一大堆没有听过的名词,都是些新东西。哪位站出来品评一番?
大风 写道: > Microsoft��s internal security conference BlueHat <http://technet.microsoft. > com/en-us/security/cc261637.aspx> finished on Friday. I posted > <http://www.mikeandrews.com/2008/10/13/its-bluehat-week/> earlier that I > would do a write up about it, so I��ll briefly discuss the presentations I > went to, and some of the other comings-and-goings of the conference. I��m > told that some of the presentations will be up on TechNet later, so look out > for those and I��ll try and come back to this post and edit them in when > they are available. > > Tuesday > Although the conference didn��t truly start until Thursday, there was a > speakers dinner held on Tuesday night. It was a small gathering at a > restaurant in Seattle and allowed us to mingle with the other presenters and > people from Microsoft that put the conference together. I got to meet a few > people for the very first time that I was really looking forward to talking > to. Ashley Allen and Bryan Sullivan <http://blogs.msdn.com/bryansul/> were > the first to welcome me after Jeremiah Grossman and myself talked him into > letting us do a panel (in reality, Bryan thought it was a great idea) and > Ashley organized everything for us (which for once was really easy for me as > I didn��t have to travel or get a hotel to go to a con �C score!). Spent a > lot of the first part of the evening talking to Adam Shostack > <http://www.emergentchaos.com/> about the state of the internet, current > development practices, and how MSFT is addressing them (and can help other > devs/orgs in the future). Also had a great discussion with Dave Weinstein > <http://www.sff.net/people/olorin/> about vulnerability vs exploitation > (does it really matter if things aren��t getting exploited? If a tree falls > in the forest and there��s no-one around, does it make a sound? How much > are we getting exploited?) Dave has some great stats on the exploitation of > Word of Warcraft and how criminals are profiting from it quite easily (it��s > as close as you can get to a victimless and low-risk crime). Talked to the > internet security celebrity of the year, Dan Kaminsky > <http://www.doxpara.com/> , for some time and turned out that not only did > we get on really well (he has very much the same personality as I do), but > discover there��s lots of tenuous links between us of people we know, places > we��ve been, etc. Starting to see this "6 degrees of separation" thing more > and more �C it��s even less in small community like computer security. > > Wrapped up the evening hopping between a number of different conversations > �C please don��t feel left out if I don��t mention you here �C I talked to a > *lot* of people over the course of this week, and I��m only going to have > space to write about a small subset of even the few I can still remember :) > > Wednesday > Despite booking most of the week off from work so I could go to some > meetings and meet/network with more people, guess what �C still had work to > do for Foundstone. Ah the joys of billable hours and last-minute scheduling > difficulties :) In any case, another party in Seattle. Spent time with > Danny Dhillon and the CSS guys - David Lindsay, Gareth Heyes > <http://www.businessinfo.co.uk/> and Eduardo Vela Nava > <http://www.sirdarckcat.net/> as well as Alex K > <http://kuza55.blogspot.com/> - on what seems to be the theme for me this > week - "why the hell does it allow that". From triple encoding an attack > (for filter bypass) and the browser triple decoding, then executing the > result!, invisible iframes, a:link CSS being allowed to have > ��expression(��)�� and calling out to a remote site, etc, etc. All of these > things I couldn��t think of a single legitimate use of (these guys couldn��t > either), and therefore the only usage is a malicious or unnecessary one. > Finished off the night in a small loft where some of the guys at the party > had invited us back to listening to Frank > <http://www.leviathansecurity.com/team.html#Frank_Heidt> Heidt explain the > intricacies of the financial market, reselling non-existent "things", and > how it was plainly obvious that this was all going to come crashing down, it > was just a matter of when. Smart guy Frank, and looking forward to hanging > out with him more. > > Thursday > First day <http://technet.microsoft.com/en-us/security/cc748656.aspx#day1> > of the conference proper. Iftach > <http://www.aladdin.com/CsrtBlog/default.aspx> "Ian" Amit��s talk on modern > crimeware was interesting, but being related to that field (listening to the > McAfee guys) nothing that I didn��t already know. > > Roelof Temmingh��s <http://www.paterva.com> talk was about how much > information you could glean from public sources, often just starting with an > IP address / network footprinting. Once again, I had some idea, but > Roelof��s <http://www.paterva.com/maltego/> tool really did open my eyes. > There��s a stunning amount of info out there, and with a good tool and > visualization techniques, it��s possible to pull a lot of thing together. > This is certainly a demo to watch. > > Dan��s talk (the DNS flaw) I had seen before, but I always find it > entertaining to watch him. > > The CSS guys seemed to have a hard time of presenting �C not because they > weren��t good, but this was the first time that they had ever physically > been in the same place! The joys of the internet meant that they were able > to research together for quite some time, and didn��t have the opportunity > to be able to rehearse or get everything together quite as smoothly as they > might have liked (multi-presenter talks are hard). In any case, they had > some cool things to show, but I couldn��t help keep thinking "why do > browsers support this" �C it��s clearly a malicious use of the spec, and I > can��t see why some of the things are in there anyway. Certainly drew > awareness of the fact that turning Javascript off isn��t the end of it and a > means of protection, and that CSS has to also be restricted in some way. > > The last two talks �C Richard Johnson and Ian Hellen �C talked about > visualization and code characteristics to find defects. I only partially > caught these two talks from the remote display in the speakers green-room as > I caught up with old-time friends Jeremy Dallman and Dave Ladd. > > Throughout the day I was with Alex <http://keepitlocked.net/> Smolen, > friend and fellow Foundstone consultant, so we went out for some dinner, > talked about various work stuff, and then headed out to the last MSFT > BlueHat community dinner/party. This event I spent quite some time with > Frank from Leviathan and some of his team/colleagues/friends, and also got > to spend some time with one of my "security hero��s" RainForestPuppy > <http://www.wiretrip.net/rfp/> . This was a really nice meeting as RFP was > one of the first guys on the webapp security trail and got me thinking > differently �C certainly helped me take the first few steps in my security > interests. RFP was far nicer (and younger) than I imagined he would be. > Ending the night I managed to get a few words with Andrew Cushman and Jon > Pincus <http://www.talesfromthe.net/> , mostly about "normal" life, blogging > and the election �C a nice (and welcome) change of topic. > > Friday > Day 2 <http://technet.microsoft.com/en-us/security/cc748656.aspx#day2> was > focused towards the "building" rather than the day one "breaking" theme �C > Mark Curphey would have been proud > <http://securitybuddha.com/2008/09/10/are-you-a-builder-or-a-breaker/> :) > > Danny and Adam started off the talks with quick discussions of how EMC and > MSFT do threat modeling. It certainly looked like there were lots of > obvious similarities between their two approaches. Adam highlighted the > differences, and why EMC or MSFT chose to go down those routes because of > different lines of business or process/security/developer maturity. Adam > also showed the next version of MSFT��s threat modeling tool (which we were > talking about at the first party), which is very cool and should make a big > impact in the ease of threat modeling. I would still like to see a "wizard > based" approach which non-security aware developers could use if only to get > started, but as Adam suggested it would be a bit "boring" and "heavy-weight" > to see that many questions, and just didn��t interest him in going down that > path. Instead, users draw out the system and the tool suggests threats and > things that haven��t been put into the drawing. After seeing this demoed, I > think it��s a much better approach. The tool is internal for now but should > be released free to the public in ��09. > > Matt Miller��s talk focused a lot on how technologies like GS, DEP, ASLR, > etc helped mitigate against exploitation, even if a vulnerability was > discovered �C layered defenses are certainly a must-have. This was another > talk I only caught some of remotely in the speakers room or in the corridors > while catching up with people. > > Scott Stender and Alex Videgar from iSec <http://www.isecpartners.com/> > Partners talked abut concurrency attacks in web apps > <http://www.isecpartners.com/files/iSEC%20Partners%20-%20Concurrency%20Attac > ks%20in%20Web%20Applications.pdf> [PDF]. At first I wasn��t too interested > in this �C it��s really hard to do any kind of deterministic testing on a > webapp, so attacking concurrency (where timing is everything) is simply a > difficult place to go. These guys showed how most web frameworks are not > thread safe, and multiple users hitting a server can cause the traditional > "lost update" race hazards. Lots of perf graphs showing the performance hit > of locking, transactions, etc (and thus the potential of DoS if "done > correctly, but with a performance hit") got the point across. Takeaway �C > most web frameworks are not thread safe (and don��t warn you about that > fact) and it��s something not many people think of. Also, because of > database settings and transactions, doing this may not actually safe you! > > A bunch of guys from MSFT talked about fuzzing. I didn��t learn a whole > amount technically here, but was interesting to see how MSFT does fuzzing, > and some of the stats �C there��s some "break even" points or "guidance" on > the number of iterations vs bugs left to find, but it seems that there��s no > top limit. Some tools are better than others (no surprise there), but > there��s no one great tool (although SAGE seemed to be the best and won the > "fuzzing olympics" - medals were handed out :)). Random fuzzing is better > than "intelligent" fuzzing (where the tool knows the file/protocol > structure), which is certainly unintuitive, but something I learnt quite > some time ago. > > Vinnie Liu <http://www.stachliu.com/> talked about the trade-offs in tools > (and humans) during a code review/pen test. Once again, nothing new for me > �C I��ve learn and preached all these lessons, but was a fun and engaging > talk. I��ve asked Vinnie for a copy of his slides because there were some > great classic humor slides in there �C I��ll post (and comment) on them if > he does send them to me. > > Finally, and closing the conference, was the WAF vs. SDL Shootout panel. > Myself, Nate McFetters <http://natemcfeters.blogspot.com/> , Gareth Heyes > and Kevin Overcash <http://www.whitehatsec.com/home/abt/team.html> (poor > guy �C he was to "defend" WAF��s, but ended up being just as critical as all > of us!) fielding questions from Bryan Sullivan and the audience. The main > questions were�� > > * Earlier this year, over one million sites fell victim to an > automated SQL injection attack. The vast majority of affected pages were > classic ASP pages. While we don��t have statistics, it can be assumed that > many if not most of these pages were no longer being actively developed. If > you were called in as a consultant by one of these sites to fix the problem, > what do you do? Do you recommend a WAF or a change to the code? Or both? > Would your answer to this question change if the site in question was still > being actively developed? > * Five years ago, black-box scanning was the ��magic pill�� that would > solve security problems. Then source analysis became more popular. > Pentesting has always been important. While none of these approaches are > perfect, they each have definite benefits, and more to the point: each of > these activities is now part of the SDL (at least the Microsoft SDL). Should > we end the feud between the SDL camp and the WAF camp by mandating WAF usage > in the SDL? > * Imagine that someone invents a perfect WAF. It blocks all known > attacks with a 0% false negative and 0% false positive rate. Do we now > abandon previously mandated secure coding practices like validating input? > If not, how do you justify spending developer time on this activity? How > would you justify spending tester and pentester time on security testing? > > The discussion went all over the place, and I can��t remember all of the > answers or points that each of us raised (although I did pull out the > "silver bullet and Jack and the Beanstalk > <http://www.mikeandrews.com/2008/01/14/silver-bullets-or-magic-beans/> " > allegory at one point). I hope there��s some audio somewhere as there was > some good well-reasoned arguments. If I can find some time and anyone is > interested (i.e. the audio doesn��t go up), I see if I can come back and > fill this in a bit more. > > There was one final party hosted by IOActive <http://ioactive.com/> , but by > then I was far to knackered for another night on the town (and I��m told > that the IOA parties can get a bit out of hand!) so headed home and crashed > out �C nice to (finally) get to bed in the same 24hrs in which you woke up, > but there��s still the mountain of emails and RSS items I had to dig out of > over the weekend. > > Thanks to all the people that I met and had great discussions with. Also a > big thanks to Bryan for the invitation and Ashley for organizing everything > for the speakers. I had a fantastic time, and confirmed one of the reasons > that I moved up to Seattle �C meeting interesting people and being engaged > in the community again �C really was worth it. I look forward to seeing all > these people again, and if anyone is in the area, visiting, or has time to > chat, and wants to hook up, by all means get in contact. > > > > > > [Ph4nt0m] <http://www.ph4nt0m.org/> > > [Ph4nt0m Security Team] > > <http://blog.ph4nt0m.org/> [EMAIL PROTECTED] > > Email: [EMAIL PROTECTED] > > PingMe: > <http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=hanqin_wu > hq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724> > > === V3ry G00d, V3ry Str0ng === > > === Ultim4te H4cking === > > === XPLOITZ ! === > > === #_# === > > #If you brave,there is nothing you cannot achieve.# --~--~---------~--~----~------------~-------~--~----~ 要向邮件组发送邮件,请发到 [email protected] 要退订此邮件,请发邮件至 [EMAIL PROTECTED] -~----------~----~----~----~------~----~------~--~---

