iSymposium 2018 - Live Hack with Ben and Kassie Holt
Talk given on 4/26 at Adobe campus in Lehi with three live hacking demonstrations that included a physical drive removal, Google Gruyere Privilege Escalation and Remote Desktop network scan and bruteforce attack.
Employee Data, Episodes Employee Data, Episodes 60,000 Customers 60,000 Customers Cryptocurrency $133 M Cryptocurrency $133 M 57 M Users’ Data 57 M Users’ Data 2017
Encryption • Limit Access to Servers • Limit Number of Password Retries • TCM (Trusted Computing Module) If you learn one thing from me: Use Full Disk Encryption on All Computing Systems
Cookie and Discovered Username | Role • Application Did Not Forbid “|” in Username • Create New Username with Role In It • Logout • Login • Deny Service
Security Needs to Be “Baked-In” • How Do They Test Security? • What Responsibility do They Take? • What is Their Response Plan? • How Do They Store Your Data? Free Services Are Not Free - They Take No Responsibility
trying to pass policies that make my remote work so much more difficult. Can you show them that I am secure? That way I can tell them to back off and let me work remotely in peace. Let’s Talk About
Mitigation: Training and Understanding • Policies are Only as Good as They Are Followed • Train for Understanding with Compliance • Limit Access • Use Two Factor Authentication • Exponential Backoff • Monitor Stupidity is a more dangerous enemy of the good than malice. One may protest against evil; it can be exposed and, if need be, prevented by use of force. Evil always carries within itself the germ of its own subversion in that it leaves behind in human beings at least a sense of unease. Against stupidity we are defenseless. --DIETRICH BONHOEFFER