SlideShare a Scribd company logo
Maciej Lasyk
OWASP Poland, 2013-10-17
Recruitment process @OWASP?
● Because this system is web application (partially)
● Because we based (100%) on FOSS (open-source)
● Because security matters
● Because OWASP people cares about security and can affect
recruitment processes (hopefully) ;)
Recruitment
● Lot of recruitment agencies / services
● Huge number of potential candidates
● Whole team is involved in recruitment
● Candidate evaluation takes really lot of time
SysAdmin / Operations
● He is sysop, developer, QA and network specialist
● Also great for performance tuning
● Responsible for critical data (all data)
● Easy handles moving UPSes between racks ;)
● Anytime day / night understands what you’re talking to him
● Everything he does respects high security standards
● Loves playing games (do you know sysop that doesn’t play)? ;)
Let’s play then
● Any idea? Not Quake / Diablo / Warcraft ;)
● pythonchallenge.com, wechall.net – CTFs are great!
● trueability.com – event for sysops
● So maybe CTF / challenge?
● Such system would have to fulfill some requirements:
● Optimization of recruitment process time
● Minimisation of the risk of rejecting good candidate
● Draw attention as very interesting (you like mindfscks?)
Let's start the ball rolling
Stage 1 – simple task
Stage 2 – call/social.eng.
Stage 3 – challenge
Application Problem: huge candidates number (>100)
Target: reject not suitable cands (>80% rejections!)
Target: recognition, manipulation
Global Thermonuclear War ;)
Stage 1 – telnet / SMTP
RFC-821/1869:
HELO/EHLO ??.....??
GPG us ur CV using
http://..../gpg.asc
Lack of GPG knowledge :(
RTFM!
Stage 1 – telnet / SMTP
RFC-821/1869:
HELO/EHLO my.hostname
1 trap – not server’s hostname
but client’s (90% catched)
GPG us ur CV using
http://..../gpg.asc
Lack of GPG knowledge :(
RTFM!
Stage 1 – node.js
● At the beginning – pure C server. After 3am.. Node.js (simplicity) ;)
● What’s wrong with node.js?
● http://seclists.org/bugtraq/ - 0 hits
● http://osvdb.org/ - 2 hits
● http://1337day.com/, http://www.exploit-db.com/ - 1 hit
● https://nodesecurity.io/advisories - 4 hits
● Does it mean that node.js is safe & secure?
Node.js – how it works?
http://magnetik.github.io/
- Event driven
- Event loop
- Callbacks
- SPA, async, REST, Json
Node.js - threats
● no logging
● No error handling - DoS
● No configuration – “+” or “-”?
● No filters checking user-input
● JS: function as a variable
● Evil eval(code). Server-side XSS
● setInterval(code,2), setTimeout(code,2), str = new Function(code)
● Moduły npm – who creates those?
............................................________
....................................,.-'"...................``~.,
.............................,.-"..................................."-.,
.........................,/...............................................":,
.....................,?......................................................,
.................../...........................................................,}
................./......................................................,:`^`..}
.............../...................................................,:"........./
..............?.....__.........................................:`.........../
............./__.(....."~-,_..............................,:`........../
.........../(_...."~,_........"~,_....................,:`........_/
..........{.._$;_......"=,_......."-,_.......,.-~-,},.~";/....}
...........((.....*~_......."=-._......";,,./`..../"............../
...,,,___.`~,......"~.,....................`.....}............../
............(....`=-,,.......`........................(......;_,,-"
............/.`~,......`-...................................../
.............`~.*-,.....................................|,./.....,__
,,_..........}.>-._...................................|..............`=~-,
.....`=~-,__......`,.................................
...................`=~-,,.,...............................
................................`:,,...........................`..............__
.....................................`=-,...................,%`>--==``
........................................_..........._,-%.......`
Node.js – evil eval()
This way we added new functionality to the server during runtime!
http://node.js/myurl
Node.js – evil eval()
Node.js - npm
https://blog.nodejitsu.com/npm-innovation-through-modularity
Amount of npm
modules in the time
Amount of
npm-mods/day
comparison to
node.js and others
Node.js – how can?
● Use frameworks: https://npmjs.org/ - carefully
● Npm modules are not validated! Check those: https://nodesecurity.io
● Watch module dependencies!
● must have: your own error handling & logging
● This is server – we need proper server security solutions:
● Monitoring – think how to monitor your app
● Control-groups – set limits for resources
● SELinux sandbox
Node.js – SELinux sandbox
●'home_dir' and 'tmp_dir'
● App can r/w from std(in|out) + only defined FDs
● No network access
● No access to foreign processes / files
● We can easily connect sandbox with cgroups :)
● Helpful: semodule -DB (no dontaudit)
● grep XXX /var/log/audit/audit.log | audit2allow -M node.sandbox
● semodule -i node.sandbox.pp
Node.js – SELinux sandbox
Node.js – how can #2
● Freeze node.js version per project?
● Let’s read & learn:
● https://media.blackhat.com/bh-us-11/Sullivan/BH_US_11_Sullivan_Server_Side_WP.pdf
● http://lab.cs.ttu.ee/dl91
● https://github.com/toolness/security-adventure
● Pseudo–configuration – set limits in your code (e.g. POST size)
● try...catch ftw
● use strict; - helps even with eval case (partially)
● Bunyan / dtrace: https://npmjs.org/package/bunyan
● node.js OS? Oh and use / build node.js packages (fpm or whatever)
Stage 2 – social engineering
● Stage’s target is to verify & check candidate’s security awareness
● Christopher Hadnagy – SE framework (2k10):
● http://www.social-engineer.org/framework/Social_Engineering_Framework
● Everyone can act as recruiter and call anyone
● Building network / connections on Linkedin is very easy
● Trust (lingo, easiness in some env: research)
● Sysop knows really much about env – he’s good target
● So one has to only get sysop’s trust and decrease his carefulness
Stage 3 - virtualization
● Our needs?
● Boot process supervision
● Console access
● Resource management
● Redundant storage
● Rescue mode for VMs
● Security by default
> AWS
> KVM/libvirt
> XEN/libvirt
> LXC
Stage 3 - virtualization
boot console resources
mgmt.
redundant
storage
rescue VM security
Stage 3 - virtualization
VS
Performance XEN/HVM or KVM?
Stage 3 - virtualization
VS
We had great performance issues with XEN/HVM
The winner is „hat in the red” and its PV
(but with the cgroups help – under heavy load KVM is
not that stable)
Performance XEN/HVM or KVM?
Stage 3 – network security
DMZ (Demilitarized Zone) – logical or physical partition
https://en.wikipedia.org
Stage 3 – network security
https://en.wikipedia.org
DMZ (Demilitarized Zone) – logical or physical partition
Stage 3 – network security
● Separated, dedicated DMZ (VLAN?) for host
● No routing / communication from this DMZ with other segments
● Low – cost solutions?
● OpenWRT / DDWRT way || Pure Linux server
● 802.1Q – VLANs
Stage 3 – network security
● Network isolation on KVM host:
● Host/network bridge: L2 switch
● netfilter / nwfilter (IBM)
● By default there’s no packets isolation in the
bridged network - ebtables null, no filtering
● ebtables – filtering l2– so we gain isolation
● Or virsh nwfilter-list
● allow-arp,dhcp,dhcp-server,clean-traffic, no-
arp-ip-spoofing, no-arp-mac-spoofing, no-
arp-spoofing, no-ip-multicast, no-ip-spoofing,
no-mac-broadcast, no-mac-spoofing, no-
other-l2-traffic
● L2 filtering? /proc/sys/net/bridge
https://www.redhat.com/archives/libvir-list/2010-June/msg00762.html
http://pic.dhe.ibm.com/infocenter/lnxinfo/v3r0m0/topic/liaat/liaatsecurity_pdf.pdf
Stage 3 –boot process, VNC
● Accessing boot process – VNC
● VNC security? SSL? Complications..
● Maybe VNC over SSH tunnel?
● Encryption
● No certificates issues
● Every admin can easily use VNC
Stage 3 – restricted shells
● SSH tunneling requires SSH access (thank You Captain Obvious!)
● SSH access is a threat per se
● Let’s limit this SSH / shell access – use restricted shells
Restricted shells by. Google ;) =>
Stage 3 – restricted shells
● Restricted shells are threat by default – unless we know how to use those!
● Under some circumstances one could escape the rshell:
https://en.wikipedia.org/wiki/Rbash
Stage 3 – restricted shells
● Rbash:
● CentOSie / RHEL approved / friendly / legit ;)
● Protects from directory traversal
● Prohibits access to files via direct path
● Prohibits setting PATH or other shell env variables
● No commands output redirection
● PATH=$HOME/bin – and reconsider 2x what to put into this „bin”
https://en.wikipedia.org/wiki/Rbash
Stage 3 – SSH tunnel / VNC
● We must go deeper!
Candidate
VM-Proxy
screen / ssh tunnel
VM host
rshell / ibsh
rshell / rbash
VNC server
Stage 3 – restricted shells
● Other restricted shells:
● rssh – allows scp, sftp, rsync
● sudosh - http://sourceforge.net/projects/sudosh
● Allows saving whole user session and replay it
● One can define allowed operations for user
● Little outdated – better use sudosh3
● Ibsh (small, fast, secure): http://sourceforge.net/projects/ibsh/
Stage 3 – control groups
● resource management in a simple way (ulimits, nice, limits.conf).. but..
● Could you set 50 IOPS for defined process?
● What about 100Kbp/s limit for particular user?
● issues with memory–leaks in Java?
Stage 3 – control groups
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Resource_Management_Guide/ch01.html
● Debian & RHEL friendly
● Running apps in cgroup context
● Setting cgroup context for process during runtime
Stage 3 – web application
● OpenStack?
„Couple” of compliations ;) “Out of the box” – yup – I’ve heard
about that ;) Could you deploy it in a few hours – securely?
Stage 3 – web application
Commodore OS ???
Stage 3 – web application
Commodore OS Vision FTW!
Stage 3 – web application
● Apache + mod_security
● mod_security + OWASP rules
● PHP & Python :)
● Simplicity!
● VM management with simple daemon + screen:
● while(1) do: manage_VMs();
● And this just works!
Stage 3 – recording SSH sessions
● We have to record all sessions – also those under „screen”
● Real time recording
● sudosh3 (sudosh fork) – kinda proxy shell – great ;)
● auditd – lov-lewel tool for recording syscalls
● Asciinema (ascii.io, Marcin Kulik) – great one, but not for audit purposes
● Ttyrec – outdated: http://0xcc.net/ttyrec/index.html.en
● Ssh logging patch - outdated: http://www.kdvelectronics.eu/ssh-logging/ssh-logging.html
Stage 3 – data security
● What if we loose any of the VMs...? Brrr....
● Risk assesement – what would be enough for us?
● RAID1 / Mirror – “usually” is enough for a 3 – month time
● Backups – useful ;) RAID / replication are not backups...
● GlusterFS / DRBD – if you have enough resources – try it :)
LVM
Gluster brick
KVM active host
LVM
Gluster brick
KVM passive host
replication
Podsumowanie
Maciej Lasyk
http://maciek.lasyk.info
maciek@lasyk.info
Twitter: @docent_net
OWASP Poland, 2013-10-17

More Related Content

PDF
We shall play a game....
Sadia Textile
 
PDF
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
Biblioteca Nacional de España
 
PDF
Масштабируемый и эффективный фаззинг Google Chrome
Positive Hack Days
 
PDF
CONFidence 2017: Escaping the (sand)box: The promises and pitfalls of modern ...
PROIDEA
 
PDF
Lightweight Virtualization with Linux Containers and Docker | YaC 2013
dotCloud
 
PPT
Leveraging zeromq for node.js
Ruben Tan
 
PDF
"Lightweight Virtualization with Linux Containers and Docker". Jerome Petazzo...
Yandex
 
PDF
Применение виртуализации для динамического анализа
Positive Hack Days
 
We shall play a game....
Sadia Textile
 
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
Biblioteca Nacional de España
 
Масштабируемый и эффективный фаззинг Google Chrome
Positive Hack Days
 
CONFidence 2017: Escaping the (sand)box: The promises and pitfalls of modern ...
PROIDEA
 
Lightweight Virtualization with Linux Containers and Docker | YaC 2013
dotCloud
 
Leveraging zeromq for node.js
Ruben Tan
 
"Lightweight Virtualization with Linux Containers and Docker". Jerome Petazzo...
Yandex
 
Применение виртуализации для динамического анализа
Positive Hack Days
 

What's hot (18)

KEY
Distributed app development with nodejs and zeromq
Ruben Tan
 
PDF
An Introduction to the Formalised Memory Model for Linux Kernel
SeongJae Park
 
PDF
LAS16-211: Using LAVA V2 for advanced KVM testing
Linaro
 
PPTX
Dead Lock Analysis of spin_lock() in Linux Kernel (english)
Sneeker Yeh
 
PDF
Kernel Recipes 2015 - So you want to write a Linux driver framework
Anne Nicolas
 
PDF
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
egypt
 
PDF
Introduction to Docker (and a bit more) at LSPE meetup Sunnyvale
Jérôme Petazzoni
 
PDF
libreCMC : The Libre Embedded GNU/Linux Distro
All Things Open
 
PDF
Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000
CTruncer
 
PPTX
Testing CAN network with help of CANToolz
Alexey Sintsov
 
PDF
Egress-Assess and Owning Data Exfiltration
CTruncer
 
PDF
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE Corporation
 
PDF
AV Evasion with the Veil Framework
VeilFramework
 
PDF
An EyeWitness View into your Network
CTruncer
 
PDF
Clang: More than just a C/C++ Compiler
Samsung Open Source Group
 
PDF
BSides Denver: Stealthy, hypervisor-based malware analysis
Tamas K Lengyel
 
PDF
OffensiveCon2022: Case Studies of Fuzzing with Xen
Tamas K Lengyel
 
PDF
OpenWrt From Top to Bottom
Kernel TLV
 
Distributed app development with nodejs and zeromq
Ruben Tan
 
An Introduction to the Formalised Memory Model for Linux Kernel
SeongJae Park
 
LAS16-211: Using LAVA V2 for advanced KVM testing
Linaro
 
Dead Lock Analysis of spin_lock() in Linux Kernel (english)
Sneeker Yeh
 
Kernel Recipes 2015 - So you want to write a Linux driver framework
Anne Nicolas
 
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
egypt
 
Introduction to Docker (and a bit more) at LSPE meetup Sunnyvale
Jérôme Petazzoni
 
libreCMC : The Libre Embedded GNU/Linux Distro
All Things Open
 
Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000
CTruncer
 
Testing CAN network with help of CANToolz
Alexey Sintsov
 
Egress-Assess and Owning Data Exfiltration
CTruncer
 
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE Corporation
 
AV Evasion with the Veil Framework
VeilFramework
 
An EyeWitness View into your Network
CTruncer
 
Clang: More than just a C/C++ Compiler
Samsung Open Source Group
 
BSides Denver: Stealthy, hypervisor-based malware analysis
Tamas K Lengyel
 
OffensiveCon2022: Case Studies of Fuzzing with Xen
Tamas K Lengyel
 
OpenWrt From Top to Bottom
Kernel TLV
 
Ad

Viewers also liked (8)

PDF
Infographic: DC vs Marvel – The Battle of Brands
domain .ME
 
Ad

Similar to 0507 057 01 98 * Adana Klima Servisleri (20)

PPTX
Shall we play a game?
Maciej Lasyk
 
PDF
Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Docker, Inc.
 
PPTX
Linux 开源操作系统发展新趋势
Anthony Wong
 
PDF
Docker and-containers-for-development-and-deployment-scale12x
rkr10
 
ODP
Ceph Day Melbourne - Troubleshooting Ceph
Ceph Community
 
ODP
Nagios Conference 2014 - Eric Mislivec - Getting Started With Nagios Core
Nagios
 
PDF
Security of Linux containers in the cloud
Dobrica Pavlinušić
 
ODP
Time to rethink /proc
Kir Kolyshkin
 
ODP
OpenShift & SELinux with Dan Walsh @rhatdan
OpenShift Origin
 
PDF
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
OpenStack Korea Community
 
PDF
Fosdem_Using_SELinux_with_container_runtimes.pdf
nicerussianpainter
 
PDF
GDG Cloud Iasi - Docker For The Busy Developer.pdf
athlonica
 
PPTX
Open stack HA - Theory to Reality
Sriram Subramanian
 
PDF
Archivematica Technical Training Diagnostics Guide (September 2018)
Artefactual Systems - Archivematica
 
PPTX
Build reliable, traceable, distributed systems with ZeroMQ
Robin Xiao
 
PDF
Socket programming, and openresty
Tavish Naruka
 
PDF
Workflow story: Theory versus practice in Large Enterprises
Puppet
 
PDF
Workflow story: Theory versus Practice in large enterprises by Marcin Piebiak
NETWAYS
 
PDF
New Jersey Red Hat Users Group Presentation: Provisioning anywhere
Rodrique Heron
 
PDF
A3Sec Advanced Deployment System
a3sec
 
Shall we play a game?
Maciej Lasyk
 
Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Docker, Inc.
 
Linux 开源操作系统发展新趋势
Anthony Wong
 
Docker and-containers-for-development-and-deployment-scale12x
rkr10
 
Ceph Day Melbourne - Troubleshooting Ceph
Ceph Community
 
Nagios Conference 2014 - Eric Mislivec - Getting Started With Nagios Core
Nagios
 
Security of Linux containers in the cloud
Dobrica Pavlinušić
 
Time to rethink /proc
Kir Kolyshkin
 
OpenShift & SELinux with Dan Walsh @rhatdan
OpenShift Origin
 
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
OpenStack Korea Community
 
Fosdem_Using_SELinux_with_container_runtimes.pdf
nicerussianpainter
 
GDG Cloud Iasi - Docker For The Busy Developer.pdf
athlonica
 
Open stack HA - Theory to Reality
Sriram Subramanian
 
Archivematica Technical Training Diagnostics Guide (September 2018)
Artefactual Systems - Archivematica
 
Build reliable, traceable, distributed systems with ZeroMQ
Robin Xiao
 
Socket programming, and openresty
Tavish Naruka
 
Workflow story: Theory versus practice in Large Enterprises
Puppet
 
Workflow story: Theory versus Practice in large enterprises by Marcin Piebiak
NETWAYS
 
New Jersey Red Hat Users Group Presentation: Provisioning anywhere
Rodrique Heron
 
A3Sec Advanced Deployment System
a3sec
 

More from Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri (20)

PDF
Adana'da 15 yaşındaki kız 14’üncü kattan düşerek öldü
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Kutup buzulları eriyince ortaya çıktı. Bilim insanları aynı anda dehşete düştü
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
İran Cumhurbaşkanı Ruhani'den ABD seçimlerine dair flaş açıklama
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Almanya'da günlük en yüksek Kovid-19 vaka sayısına ulaşıldı
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Çin'den Dev Adım: Dünyanın İlk 6G Deneme Uydusu Uzaya Gönderildi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Son dakika… ABD’nin yeni başkanı Joe Biden oldu
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Rüzgarda uçuşan binlerce lirayı böyle topladılar
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Sağlık çalışanlarının bulunduğu otomobil Ihlara Vadisi'ne uçtu
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Belgeseli yayınlandıktan 3 hafta sonra koronavirüsten yaşamını yitirdi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Corona listesini yayınlayan filyasyon ekibindeki görevliye soruşturma
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Erdoğan: Bahçeli ile birlikte Kıbrıs’ta piknik yapacağız
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Sigara içme yasağı olan iller! Hangi illerde sigara içme yasağı var?
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Ekrem İmamoğlu’ndan Tunç Soyer’e geçmiş olsun ziyareti
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Merkez Bankasındaki görev değişikliği dünyanın gündeminde
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Adana'da Ekim ayında meydana gelen trafik kazalarında 15 kişi öldü
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Adana Jeofizik Mühendisleri Odası’ndan Korkutan Açıklama
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisler...
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Adana'da FETÖ sanığı 7 eski polisin yargılanmasına devam edildi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Adana’da Ekim ayında bin 889 araç trafikten men edildi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
PDF
Adana’dan yardım tırları yola çıktı 8 tır yaşam malzemesi gönderildi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Adana'da 15 yaşındaki kız 14’üncü kattan düşerek öldü
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Kutup buzulları eriyince ortaya çıktı. Bilim insanları aynı anda dehşete düştü
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
İran Cumhurbaşkanı Ruhani'den ABD seçimlerine dair flaş açıklama
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Almanya'da günlük en yüksek Kovid-19 vaka sayısına ulaşıldı
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Çin'den Dev Adım: Dünyanın İlk 6G Deneme Uydusu Uzaya Gönderildi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Son dakika… ABD’nin yeni başkanı Joe Biden oldu
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Rüzgarda uçuşan binlerce lirayı böyle topladılar
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Sağlık çalışanlarının bulunduğu otomobil Ihlara Vadisi'ne uçtu
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Belgeseli yayınlandıktan 3 hafta sonra koronavirüsten yaşamını yitirdi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Corona listesini yayınlayan filyasyon ekibindeki görevliye soruşturma
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Erdoğan: Bahçeli ile birlikte Kıbrıs’ta piknik yapacağız
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Sigara içme yasağı olan iller! Hangi illerde sigara içme yasağı var?
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Ekrem İmamoğlu’ndan Tunç Soyer’e geçmiş olsun ziyareti
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Merkez Bankasındaki görev değişikliği dünyanın gündeminde
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Adana'da Ekim ayında meydana gelen trafik kazalarında 15 kişi öldü
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Adana Jeofizik Mühendisleri Odası’ndan Korkutan Açıklama
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisler...
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Adana'da FETÖ sanığı 7 eski polisin yargılanmasına devam edildi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Adana’da Ekim ayında bin 889 araç trafikten men edildi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Adana’dan yardım tırları yola çıktı 8 tır yaşam malzemesi gönderildi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 

Recently uploaded (20)

PPTX
Surgical management of colorectal cancer.pptx
Oladele Situ
 
DOCX
RUHS II MBBS Pharmacology Paper-II with Answer Key | 28 July 2025 (New Scheme)
Shivankan Kakkar
 
PPT
8-Ergonomics of Aging.ppt · version 1.ppt
Bolan University of Medical and Health Sciences ,Quetta
 
PDF
CA & Simple Goitre , surgery, Faculty of medicine .pdf
MostafaMohammed95
 
PPTX
HYPONATREMIA presentation prepared from harrison
theoptimist10000
 
PPT
9. Applied Biomechanics (fracture fixation)etc.ppt
Bolan University of Medical and Health Sciences ,Quetta
 
PPTX
Nirsevimab in India - Single-Dose Monoclonal Antibody to Combat RSV .pptx
Gaurav Gupta
 
PPTX
12. Neurosurgery (part. 2) SURGERY OF VERTEBRAL COLUMN, SPINAL CORD AND PERIP...
Bolan University of Medical and Health Sciences ,Quetta
 
DOCX
RUHS II MBBS Pharmacology Paper-I with Answer Key | 26 July 2025 (New Scheme)
Shivankan Kakkar
 
PPTX
Models for screening of Local Anaesthetics.pptx
AntoRajiv1
 
PDF
ADVANCED CLINICAL PHARMACOKINETICS AND BIOPHARMACEUTICS AT ONE PLACE.pdf
BalisaMosisa
 
PPTX
HANAU ARTICULATORS AND CLASSIFICATION.pptx
Priya Singaravelu
 
PPTX
Anatomy of eyelids basic anatomy covered along with abnormalities of eyelids
SummyBhatnagar1
 
PPTX
Sources, types and collection of data.pptx
drmadhulikakgmu
 
PPTX
Pharmacotherapy of Myasthenia Gravis- Dr. Anurag Sharma (1).pptx
Anurag Sharma
 
PPTX
The Anatomy of the Major Salivary Glands
Srinjoy Chatterjee
 
PPTX
CANSA Womens Health UTERINE focus Top Cancers slidedeck Aug 2025
CANSA The Cancer Association of South Africa
 
PPTX
Omphalocele: PowerPoint presentation
Nathan Lupiya
 
PDF
ICF around the World - Keynote presentation
Olaf Kraus de Camargo
 
PPTX
Pharmacology is the scientific study of how drugs and other chemical substanc...
tarun35435605
 
Surgical management of colorectal cancer.pptx
Oladele Situ
 
RUHS II MBBS Pharmacology Paper-II with Answer Key | 28 July 2025 (New Scheme)
Shivankan Kakkar
 
8-Ergonomics of Aging.ppt · version 1.ppt
Bolan University of Medical and Health Sciences ,Quetta
 
CA & Simple Goitre , surgery, Faculty of medicine .pdf
MostafaMohammed95
 
HYPONATREMIA presentation prepared from harrison
theoptimist10000
 
9. Applied Biomechanics (fracture fixation)etc.ppt
Bolan University of Medical and Health Sciences ,Quetta
 
Nirsevimab in India - Single-Dose Monoclonal Antibody to Combat RSV .pptx
Gaurav Gupta
 
12. Neurosurgery (part. 2) SURGERY OF VERTEBRAL COLUMN, SPINAL CORD AND PERIP...
Bolan University of Medical and Health Sciences ,Quetta
 
RUHS II MBBS Pharmacology Paper-I with Answer Key | 26 July 2025 (New Scheme)
Shivankan Kakkar
 
Models for screening of Local Anaesthetics.pptx
AntoRajiv1
 
ADVANCED CLINICAL PHARMACOKINETICS AND BIOPHARMACEUTICS AT ONE PLACE.pdf
BalisaMosisa
 
HANAU ARTICULATORS AND CLASSIFICATION.pptx
Priya Singaravelu
 
Anatomy of eyelids basic anatomy covered along with abnormalities of eyelids
SummyBhatnagar1
 
Sources, types and collection of data.pptx
drmadhulikakgmu
 
Pharmacotherapy of Myasthenia Gravis- Dr. Anurag Sharma (1).pptx
Anurag Sharma
 
The Anatomy of the Major Salivary Glands
Srinjoy Chatterjee
 
CANSA Womens Health UTERINE focus Top Cancers slidedeck Aug 2025
CANSA The Cancer Association of South Africa
 
Omphalocele: PowerPoint presentation
Nathan Lupiya
 
ICF around the World - Keynote presentation
Olaf Kraus de Camargo
 
Pharmacology is the scientific study of how drugs and other chemical substanc...
tarun35435605
 

0507 057 01 98 * Adana Klima Servisleri

  • 2. Recruitment process @OWASP? ● Because this system is web application (partially) ● Because we based (100%) on FOSS (open-source) ● Because security matters ● Because OWASP people cares about security and can affect recruitment processes (hopefully) ;)
  • 3. Recruitment ● Lot of recruitment agencies / services ● Huge number of potential candidates ● Whole team is involved in recruitment ● Candidate evaluation takes really lot of time
  • 4. SysAdmin / Operations ● He is sysop, developer, QA and network specialist ● Also great for performance tuning ● Responsible for critical data (all data) ● Easy handles moving UPSes between racks ;) ● Anytime day / night understands what you’re talking to him ● Everything he does respects high security standards ● Loves playing games (do you know sysop that doesn’t play)? ;)
  • 5. Let’s play then ● Any idea? Not Quake / Diablo / Warcraft ;) ● pythonchallenge.com, wechall.net – CTFs are great! ● trueability.com – event for sysops ● So maybe CTF / challenge? ● Such system would have to fulfill some requirements: ● Optimization of recruitment process time ● Minimisation of the risk of rejecting good candidate ● Draw attention as very interesting (you like mindfscks?)
  • 6. Let's start the ball rolling Stage 1 – simple task Stage 2 – call/social.eng. Stage 3 – challenge Application Problem: huge candidates number (>100) Target: reject not suitable cands (>80% rejections!) Target: recognition, manipulation Global Thermonuclear War ;)
  • 7. Stage 1 – telnet / SMTP RFC-821/1869: HELO/EHLO ??.....?? GPG us ur CV using http://..../gpg.asc Lack of GPG knowledge :( RTFM!
  • 8. Stage 1 – telnet / SMTP RFC-821/1869: HELO/EHLO my.hostname 1 trap – not server’s hostname but client’s (90% catched) GPG us ur CV using http://..../gpg.asc Lack of GPG knowledge :( RTFM!
  • 9. Stage 1 – node.js ● At the beginning – pure C server. After 3am.. Node.js (simplicity) ;) ● What’s wrong with node.js? ● http://seclists.org/bugtraq/ - 0 hits ● http://osvdb.org/ - 2 hits ● http://1337day.com/, http://www.exploit-db.com/ - 1 hit ● https://nodesecurity.io/advisories - 4 hits ● Does it mean that node.js is safe & secure?
  • 10. Node.js – how it works? http://magnetik.github.io/ - Event driven - Event loop - Callbacks - SPA, async, REST, Json
  • 11. Node.js - threats ● no logging ● No error handling - DoS ● No configuration – “+” or “-”? ● No filters checking user-input ● JS: function as a variable ● Evil eval(code). Server-side XSS ● setInterval(code,2), setTimeout(code,2), str = new Function(code) ● Moduły npm – who creates those? ............................................________ ....................................,.-'"...................``~., .............................,.-"..................................."-., .........................,/...............................................":, .....................,?......................................................, .................../...........................................................,} ................./......................................................,:`^`..} .............../...................................................,:"........./ ..............?.....__.........................................:`.........../ ............./__.(....."~-,_..............................,:`........../ .........../(_...."~,_........"~,_....................,:`........_/ ..........{.._$;_......"=,_......."-,_.......,.-~-,},.~";/....} ...........((.....*~_......."=-._......";,,./`..../"............../ ...,,,___.`~,......"~.,....................`.....}............../ ............(....`=-,,.......`........................(......;_,,-" ............/.`~,......`-...................................../ .............`~.*-,.....................................|,./.....,__ ,,_..........}.>-._...................................|..............`=~-, .....`=~-,__......`,................................. ...................`=~-,,.,............................... ................................`:,,...........................`..............__ .....................................`=-,...................,%`>--==`` ........................................_..........._,-%.......`
  • 13. This way we added new functionality to the server during runtime! http://node.js/myurl Node.js – evil eval()
  • 15. Node.js – how can? ● Use frameworks: https://npmjs.org/ - carefully ● Npm modules are not validated! Check those: https://nodesecurity.io ● Watch module dependencies! ● must have: your own error handling & logging ● This is server – we need proper server security solutions: ● Monitoring – think how to monitor your app ● Control-groups – set limits for resources ● SELinux sandbox
  • 16. Node.js – SELinux sandbox ●'home_dir' and 'tmp_dir' ● App can r/w from std(in|out) + only defined FDs ● No network access ● No access to foreign processes / files ● We can easily connect sandbox with cgroups :) ● Helpful: semodule -DB (no dontaudit) ● grep XXX /var/log/audit/audit.log | audit2allow -M node.sandbox ● semodule -i node.sandbox.pp
  • 18. Node.js – how can #2 ● Freeze node.js version per project? ● Let’s read & learn: ● https://media.blackhat.com/bh-us-11/Sullivan/BH_US_11_Sullivan_Server_Side_WP.pdf ● http://lab.cs.ttu.ee/dl91 ● https://github.com/toolness/security-adventure ● Pseudo–configuration – set limits in your code (e.g. POST size) ● try...catch ftw ● use strict; - helps even with eval case (partially) ● Bunyan / dtrace: https://npmjs.org/package/bunyan ● node.js OS? Oh and use / build node.js packages (fpm or whatever)
  • 19. Stage 2 – social engineering ● Stage’s target is to verify & check candidate’s security awareness ● Christopher Hadnagy – SE framework (2k10): ● http://www.social-engineer.org/framework/Social_Engineering_Framework ● Everyone can act as recruiter and call anyone ● Building network / connections on Linkedin is very easy ● Trust (lingo, easiness in some env: research) ● Sysop knows really much about env – he’s good target ● So one has to only get sysop’s trust and decrease his carefulness
  • 20. Stage 3 - virtualization ● Our needs? ● Boot process supervision ● Console access ● Resource management ● Redundant storage ● Rescue mode for VMs ● Security by default > AWS > KVM/libvirt > XEN/libvirt > LXC
  • 21. Stage 3 - virtualization boot console resources mgmt. redundant storage rescue VM security
  • 22. Stage 3 - virtualization VS Performance XEN/HVM or KVM?
  • 23. Stage 3 - virtualization VS We had great performance issues with XEN/HVM The winner is „hat in the red” and its PV (but with the cgroups help – under heavy load KVM is not that stable) Performance XEN/HVM or KVM?
  • 24. Stage 3 – network security DMZ (Demilitarized Zone) – logical or physical partition https://en.wikipedia.org
  • 25. Stage 3 – network security https://en.wikipedia.org DMZ (Demilitarized Zone) – logical or physical partition
  • 26. Stage 3 – network security ● Separated, dedicated DMZ (VLAN?) for host ● No routing / communication from this DMZ with other segments ● Low – cost solutions? ● OpenWRT / DDWRT way || Pure Linux server ● 802.1Q – VLANs
  • 27. Stage 3 – network security ● Network isolation on KVM host: ● Host/network bridge: L2 switch ● netfilter / nwfilter (IBM) ● By default there’s no packets isolation in the bridged network - ebtables null, no filtering ● ebtables – filtering l2– so we gain isolation ● Or virsh nwfilter-list ● allow-arp,dhcp,dhcp-server,clean-traffic, no- arp-ip-spoofing, no-arp-mac-spoofing, no- arp-spoofing, no-ip-multicast, no-ip-spoofing, no-mac-broadcast, no-mac-spoofing, no- other-l2-traffic ● L2 filtering? /proc/sys/net/bridge https://www.redhat.com/archives/libvir-list/2010-June/msg00762.html http://pic.dhe.ibm.com/infocenter/lnxinfo/v3r0m0/topic/liaat/liaatsecurity_pdf.pdf
  • 28. Stage 3 –boot process, VNC ● Accessing boot process – VNC ● VNC security? SSL? Complications.. ● Maybe VNC over SSH tunnel? ● Encryption ● No certificates issues ● Every admin can easily use VNC
  • 29. Stage 3 – restricted shells ● SSH tunneling requires SSH access (thank You Captain Obvious!) ● SSH access is a threat per se ● Let’s limit this SSH / shell access – use restricted shells Restricted shells by. Google ;) =>
  • 30. Stage 3 – restricted shells ● Restricted shells are threat by default – unless we know how to use those! ● Under some circumstances one could escape the rshell: https://en.wikipedia.org/wiki/Rbash
  • 31. Stage 3 – restricted shells ● Rbash: ● CentOSie / RHEL approved / friendly / legit ;) ● Protects from directory traversal ● Prohibits access to files via direct path ● Prohibits setting PATH or other shell env variables ● No commands output redirection ● PATH=$HOME/bin – and reconsider 2x what to put into this „bin” https://en.wikipedia.org/wiki/Rbash
  • 32. Stage 3 – SSH tunnel / VNC ● We must go deeper! Candidate VM-Proxy screen / ssh tunnel VM host rshell / ibsh rshell / rbash VNC server
  • 33. Stage 3 – restricted shells ● Other restricted shells: ● rssh – allows scp, sftp, rsync ● sudosh - http://sourceforge.net/projects/sudosh ● Allows saving whole user session and replay it ● One can define allowed operations for user ● Little outdated – better use sudosh3 ● Ibsh (small, fast, secure): http://sourceforge.net/projects/ibsh/
  • 34. Stage 3 – control groups ● resource management in a simple way (ulimits, nice, limits.conf).. but.. ● Could you set 50 IOPS for defined process? ● What about 100Kbp/s limit for particular user? ● issues with memory–leaks in Java?
  • 35. Stage 3 – control groups https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Resource_Management_Guide/ch01.html ● Debian & RHEL friendly ● Running apps in cgroup context ● Setting cgroup context for process during runtime
  • 36. Stage 3 – web application ● OpenStack? „Couple” of compliations ;) “Out of the box” – yup – I’ve heard about that ;) Could you deploy it in a few hours – securely?
  • 37. Stage 3 – web application Commodore OS ???
  • 38. Stage 3 – web application Commodore OS Vision FTW!
  • 39. Stage 3 – web application ● Apache + mod_security ● mod_security + OWASP rules ● PHP & Python :) ● Simplicity! ● VM management with simple daemon + screen: ● while(1) do: manage_VMs(); ● And this just works!
  • 40. Stage 3 – recording SSH sessions ● We have to record all sessions – also those under „screen” ● Real time recording ● sudosh3 (sudosh fork) – kinda proxy shell – great ;) ● auditd – lov-lewel tool for recording syscalls ● Asciinema (ascii.io, Marcin Kulik) – great one, but not for audit purposes ● Ttyrec – outdated: http://0xcc.net/ttyrec/index.html.en ● Ssh logging patch - outdated: http://www.kdvelectronics.eu/ssh-logging/ssh-logging.html
  • 41. Stage 3 – data security ● What if we loose any of the VMs...? Brrr.... ● Risk assesement – what would be enough for us? ● RAID1 / Mirror – “usually” is enough for a 3 – month time ● Backups – useful ;) RAID / replication are not backups... ● GlusterFS / DRBD – if you have enough resources – try it :) LVM Gluster brick KVM active host LVM Gluster brick KVM passive host replication