152
Iftach Ian Amit | November 2011 www.security-art.com All rights reserved to Security Art ltd. 2002-2011 Advanced Data Exfiltration The way Q would have done it Iftach Ian Amit VP Consulting DC9723 CSA-IL Board member IL-CERT Visionary Wednesday, December 7, 11

Advanced Data Exfiltration - the way Q would have done it

Embed Size (px)

DESCRIPTION

An updated version of my data exfiltration talk. Much more "visual" in nature.Used it at Hashdays, Govcert.NL, SourceBCN, and SecurityZone.

Citation preview

Page 2: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 3: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 4: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 5: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 6: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 7: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 8: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 9: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 10: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 11: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 12: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

whoami

2

Wednesday, December 7, 11

Page 13: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Agenda

3

Wednesday, December 7, 11

Page 14: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Agenda

3

Wednesday, December 7, 11

Page 15: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Agenda

3

Wednesday, December 7, 11

Page 16: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Agenda

3

Wednesday, December 7, 11

Page 17: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

4

Wednesday, December 7, 11

Page 18: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

5

Wednesday, December 7, 11

Page 19: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

5

Wednesday, December 7, 11

Page 20: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

5

Wednesday, December 7, 11

Page 21: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

5

Wednesday, December 7, 11

Page 22: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

5

Wednesday, December 7, 11

Page 23: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Wednesday, December 7, 11

Page 24: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Wednesday, December 7, 11

Page 25: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Wednesday, December 7, 11

Page 26: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Wednesday, December 7, 11

Page 27: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Wednesday, December 7, 11

Page 28: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Wednesday, December 7, 11

Page 29: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

6

Wednesday, December 7, 11

Page 30: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Wednesday, December 7, 11

Page 31: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Wednesday, December 7, 11

Page 32: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Wednesday, December 7, 11

Page 33: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Wednesday, December 7, 11

Page 34: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Wednesday, December 7, 11

Page 35: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

7

Wednesday, December 7, 11

Page 36: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 8

Wednesday, December 7, 11

Page 37: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 8

Wednesday, December 7, 11

Page 38: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 8

Wednesday, December 7, 11

Page 39: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 8

Wednesday, December 7, 11

Page 40: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

Wednesday, December 7, 11

Page 41: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

• eMails, web links, phishing...

Wednesday, December 7, 11

Page 42: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

• eMails, web links, phishing...

• Works like a charm!

Wednesday, December 7, 11

Page 43: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

• eMails, web links, phishing...

• Works like a charm!

• And can be mostly automated

Wednesday, December 7, 11

Page 44: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

• eMails, web links, phishing...

• Works like a charm!

• And can be mostly automated

• SET to the rescue

Wednesday, December 7, 11

Page 45: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

9

• eMails, web links, phishing...

• Works like a charm!

• And can be mostly automated

• SET to the rescue

Wednesday, December 7, 11

Page 46: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

10

And... being nice/nasty/obnoxious/needy always helps!

Wednesday, December 7, 11

Page 47: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

10

And... being nice/nasty/obnoxious/needy always helps!

Wednesday, December 7, 11

Page 48: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

10

And... being nice/nasty/obnoxious/needy always helps!

Wednesday, December 7, 11

Page 49: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

10

And... being nice/nasty/obnoxious/needy always helps!

Wednesday, December 7, 11

Page 50: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

10

And... being nice/nasty/obnoxious/needy always helps!

Wednesday, December 7, 11

Page 51: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

11

Wednesday, December 7, 11

Page 52: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

11

Wednesday, December 7, 11

Page 53: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Wednesday, December 7, 11

Page 54: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Wednesday, December 7, 11

Page 55: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Wednesday, December 7, 11

Page 56: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Wednesday, December 7, 11

Page 57: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Wednesday, December 7, 11

Page 58: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Wednesday, December 7, 11

Page 59: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Internet

11

3rd partyYou!

Target

Wednesday, December 7, 11

Page 60: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

12

Wednesday, December 7, 11

Page 61: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

12

Wednesday, December 7, 11

Page 62: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

12

Wednesday, December 7, 11

Page 63: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

What is the target “willing” to tell about itself?

13

Wednesday, December 7, 11

Page 64: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

What is the target “willing” to tell about itself?

13

Wednesday, December 7, 11

Page 65: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

What is the target “willing” to tell about itself?

13

Wednesday, December 7, 11

Page 66: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Wednesday, December 7, 11

Page 67: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Wednesday, December 7, 11

Page 68: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Wednesday, December 7, 11

Page 69: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Who’s your daddy?And buddy, and friends, relatives, colleagues...

14

Wednesday, December 7, 11

Page 70: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 15

Wednesday, December 7, 11

Page 71: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 15

Wednesday, December 7, 11

Page 72: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Select your target wisely

And then craft your payload :-)

16

Wednesday, December 7, 11

Page 73: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

17

Wednesday, December 7, 11

Page 74: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

17

Wednesday, December 7, 11

Page 75: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

17

Wednesday, December 7, 11

Page 76: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

17

Wednesday, December 7, 11

Page 77: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

17

Wednesday, December 7, 11

Page 78: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• ZeuS: $3000-$5000

• SpyEye: $2500-$4000

• Limbo: $500-$1500

17

Wednesday, December 7, 11

Page 79: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• ZeuS: $3000-$5000

• SpyEye: $2500-$4000

• Limbo: $500-$1500

17

FREE!

Wednesday, December 7, 11

Page 80: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

18

Wednesday, December 7, 11

Page 81: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

18

Wednesday, December 7, 11

Page 82: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

18

Experienced travelers know the importance of packing properly

Wednesday, December 7, 11

Page 83: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

18

Experienced travelers know the importance of packing properly

Wednesday, December 7, 11

Page 84: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• File servers

• Databases

• File types

• Gateways (routes)

• Printers

19

Wednesday, December 7, 11

Page 85: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

20

Mass infection:5-6 days before

detection

APT:5-6 months before

detection

Wednesday, December 7, 11

Page 86: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

20

Mass infection:5-6 days before

detection

APT:5-6 months before

detection

Wednesday, December 7, 11

Page 87: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

20

Mass infection:5-6 days before

detection

APT:5-6 months before

detection

Frequent updates No* updates* Almost

Wednesday, December 7, 11

Page 88: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

21

PATIENCEMass infection:5-6 days before

detection

APT:5-6 months before

detection

Frequent updates No* updates* Almost

Wednesday, December 7, 11

Page 89: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Wednesday, December 7, 11

Page 90: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Wednesday, December 7, 11

Page 91: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Wednesday, December 7, 11

Page 92: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Wednesday, December 7, 11

Page 93: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Wednesday, December 7, 11

Page 94: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Wednesday, December 7, 11

Page 95: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

22

Wednesday, December 7, 11

Page 96: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

23

Wednesday, December 7, 11

Page 97: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

23

Wednesday, December 7, 11

Page 98: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

24

Wednesday, December 7, 11

Page 99: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

24

Wednesday, December 7, 11

Page 100: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

24

Wednesday, December 7, 11

Page 101: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

So...

25

-----BEGIN PGP MESSAGE-----Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

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jN3t-----END PGP MESSAGE-----

Wednesday, December 7, 11

Page 102: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Still “too detectable”

26

Wednesday, December 7, 11

Page 103: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Still “too detectable”

26

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jN3t

Wednesday, December 7, 11

Page 104: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Much better• Throws in some additional encodings

• And an XOR for old time’s sake

• And we are good to go...

• 0% detection rate

27

Wednesday, December 7, 11

Page 105: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 28

Resistance is futile

Wednesday, December 7, 11

Page 106: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

29

Wednesday, December 7, 11

Page 107: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

29

80

44353

Wednesday, December 7, 11

Page 108: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

29

80

44353

Wednesday, December 7, 11

Page 109: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Kill some trees

30

Wednesday, December 7, 11

Page 110: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

31

Wednesday, December 7, 11

Page 111: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

31

Wednesday, December 7, 11

Page 112: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011

Good ol’e DD...

32

Wednesday, December 7, 11

Page 113: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

33

Wednesday, December 7, 11

Page 114: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

33

Wednesday, December 7, 11

Page 115: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

33

1 0 1 0

1/2 byte=

16 values

Wednesday, December 7, 11

Page 116: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

33

1 0 1 0

1/2 byte=

16 values

Wednesday, December 7, 11

Page 117: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

33

1 0 1 0

1/2 byte=

16 values

Wednesday, December 7, 11

Page 118: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Wednesday, December 7, 11

Page 119: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Wednesday, December 7, 11

Page 120: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Wednesday, December 7, 11

Page 121: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Wednesday, December 7, 11

Page 122: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Wednesday, December 7, 11

Page 123: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Wednesday, December 7, 11

Page 124: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Wednesday, December 7, 11

Page 125: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

34

Wednesday, December 7, 11

Page 126: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 35

Wednesday, December 7, 11

Page 127: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 35

Wednesday, December 7, 11

Page 128: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 35

1 0 1 0

Wednesday, December 7, 11

Page 129: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Wednesday, December 7, 11

Page 130: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Wednesday, December 7, 11

Page 131: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Wednesday, December 7, 11

Page 132: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Wednesday, December 7, 11

Page 133: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Wednesday, December 7, 11

Page 134: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

DEMO

36

Wednesday, December 7, 11

Page 135: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

37

Wednesday, December 7, 11

Page 136: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Killing paper isn’t nice• Fax it!

• Most corporations have email-to-fax services

• heard of the address [email protected] ?

• Just send any document (text, doc, pdf) to it and off you go with the data...

38

Wednesday, December 7, 11

Page 137: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Conclusions

39

Wednesday, December 7, 11

Page 138: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Conclusions

39

Wednesday, December 7, 11

Page 139: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Conclusions

39

Wednesday, December 7, 11

Page 140: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

Conclusions

39

Wednesday, December 7, 11

Page 141: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• Start with the human factor

• Then add technology

40

Wednesday, December 7, 11

Page 142: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• Start with the human factor

• Then add technology

40

Wednesday, December 7, 11

Page 143: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• Where people leave data

• Hint - spend time with developers.

• “Hack” the business process

• Test, test again, and then test. Follow with a surprise test!

41

Wednesday, December 7, 11

Page 144: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

• Where people leave data

• Hint - spend time with developers.

• “Hack” the business process

• Test, test again, and then test. Follow with a surprise test!

41

Wednesday, December 7, 11

Page 145: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 42

“be true to yourself, not to what you believe things should look like”

Old chinese proverb

Wednesday, December 7, 11

Page 146: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 42

“be true to yourself, not to what you believe things should look like”

Old chinese proverb

Wednesday, December 7, 11

Page 147: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 43

They are YOUR assetsafter all

No reason to beshy about it...

And remember to add honey...

Wednesday, December 7, 11

Page 148: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

44

Wednesday, December 7, 11

Page 149: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

44

Wednesday, December 7, 11

Page 150: Advanced Data Exfiltration - the way Q would have done it

All rights reserved to Security Art ltd. 2002-2011

I f tach Ian Amit | November 2011

44

Wednesday, December 7, 11

Page 151: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011 45

TEST SOME MORE

For hints/guides see: www.pentest-standard.org

Wednesday, December 7, 11

Page 152: Advanced Data Exfiltration - the way Q would have done it

I f tach Ian Amit | November 2011

All rights reserved to Security Art ltd. 2002-2011

Questions?

46

Thank you! Whitepapers:www.security-art.com

Too shy to ask [email protected]

Need your daily chatter?twitter.com/iiamit

Data modulation Exfil POC:http://code.google.com/p/

data-sound-poc/

Wednesday, December 7, 11