Laura Bell
Founder and Lead Consultant -‐ SafeStack
@lady_nerd
[email protected]
h6p:/
/safestack.io
For the greater good?
open sourcing
weaponisable code
Slide 2
Slide 2 text
#oscon
#protectyourpeople
To join the discussion (but play nicely please)
Slide 3
Slide 3 text
This talk may make you feel
uncomfortable.
Sorry.
Slide 4
Slide 4 text
Should all so=ware
be open source?
Slide 5
Slide 5 text
Ever wriBen a tool that could be used in
more ways than you intended?
Slide 6
Slide 6 text
Ever worried about who is using your
OS tool and what they use it for?
Slide 7
Slide 7 text
Once upon a Eme…
Slide 8
Slide 8 text
“Do research!” they said, “Present it”
Slide 9
Slide 9 text
What’s the worst that can happen?
Slide 10
Slide 10 text
Research code quality may vary
Slide 11
Slide 11 text
Not everyone was happy
Slide 12
Slide 12 text
For the greater good?
Slide 13
Slide 13 text
In
this
talk
The
Story
AVA
and
building
security
tools
The
Challenges
Lessons
learned
the
hard
way
and
ques7ons
with
difficult
answers
The
Solu4ons
The
future
and
how
we
proceed
Slide 14
Slide 14 text
The story
Slide 15
Slide 15 text
Ava
first generation
proof of concept
3- phase
automated
human vulnerability
scanner
Slide 16
Slide 16 text
KNOW
PHASE 1
Slide 17
Slide 17 text
We don’t know what our organisations look like
Slide 18
Slide 18 text
Human
security
risk is
magnified
by
connection
Slide 19
Slide 19 text
Active Directory
Twitter
LinkedIn
Facebook
Email providers
People
Identifiers
Groups
Relationships
metaData
Slide 20
Slide 20 text
Location
Time stamps
Sender
Receiver
User agent
friends
contacts
frequency
aliases
profiles
Last login
Pw Expires?
Disabled?
Influence
Admin?
Slide 21
Slide 21 text
TEST
PHASE 2
Slide 22
Slide 22 text
Threat
injection
and
behaviour
monitoring
Slide 23
Slide 23 text
Attack vectors that mean something
Email
Social Networks
Removable Media
Files and honeypots
SMS
Slide 24
Slide 24 text
Email attacks that go beyond phishing
Email
phishing Internal
request
social
panic
Direct request External request
favour
authoritative
Slide 25
Slide 25 text
The
URL
may
be
different
on
different
messages.
Subject:
Security
Alert:
Update
Java
(*See
Kronos
Note)
Date:
February
22,
2013
***********************************************************
*************
This
is
an
automa4cally
generated
message.
Please
DO
NOT
REPLY.
If
you
require
assistance,
please
contact
the
Help
Center.
***********************************************************
*************
Oracle
has
released
an
update
for
Java
that
fixes
50
security
holes,
including
a
cri4cal
hole
currently
being
exploited
in
the
wild.
The
IT
Security
Office
strongly
recommends
that
you
update
Java
as
User generated and publicly sourced attacks
Slide 26
Slide 26 text
Removing the boundaries between business and personal
Slide 27
Slide 27 text
INSTANT, SCHEDULED AND RECURRING
Security fails when it is treated like a special event
Slide 28
Slide 28 text
Give the option of succeeding
and reinforce good behaviours
Slide 29
Slide 29 text
analyse
PHASE 3
Slide 30
Slide 30 text
Behaviour Vs. time
Slide 31
Slide 31 text
Technologies
• Django
• Postgresql
• Celery
• Redis
• Bootstrap
• Open source
• GPL
• docker
• Integrates with exchange,
ad and google apps for
business
Slide 32
Slide 32 text
The history
Slide 33
Slide 33 text
I’m not the first here
Slide 34
Slide 34 text
World famous hacking tool
‘wget’
(as used by Snowden)
Slide 35
Slide 35 text
Just a few examples
The Social Engineering
Toolkit
Metasploit
SQLMap
Slide 36
Slide 36 text
Awareness someEmes leads to fear
Slide 37
Slide 37 text
The challenges
Slide 38
Slide 38 text
Control of contribuEon
and codebase
Slide 39
Slide 39 text
DirecEon and Leadership
Slide 40
Slide 40 text
Everybody has a moral compass, we just don’t agree where north is
Project values and ethics
are important
Slide 41
Slide 41 text
But is this a necessary evil?
Ve_ng contributors is voodoo
ability, enthusiasm, moEvaEon, background, employer, maturity
Slide 42
Slide 42 text
Peer review sucks
Slide 43
Slide 43 text
Control of usage
Slide 44
Slide 44 text
Having a license
is simple
Enforcing a
license is less so
Slide 45
Slide 45 text
Forking
Slide 46
Slide 46 text
Not typical OS community members
Slide 47
Slide 47 text
Ethics and the Law
Slide 48
Slide 48 text
The law in this space is immature
Slide 49
Slide 49 text
Privacy is about protecEng people
Know
Update
Delete
Ask
Slide 50
Slide 50 text
Could I live with myself?
Slide 51
Slide 51 text
The soluEons
Slide 52
Slide 52 text
Won’t hold ‘em for long but it may slow them down.
OpEon 1
Closed source
Slide 53
Slide 53 text
With great power comes great…. stress related headaches
OpEon 2
Open source with vigilance
Slide 54
Slide 54 text
Some security at the cost of maintainability and community
OpEon 3
Hybrid model
Slide 55
Slide 55 text
The path forward is uncertain
Slide 56
Slide 56 text
Should all so=ware
be open source?
Slide 57
Slide 57 text
Learn more or get involved
@avasecure
http://avasecure.com
open source (GPL)
https://github.com/SafeStack/ava
now with docker build
Slide 58
Slide 58 text
Laura Bell
Founder and Lead Consultant -‐ SafeStack
@lady_nerd
[email protected]
h6p:/
/safestack.io
Questions?
#protectyourpeople
#oscon