The Hacker Always Gets Through

TJ O’Connor Author, Violent Python GIAC GSE, OSCE The views expressed in this presentation are those of the author and do not reflect the official policy or position of the Department of the Army, Department of Defense, or the US Government. Education • PhD Candidate, Computer Science, NC State • MS, Computer Science, NC State • BS, Computer Science, West Point

Work Experience • Professor of Military Science, Florida Tech • G6, Special Forces Command • S6, 10th Special Forces Group • Assistant Professor, CS, West Point • S6, 1/7th Special Forces Group

Qualifications • GIAC GSE Expert (#31/138), 12+ GSE Certs • Offensive Security (OSCE, OSCP, OSWP) • Purple Belt, Brazilian Jiu Jitsu The chief assets of the attacker are...the power to choose at what place, by what method, and at what time the main action will be fought.

Field Marshal A. Wavell, The Good Soldier

War is the unfolding of miscalculations. - Barbara Tuchman

[*] ://www.bromium.com/sites/default/files/rpt-threat-report-1h2015-us-en.pdf “Its not hard to avoid being exploited. Its hard providing functionality to your users and avoid being exploited.”

- LTC TJ OConnor Vulnerable Operating System Prize

Google Chrome $100,000

Internet Explorer 10 $100,000

Internet Explorer 9 Windows 7 $75,000

Mozilla Windows 7 $60,000

Safari Mac OS X Mountain Lion $65,000

Adobe Reader XI Windows 7 $70,000

Adobe Flash Windows 7 $70,000

Oracle Windows 7 $20,000 Exploit Technique Y ear Developed Mitigation Strategy Y ear Developed Stack Cookies (/GS Flag) 2003 NX feature in Data Stack-based buffer 2004 1972 Execution Protection overflow Stack Cookies (/GS v2 2005 Flag) Partial 2007 Overwrite EIP, Jump to ASLR 19963 register Windows Vista SP1 Full 2008 ASLR /SAFESEH 2003 Pointer Guard in Data SEH Overwrite 2003 Execution Protection 2004 (DEP) SEHOP in EMET v1.0 2009 Windows XP SP2 Heap Heap-Spray 2004 2004 Protection Windows Vista SP1 Full 2008 ASLR ASLR Partial Overwrite 2007 Mandatory ASLR in EMET 2010 v2.0 Malware Dropper Strategy Infected Victims Duration Five droppers utilizing domain-flux to point to a Effectively January 2008 Conficker pool of 50,000 domains 9–15 million victims through April 2009 across 110 TLDs. (Doyle, 2001) Shutdown of two South One day – March 20, Dark Seoul 1 dropper (Trojan.Jokra) Korean banks and media 2013 companies Used infected systems to propagate initial payload 250,000 computers Less than nine hours on Code Red by scanning the Internet (initially 9 hours) July 19, 2001. for future victims Pwn2Own 2010 Exploit Operation Aurora Exploit

Affected Software Internet Explorer 6 Affected OS Windows 7 (released in 2009) Windows XP (released in 2001) Bypasses DEP Yes No Bypasses ASLR Yes No Chains Multiple Vulnerabilities Yes No Development Team 1 Contestant Nation-State Sponsored Team Intellectual property of 20 top tech Result $10,000 in Prize Money companies. Bypasses # of Chained Bypasses Bypasses Application Preventable Result Vulnerabilities ASLR DEP Sandbox 2012 Pwnium $60,000 prize Competition 6 Yes Yes Yes No winnings () Stole F- 35 RSA Breach 1 No No No Yes Strike Force (US) Fighter Plans Disrupted Dark Comet 0 No No No Yes Syrian Rebel (Syria) Network Dark Seoul Disrupted (South 1 No No No Yes South Korean Korea) Banking

The most important branch of aviation is pursuit, which fights for and gains control of the air.

- Brigadier General William “Billy” Mitchell

He who wants to protect everything, protects nothing.

- General Adolf Galland, Luftwaffe For More Information Contact:

[email protected]