Vulnerabilità e Attacchi alle Infrastrutture IT
Simone Riccetti
Sr. IT Security Architect
Agenda
Team di Ricerca X-Force
Vulnerabilità e Minacce
Tecnologie di Protezione
Attack Lifecycle
Live Demo
2
The mission of the
IBM Internet Security Systems™
X-Force® research and development
team is to:
Research and evaluate threat and protection issues
Develop assessment and countermeasure technology
Educate the media and user communities
3
X-Force
4
Agenda
Team di Ricerca X-Force
Vulnerabilità e Minacce
Tecnologie di Protezione
Attack Lifecycle
Live Demo
5
Vulnerability Highlights
Overall number of disclosed
vulnerabilities increased in
comparison to previous years
5% increase over the first half of
year 2007
6
Patch Availability Date
Y-Axis
gg tra la patch e
l’annuncio della
vulnerabilità
X-Axis
Data di annuncio della
vulnerabilità
Data
1,551 patches
15% Prima dell’annuncio
54% All’annuncio
31% Dopo l’annuncio
Courtesy: Stefan Frei, ETH Zurich – http://www.techzoom.net/risk/
Exploit Availability Date
Exploit Availability Date
Courtesy: Stefan Frei, ETH Zurich – http://www.techzoom.net/risk/
Y-Axis
Giorni trascorsi tra
l’annuncio della
vulnerabilità e l’exploit
X-Axis
Data di annuncio della
vulnerabilità
Data
3,428 exploits
23% disp. prima
dell’annuncio
58% disp. all’annuncio
19% disp. dopo l’annuncio
Browser Vulnerabilities
Memory corruption is the main vulnerability.
No substantial difference.
9
Primary Exploit Target: Browser Plug-Ins
The majority of publicly released
exploits are for browser plug-ins
The top five most exploited browser
vulnerabilities all target plug-ins
Although most active exploitation
focuses on older vulnerabilities,
newer attack tools have automatic
methods to incorporate the most
recent exploits
10
Web Server Application Vulnerabilities
Three newcomers to the top ten vendor list were web server application
software vendors
Web server application vulnerabilities account for 54% of all 2008 H1
disclosures and 51% since 2006
11
Agenda
Team di Ricerca X-Force
Vulnerabilità e Minacce
Tecnologie di Protezione
Attack Lifecycle
Live Demo
12
ISS Preemptive Protection
Vulnerability Focused Protection
Agenda
Team di Ricerca X-Force
Vulnerabilità e Minacce
Tecnologie di Protezione
Attack Lifecycle
Live Demo
15
How do you get “owned” these days?
The Attach Lifecycle
The initial culprits in owning a system can be as innocent as an email from
Mom or as malicious as a hacker set to steal valuable information.
16
The Attack Lifecycle
Inherent in any computer program
are vulnerabilities, or small cracks
in the code, that allow things in that
were not originally intended.
17
The Attack Lifecycle
Inherent in any computer program
are vulnerabilities, or small cracks
in the code, that allow things in that
were not originally intended.
A “proof of concept”, or exploit,
is created to take advantage of
the lowered defenses from the
vulnerability
18
The Attack Lifecycle
Inherent in any computer program
are vulnerabilities, or small cracks
in the code, that allow things in that
were not originally intended.
Shellcode is then
injected to enable
remote code
execution
A “proof of concept”, or exploit,
is created to take advantage of
the lowered defenses from the
vulnerability
19
The Attack Lifecycle
Inherent in any computer program
are vulnerabilities, or small cracks
in the code, that allow things in that
were not originally intended.
Shellcode is then
injected to enable
remote code
execution
A “proof of concept”, or exploit,
is created to take advantage of
the lowered defenses from the
vulnerability
20
Shell code is executed to
create a buffer overflow
that opens the back door
to the system
The Attack Lifecycle
Inherent in any computer program
are vulnerabilities, or small cracks
in the code, that allow things in that
were not originally intended.
Shellcode is then
injected to enable
remote code
execution
A “proof of concept”, or exploit,
is created to take advantage of
the lowered defenses from the
vulnerability
21
Malcode, such as a
trojan or rootkit is
executed to wreak
havoc on the system
Shell code is executed to
create a buffer overflow
that opens the back door
to the system
The Attack Lifecycle
Inherent in any computer program
are vulnerabilities, or small cracks
in the code, that allow things in that
were not originally intended.
Shellcode is then
injected to enable
remote code
execution
A “proof of concept”, or exploit,
is created to take advantage of
the lowered defenses from the
vulnerability
22
Malcode, such as a
trojan or rootkit is
executed to wreak
havoc on the system
Shell code is executed to
create a buffer overflow
that opens the back door
to the system
X-Force Protection Engines
Cobion
Shellcode Heuristics
Cobion e-mail and content
filtering technology has analyzed
over 8.7B URLs and images and
1B unique spam messages. Over
100k web/700k spams
analyzed daily.
This engine uses generic
shellcode detection to block
shellcode payloads, one of
the most prevalent method of
infecting non-binary files like
html, docs, and images.
PAM
The Protocol Analysis Module (PAM) is the
network IPS component in IBM ISS desktop, server,
and network products. PAM uses behavioral and
vulnerability-centric methods to detect and block
network-based exploits affecting more than 7,400
vulnerabilities.
23
BOEP
Buffer Overflow Exploit Prevention
(BOEP) blocks execution payloads
delivered through buffer overflow
exploits, providing 0-day protection
for this class of threats.
VPS
The Virus Prevention System (VPS) is a behavioral
anti-virus technology that can stop not only new
malware variants, but also new malware families.
VPS uses pre-execution behavioral analysis to
stop malware before it can run and do damage.
Conclusions
The costs of data loss are significant but hard to calculate: the whole
company is at risk.
Collaboration brings complexity and with it many new risks.
Statistics are showing how the endpoint and the data are targeted.
A complete solutions must entail intrusion and extrusion prevention, as
well as proper Authentication, Authorization and Accounting.
24
Agenda
Team di Ricerca X-Force
Vulnerabilità e Minacce
Tecnologie di Protezione
Attack Lifecycle
Live Demo
25
GRAZIE!
Domande?
Simone Riccetti
[email protected]
Scarica

Vulnerabilità e Attacchi alle Infrastrutture IT Simone