the tools do not make the analyst

Harlan echoed some of my own feelings in a recent post of his:

…I keep coming back to the same thought…that the best tool available to an analyst is that grey matter between their ears.

…Over the years, knowing how things work and knowing what I needed to look for really helped me a lot…it wasn’t a matter of having to have a specific tool as much as it was knowing the process and being able to justify the purchase of a product, if need be.

Totally agree. This should apply to IT in general. If the tools replace knowledge, then you become a slave to the tool and it’s capabilities and weaknesses or lose the ability to ever work around the inevitable gaps of these tools.

skype 0day: pwning through messages

Every now and then I have to give reasons against something like Skype in the enterprise. Here’s a great reason why: 0day Skype messages. Wormable. (via @hdmoore)

The point is not to waggle fingers at Skype (though you could, since they’re closed and not very talkative), but to illustrate the risks inherent in any new technologies brought into the enterprise. (Not that I wouldn’t waggle fingers at Skype anyway, since I believe something like Skype wouldn’t be allowed to be so popular unless there were ways to tap into the voice streams.)

nsa publishes home network security tips

The NSA has published a nifty Best Practices for Keeping Your Home Network Safe fact sheet. This is a pretty good document which mixes easy-to-understand concepts with some more challenging ones. I really feel that people can get overwhelmed with the technical stuff, but usually do react favorably when given managable challenges.

I’d like to have seen more emphasis made on unique, complex passwords and the importance of passwords, but these are still excellent bullet points to cover with people. Entire books can’t cover the breadth of tips for good security these days, even for the layman….

just passed my five-year job anniversary

As I earlier mentioned as an afterthought, I just passed my 5-year anniversary in my current job.

My timeline:
1996-2001 college (5 years=studies change halfway through)
2001-2002 yeah, the tech hiring bust!
2002-2006 first job
2006-2011 second job

Let me tell ya, time flies.

jobwise, if I had a million dollars…

This is a useful exercise to do with oneself every now* and then: If I had xx million dollars right now, jobwise, what would I do? A few things spring to my mind…

1. Let’s get this out of the way first: Nothing. Retire and travel around the world to beautiful places and experiences. Play video games. Do whatever. Nothing too crazy.

Goal: Relaxation.

Why not do it now? Duh, $$$

2. Open a store: combination arcade, video/PC gaming, tabletop gaming, culture.

Goal: Enjoyment!

Why not do it now? A store like this won’t yield crazy margins and probably won’t ever be profitable. But if I had the money to eat the losses, I can think of many, many, many other less interesting and fun ways to spend my life.

Ok, now let’s get back to the real world for a bit.

3. Security consulting business. Now, I’m not talking some generic consulting where you just regurgitate the latest NetworkWorld news blurb or Gartner reports on what products in the AV space to buy. I simply want to answer security questions and help someone improve their security. I’d want to have the ability to dive in deeper as well, such as evaluating weaknesses in an IDS/IPS deployment and configuration, making recommendations on staffing for technologies, code development processes, testing detection and response, what works and what doesn’t in identity management. Not just top-level non-actionable things, but actually fingers-in-the-shit sort of work. Basically one step away from being on staff/contractor, so that the things I can talk about are also things that can be lived with, and any questions I can’t answer (like how do I protect against XSS in this specific function?) I can spend the time to figure out the answer. I wouldn’t want to be the consultant who says, “Classify all your data,” and then walks away with a paycheck for dropping that load of shit on some CIO’s desk when there are many other actionable items that can be tackled first. Even small things like the PCI item to discover all CC info on the network, would be fun, without just saying, “Buy DLP.” Any down time would be spent as I do now: tinkering with whatever I want to dig my fingers into, and staying abreast of the community.

That’s a huge paragraph, and I’m probably being more detailed than I need to be. Essentially like 1 part security analyst, 1 part architect,, 1 part coder, 1 part auditor, 1 part pen-tester, 1 part manager, 1 part managed security service provider….

Goal: I love doing it (defense and offense), including the allowances for profits/convenience.
Why not do it now? Simply financial risk.

Why not do it now, part 2? I’m not much of a salesperson; I often understate my abilities rather than thinking I’m a qualified expert.

Why not do it now, part 3? Ok, fine, as Rothman excellently points out, I could almost do this now by taking on the consultant attitude. Other than not having a dedicated security role right now (general ops), I could be there.

4. Pentesting. I get that it’s not all fun and games and there’s tons of report-writing and analysis and screen-staring and delivering the same old report to hostile managers and fruitless scanning and frustration at squeezing 2 months of work into 72 hours on site. I get that. But I’d still love to be doing it.

Why not do it now? RE:An earlier point, I feel like I could use some “junior” time under a mentor/guidance.

Why not do it now, part dos? Honestly, I feel like I would suck for several years until I gained more experience and instinct, and I hate underdelivering. That would be a rough few years where financial security would be nice. But for someone who self-describes as having the logical/analystical/paranoid mindset that is nice for security, it’s really just a matter of getting experience under the belt.

Any number of roles also come to mind or even my own managed security services firm, though I still am not sure of their value, ultimately. Even doing some auditing, but I also feel like that will never be profitable because of the corners so many other firms cut in order to do more and quicker audits while keeping customers happy (i.e. as much good news as possible).

As far as company size, I don’t mind large companies all that much, or even just being a cog in a much bigger wheel, but I would love the family-and-friends feel of a smaller shop, where you can relax and be yourself in the office and not just have it be a stuffy 9-to-5 sort of environment. I’ve actually been in a start-up for a summer, and while it was ultimately a waste of time, I think, I did really enjoy the informality and get-it-done feeling. (The Penny-Arcade office atmosphere comes to mind…)

The ultimate goal that makes me happy, though, is helping someone better understand the security of their data, business, network, systems, and ultimately people.

* I actually just hit my 5-year anniversary at my current job. A bit of a milestone that causes me to sit back and think about where I am now and my next 5 years…

stop asking questions!

If you have a remote developer who has access to a development database that actually has mostly production-level data inside it, would you know if that developer downloaded the whole database to their home system?

Would you know it if they put in a backdoor page on a production site that allows raw query access?

humor me while I make PCI really hard for a moment

Preaching to the choir, but here is my illustration of how difficult PCI can be. Let’s look at requirement 10.5.1: Limit viewing of audit trails to those with a job-related need. Let’s also keep in mind the wording of 10.5.2: Protect audit trail files from unauthorized modifications. Essentially we’re talking about log management.

(If you’ve worked in logs before, you can probably guess where I’m going to go…)

Let’s say Bob uses LogRhythm as his choice of log management software, and he points his devices over to it. For simplicity, let’s just say he has a Windows Server OS box that is under scope for PCI. Since the LogRhythm agent sucks up these logs and throws them at the master server, Bob submits only a screenshot of the user account list inside LogRhythm. Bob reasons that only these peope can see the logs in the SEIM.

Done! Right?

Well, wait a minute. The point of these PCI items is twofold. First, make sure unauthorized people can’t view the logs, only those who need to see them can view the logs (an important distinction, sadly), either because they may give details away or aid an attacker in seeing what errors she generates. Second, make sure the attacker doesn’t have a chance to modify those logs, or flat out destroy them.

As some vendors in this space will tell you, there are gaps here! The gap between when Windows gets the event and when it saves it to the event log. The gap between when the event is written to a local log and when LogRhythm’s agent grabs it up (including when an attacker has been able to turn off the collector agent). Moving forward, what about the backup location of log files? The agent-to-master communication? (Better yet, let’s talk syslog in terms of confidentiality and integrity!)

Another way to look at it is just to evalute our audit logs in a way that unauthorized people can’t just stumble upon them and/or edit them. If an attacker subverted a system and can intercept logs before they’re gathered, that just might be an advanced case. If an attacker popped Local System on his Windows/IIS box, should he still be able to protect those logs completely? I think that’s arguable. Likewise, someone may argue that more open logs like the Windows System and Application logs aren’t in scope of this, and only the Security log is, which is more locked down by default in Windows. Perhaps… In cases like this, you at least have logs up to when the attacker gained enough rights to start hiding her tracks.

I’m not going to diss on “just enough security” since I think that’s what we often preach anyway when we talk risk. I just wanted to illustrate that even slam dunk PCI items, when really analyzed deeply, are not always so easy to rush through.

Update: Also check out 11.5: Deploy file-integrity monitoring tools to alert personnel to unauthorized modification of critical system files, configuration files, or content files; and configure the software to perform critical file comparisons at least weekly. This begs the obvious question, “What files should I monitor?” It’s not an easy question and more orgs/people will opt not to tell you unless you’re paying them money to do so. So, do you purchase and deploy a FIM tool with defaults? What executables and dlls and files do you monitor? Unless you do the bare minimum of following vendor defaults, this won’t ever be something you just do and forget forever…and that’s not even having to deal with patch-related false positives or a misguided desire to log *everything* just because you want to, and then suffer through many false positives…

monday rant: secure development

Catching up on ISC.SANS entries and I came across “In-house developed applications: The constant headache for the information security officer.” This is one of those things that I think is not only far easier said than done, but is also not limited at all to in-house apps. I’ve had as much headache, if not more, with third-party delivered apps, especially those custom made.

In-house apps suffer from a developer doing things any way they can get away with. The only protection is to be stringent with least privileges and access, and questioning every design requirement; basically make them develop inside a safe box, which of course gets in the way of innovation.

Out-of-house apps suffer from doing things any way they can that will get the job done with as little tinkering as possible. The only protection to this is to give complete knowledge of your requirements to the third-party so they design it to fit. Yeah, good luck with that.

So when shit hits the fan and a manger has already spent xx manhours on an application, guess what? Yup, the network/systems/security need to bend to accomodate, often creating exceptions and other administrative headache. All because of poor up-front involvement…

…and expert level knowledge. (Yes, that’s the crux of it all!)

This is why I am cynical about getting code to be better. It helps in large enterprises with mature development lifecycles, but I truly feel most shops don’t have that, and their security/ops teams are manhandled by developers meeting business requests.

sony talks about psn hack

Picked up via @MikkoHypponen that some liveblogging was happening during a Sony press conference. I still won’t complain about their response to all of this, but…

No CSO level position? Weak. You’re how big with how much IP and data and how big if your digital footprint?

Known vulnerability but wasn’t known to you? What does that even mean? You think management is going to understand such vulnerabilities? Anyway, this means to me that either patching was broken or this was a reported hole in their systems that wasn’t addressed properly.

Rebuild/move data center with better security? Sounds almost like they just outsource their operations…that or moving your physical location isn’t going to help against a digital attack.

playstation network pwned; hard questions for sony

In case you missed it, the recent Playstation Network outage has been finally acknowledged in a Sony release. If you were thinking it was a DoS, you’re wrong. It was complete pwnage [emphasis mine]:

…we believe that an unauthorized person has obtained the following information that you provided: name, address (city, state, zip), country, email address, birthdate, PlayStation Network/Qriocity password and login, and handle/PSN online ID. It is also possible that your profile data, including purchase history and billing address (city, state, zip), and your PlayStation Network/Qriocity password security answers may have been obtained. If you have authorized a sub-account for your dependent, the same data with respect to your dependent may have been obtained. While there is no evidence at this time that credit card data was taken, we cannot rule out the possibility.

In short, this is a big deal. Maybe not ultimately to Sony/PSN, but it is a big deal for the industry. And these are the hard questions:

1. How did this one breach disclose so much? Was it one issue or several that were leveraged? (As a learning opportunity, which is better, a single issue that caused your (gigs of) data to be exfiltrated or a series of leveraged weaknesses?)

2. No password hashing? Encrypting? Credit card information segregated/tokenized/hashed/encrypted? If it was, was the key management that poor? I hate to be the one to say it, but let’s hear that PCI compliance status… (without the PCI marketing spin)

3. What was Sony’s security budget? Or any budget around technology and the protection thereof.

4. If Sony’s deep pockets and ability to have a deep budget didn’t help, is this further illustration of security futility? If nothing else, it’s illustration of the view of digital security in profitable enterprises…

5. What if Sony *has* done risk analysis and determined to accept whatever risk was present? (Even the act of not doing anything is an unspoken acceptance of risk, in my book.) This is my biggest problem with risk and probability: You’re still susceptible to that one-in-a-100-years-hurricane scenario; and heads will roll. It’s also my biggest problem with security and the media: We, in security, believe that you *will* fail, and the media will always sensationalize everything it can. This will always shake out against us; even when we do things absolutely correct (and what organization lets us even come close to doing things absolutely correct?).

6. Do you blame the attacker or do you blame Sony?

7. What was the time-to-breach after they leveled their attacks against you? I’m hoping it wasn’t hours, days, or even weeks… I’m also hoping their breach-to-detection time is small.

One thing I won’t harp on is how long or quick it took Sony to announce something to its customers. A 6-day period during which it took the network down to analyze the extent is not entirely something I can get upset about. And you certainly don’t want to tell 70 million customers something until you know it for sure; not just because of a loss of customers, but simply because if you’re wrong, you’ve just done fucked up even worse. This is an announcement you take the time to get right; and 6ish days is not unreasonable. Does this mean an attacker may have had free reign on credit card information (etc) for 6+(time of breach-to-detection) days? Yes, but when is that *not* the case?

nook color update adds a market, flash support, and more

I mentioned on Twitter yesterday that Barnes and Noble have released their long-awaited update to the Nook Color which includes Android 2.2 Froyo, Flash support, an apps store, and other updates. Really cool!

While the app store has been down for me all day (not something I’d hold too hard against someone, since I’m sure the load is high and the site brand new), I’d overall give the rollout a “B” grade so far.

Pros: Excellent upgrade and the chance to buy and install apps! Flash support really rounds out the web experience. Things just overall seem faster. Essentially, they’re transitioning the $250 e-reader+ device into an actual tablet. Good deal! I know this is a short list, but it’s a big update. (A continued pro for the device itself is the better, less proprietary format of media in comparison to the Kindle.)

Cons: The app store is “curated,” meaning it’s a B&N store and *not* the whole Android market. While this makes me sad, I understand why they would do it, both from a profits perspective but also support. (Why allow users to install apps that won’t work? And what about the lack of the traditional Home/Menu/Back/Search/Settings buttons that some apps require?) Bluetooth radio is untouched and still not enabled (Can’t blame them, but *I* personally want it so I can hook up a gamepad). Also, still no geolocation, though I don’t think that’s even possible with the current hardware, and even if it were, the usefulness would be severely limited without 3G connectivity.

Compared to my autonootered Nook Color: Bottomline, my rooted Nook Color can do more apps and play more games (NES/SNES…) than my non-rooted Nook Color, so I don’t yet plan to unroot that particular one. Sure, there are some small issues like needing to kill a particular task to get the Extras to update after an install, but I still really value the apps that are not yet available on the B&N storefront. If and when they expand further and cover any apps I’d want, the move would be a no-brainer.

If you have a non-rooted Nook Color, this update is a no-brainer and a huge deal.

the triforce of power is recovered

Not a big deal, but thought I’d mark the occasion where I now own the terminal23.com version of this site to go with the .net and .org. Ever since I wanted to name my site this, some group has held the .com version (along with many other terminal##.com sites), but it has since been relinquished.

Not that I’m going to actually *use* that domain, but it’s a nice full circle sort of thing to have it under my control.

CAs have a nice scam going on with constant cert renewals, but registrars have it even better with all the damn top-level domains, let me tell ya…

the tracking has only just started

NCircle has a nifty article up about the dangers of what installed [mobile] apps know and access about you, whether they tell you or not.

This isn’t new, apps do what they want when you install them; always. What *is* new is how we now have this device with us everywhere we go; we put in social contacts, search, and use geolocation…constantly. That wealth of knowledge makes even *me* salivate…and I’m not even into advertising!!

Thought I’d repost this blurb I made recently in a HardOCP forum thread on the topic:

Besides, no one with a smartphone with Google/3rd party/provider geolocation services enabled should even begin to be worried about ISP/IP tracking. You’re already in far, far deeper with location tracking and delivered ads. Or if you don’t remain anonymous while using something like Google search. They’re already doing generic ISP location; I can’t search for many things without Google appending my city name to the back of it.

And no, people just accept it, and will let their privacy slowly erode. If it’s wrapped around an Angry Birds app, you’ve already lost the battle. If it’s a free search engine that you use while logged into your free email account which also houses your RSS feeds and IM/VOIP friend lists as well as a free DNS provider (tracks when you query) and free browser (that won’t let you globally disable scripting), all of which is also tied by account to your smartphone with a geolocation service…

…all from the same company*…you’ve already lost.

* Throw in things like Facebook and Twitter behind-the-scenes information-sharing, and you’re even further in the hole. (Oh, and all of this is opt-in by default.)

I don’t trust Google, nor do I trust Apple…and it really does suck that if I want a device like this, I’m screwed. If I want these convenience-adding apps that *need* a business model and to make money any way they can, I have to feel dirty when I install them.

By the way, recent news is that Apple requires and uploads location information from their devices. This begs the question: How come Apple doesn’t retrieve every single device that is ever stolen? If my device spends a huge chunk of time in my home, and suddenly spends it elsewhere shortly after me reporting it stolen…help a brotha out, ya know?