanism</li>
<li>Analyze and Debug crashes</li>
</ul>
<p>If the fuzzing is successful, triage and categorization of the issues is an important step to avoid being overwhelmed by responses.</p>
<p><em>Data Generation</em></p>
<p>Mutational vs. generational Fuzzing</p>
<p>Maintain the structural validity of the file being processed. The target needs to accept that the file is valid otherwise it won&#8217;t run.</p>
<p>Tools use for test-case generation:</p>
<ul>
<li>Basic Fuzzing Framework (BFF)</li>
<li>FuzzBox</li>
<li>Radamsa</li>
<li>American Fuzzy Lop (AFL)</li>
</ul>
<p><em>Log Process</em></p>
<p>To find out what&#8217;s happening with the test-cases we send to the Android device, we need to check the logs. This can be read out using the logcat on the device. This can be done by looking for Fatal messages and seeding the logcat before and after the run to identify the test case details and information required to reproduce.</p>
<pre style="padding-left:30px;">adb shell logcat -v time *:F</pre>
<p><em>Triage Mechanism</em></p>
<p>Each time a crash occurs a tombstone file is created under /data/tombstones and /data/system/dropbox. This data is important to have for triaging the issues and tracking the various crashes.</p>
<p>By looking at the value where the crash occurs you can collect a unique list of crashes without duplicates.</p>
<ol>
<li>Parse logcat for input that causes crashes</li>
<li>Execute input to cause the crash again</li>
<li>Grab the Tombstone data to check against existing know issues</li>
</ol>
<p><em>Analyze and Debug Crashes</em></p>
<p>After triage maybe you have 2 or 3 interesting crashes to investigate. Using the Tombstone data can give a good indication of the severity and location of where the crash occurs. Dmesg also gives a good source of information.</p>
<p>Using gdbserver you can debug crashes on the device. gdb can then be used to start a remote debugging session (make sure you set the Android debugging symbols).</p>
<p>addr2line can be useful in getting the information on where the call took place (example: where libstagefright called libc.so)</p>
<h3>Fuzzing the Stagefright Media Framework</h3>
<p>Media files are interesting attack vectors as the contain complex data and result in a large attack surface (audio, video, images, etc&#8230;). Media files are also seen as innocuous to users, and can be played through various sources without the users consent (MMS etc..).</p>
<p>Easiest way to test was the build the stagefright CLI tool (frameworks/av/cmds/stagefright) and calling it from the Android command line for testing.</p>
<p>Initially started fuzzing in early 2014&#8230; thousands of crashes (needed a triage mechanism to cope). First severe issues reported to Google in September 2014.</p>
<h3>Fuzzing the Android application installer</h3>
<p>The application installer is an attractive target (runs with high system privileges). If an attacker can exploit this, the impact will be high. The installer also allows for unprivileged users to send input to system components.</p>
<p>The process of application installation differs between ART and Dalvik (Lollipop and KitKat respectively).</p>
<p>Extract the APK, fuzz the components to be tested, repack</p>
<p>ART is easier as alterations can be made without extraction.</p>
<p>Modifications to the APK will result in an application signature mismatch. This means that the APK will need to be re-signed before testing.</p>
<h3>Fuzzing with AFL in Android</h3>
<p>Android port of the tool developed by Adrian Denkiewicz of Intel</p>
<p>Using alongside <a href="https://github.com/fuzzing/MFFA" target="_blank">MFFA</a> to discover issues. In some cases, AFL reported crashes that could not be confirmed when running the test case singularly.</p>
<p>This method of testing showed some results that were not seen in other tests (1 high RCE issue, and several low severity issues).</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>Links:</strong></p>
<ul>
<li>Presentation <a href="https://deepsec.net/speaker.html#PSLOT199" target="_blank">Abstract</a></li>
<li>Presentation <a href="https://www.blackhat.com/docs/eu-15/materials/eu-15-Blanda-Fuzzing-Android-A-Recipe-For-Uncovering-Vulnerabilities-Inside-System-Components-In-Android-wp.pdf" target="_blank">Paper</a></li>
<li>Alexandru Blanda <a href="@bigdinrock" target="_blank">Twitter</a></li>
</ul>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28395</post-id>
		<media:content url="https://0.gravatar.com/avatar/37074c21dd813b3edcaa5d040fca6abd2fb9ab5a6a6d0ee87e906ccaed60f0d7?s=96&#38;d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">ChrisJohnRiley</media:title>
		</media:content>

		<media:content url="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" medium="image">
			<media:title type="html">DeepSecLogo</media:title>
		</media:content>
	</item>
		<item>
		<title>[DeepSec 2015]How to Break XML Encryption – Automatically</title>
		<link>https://c22blog.wordpress.com/2015/11/19/deepsec-2015how-to-break-xml-encryption-automatically/</link>
		
		<dc:creator><![CDATA[ChrisJohnRiley]]></dc:creator>
		<pubDate>Thu, 19 Nov 2015 10:57:26 +0000</pubDate>
				<category><![CDATA[Conference]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[deepsec]]></category>
		<guid isPermaLink="false">http://blog.c22.cc/?p=28314</guid>

					<description><![CDATA[How to Break XML Encryption – Automatically Juraj Somorovsky (Ruhr University Bochum) In recent years, XML Encryption became a target of several new attacks. These attacks belong to the family of adaptive chosen-ciphertext attacks, and allow an adversary to decrypt symmetric and asymmetric XML ciphertexts, without knowing the secret keys. In order toprotect XML Encryption [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png"><img data-attachment-id="28070" data-permalink="https://c22blog.wordpress.com/2014/11/20/deepsec-2014-the-measured-cso-alex-hutton/deepseclogo/" data-orig-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" data-orig-size="262,55" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="DeepSecLogo" data-image-description="" data-image-caption="" data-medium-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" data-large-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" class="wp-image-28070 size-full alignright" style="margin:10px;" src="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=630" alt="DeepSecLogo"   srcset="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png 262w, https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=150&amp;h=31 150w" sizes="(max-width: 262px) 100vw, 262px" /></a></p>
<p><a href="https://deepsec.net/speaker.html#PSLOT198" target="_blank">How to Break XML Encryption – Automatically</a><br />
<em>Juraj Somorovsky (Ruhr University Bochum)</em></p>
<blockquote><p>In recent years, XML Encryption became a target of several new attacks. These attacks belong to the family of adaptive chosen-ciphertext attacks, and allow an adversary to decrypt symmetric and asymmetric XML ciphertexts, without knowing the secret keys. In order toprotect XML Encryption implementations, the World Wide Web Consortium (W3C) published an updated version of the standard.</p>
<p>Unfortunately, most of the current XML Encryption implementations do not support the newest standard and offer different XML Security configurations to protect confidentiality of the exchanged messages. Resulting from the attack and specification complexity, evaluation of the security configuration correctness becomes tedious and error prone.<br />
In this talk, we will first give an overview on Web Service specific attacks. Afterwards, we present attacks on XML Encryption and how to evaluate security of XML Encryption interfaces automatically. Our algorithm can detect a vulnerability and exploit it to retrieve a plaintext from an encrypted message. To assess practicability of our approach, we implemented an open source attack plugin for Web Service attacking tool called WS-Attacker. With the plugin, we discovered new security problems in four out of five analyzed Web Service implementations, including IBM Datapower or Apache CXF.</p></blockquote>
<h3>What is a WebService and XML Security</h3>
<p>SOAP WebService are a standard that allows you to execute a function on the server and receive a response (remote procedure calls). This range from simple to very complex requests.</p>
<p>There are many ways to secure this communication. SSL/TLS can be used to secure the tunnel between the client and server (transport communication). The broker however (the server in this case) can see the data. To stops this from happening, you need to encrypt the data within the SOAP request using something like XML Security.</p>
<p>XML Security consists of 2 standards (XML Signature and XML Encryption). This can be used to protect to the entire document, or sections individually.</p>
<h3>XML Signature Wrapping</h3>
<p>One of the problems of XML Security is XML Signature wrapping. As the XML signature should protect against alteration to the document, by allowing validation of specific elements.</p>
<p>An attacker can however relocate the signed element, maintaining the valid signature. Then an attacker can add additional data to the request that are understood by the application layer. As the verification and application logic are separate, the verification will pass due to the presence of a valid signature. The application will then accept the attackers data as validated when it hasn&#8217;t been confirmed at the validation layer.</p>
<p>This problem was seen in 2011 in Amazon Web Services by bypassing signed SOAP requests. This resulted in the ability for an active attacker to alter the SOAP data and start instances without permission.</p>
<p>Further attacks against SAML were performed, where &lt;10 out of 22 systems tested were vulnerable to signature wrapping attacks.</p>
<h3>Attacks on XML encryption</h3>
<p>In most cases XML Encryption uses a hybrid encryption scheme (Asymmetric and symmetric keys). Published attacks (2011/2012) exist for both portions of the encryption (adapted chosen-ciphertext attacks) using the server as an oracle.</p>
<p>&nbsp;</p>
<p>XML is a text-based data format. Therefore it must be parsed to be understood (usually ASCII encoded). Certain ASCII characters are not parseable or can be excluded. This reduces the understood character set and makes the attack easier.</p>
<p><em>Validity oracle</em></p>
<ol>
<li>Content Decryption</li>
<li>XML parsing</li>
<li>XML Evaluation</li>
</ol>
<p>Be using this oracle and checking the error type returned, it&#8217;s possible to see if the failure occurs at the decryption of parsing phase.</p>
<p>This attack is made possible as an attacker can flip bits in the request. Cipher Block Chaining Mode has been discussed previously in several padding oracle attacks.</p>
<p>Performance (against Symmetric encryption): 14 queries / pain-text byte</p>
<p>&nbsp;</p>
<h3>How to analyze WebServices Automatically</h3>
<p>WS-Attacker tool &#8211; https://github.com/RUB-NDS/WS-Attacker</p>
<p>Automated tool to validate attacks against WebServices, implementing XML Signature wrapping and sending requests to the oracle to validate if the system is vulnerable.</p>
<p>If the oracle can be identified, the attack is performed.</p>
<p>Examples of vulnerable systems discovered in testing:</p>
<ul>
<li>Apache Axis2</li>
<li>Apache CXF</li>
<li>Axway Gateway</li>
<li>IBM DataPower</li>
<li>Microsoft WCF</li>
</ul>
<h3></h3>
<p>Countermeasures that were in place for Apache CXF were found to be incorrectly implemented, resulting it being vulnerable to attack.</p>
<h3>Conclusion</h3>
<p>XML is very complicated, so application of XML Encryption should be validated using tools like WS-Attacker to ensure that it&#8217;s not vulnerable.</p>
<p>This attack is also applies to other scenarios like SAML, JSON, Web Crypto</p>
<p>Prefer authentication encryption (AES-GCM instead of AES-CBC)</p>
<p><strong>Links:</strong></p>
<ul>
<li>Presentation <a href="https://deepsec.net/speaker.html#PSLOT198" target="_blank">Abstract</a></li>
<li>Juraj Somorovsky <a href="@jurajsomorovsky" target="_blank">Twitter</a></li>
<li>WS-Attacker &#8211; <a href="https://github.com/RUB-NDS/WS-Attacker" target="_blank">Github</a> &#8211; <a href="http://web-in-security.blogspot.co.at/2015/04/introduction-to-ws-attacker-xml.html" target="_blank">Blogpost</a></li>
<li>How to Break XML Encryption – Automatically <a href="https://www.usenix.org/system/files/conference/woot15/woot15-paper-kupser.pdf" target="_blank">Paper</a></li>
</ul>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28314</post-id>
		<media:content url="https://0.gravatar.com/avatar/37074c21dd813b3edcaa5d040fca6abd2fb9ab5a6a6d0ee87e906ccaed60f0d7?s=96&#38;d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">ChrisJohnRiley</media:title>
		</media:content>

		<media:content url="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" medium="image">
			<media:title type="html">DeepSecLogo</media:title>
		</media:content>
	</item>
		<item>
		<title>[DeepSec 2015] Hacking Cookies in Modern Web Applications and Browsers</title>
		<link>https://c22blog.wordpress.com/2015/11/19/deepsec-2015-hacking-cookies-in-modern-web-applications-and-browsers/</link>
		
		<dc:creator><![CDATA[ChrisJohnRiley]]></dc:creator>
		<pubDate>Thu, 19 Nov 2015 09:48:49 +0000</pubDate>
				<category><![CDATA[Conference]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[deepsec]]></category>
		<guid isPermaLink="false">http://blog.c22.cc/?p=28238</guid>

					<description><![CDATA[Hacking Cookies in Modern Web Applications and Browsers Dawid Czagan (Silesia Security Lab) Since cookies store sensitive data (session ID, CSRF token, etc.) they are interesting from an attacker&#8217;s point of view. As it turns out, quite many web applications (including sensitive ones like bitcoin platforms) have cookie related vulnerabilities, that lead, for example, to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png"><img loading="lazy" data-attachment-id="28070" data-permalink="https://c22blog.wordpress.com/2014/11/20/deepsec-2014-the-measured-cso-alex-hutton/deepseclogo/" data-orig-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" data-orig-size="262,55" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="DeepSecLogo" data-image-description="" data-image-caption="" data-medium-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" data-large-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" class="wp-image-28070 size-full alignright" style="margin:10px;" src="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=630" alt="DeepSecLogo"   srcset="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png 262w, https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=150&amp;h=31 150w" sizes="(max-width: 262px) 100vw, 262px" /></a></p>
<p><a href="https://deepsec.net/speaker.html#PSLOT196" target="_blank">Hacking Cookies in Modern Web Applications and Browsers</a><br />
<em>Dawid Czagan (Silesia Security Lab)</em></p>
<blockquote><p>Since cookies store sensitive data (session ID, CSRF token, etc.) they are interesting from an attacker&#8217;s point of view. As it turns out, quite many web applications (including sensitive ones like bitcoin platforms) have cookie related vulnerabilities, that lead, for example, to user impersonation, remote cookie tampering, XSS and more.</p>
<p>Developers tend to forget that multi-factor authentication does not help if cookies are insecurely processed. Security evaluators underestimate cookie related problems. Moreover, there are problems with the secure processing of cookies in modern browsers. And browser dependent exploitation can be used to launch more powerful attacks.</p>
<p>That&#8217;s why secure cookie processing (from the perspective of web application and browser) is a subject worth discussing. The following topics will be presented:</p>
<p>&#8211; cookie related vulnerabilities in web applications<br />
&#8211; insecure processing of secure flag in modern browsers<br />
&#8211; bypassing HttpOnly flag in Safari<br />
&#8211; problems with Domain attribute in Internet Explorer<br />
&#8211; cookie tampering in Safari<br />
&#8211; underestimated XSS via cookie<br />
&#8211; HTTP Strict Transport Security (HSTS)<br />
&#8211; importance of regeneration<br />
&#8211; and more</p></blockquote>
<p>Why are we interested in Cookies&#8230;</p>
<p>Even when an application enforced 2 Factor Authentication, an attacker can gain access by getting the cookies. Security is always measured at the least protected part. If Cookies aren&#8217;t correctly protected, then even a 2FA system can be bypassed.</p>
<p>Many testers underestimate the security issues caused by mis-configured Cookie protections. Exploitation of Cookie related issues is not limited to local attacks.</p>
<p>Browsers also have issues dealing with secure Cookie processing. These kind of issues can be combined with application issues to make attacks on cookies more impactful.</p>
<p>What are the consequences of insecure Cookie processing?</p>
<ul>
<li>SQL injection</li>
<li>XSS</li>
<li>User impersonation</li>
<li>&#8230;</li>
</ul>
<h3>Web Application</h3>
<h4>Secure flag and HSTS</h4>
<p>Setting &#8220;Secure&#8221; on Cookies protects the confidentiality of the cookies by making sure that they are only send over secure connections.</p>
<p>RFC6265 prevents this cookie being sent over unencrypted HTTP, however it specifically allows an attacker to overwrite a cookie in the browser. This allows an attacker to inject a cookie (new or overwriting an existing cookie) that will be used in the HTTPS protected sessions.</p>
<p>HSTS to the rescue&#8230; even if a Cookie is not marked as &#8220;Secure&#8221; an HSTS header will tell the browser to only communicate over HTTPS. Therefore it&#8217;s not required to set &#8220;Secure&#8221; right&#8230; wrong!</p>
<p>Although HSTS works fine, as long as it&#8217;s supported by all major browsers. This is not the case with HSTS, as Internet Explorer 10 doesn&#8217;t support it.</p>
<p>Setting both &#8220;Secure&#8221; and HSTS is the safest mechanism here&#8230; to ensure maximum security.</p>
<h4>Importance of regeneration</h4>
<p>If session IDs are regenerated after a session change (logon, logout, etc&#8230;) then this may allow an attacker access (session fixation).</p>
<p>An attacker who can learn the value of the Cookie prior to the user authenticating, can re-use this knowledge once the Cookie is authenticated.</p>
<p>All Cookies with sensitive data or used within the application should be regenerated on a state change (include CSRF tokens etc&#8230;)</p>
<h4>Server-side invalidation</h4>
<p>Just because the session cookie is deleted by the users browser, doesn&#8217;t mean that it&#8217;s invalidated on the server. This can lead to issues where the session remains open, however the server still has a valid session.</p>
<h4>HttpOnly Flag</h4>
<p>Assigning this flag prevents a non-HTTP API (e.g JavaScript) from reading out the session Cookie&#8230; the theory being, that it can be used to protect against XSS attacks stealing the session Cookies.</p>
<p>Problems here are that RFC6265 talks about &#8220;reading&#8221; the cookie. However non-HTTP API can still write or overwrite depending on how the RFC is understood and implemented.</p>
<p>Specific browsers (e.g. Safari 9) will allow you to overwrite the cookie. This means that an XSS vulnerability can overwrite the Cookie and switch the user into an attacker controlled account. If the user can then be prompted to enter private data into this session, it is exposed to the attacker.</p>
<p>Combining this with the previously seen session fixation issue (Cookie value not changed after state change). This would allow an attacker to set a known Cookie and use it to gain access to a user&#8217;s session once they authenticate.</p>
<h4>Domain Attribute</h4>
<p>RFC6265 says &#8211; When a domain attribute is not specified, then it should only be sent to the domain where it originated.</p>
<p>However Internet Explorer 11 sends this Cookie to all subdomains of this domain.</p>
<p>This can be a real issue where a cookie is set on example.com where a sensitive application lives under example.com/wallet. The cookie is set without the domain attribute, according to the RFC. In Internet Explorer 11 this means that the user will also send this Cookie to sub-domains that are less sensitive, meaning an XSS in test.example.com can read out the Cookie value.</p>
<p>This kind of leakage can happen to externally hosted domains. As the rules only take effect on the Domain name, the fact that the site is hosted externally is incidental, however may expose sensitive data to a 3rd party vendor.</p>
<h4>Cookie Tampering</h4>
<p>Safari 9 allows comma-separated lists of Cookies (taken from the obsoleted RFC2109)</p>
<p>Example:</p>
<pre style="padding-left:30px;">/index.php?lang=de,%20PHPSESSID=abc</pre>
<p>As this is taken from the request and put into the Set-Cookie header, it allows an attacker fully remotely to tamper with the Cookie jar of the user. This allows changing the users account, as discussed previously.</p>
<p>It&#8217;s also possible to perform XSS via Cookie without locally setting a Cookie.</p>
<h4>Underestimated XS via Cookie</h4>
<p>Commonly this issue has a low assigned risk as the Cookie value has to be set locally. However if you can gain access to a low sensitive website on a subdomain like x.example.com, you can set a Cookie for y.example.com in order to exploit the user without local access to the browser.</p>
<p>Response splitting also allows exploitation of this issue, by allowing an attacker to set a Cookie by injecting a Set-Cookie header to place the XSS into the browser&#8217;s Cookie Jar.</p>
<h3></h3>
<h3>Conclusions</h3>
<ul>
<li>Educate development teams about the risks of Cookies</li>
<li>Discuss/improve RFC 6265</li>
<li>Cooperate with Browser vendors</li>
</ul>
<p>&nbsp;</p>
<p><strong>Links:</strong></p>
<ul>
<li>Presentation <a href="https://deepsec.net/speaker.html#PSLOT196" target="_blank">Abstract</a></li>
<li>Dawid Czagan <a href="@dawidczagan" target="_blank">Twitter</a></li>
<li>RFC <a href="https://tools.ietf.org/html/rfc6265" target="_blank">6265</a></li>
</ul>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28238</post-id>
		<media:content url="https://0.gravatar.com/avatar/37074c21dd813b3edcaa5d040fca6abd2fb9ab5a6a6d0ee87e906ccaed60f0d7?s=96&#38;d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">ChrisJohnRiley</media:title>
		</media:content>

		<media:content url="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" medium="image">
			<media:title type="html">DeepSecLogo</media:title>
		</media:content>
	</item>
		<item>
		<title>[DeepSec 2015] Can societies manage the SIGINT monster?</title>
		<link>https://c22blog.wordpress.com/2015/11/19/deepsec-2015-can-societies-manage-the-sigint-monster/</link>
		
		<dc:creator><![CDATA[ChrisJohnRiley]]></dc:creator>
		<pubDate>Thu, 19 Nov 2015 08:54:11 +0000</pubDate>
				<category><![CDATA[Conference]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[deepsec]]></category>
		<guid isPermaLink="false">http://blog.c22.cc/?p=28165</guid>

					<description><![CDATA[Can societies manage the SIGINT monster? Duncan Campbell (IPTV Ltd) Behind closed doors, ubiquitous surveillance systems have evolved in parallel to and hidden within the global communications infrastructure. Developments in signals intelligence (Sigint) technology and tradecraft have shadowed all new telecommunications developments. Sigint agencies have covertly sought to lead, change, and subvert arrangements that IT [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png"><img loading="lazy" data-attachment-id="28070" data-permalink="https://c22blog.wordpress.com/2014/11/20/deepsec-2014-the-measured-cso-alex-hutton/deepseclogo/" data-orig-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" data-orig-size="262,55" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="DeepSecLogo" data-image-description="" data-image-caption="" data-medium-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" data-large-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" class="wp-image-28070 size-full alignright" style="margin:10px;" src="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=630" alt="DeepSecLogo"   srcset="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png 262w, https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=150&amp;h=31 150w" sizes="(max-width: 262px) 100vw, 262px" /></a></p>
<p><a href="https://deepsec.net/speaker.html#PSLOT227" target="_blank">Can societies manage the SIGINT monster?</a><br />
<em>Duncan Campbell (IPTV Ltd)</em></p>
<blockquote><p>Behind closed doors, ubiquitous surveillance systems have evolved in parallel to and hidden within the global communications infrastructure. Developments in signals intelligence (Sigint) technology and tradecraft have shadowed all new telecommunications developments. Sigint agencies have covertly sought to lead, change, and subvert arrangements that IT practitioners make for security and privacy.</p></blockquote>
<p>Everybody with an open data connection is being monitored and recorded at all time.</p>
<p>We <strong>can</strong> do privacy and security. The fallacy that we can&#8217;t have both needs to be disproven.</p>
<p>Even though there&#8217;s no wall of sheep here, there is an embassy only meters from the hotel were this conference takes place. On the rooftop of the British embassy there is massive surveillance and recording equipment. Phased arrays trying to scan and record anything within range.</p>
<p>This kind of system was exposed in the Snowden document leaks, and boasts a range of collection types (WiFi, CDMA, GSM, Satellite, WiMAX, Microwave, &#8230;).</p>
<p>To the other side of the Danube, sitting atop the United Nations tower is an almost identical tower (part of a project called STATEROOM). These are covert special collection sites.</p>
<p>Other collection points exist at the US embassy in Vienna&#8230; and are listed in the Snowden leaks.</p>
<p>Outside of Vienna, there are obviously other monitoring stations, including the famous event in Athens were GSM networks were monitored resulting in the <a href="https://theintercept.com/2015/09/28/death-athens-rogue-nsa-operation/" target="_blank">death</a> of a telecom employee.</p>
<p>Austria has a history of being central to monitoring within europe dating back many years. These capabilities have only expanded under the RAMPART program, accessing international communications from around the world. These 3rd party relationships are key to the US monitoring plans.</p>
<p>Access to communications data and monitoring is traded for access to advanced techniques and technologies.</p>
<p>Austria is only one part of the process&#8230; with data flowing through Germany and back to Washington for further analysis.</p>
<p>Without knowing the language used to describe things, the Snowden documents (and others) are hard to decipher. The word hacking isn&#8217;t used, instead being replaced with words such as &#8220;touch&#8221; and &#8220;implant&#8221; to describe malware.</p>
<h4>A brief history of sessionizers</h4>
<ul>
<li>1998 First optical fibre rate sessionizers</li>
<li>2000 Grandmaster</li>
<li>2002 WEALTHCLUSTER (known publicly as DPI)</li>
<li>2006 TURMOIL (also known as TULLURIAN)</li>
<li>2010 Increased to 10 Gbps</li>
<li>2013 100 Gbps (post Snowden information)</li>
</ul>
<p>This data is all then fed into projects like XKeystore&#8230; however this is a broken system as the recent attacks in Paris show.</p>
<p>Extraordinary mis-purposing of systems designed for one use, but resulting in the large-scale collection of data from civilians.</p>
<blockquote><p>Massive amounts of information, incompetent tools, coupled with wide reaching monitoring.</p></blockquote>
<p>XKeystore runs on MySQL, relies on Crontab, and uses CADENCE, an ancient and inefficiently designed system (scaled up from the days of telegraphy).</p>
<blockquote><p>Little intelligence value&#8230;</p>
<p>You give them big data, and they screw up badly&#8221;</p></blockquote>
<p>Anything that they can&#8217;t get is their biggest target. Access to mobile communications, leading to attacks on Belgacom to get insight into their network and communications.</p>
<p>Even with all that access however, they still don&#8217;t do their job. Stealing data, but not stopping the attacks that they are meant to detect by invading this privacy.</p>
<p>Recent Wikeleaks data shows that US monitoring stations in the EU are targeting politicians and business talks&#8230; and not attempting to try and find the bad guys.</p>
<p>Going for data at scale, exposes their overreach and inability to gain meaningful insight from the data.</p>
<blockquote><p>Privacy and Security do not trade-off against each other&#8230; it&#8217;s not a zero sum game!</p></blockquote>
<p><strong>Links:</strong></p>
<ul>
<li>Presentation <a href="https://deepsec.net/speaker.html#PSLOT227" target="_blank">Abstract</a></li>
<li>Presentation <a href="http://blog.deepsec.net/deepsec-2015-keynote-can-societies-manage-the-sigint-monster/" target="_blank">Blogpost</a></li>
<li>Duncan Campbell <a href="https://en.wikipedia.org/wiki/Duncan_Campbell_(journalist)" target="_blank">Bio</a></li>
</ul>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28165</post-id>
		<media:content url="https://0.gravatar.com/avatar/37074c21dd813b3edcaa5d040fca6abd2fb9ab5a6a6d0ee87e906ccaed60f0d7?s=96&#38;d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">ChrisJohnRiley</media:title>
		</media:content>

		<media:content url="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" medium="image">
			<media:title type="html">DeepSecLogo</media:title>
		</media:content>
	</item>
		<item>
		<title>[LHS Microcast] DeepSec 2015</title>
		<link>https://c22blog.wordpress.com/2015/10/19/lhs-microcase-deepsec-2015/</link>
		
		<dc:creator><![CDATA[ChrisJohnRiley]]></dc:creator>
		<pubDate>Mon, 19 Oct 2015 20:30:16 +0000</pubDate>
				<category><![CDATA[Conference]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[deepsec]]></category>
		<guid isPermaLink="false">http://blog.c22.cc/?p=28161</guid>

					<description><![CDATA[Chris sits down with Mika and René from the DeepSec conference to talk a little bit about what the upcoming conference and how embedded dependencies are causing such headaches in security.]]></description>
										<content:encoded><![CDATA[<p><a href="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png"><img loading="lazy" data-attachment-id="28070" data-permalink="https://c22blog.wordpress.com/2014/11/20/deepsec-2014-the-measured-cso-alex-hutton/deepseclogo/" data-orig-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" data-orig-size="262,55" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="DeepSecLogo" data-image-description="" data-image-caption="" data-medium-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" data-large-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" class="size-thumbnail wp-image-28070 alignright" src="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=150&#038;h=31" alt="DeepSecLogo" width="150" height="31" srcset="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=150 150w, https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png 262w" sizes="(max-width: 150px) 100vw, 150px" /></a></p>
<p>Chris sits down with Mika and René from the<a href="http://deepsec.net/" target="_blank"> DeepSec</a> conference to talk a little bit about what the upcoming conference and how embedded dependencies are causing such headaches in security.</p>
<audio class="wp-audio-shortcode" id="audio-28161-1" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3?_=1" /><a href="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3">http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3</a></audio>
]]></content:encoded>
					
		
		<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/mckeay/LHS_MicroCast_DeepSec2015.mp3" length="13775097" type="audio/mpeg" />

		<post-id xmlns="com-wordpress:feed-additions:1">28161</post-id>
		<media:thumbnail url="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" />
		<media:content url="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" medium="image">
			<media:title type="html">DeepSecLogo</media:title>
		</media:content>

		<media:content url="https://0.gravatar.com/avatar/37074c21dd813b3edcaa5d040fca6abd2fb9ab5a6a6d0ee87e906ccaed60f0d7?s=96&#38;d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">ChrisJohnRiley</media:title>
		</media:content>

		<media:content url="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=150" medium="image">
			<media:title type="html">DeepSecLogo</media:title>
		</media:content>
	</item>
		<item>
		<title>[LHS Microcast] Interview w/ Jen Ellis</title>
		<link>https://c22blog.wordpress.com/2015/10/02/lhs-microcast-interview-w-jen-ellis/</link>
		
		<dc:creator><![CDATA[ChrisJohnRiley]]></dc:creator>
		<pubDate>Fri, 02 Oct 2015 13:27:46 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.c22.cc/?p=28157</guid>

					<description><![CDATA[Martin and I took the time to sit down with Jen Ellis at DEF CON this year to discuss the legal system in the US and how it effects researchers and hackers, how the system is flawed, and what steps we should be taking to influence future legal measures. Jen also gives us a little background into [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Martin and I took the time to sit down with Jen Ellis at DEF CON this year to discuss the legal system in the US and how it effects researchers and hackers, how the system is flawed, and what steps we should be taking to influence future legal measures. Jen also gives us a little background into the Wassenaar Arrangement and what it could mean to researchers internationally.</p>
<p>Enjoy</p>
<audio class="wp-audio-shortcode" id="audio-28157-3" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3?_=3" /><a href="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3">http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3</a></audio>
<p>[Download <a href="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3">MP3</a>]</p>
]]></content:encoded>
					
		
		<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/preview/mckeay/LHSMicrocast-BHDC2015-JenEllis.mp3" length="21847101" type="audio/mpeg" />

		<post-id xmlns="com-wordpress:feed-additions:1">28157</post-id>
		<media:content url="https://0.gravatar.com/avatar/37074c21dd813b3edcaa5d040fca6abd2fb9ab5a6a6d0ee87e906ccaed60f0d7?s=96&#38;d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">ChrisJohnRiley</media:title>
		</media:content>
	</item>
		<item>
		<title>Taking out the Eurotrash</title>
		<link>https://c22blog.wordpress.com/2014/12/23/taking-out-the-eurotrash/</link>
		
		<dc:creator><![CDATA[ChrisJohnRiley]]></dc:creator>
		<pubDate>Tue, 23 Dec 2014 13:00:00 +0000</pubDate>
				<category><![CDATA[podcast]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Strange]]></category>
		<category><![CDATA[eurotrash]]></category>
		<guid isPermaLink="false">http://blog.c22.cc/?p=28134</guid>

					<description><![CDATA[Regular listeners are probably already aware by now, that the Eurotrash is no more! As with all good things, there had to be an end, and with the last Christmas episode, we got the old crew back together for one last go around! We&#8217;d like to say that we&#8217;re throwing in the towel because our efforts to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" data-attachment-id="1946" data-permalink="https://c22blog.wordpress.com/2010/09/16/update-new-advanced-penetration-testing-class-from%c2%a0sans/eurotrash_sq/" data-orig-file="https://c22blog.wordpress.com/wp-content/uploads/2010/09/eurotrash_sq.png" data-orig-size="368,254" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="eurotrash_sq" data-image-description="" data-image-caption="" data-medium-file="https://c22blog.wordpress.com/wp-content/uploads/2010/09/eurotrash_sq.png?w=300" data-large-file="https://c22blog.wordpress.com/wp-content/uploads/2010/09/eurotrash_sq.png?w=368" class="alignright wp-image-1946 size-medium" style="margin:20px;" src="https://c22blog.wordpress.com/wp-content/uploads/2010/09/eurotrash_sq.png?w=300&#038;h=207" alt="eurotrash_sq" width="300" height="207" srcset="https://c22blog.wordpress.com/wp-content/uploads/2010/09/eurotrash_sq.png?w=300 300w, https://c22blog.wordpress.com/wp-content/uploads/2010/09/eurotrash_sq.png?w=150 150w, https://c22blog.wordpress.com/wp-content/uploads/2010/09/eurotrash_sq.png 368w" sizes="(max-width: 300px) 100vw, 300px" />Regular listeners are probably already aware by now, that the Eurotrash is no more! As with all good things, there had to be an end, and with the last Christmas episode, we got the old crew back together for one last go around! We&#8217;d like to say that we&#8217;re throwing in the towel because our efforts to solve world hunger and push the middle east peace process through is taking up most of our time, but if I did I&#8217;d only be telling half the truth.</p>
<p>A While ago the crew decided that we weren&#8217;t having enough time to record and edit the way we wanted to… as you can see, the number of episodes in 2014 was down on the previous years, because of lack of time and so many other projects. So, something had to give. We hope you&#8217;ve had a fun journey with us over the years, and it&#8217;s been a pleasure to do.</p>
<p>So, thank you <em>Ben, Craig, Dale, Wim</em>… thank you to the <em>guests</em> over the years for putting up with our silly questions… and most of all, thank <em><strong>YOU</strong></em> the listeners for making us want to do this thing again and again until our hands bled from the editing, and our families were starving on the streets*</p>
<p>So, this Christmas time, don&#8217;t cry for us! Light a candle (<em>or a cigarette</em>), and raise a glass (<em>or a bottle of vodka</em>) to the Eurotrash Security Podcast… gone but not forgotten! Episode 50: The Final One&#8230; <em>evar</em></p>
<p style="text-align:center;">
<div class="embed-soundcloud"><iframe title="Eurotrash50 by EurotrashSecurity" width="630" height="400" scrolling="no" frameborder="no" src="https://w.soundcloud.com/player/?visual=true&#038;url=https%3A%2F%2Fapi.soundcloud.com%2Ftracks%2F181969616&#038;show_artwork=true&#038;maxheight=945&#038;maxwidth=630"></iframe></div>
</p>
<p style="text-align:center;"><em>&#8220;Doesn&#8217;t Ben look hawt in his new work outfit!&#8221;</em></p>
<p><strong>Note</strong>: Past episodes will remain available on <a href="http://eurotrashsecurity.eu" rel="nofollow">http://eurotrashsecurity.eu</a> until such time as  Craig gets so drunk that he forgets to renew the domain… or he pawns it to buy cheap aftershave! So probably a few months at least <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>* Not actually starving</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28134</post-id>
		<media:content url="https://0.gravatar.com/avatar/37074c21dd813b3edcaa5d040fca6abd2fb9ab5a6a6d0ee87e906ccaed60f0d7?s=96&#38;d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">ChrisJohnRiley</media:title>
		</media:content>

		<media:content url="https://c22blog.wordpress.com/wp-content/uploads/2010/09/eurotrash_sq.png?w=300" medium="image">
			<media:title type="html">eurotrash_sq</media:title>
		</media:content>
	</item>
		<item>
		<title>All good things must come to an end</title>
		<link>https://c22blog.wordpress.com/2014/12/22/all-good-things-must-come-to-an-end/</link>
		
		<dc:creator><![CDATA[ChrisJohnRiley]]></dc:creator>
		<pubDate>Mon, 22 Dec 2014 17:00:00 +0000</pubDate>
				<category><![CDATA[General Life]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[R-IT]]></category>
		<category><![CDATA[R-IT CERT]]></category>
		<category><![CDATA[Raiffeisen Informatik]]></category>
		<guid isPermaLink="false">http://blog.c22.cc/?p=28130</guid>

					<description><![CDATA[By the time you read this, I will be gone… no, not like that! Let me start at the beginning. Back in 2008 (when I was still young and almost had hair) I joined a small team (actually it was just 1 person if I remember rightly) at an Austrian company called Raiffeisen Informatik (I [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img class="alignleft" style="margin:8px;" src="https://www.raiffeiseninformatik.at/fileadmin/templates/img/neueStartseite/logo.gif" alt="" width="134" height="80" />By the time you read this, I will be gone… no, not like that! Let me start at the beginning.</p>
<p>Back in 2008 (when I was still young and almost had hair) I joined a small team (<em>actually it was just 1 person if I remember rightly</em>) at an Austrian company called <a href="https://www.raiffeiseninformatik.at/en/" target="_blank">Raiffeisen Informatik</a> (<em>I think that&#8217;s the first time I&#8217;ve written that on the blog… for obvious reasons</em>). It was my first job since moving to Austria, and despite my lack of German skills (<em>I could just about say &#8220;hello&#8221; and &#8220;goodbye&#8221; at the time</em>) they took the chance on me. I&#8217;d like to think it paid off… but who am I to say.</p>
<p>It&#8217;s been more than 6 years since that day, and the team at what became <a href="http://www.first.org/members/teams/r-it_cert" target="_blank">R-IT CERT</a> has expanded from it&#8217;s early days considerably. As the title suggests, today was my last day at R-IT CERT… and it&#8217;s a bitter sweat ending. I&#8217;ve enjoyed my time working with the great members of the team, and had a lot of great challenges. Working at R-IT CERT has given me a lot of freedom to do interesting and unique projects… but I&#8217;m really looking forward to the new challenges that are ahead of me. More details on that as and when!</p>
<p style="text-align:center;"><iframe class="youtube-player" width="630" height="355" src="https://www.youtube.com/embed/Y2iWsOZ_AAA?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en&#038;autohide=2&#038;wmode=transparent" allowfullscreen="true" style="border:0;" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox"></iframe></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28130</post-id>
		<media:content url="https://0.gravatar.com/avatar/37074c21dd813b3edcaa5d040fca6abd2fb9ab5a6a6d0ee87e906ccaed60f0d7?s=96&#38;d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">ChrisJohnRiley</media:title>
		</media:content>

		<media:content url="https://www.raiffeiseninformatik.at/fileadmin/templates/img/neueStartseite/logo.gif" medium="image" />
	</item>
		<item>
		<title>[DeepSec 2014] Advanced Powershell Threat: Lethal Client Side Attacks using Powershell</title>
		<link>https://c22blog.wordpress.com/2014/11/21/deepsec-2014-advanced-powershell-threat-lethal-client-side-attacks-using-powershell/</link>
		
		<dc:creator><![CDATA[ChrisJohnRiley]]></dc:creator>
		<pubDate>Fri, 21 Nov 2014 10:58:50 +0000</pubDate>
				<category><![CDATA[Conference]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[deepsec]]></category>
		<guid isPermaLink="false">http://blog.c22.cc/?p=28093</guid>

					<description><![CDATA[Advanced Powershell Threat: Lethal Client Side Attacks using Powershell &#8211; Nikhil Mittal APT &#8211; A buzzword which refuses to die. Lets have some fun with it, lets move it to powershell. This talk would focus on using powershell for Client Side Attacks. Powershell is an ideal platform for client side attacks as it is available on all [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png"><img loading="lazy" data-attachment-id="28070" data-permalink="https://c22blog.wordpress.com/2014/11/20/deepsec-2014-the-measured-cso-alex-hutton/deepseclogo/" data-orig-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" data-orig-size="262,55" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="DeepSecLogo" data-image-description="" data-image-caption="" data-medium-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" data-large-file="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=262" class="wp-image-28070 size-full alignright" style="margin:10px;" src="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=630" alt="DeepSecLogo"   srcset="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png 262w, https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png?w=150&amp;h=31 150w" sizes="(max-width: 262px) 100vw, 262px" /></a></p>
<p><a href="http://deepsec.net/speaker.html#PSLOT165">Advanced Powershell Threat: Lethal Client Side Attacks using Powershell</a> &#8211; Nikhil Mittal</p>
<blockquote><p>APT &#8211; A buzzword which refuses to die. Lets have some fun with it, lets move it to powershell. This talk would focus on using powershell for Client Side Attacks.</p>
<p>Powershell is an ideal platform for client side attacks as it is available on all the Windows machines. We would see how easy and effective it is to use powershell for various client side attacks like drive-by-downloads, malicious attachments, Java applets, Human Interface Devices etc.</p>
<p>The payloads which would be used with these attacks include in-memory code execeution, dump passwords and system secretsin plain text, backdoors, keyloggers, moving to other systems, reverse shells etc.</p>
<p>The code used in the above talk will be released as open source. The talk would be full of live demonsrations.</p></blockquote>
<p><strong>Client-side Attacks</strong></p>
<p>Why Client-side attacks</p>
<ul>
<li>Server-side is being locked down, so attacks are moving more to the client-side</li>
<li>Often client-side is less secured and not prioritized for patching compared to the server-side systems</li>
<li>The perimeter-ized network is still the norm</li>
<li>Less chance of being discovered when the attack begins from the inside of the network</li>
<li>Users are too familiar with their systems, and tend to feel over-confident about their security</li>
</ul>
<p>To avoid detection it&#8217;s best to not use exploitation or memory corruption attacks to avoid being detected by possible host-based IDS/IPS or Anti-virus.</p>
<p><strong>What is Powershell / Why Powershell</strong></p>
<p>Tasked-based command line shell and scripting language designed for system administrators</p>
<p>Powershell is already present on the majority of your target systems and is a powerful method to reside in the system. It also provides easy access to things such as the .Net classes, WMI, Windows API, WinRM, Registry, etc&#8230;</p>
<p>Anything we can do to reduce our dependance on Metasploit and possibly detectable tools is a good thing.</p>
<p><strong>Tools to create malicious client-side files</strong></p>
<p><em>Out-Word.ps1</em></p>
<p>Used to create &#8220;armed&#8221; or &#8220;infected&#8221; MS Word documents</p>
<p><em>Out-Excel.ps1</em></p>
<p>Same as Out-Word, but for Excel files.</p>
<p><em>Out-HTA.ps1</em></p>
<p>Creates an executable HTML application to send to the user that triggers Powershell</p>
<p><em>Out-Java.ps1</em></p>
<p>Creates an executable JAR file to launch Powershell</p>
<p><em>Out-Shortcut.ps1</em></p>
<p>Creates a malicious .lnk file that points to the Powershell on the users machine to trigger specific actions. Can also set a hotkey on the shortcut so the link is triggered whenever the user clicks a specific key combination.</p>
<p><em>Out-CHM.ps1</em></p>
<p>Creates compiled HTML Help Files to execute Powershell commands. Can be customized to include real help information to fool a user.</p>
<p><strong>Defense</strong></p>
<ul>
<li>Don&#8217;t click stuff! Teach your users to not trust content from external sources</li>
<li>Removal of VBA from MS Office would help specific attacks</li>
<li>Active monitoring of users machines may help detect such attacks</li>
<li>Remove powershell access to users who don&#8217;t need it (block/limit the user)</li>
</ul>
<p><strong>Links:</strong></p>
<ul>
<li>Presentation <a href="http://deepsec.net/speaker.html#PSLOT165" target="_blank">Abstract</a></li>
<li>Presentation <a href="http://blog.deepsec.net/?p=1873" target="_blank">blogpost</a></li>
<li>Nikhil Mittal <a href="https://twitter.com/nikhil_mitt" target="_blank">Twitter</a></li>
<li>Nikhil Mittal <a href="http://www.labofapenetrationtester.com/" target="_blank">Homepage</a></li>
<li>Nishang tool (<a href="https://github.com/samratashok/nishang" target="_blank">github</a>)</li>
</ul>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28093</post-id>
		<media:thumbnail url="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" />
		<media:content url="https://c22blog.wordpress.com/wp-content/uploads/2014/11/deepseclogo.png" medium="image">
			<media:title type="html">DeepSecLogo</media:title>
		</media:content>

		<media:content url="https://0.gravatar.com/avatar/37074c21dd813b3edcaa5d040fca6abd2fb9ab5a6a6d0ee87e906ccaed60f0d7?s=96&#38;d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">ChrisJohnRiley</media:title>
		</media:content>
	</item>
	</channel>
</rss>
