Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs [email protected].

35
Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs [email protected].

Transcript of Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs [email protected].

Page 1: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Herbert BosErik van der Kouwe

Remco Vermeulen

Andrei Bacs [email protected]

Page 2: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Computer and Network Security

• Little crypto• Much hacking• No book• Very intensive

Page 3: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Who should pick this course?

• You, if you would like to be a “security expert”• You, if you are technical in the Systems sense– C and Linux should not be a problem for you– If you have never written a C program… then this

might not be for you– At the very least, you will have to catch up

• You, if you are interested in solving technical problems

• You, if you are not afraid to invest “private” time…

Page 4: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Set up

• 70% challenges and 30% exam– all grades must be >= 5

• Theory in lectures• Four challenges– Throughout the course duration– Solve in your own time

• Final exam– Exam material: all material covered in the lectures– Papers and material provided during the lectures

Page 5: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Challenges

• Start simple, end tough• You will not know in advance what the

challenges are• Speed matters– top 3 : 1pt bonus– below that : it still matters!

• Top achievers will be announced and applauded• Choose nicks – compete, have fun!

Page 6: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

If you work hard…

• this will be an extremely rewarding course.

Page 7: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

2010

Page 8: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

2011

Page 9: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

VU-Bar

• we run a regular CTF team• excellent way to learn more and have fun

Page 10: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

• Hack in the Box 2010 (Amsterdam)– Capture the Flag

competition– 6 VU students

participated– When the dust

settled…we ranked 1-6!

Page 11: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

2011

Page 12: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.
Page 13: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Contacts

• guest lecture(s)• internships– KPMG– Atos– NFI– Smaller security firms– …

Page 14: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Alert: new course

• Binary and malware analysis (first term next year)

Page 15: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Course information

• Everything will be made available via blackboard

• There is a discussion board, use it!– All questions should first be posted on the

discussion board– Help each other, but do not give full solutions

Page 16: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Case Study: Operation Aurora• A massive cyber attack first disclosed by Google on January, 2010

– The attack targeted many different organizations(Google, Adobe, Yahoo, Symantec, . . . )

– Originated in China

• Goal: to compromise the source code repositories of several high tech companies

Page 17: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

How did it work?

Page 18: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Case study: operation Aurora

1. The attackers spam infected URLs (e-mail, IM, . . . )

Page 19: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Case study: operation Aurora

1. The attackers spam infected URLs (e-mail, IM, . . . )2. A victim opens an infected web page

Page 20: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Case study: operation Aurora

1. The attackers spam infected URLs (e-mail, IM, . . . )2. A victim opens an infected web page3. Some JavaScript code exploits a 0-day vulnerability in IE

Page 21: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Case study: operation Aurora

1. The attackers spam infected URLs (e-mail, IM, . . . )2. A victim opens an infected web page3. Some JavaScript code exploits a 0-day vulnerability in IE4. The payload of the exploit downloads & installs multiple malware samples

Page 22: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Case study: operation Aurora

1. The attackers spam infected URLs (e-mail, IM, . . . )2. A victim opens an infected web page3. Some JavaScript code exploits a 0-day vulnerability in IE4. The payload of the exploit downloads & installs multiple malware samples5. The malware scan the LAN, looking for source code repositories

Page 23: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Case study: operation Aurora

1. The attackers spam infected URLs (e-mail, IM, . . . )2. A victim opens an infected web page3. Some JavaScript code exploits a 0-day vulnerability in IE4. The payload of the exploit downloads & installs multiple malware samples5. The malware scan the LAN, looking for source code repositories6. The malware contact a remote server and ask for commands from the attackers

“attack www.cs.vu.nl”

Page 24: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.
Page 25: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Case study: operation AuroraLessons learned

1. Most security threats start from the web2. A malicious web page leverages a defect in a program to

gain arbitrary code execution3. The exploit downloads and installs a malware sample,

infecting the victim4. Victim turns into a bot• Steals sensitive information• Performs scan, DDoS, SPAM, and other malicious activities

April 5, 16.17

(Network Security)

May 4, 7, 10 April 20, 23, 27

May 14

What about today, and May 25th? History, hacking, and (a crash course on) cryptography

May 21

Page 26: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Course outline (tentative)

• Mon 2 April : IntroductionAnnounce assignment 1 due on Mon 9 Apr @ 23:59 CET (1 week)

• Thu 5 Apr 9:00?! : Network security Announce assignment 2 due on Mon 23 Apr @ 23:59 CET (2+ weeks)

• Mon 16 Apr : Network security (CONT'd) • Tue 17 : Network security (CONT'd) • Fri 20 Apr : Application security

• Mon 23 Apr : Application security (CONT'd) Deadline assignment 2Announce assignment 3 due 14 May Apr @ 23:59 CET (3+ weeks)

• Fri 27 Apr : Application security (CONT'd)

Page 27: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Course outline (tentative)• Fri 4 May : Web App security

• Mon 7 May : Web App security (CONT'd) • Fri 10 May : Web App security (CONT'd)

• Mon 14 May : Web App security (CONT'd)Deadline assignment 3Announce assignment 4 due 31 May @ 23:59 CET (2 weeks)

• Mon 21 May : Botnets • Fri 25 May : Cryptography

• Thu 31 May : EXAMDeadline assignment 3

Page 28: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Grading

• 70% assignments, 30% exam• Every grade should be at least a 5.0• Speed matters

Page 29: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Assignment grade

Page 30: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Assignment grade breakdown

Page 31: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Assignment grade breakdown

Page 32: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Assignment grade breakdown

Page 33: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Assignment grade breakdown

Page 35: Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs cns-l@few.vu.nl.

Questions?