SlideShare una empresa de Scribd logo
1 de 43
Maciej Lasyk
OWASP Poland, 2013-10-17
Recruitment process @OWASP?
● Because this system is web application (partially)
● Because we based (100%) on FOSS (open-source)
● Because security matters
● Because OWASP people cares about security and can affect
recruitment processes (hopefully) ;)
Recruitment
● Lot of recruitment agencies / services
● Huge number of potential candidates
● Whole team is involved in recruitment
● Candidate evaluation takes really lot of time
SysAdmin / Operations
● He is sysop, developer, QA and network specialist
● Also great for performance tuning
● Responsible for critical data (all data)
● Easy handles moving UPSes between racks ;)
● Anytime day / night understands what you’re talking to him
● Everything he does respects high security standards
● Loves playing games (do you know sysop that doesn’t play)? ;)
Let’s play then
● Any idea? Not Quake / Diablo / Warcraft ;)
● pythonchallenge.com, wechall.net – CTFs are great!
● trueability.com – event for sysops
● So maybe CTF / challenge?
● Such system would have to fulfill some requirements:
● Optimization of recruitment process time
● Minimisation of the risk of rejecting good candidate
● Draw attention as very interesting (you like mindfscks?)
Let's start the ball rolling
Stage 1 – simple task
Stage 2 – call/social.eng.
Stage 3 – challenge
Application Problem: huge candidates number (>100)
Target: reject not suitable cands (>80% rejections!)
Target: recognition, manipulation
Global Thermonuclear War ;)
Stage 1 – telnet / SMTP
RFC-821/1869:
HELO/EHLO ??.....??
GPG us ur CV using
http://..../gpg.asc
Lack of GPG knowledge :(
RTFM!
Stage 1 – telnet / SMTP
RFC-821/1869:
HELO/EHLO my.hostname
1 trap – not server’s hostname
but client’s (90% catched)
GPG us ur CV using
http://..../gpg.asc
Lack of GPG knowledge :(
RTFM!
Stage 1 – node.js
● At the beginning – pure C server. After 3am.. Node.js (simplicity) ;)
● What’s wrong with node.js?
● http://seclists.org/bugtraq/ - 0 hits
● http://osvdb.org/ - 2 hits
● http://1337day.com/, http://www.exploit-db.com/ - 1 hit
● https://nodesecurity.io/advisories - 4 hits
● Does it mean that node.js is safe & secure?
Node.js – how it works?
http://magnetik.github.io/
- Event driven
- Event loop
- Callbacks
- SPA, async, REST, Json
Node.js - threats
● no logging
● No error handling - DoS
● No configuration – “+” or “-”?
● No filters checking user-input
● JS: function as a variable
● Evil eval(code). Server-side XSS
● setInterval(code,2), setTimeout(code,2), str = new Function(code)
● Moduły npm – who creates those?
............................................________
....................................,.-'"...................``~.,
.............................,.-"..................................."-.,
.........................,/...............................................":,
.....................,?......................................................,
.................../...........................................................,}
................./......................................................,:`^`..}
.............../...................................................,:"........./
..............?.....__.........................................:`.........../
............./__.(....."~-,_..............................,:`........../
.........../(_...."~,_........"~,_....................,:`........_/
..........{.._$;_......"=,_......."-,_.......,.-~-,},.~";/....}
...........((.....*~_......."=-._......";,,./`..../"............../
...,,,___.`~,......"~.,....................`.....}............../
............(....`=-,,.......`........................(......;_,,-"
............/.`~,......`-...................................../
.............`~.*-,.....................................|,./.....,__
,,_..........}.>-._...................................|..............`=~-,
.....`=~-,__......`,.................................
...................`=~-,,.,...............................
................................`:,,...........................`..............__
.....................................`=-,...................,%`>--==``
........................................_..........._,-%.......`
Node.js – evil eval()
This way we added new functionality to the server during runtime!
http://node.js/myurl
Node.js – evil eval()
Node.js - npm
https://blog.nodejitsu.com/npm-innovation-through-modularity
Amount of npm
modules in the time
Amount of
npm-mods/day
comparison to
node.js and others
Node.js – how can?
● Use frameworks: https://npmjs.org/ - carefully
● Npm modules are not validated! Check those: https://nodesecurity.io
● Watch module dependencies!
● must have: your own error handling & logging
● This is server – we need proper server security solutions:
● Monitoring – think how to monitor your app
● Control-groups – set limits for resources
● SELinux sandbox
Node.js – SELinux sandbox
●'home_dir' and 'tmp_dir'
● App can r/w from std(in|out) + only defined FDs
● No network access
● No access to foreign processes / files
● We can easily connect sandbox with cgroups :)
● Helpful: semodule -DB (no dontaudit)
● grep XXX /var/log/audit/audit.log | audit2allow -M node.sandbox
● semodule -i node.sandbox.pp
Node.js – SELinux sandbox
Node.js – how can #2
● Freeze node.js version per project?
● Let’s read & learn:
● https://media.blackhat.com/bh-us-11/Sullivan/BH_US_11_Sullivan_Server_Side_WP.pdf
● http://lab.cs.ttu.ee/dl91
● https://github.com/toolness/security-adventure
● Pseudo–configuration – set limits in your code (e.g. POST size)
● try...catch ftw
● use strict; - helps even with eval case (partially)
● Bunyan / dtrace: https://npmjs.org/package/bunyan
● node.js OS? Oh and use / build node.js packages (fpm or whatever)
Stage 2 – social engineering
● Stage’s target is to verify & check candidate’s security awareness
● Christopher Hadnagy – SE framework (2k10):
● http://www.social-engineer.org/framework/Social_Engineering_Framework
● Everyone can act as recruiter and call anyone
● Building network / connections on Linkedin is very easy
● Trust (lingo, easiness in some env: research)
● Sysop knows really much about env – he’s good target
● So one has to only get sysop’s trust and decrease his carefulness
Stage 3 - virtualization
● Our needs?
● Boot process supervision
● Console access
● Resource management
● Redundant storage
● Rescue mode for VMs
● Security by default
> AWS
> KVM/libvirt
> XEN/libvirt
> LXC
Stage 3 - virtualization
boot console resources
mgmt.
redundant
storage
rescue VM security
Stage 3 - virtualization
VS
Performance XEN/HVM or KVM?
Stage 3 - virtualization
VS
We had great performance issues with XEN/HVM
The winner is „hat in the red” and its PV
(but with the cgroups help – under heavy load KVM is
not that stable)
Performance XEN/HVM or KVM?
Stage 3 – network security
DMZ (Demilitarized Zone) – logical or physical partition
https://en.wikipedia.org
Stage 3 – network security
https://en.wikipedia.org
DMZ (Demilitarized Zone) – logical or physical partition
Stage 3 – network security
● Separated, dedicated DMZ (VLAN?) for host
● No routing / communication from this DMZ with other segments
● Low – cost solutions?
● OpenWRT / DDWRT way || Pure Linux server
● 802.1Q – VLANs
Stage 3 – network security
● Network isolation on KVM host:
● Host/network bridge: L2 switch
● netfilter / nwfilter (IBM)
● By default there’s no packets isolation in the
bridged network - ebtables null, no filtering
● ebtables – filtering l2– so we gain isolation
● Or virsh nwfilter-list
● allow-arp,dhcp,dhcp-server,clean-traffic, no-
arp-ip-spoofing, no-arp-mac-spoofing, no-
arp-spoofing, no-ip-multicast, no-ip-spoofing,
no-mac-broadcast, no-mac-spoofing, no-
other-l2-traffic
● L2 filtering? /proc/sys/net/bridge
https://www.redhat.com/archives/libvir-list/2010-June/msg00762.html
http://pic.dhe.ibm.com/infocenter/lnxinfo/v3r0m0/topic/liaat/liaatsecurity_pdf.pdf
Stage 3 –boot process, VNC
● Accessing boot process – VNC
● VNC security? SSL? Complications..
● Maybe VNC over SSH tunnel?
● Encryption
● No certificates issues
● Every admin can easily use VNC
Stage 3 – restricted shells
● SSH tunneling requires SSH access (thank You Captain Obvious!)
● SSH access is a threat per se
● Let’s limit this SSH / shell access – use restricted shells
Restricted shells by. Google ;) =>
Stage 3 – restricted shells
● Restricted shells are threat by default – unless we know how to use those!
● Under some circumstances one could escape the rshell:
https://en.wikipedia.org/wiki/Rbash
Stage 3 – restricted shells
● Rbash:
● CentOSie / RHEL approved / friendly / legit ;)
● Protects from directory traversal
● Prohibits access to files via direct path
● Prohibits setting PATH or other shell env variables
● No commands output redirection
● PATH=$HOME/bin – and reconsider 2x what to put into this „bin”
https://en.wikipedia.org/wiki/Rbash
Stage 3 – SSH tunnel / VNC
● We must go deeper!
Candidate
VM-Proxy
screen / ssh tunnel
VM host
rshell / ibsh
rshell / rbash
VNC server
Stage 3 – restricted shells
● Other restricted shells:
● rssh – allows scp, sftp, rsync
● sudosh - http://sourceforge.net/projects/sudosh
● Allows saving whole user session and replay it
● One can define allowed operations for user
● Little outdated – better use sudosh3
● Ibsh (small, fast, secure): http://sourceforge.net/projects/ibsh/
Stage 3 – control groups
● resource management in a simple way (ulimits, nice, limits.conf).. but..
● Could you set 50 IOPS for defined process?
● What about 100Kbp/s limit for particular user?
● issues with memory–leaks in Java?
Stage 3 – control groups
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Resource_Management_Guide/ch01.html
● Debian & RHEL friendly
● Running apps in cgroup context
● Setting cgroup context for process during runtime
Stage 3 – web application
● OpenStack?
„Couple” of compliations ;) “Out of the box” – yup – I’ve heard
about that ;) Could you deploy it in a few hours – securely?
Stage 3 – web application
Commodore OS ???
Stage 3 – web application
Commodore OS Vision FTW!
Stage 3 – web application
● Apache + mod_security
● mod_security + OWASP rules
● PHP & Python :)
● Simplicity!
● VM management with simple daemon + screen:
● while(1) do: manage_VMs();
● And this just works!
Stage 3 – recording SSH sessions
● We have to record all sessions – also those under „screen”
● Real time recording
● sudosh3 (sudosh fork) – kinda proxy shell – great ;)
● auditd – lov-lewel tool for recording syscalls
● Asciinema (ascii.io, Marcin Kulik) – great one, but not for audit purposes
● Ttyrec – outdated: http://0xcc.net/ttyrec/index.html.en
● Ssh logging patch - outdated: http://www.kdvelectronics.eu/ssh-logging/ssh-logging.html
Stage 3 – data security
● What if we loose any of the VMs...? Brrr....
● Risk assesement – what would be enough for us?
● RAID1 / Mirror – “usually” is enough for a 3 – month time
● Backups – useful ;) RAID / replication are not backups...
● GlusterFS / DRBD – if you have enough resources – try it :)
LVM
Gluster brick
KVM active host
LVM
Gluster brick
KVM passive host
replication
Podsumowanie
Maciej Lasyk
http://maciek.lasyk.info
maciek@lasyk.info
Twitter: @docent_net
OWASP Poland, 2013-10-17

Más contenido relacionado

La actualidad más candente

Distributed app development with nodejs and zeromq
Distributed app development with nodejs and zeromqDistributed app development with nodejs and zeromq
Distributed app development with nodejs and zeromq
Ruben Tan
 
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまでLINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE Corporation
 

La actualidad más candente (18)

Distributed app development with nodejs and zeromq
Distributed app development with nodejs and zeromqDistributed app development with nodejs and zeromq
Distributed app development with nodejs and zeromq
 
An Introduction to the Formalised Memory Model for Linux Kernel
An Introduction to the Formalised Memory Model for Linux KernelAn Introduction to the Formalised Memory Model for Linux Kernel
An Introduction to the Formalised Memory Model for Linux Kernel
 
LAS16-211: Using LAVA V2 for advanced KVM testing
LAS16-211: Using LAVA V2 for advanced KVM testingLAS16-211: Using LAVA V2 for advanced KVM testing
LAS16-211: Using LAVA V2 for advanced KVM testing
 
Dead Lock Analysis of spin_lock() in Linux Kernel (english)
Dead Lock Analysis of spin_lock() in Linux Kernel (english)Dead Lock Analysis of spin_lock() in Linux Kernel (english)
Dead Lock Analysis of spin_lock() in Linux Kernel (english)
 
Kernel Recipes 2015 - So you want to write a Linux driver framework
Kernel Recipes 2015 - So you want to write a Linux driver frameworkKernel Recipes 2015 - So you want to write a Linux driver framework
Kernel Recipes 2015 - So you want to write a Linux driver framework
 
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit FrameworkUnmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
 
Introduction to Docker (and a bit more) at LSPE meetup Sunnyvale
Introduction to Docker (and a bit more) at LSPE meetup SunnyvaleIntroduction to Docker (and a bit more) at LSPE meetup Sunnyvale
Introduction to Docker (and a bit more) at LSPE meetup Sunnyvale
 
libreCMC : The Libre Embedded GNU/Linux Distro
libreCMC : The Libre Embedded GNU/Linux DistrolibreCMC : The Libre Embedded GNU/Linux Distro
libreCMC : The Libre Embedded GNU/Linux Distro
 
Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000
Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000
Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000
 
Testing CAN network with help of CANToolz
Testing CAN network with help of CANToolzTesting CAN network with help of CANToolz
Testing CAN network with help of CANToolz
 
Egress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data ExfiltrationEgress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data Exfiltration
 
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまでLINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
 
AV Evasion with the Veil Framework
AV Evasion with the Veil FrameworkAV Evasion with the Veil Framework
AV Evasion with the Veil Framework
 
An EyeWitness View into your Network
An EyeWitness View into your NetworkAn EyeWitness View into your Network
An EyeWitness View into your Network
 
Clang: More than just a C/C++ Compiler
Clang: More than just a C/C++ CompilerClang: More than just a C/C++ Compiler
Clang: More than just a C/C++ Compiler
 
BSides Denver: Stealthy, hypervisor-based malware analysis
BSides Denver: Stealthy, hypervisor-based malware analysisBSides Denver: Stealthy, hypervisor-based malware analysis
BSides Denver: Stealthy, hypervisor-based malware analysis
 
OffensiveCon2022: Case Studies of Fuzzing with Xen
OffensiveCon2022: Case Studies of Fuzzing with XenOffensiveCon2022: Case Studies of Fuzzing with Xen
OffensiveCon2022: Case Studies of Fuzzing with Xen
 
OpenWrt From Top to Bottom
OpenWrt From Top to BottomOpenWrt From Top to Bottom
OpenWrt From Top to Bottom
 

Destacado

Infographic: DC vs Marvel – The Battle of Brands
Infographic: DC vs Marvel – The Battle of BrandsInfographic: DC vs Marvel – The Battle of Brands
Infographic: DC vs Marvel – The Battle of Brands
domain .ME
 

Destacado (8)

0507 057 01 98 * Adana Cukurova Klima Servisleri
0507 057 01 98 * Adana Cukurova Klima Servisleri0507 057 01 98 * Adana Cukurova Klima Servisleri
0507 057 01 98 * Adana Cukurova Klima Servisleri
 
0507 057 01 98 * Adana Klima Temizligi
0507 057 01 98 * Adana Klima Temizligi0507 057 01 98 * Adana Klima Temizligi
0507 057 01 98 * Adana Klima Temizligi
 
0507 057 01 98 * Adana Yuregir Klima Servisleri
0507 057 01 98 * Adana Yuregir Klima Servisleri0507 057 01 98 * Adana Yuregir Klima Servisleri
0507 057 01 98 * Adana Yuregir Klima Servisleri
 
0507 057 01 98 * Adana Klima Tasima Servisleri
0507 057 01 98 * Adana Klima Tasima Servisleri 0507 057 01 98 * Adana Klima Tasima Servisleri
0507 057 01 98 * Adana Klima Tasima Servisleri
 
0507 057 01 98 * Adana Saricam Klima Servisleri
0507 057 01 98 * Adana Saricam Klima Servisleri0507 057 01 98 * Adana Saricam Klima Servisleri
0507 057 01 98 * Adana Saricam Klima Servisleri
 
0507 057 01 98 * Adana Klima Montaj Servisleri
0507 057 01 98 * Adana Klima Montaj Servisleri0507 057 01 98 * Adana Klima Montaj Servisleri
0507 057 01 98 * Adana Klima Montaj Servisleri
 
0507 057 01 98 * Adana Klima Tamir Servisi
0507 057 01 98 * Adana Klima Tamir Servisi0507 057 01 98 * Adana Klima Tamir Servisi
0507 057 01 98 * Adana Klima Tamir Servisi
 
Infographic: DC vs Marvel – The Battle of Brands
Infographic: DC vs Marvel – The Battle of BrandsInfographic: DC vs Marvel – The Battle of Brands
Infographic: DC vs Marvel – The Battle of Brands
 

Similar a 0507 057 01 98 * Adana Klima Servisleri

Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Lightweight Virtualization with Linux Containers and Docker I YaC 2013Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Docker, Inc.
 
A3Sec Advanced Deployment System
A3Sec Advanced Deployment SystemA3Sec Advanced Deployment System
A3Sec Advanced Deployment System
a3sec
 

Similar a 0507 057 01 98 * Adana Klima Servisleri (20)

Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?
 
Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Lightweight Virtualization with Linux Containers and Docker I YaC 2013Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Lightweight Virtualization with Linux Containers and Docker I YaC 2013
 
Linux 开源操作系统发展新趋势
Linux 开源操作系统发展新趋势Linux 开源操作系统发展新趋势
Linux 开源操作系统发展新趋势
 
Docker and-containers-for-development-and-deployment-scale12x
Docker and-containers-for-development-and-deployment-scale12xDocker and-containers-for-development-and-deployment-scale12x
Docker and-containers-for-development-and-deployment-scale12x
 
Ceph Day Melbourne - Troubleshooting Ceph
Ceph Day Melbourne - Troubleshooting Ceph Ceph Day Melbourne - Troubleshooting Ceph
Ceph Day Melbourne - Troubleshooting Ceph
 
Nagios Conference 2014 - Eric Mislivec - Getting Started With Nagios Core
Nagios Conference 2014 - Eric Mislivec - Getting Started With Nagios CoreNagios Conference 2014 - Eric Mislivec - Getting Started With Nagios Core
Nagios Conference 2014 - Eric Mislivec - Getting Started With Nagios Core
 
Security of Linux containers in the cloud
Security of Linux containers in the cloudSecurity of Linux containers in the cloud
Security of Linux containers in the cloud
 
Time to rethink /proc
Time to rethink /procTime to rethink /proc
Time to rethink /proc
 
OpenShift & SELinux with Dan Walsh @rhatdan
OpenShift & SELinux with Dan Walsh @rhatdanOpenShift & SELinux with Dan Walsh @rhatdan
OpenShift & SELinux with Dan Walsh @rhatdan
 
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
 
Fosdem_Using_SELinux_with_container_runtimes.pdf
Fosdem_Using_SELinux_with_container_runtimes.pdfFosdem_Using_SELinux_with_container_runtimes.pdf
Fosdem_Using_SELinux_with_container_runtimes.pdf
 
Open stack HA - Theory to Reality
Open stack HA -  Theory to RealityOpen stack HA -  Theory to Reality
Open stack HA - Theory to Reality
 
Archivematica Technical Training Diagnostics Guide (September 2018)
Archivematica Technical Training Diagnostics Guide (September 2018)Archivematica Technical Training Diagnostics Guide (September 2018)
Archivematica Technical Training Diagnostics Guide (September 2018)
 
Build reliable, traceable, distributed systems with ZeroMQ
Build reliable, traceable, distributed systems with ZeroMQBuild reliable, traceable, distributed systems with ZeroMQ
Build reliable, traceable, distributed systems with ZeroMQ
 
Socket programming, and openresty
Socket programming, and openrestySocket programming, and openresty
Socket programming, and openresty
 
Workflow story: Theory versus Practice in large enterprises by Marcin Piebiak
Workflow story: Theory versus Practice in large enterprises by Marcin PiebiakWorkflow story: Theory versus Practice in large enterprises by Marcin Piebiak
Workflow story: Theory versus Practice in large enterprises by Marcin Piebiak
 
Workflow story: Theory versus practice in Large Enterprises
Workflow story: Theory versus practice in Large EnterprisesWorkflow story: Theory versus practice in Large Enterprises
Workflow story: Theory versus practice in Large Enterprises
 
New Jersey Red Hat Users Group Presentation: Provisioning anywhere
New Jersey Red Hat Users Group Presentation: Provisioning anywhereNew Jersey Red Hat Users Group Presentation: Provisioning anywhere
New Jersey Red Hat Users Group Presentation: Provisioning anywhere
 
A3Sec Advanced Deployment System
A3Sec Advanced Deployment SystemA3Sec Advanced Deployment System
A3Sec Advanced Deployment System
 
Introduction to containers
Introduction to containersIntroduction to containers
Introduction to containers
 

Más de Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri

Kutup buzulları eriyince ortaya çıktı. Bilim insanları aynı anda dehşete düştü
Kutup buzulları eriyince ortaya çıktı. Bilim insanları aynı anda dehşete düştüKutup buzulları eriyince ortaya çıktı. Bilim insanları aynı anda dehşete düştü
Kutup buzulları eriyince ortaya çıktı. Bilim insanları aynı anda dehşete düştü
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
İran Cumhurbaşkanı Ruhani'den ABD seçimlerine dair flaş açıklama
İran Cumhurbaşkanı Ruhani'den ABD seçimlerine dair flaş açıklamaİran Cumhurbaşkanı Ruhani'den ABD seçimlerine dair flaş açıklama
İran Cumhurbaşkanı Ruhani'den ABD seçimlerine dair flaş açıklama
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Almanya'da günlük en yüksek Kovid-19 vaka sayısına ulaşıldı
Almanya'da günlük en yüksek Kovid-19 vaka sayısına ulaşıldıAlmanya'da günlük en yüksek Kovid-19 vaka sayısına ulaşıldı
Almanya'da günlük en yüksek Kovid-19 vaka sayısına ulaşıldı
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Çin'den Dev Adım: Dünyanın İlk 6G Deneme Uydusu Uzaya Gönderildi
Çin'den Dev Adım: Dünyanın İlk 6G Deneme Uydusu Uzaya GönderildiÇin'den Dev Adım: Dünyanın İlk 6G Deneme Uydusu Uzaya Gönderildi
Çin'den Dev Adım: Dünyanın İlk 6G Deneme Uydusu Uzaya Gönderildi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Son dakika… ABD’nin yeni başkanı Joe Biden oldu
Son dakika… ABD’nin yeni başkanı Joe Biden olduSon dakika… ABD’nin yeni başkanı Joe Biden oldu
Son dakika… ABD’nin yeni başkanı Joe Biden oldu
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Rüzgarda uçuşan binlerce lirayı böyle topladılar
Rüzgarda uçuşan binlerce lirayı böyle topladılarRüzgarda uçuşan binlerce lirayı böyle topladılar
Rüzgarda uçuşan binlerce lirayı böyle topladılar
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Corona listesini yayınlayan filyasyon ekibindeki görevliye soruşturma
Corona listesini yayınlayan filyasyon ekibindeki görevliye soruşturmaCorona listesini yayınlayan filyasyon ekibindeki görevliye soruşturma
Corona listesini yayınlayan filyasyon ekibindeki görevliye soruşturma
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Erdoğan: Bahçeli ile birlikte Kıbrıs’ta piknik yapacağız
Erdoğan: Bahçeli ile birlikte Kıbrıs’ta piknik yapacağızErdoğan: Bahçeli ile birlikte Kıbrıs’ta piknik yapacağız
Erdoğan: Bahçeli ile birlikte Kıbrıs’ta piknik yapacağız
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Sigara içme yasağı olan iller! Hangi illerde sigara içme yasağı var?
Sigara içme yasağı olan iller! Hangi illerde sigara içme yasağı var?Sigara içme yasağı olan iller! Hangi illerde sigara içme yasağı var?
Sigara içme yasağı olan iller! Hangi illerde sigara içme yasağı var?
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Ekrem İmamoğlu’ndan Tunç Soyer’e geçmiş olsun ziyareti
 Ekrem İmamoğlu’ndan Tunç Soyer’e geçmiş olsun ziyareti Ekrem İmamoğlu’ndan Tunç Soyer’e geçmiş olsun ziyareti
Ekrem İmamoğlu’ndan Tunç Soyer’e geçmiş olsun ziyareti
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Merkez Bankasındaki görev değişikliği dünyanın gündeminde
Merkez Bankasındaki görev değişikliği dünyanın gündemindeMerkez Bankasındaki görev değişikliği dünyanın gündeminde
Merkez Bankasındaki görev değişikliği dünyanın gündeminde
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Adana Jeofizik Mühendisleri Odası’ndan Korkutan Açıklama
Adana Jeofizik Mühendisleri Odası’ndan Korkutan AçıklamaAdana Jeofizik Mühendisleri Odası’ndan Korkutan Açıklama
Adana Jeofizik Mühendisleri Odası’ndan Korkutan Açıklama
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 
Adana'da FETÖ sanığı 7 eski polisin yargılanmasına devam edildi
Adana'da FETÖ sanığı 7 eski polisin yargılanmasına devam edildiAdana'da FETÖ sanığı 7 eski polisin yargılanmasına devam edildi
Adana'da FETÖ sanığı 7 eski polisin yargılanmasına devam edildi
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri
 

Más de Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisleri (20)

Adana'da 15 yaşındaki kız 14’üncü kattan düşerek öldü
Adana'da 15 yaşındaki kız 14’üncü kattan düşerek öldüAdana'da 15 yaşındaki kız 14’üncü kattan düşerek öldü
Adana'da 15 yaşındaki kız 14’üncü kattan düşerek öldü
 
Kutup buzulları eriyince ortaya çıktı. Bilim insanları aynı anda dehşete düştü
Kutup buzulları eriyince ortaya çıktı. Bilim insanları aynı anda dehşete düştüKutup buzulları eriyince ortaya çıktı. Bilim insanları aynı anda dehşete düştü
Kutup buzulları eriyince ortaya çıktı. Bilim insanları aynı anda dehşete düştü
 
İran Cumhurbaşkanı Ruhani'den ABD seçimlerine dair flaş açıklama
İran Cumhurbaşkanı Ruhani'den ABD seçimlerine dair flaş açıklamaİran Cumhurbaşkanı Ruhani'den ABD seçimlerine dair flaş açıklama
İran Cumhurbaşkanı Ruhani'den ABD seçimlerine dair flaş açıklama
 
Almanya'da günlük en yüksek Kovid-19 vaka sayısına ulaşıldı
Almanya'da günlük en yüksek Kovid-19 vaka sayısına ulaşıldıAlmanya'da günlük en yüksek Kovid-19 vaka sayısına ulaşıldı
Almanya'da günlük en yüksek Kovid-19 vaka sayısına ulaşıldı
 
Çin'den Dev Adım: Dünyanın İlk 6G Deneme Uydusu Uzaya Gönderildi
Çin'den Dev Adım: Dünyanın İlk 6G Deneme Uydusu Uzaya GönderildiÇin'den Dev Adım: Dünyanın İlk 6G Deneme Uydusu Uzaya Gönderildi
Çin'den Dev Adım: Dünyanın İlk 6G Deneme Uydusu Uzaya Gönderildi
 
Son dakika… ABD’nin yeni başkanı Joe Biden oldu
Son dakika… ABD’nin yeni başkanı Joe Biden olduSon dakika… ABD’nin yeni başkanı Joe Biden oldu
Son dakika… ABD’nin yeni başkanı Joe Biden oldu
 
Rüzgarda uçuşan binlerce lirayı böyle topladılar
Rüzgarda uçuşan binlerce lirayı böyle topladılarRüzgarda uçuşan binlerce lirayı böyle topladılar
Rüzgarda uçuşan binlerce lirayı böyle topladılar
 
Sağlık çalışanlarının bulunduğu otomobil Ihlara Vadisi'ne uçtu
Sağlık çalışanlarının bulunduğu otomobil Ihlara Vadisi'ne uçtuSağlık çalışanlarının bulunduğu otomobil Ihlara Vadisi'ne uçtu
Sağlık çalışanlarının bulunduğu otomobil Ihlara Vadisi'ne uçtu
 
Belgeseli yayınlandıktan 3 hafta sonra koronavirüsten yaşamını yitirdi
Belgeseli yayınlandıktan 3 hafta sonra koronavirüsten yaşamını yitirdiBelgeseli yayınlandıktan 3 hafta sonra koronavirüsten yaşamını yitirdi
Belgeseli yayınlandıktan 3 hafta sonra koronavirüsten yaşamını yitirdi
 
Corona listesini yayınlayan filyasyon ekibindeki görevliye soruşturma
Corona listesini yayınlayan filyasyon ekibindeki görevliye soruşturmaCorona listesini yayınlayan filyasyon ekibindeki görevliye soruşturma
Corona listesini yayınlayan filyasyon ekibindeki görevliye soruşturma
 
Erdoğan: Bahçeli ile birlikte Kıbrıs’ta piknik yapacağız
Erdoğan: Bahçeli ile birlikte Kıbrıs’ta piknik yapacağızErdoğan: Bahçeli ile birlikte Kıbrıs’ta piknik yapacağız
Erdoğan: Bahçeli ile birlikte Kıbrıs’ta piknik yapacağız
 
Sigara içme yasağı olan iller! Hangi illerde sigara içme yasağı var?
Sigara içme yasağı olan iller! Hangi illerde sigara içme yasağı var?Sigara içme yasağı olan iller! Hangi illerde sigara içme yasağı var?
Sigara içme yasağı olan iller! Hangi illerde sigara içme yasağı var?
 
Ekrem İmamoğlu’ndan Tunç Soyer’e geçmiş olsun ziyareti
 Ekrem İmamoğlu’ndan Tunç Soyer’e geçmiş olsun ziyareti Ekrem İmamoğlu’ndan Tunç Soyer’e geçmiş olsun ziyareti
Ekrem İmamoğlu’ndan Tunç Soyer’e geçmiş olsun ziyareti
 
Merkez Bankasındaki görev değişikliği dünyanın gündeminde
Merkez Bankasındaki görev değişikliği dünyanın gündemindeMerkez Bankasındaki görev değişikliği dünyanın gündeminde
Merkez Bankasındaki görev değişikliği dünyanın gündeminde
 
Adana'da Ekim ayında meydana gelen trafik kazalarında 15 kişi öldü
Adana'da Ekim ayında meydana gelen trafik kazalarında 15 kişi öldüAdana'da Ekim ayında meydana gelen trafik kazalarında 15 kişi öldü
Adana'da Ekim ayında meydana gelen trafik kazalarında 15 kişi öldü
 
Adana Jeofizik Mühendisleri Odası’ndan Korkutan Açıklama
Adana Jeofizik Mühendisleri Odası’ndan Korkutan AçıklamaAdana Jeofizik Mühendisleri Odası’ndan Korkutan Açıklama
Adana Jeofizik Mühendisleri Odası’ndan Korkutan Açıklama
 
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisler...
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisler...Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisler...
Adana Klima Servisi Bakım Montaj Taşıma Temizlik Tamir Arıza Teknik Servisler...
 
Adana'da FETÖ sanığı 7 eski polisin yargılanmasına devam edildi
Adana'da FETÖ sanığı 7 eski polisin yargılanmasına devam edildiAdana'da FETÖ sanığı 7 eski polisin yargılanmasına devam edildi
Adana'da FETÖ sanığı 7 eski polisin yargılanmasına devam edildi
 
Adana’da Ekim ayında bin 889 araç trafikten men edildi
Adana’da Ekim ayında bin 889 araç trafikten men edildiAdana’da Ekim ayında bin 889 araç trafikten men edildi
Adana’da Ekim ayında bin 889 araç trafikten men edildi
 
Adana’dan yardım tırları yola çıktı 8 tır yaşam malzemesi gönderildi
Adana’dan yardım tırları yola çıktı 8 tır yaşam malzemesi gönderildiAdana’dan yardım tırları yola çıktı 8 tır yaşam malzemesi gönderildi
Adana’dan yardım tırları yola çıktı 8 tır yaşam malzemesi gönderildi
 

Último

Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
adilkhan87451
 
Call Girl In Pune 👉 Just CALL ME: 9352988975 💋 Call Out Call Both With High p...
Call Girl In Pune 👉 Just CALL ME: 9352988975 💋 Call Out Call Both With High p...Call Girl In Pune 👉 Just CALL ME: 9352988975 💋 Call Out Call Both With High p...
Call Girl In Pune 👉 Just CALL ME: 9352988975 💋 Call Out Call Both With High p...
chetankumar9855
 
Call Girls in Gagan Vihar (delhi) call me [🔝 9953056974 🔝] escort service 24X7
Call Girls in Gagan Vihar (delhi) call me [🔝  9953056974 🔝] escort service 24X7Call Girls in Gagan Vihar (delhi) call me [🔝  9953056974 🔝] escort service 24X7
Call Girls in Gagan Vihar (delhi) call me [🔝 9953056974 🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
 
Call Girl In Pune 👉 Just CALL ME: 9352988975 💋 Call Out Call Both With High p...
Call Girl In Pune 👉 Just CALL ME: 9352988975 💋 Call Out Call Both With High p...Call Girl In Pune 👉 Just CALL ME: 9352988975 💋 Call Out Call Both With High p...
Call Girl In Pune 👉 Just CALL ME: 9352988975 💋 Call Out Call Both With High p...
 
Top Rated Call Girls Kerala ☎ 8250092165👄 Delivery in 20 Mins Near Me
Top Rated Call Girls Kerala ☎ 8250092165👄 Delivery in 20 Mins Near MeTop Rated Call Girls Kerala ☎ 8250092165👄 Delivery in 20 Mins Near Me
Top Rated Call Girls Kerala ☎ 8250092165👄 Delivery in 20 Mins Near Me
 
Independent Call Girls In Jaipur { 8445551418 } ✔ ANIKA MEHTA ✔ Get High Prof...
Independent Call Girls In Jaipur { 8445551418 } ✔ ANIKA MEHTA ✔ Get High Prof...Independent Call Girls In Jaipur { 8445551418 } ✔ ANIKA MEHTA ✔ Get High Prof...
Independent Call Girls In Jaipur { 8445551418 } ✔ ANIKA MEHTA ✔ Get High Prof...
 
Call Girls in Gagan Vihar (delhi) call me [🔝 9953056974 🔝] escort service 24X7
Call Girls in Gagan Vihar (delhi) call me [🔝  9953056974 🔝] escort service 24X7Call Girls in Gagan Vihar (delhi) call me [🔝  9953056974 🔝] escort service 24X7
Call Girls in Gagan Vihar (delhi) call me [🔝 9953056974 🔝] escort service 24X7
 
Jogeshwari ! Call Girls Service Mumbai - 450+ Call Girl Cash Payment 90042684...
Jogeshwari ! Call Girls Service Mumbai - 450+ Call Girl Cash Payment 90042684...Jogeshwari ! Call Girls Service Mumbai - 450+ Call Girl Cash Payment 90042684...
Jogeshwari ! Call Girls Service Mumbai - 450+ Call Girl Cash Payment 90042684...
 
Call Girls Service Jaipur {9521753030 } ❤️VVIP BHAWNA Call Girl in Jaipur Raj...
Call Girls Service Jaipur {9521753030 } ❤️VVIP BHAWNA Call Girl in Jaipur Raj...Call Girls Service Jaipur {9521753030 } ❤️VVIP BHAWNA Call Girl in Jaipur Raj...
Call Girls Service Jaipur {9521753030 } ❤️VVIP BHAWNA Call Girl in Jaipur Raj...
 
Call Girls Kolkata Kalikapur 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl Se...
Call Girls Kolkata Kalikapur 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl Se...Call Girls Kolkata Kalikapur 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl Se...
Call Girls Kolkata Kalikapur 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl Se...
 
Call Girls in Delhi Triveni Complex Escort Service(🔝))/WhatsApp 97111⇛47426
Call Girls in Delhi Triveni Complex Escort Service(🔝))/WhatsApp 97111⇛47426Call Girls in Delhi Triveni Complex Escort Service(🔝))/WhatsApp 97111⇛47426
Call Girls in Delhi Triveni Complex Escort Service(🔝))/WhatsApp 97111⇛47426
 
Kollam call girls Mallu aunty service 7877702510
Kollam call girls Mallu aunty service 7877702510Kollam call girls Mallu aunty service 7877702510
Kollam call girls Mallu aunty service 7877702510
 
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
 
Call Girls Hyderabad Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 8250077686 Top Class Call Girl Service Available
 
Call Girls Madurai Just Call 9630942363 Top Class Call Girl Service Available
Call Girls Madurai Just Call 9630942363 Top Class Call Girl Service AvailableCall Girls Madurai Just Call 9630942363 Top Class Call Girl Service Available
Call Girls Madurai Just Call 9630942363 Top Class Call Girl Service Available
 
Call Girls Amritsar Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Amritsar Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Amritsar Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Amritsar Just Call 8250077686 Top Class Call Girl Service Available
 
Mumbai ] (Call Girls) in Mumbai 10k @ I'm VIP Independent Escorts Girls 98333...
Mumbai ] (Call Girls) in Mumbai 10k @ I'm VIP Independent Escorts Girls 98333...Mumbai ] (Call Girls) in Mumbai 10k @ I'm VIP Independent Escorts Girls 98333...
Mumbai ] (Call Girls) in Mumbai 10k @ I'm VIP Independent Escorts Girls 98333...
 
Call Girls Rishikesh Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Rishikesh Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Rishikesh Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Rishikesh Just Call 8250077686 Top Class Call Girl Service Available
 
Call Girls Coimbatore Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Coimbatore Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 8250077686 Top Class Call Girl Service Available
 
💕SONAM KUMAR💕Premium Call Girls Jaipur ↘️9257276172 ↙️One Night Stand With Lo...
💕SONAM KUMAR💕Premium Call Girls Jaipur ↘️9257276172 ↙️One Night Stand With Lo...💕SONAM KUMAR💕Premium Call Girls Jaipur ↘️9257276172 ↙️One Night Stand With Lo...
💕SONAM KUMAR💕Premium Call Girls Jaipur ↘️9257276172 ↙️One Night Stand With Lo...
 
Russian Call Girls Service Jaipur {8445551418} ❤️PALLAVI VIP Jaipur Call Gir...
Russian Call Girls Service  Jaipur {8445551418} ❤️PALLAVI VIP Jaipur Call Gir...Russian Call Girls Service  Jaipur {8445551418} ❤️PALLAVI VIP Jaipur Call Gir...
Russian Call Girls Service Jaipur {8445551418} ❤️PALLAVI VIP Jaipur Call Gir...
 
Coimbatore Call Girls in Coimbatore 7427069034 genuine Escort Service Girl 10...
Coimbatore Call Girls in Coimbatore 7427069034 genuine Escort Service Girl 10...Coimbatore Call Girls in Coimbatore 7427069034 genuine Escort Service Girl 10...
Coimbatore Call Girls in Coimbatore 7427069034 genuine Escort Service Girl 10...
 

0507 057 01 98 * Adana Klima Servisleri

  • 2. Recruitment process @OWASP? ● Because this system is web application (partially) ● Because we based (100%) on FOSS (open-source) ● Because security matters ● Because OWASP people cares about security and can affect recruitment processes (hopefully) ;)
  • 3. Recruitment ● Lot of recruitment agencies / services ● Huge number of potential candidates ● Whole team is involved in recruitment ● Candidate evaluation takes really lot of time
  • 4. SysAdmin / Operations ● He is sysop, developer, QA and network specialist ● Also great for performance tuning ● Responsible for critical data (all data) ● Easy handles moving UPSes between racks ;) ● Anytime day / night understands what you’re talking to him ● Everything he does respects high security standards ● Loves playing games (do you know sysop that doesn’t play)? ;)
  • 5. Let’s play then ● Any idea? Not Quake / Diablo / Warcraft ;) ● pythonchallenge.com, wechall.net – CTFs are great! ● trueability.com – event for sysops ● So maybe CTF / challenge? ● Such system would have to fulfill some requirements: ● Optimization of recruitment process time ● Minimisation of the risk of rejecting good candidate ● Draw attention as very interesting (you like mindfscks?)
  • 6. Let's start the ball rolling Stage 1 – simple task Stage 2 – call/social.eng. Stage 3 – challenge Application Problem: huge candidates number (>100) Target: reject not suitable cands (>80% rejections!) Target: recognition, manipulation Global Thermonuclear War ;)
  • 7. Stage 1 – telnet / SMTP RFC-821/1869: HELO/EHLO ??.....?? GPG us ur CV using http://..../gpg.asc Lack of GPG knowledge :( RTFM!
  • 8. Stage 1 – telnet / SMTP RFC-821/1869: HELO/EHLO my.hostname 1 trap – not server’s hostname but client’s (90% catched) GPG us ur CV using http://..../gpg.asc Lack of GPG knowledge :( RTFM!
  • 9. Stage 1 – node.js ● At the beginning – pure C server. After 3am.. Node.js (simplicity) ;) ● What’s wrong with node.js? ● http://seclists.org/bugtraq/ - 0 hits ● http://osvdb.org/ - 2 hits ● http://1337day.com/, http://www.exploit-db.com/ - 1 hit ● https://nodesecurity.io/advisories - 4 hits ● Does it mean that node.js is safe & secure?
  • 10. Node.js – how it works? http://magnetik.github.io/ - Event driven - Event loop - Callbacks - SPA, async, REST, Json
  • 11. Node.js - threats ● no logging ● No error handling - DoS ● No configuration – “+” or “-”? ● No filters checking user-input ● JS: function as a variable ● Evil eval(code). Server-side XSS ● setInterval(code,2), setTimeout(code,2), str = new Function(code) ● Moduły npm – who creates those? ............................................________ ....................................,.-'"...................``~., .............................,.-"..................................."-., .........................,/...............................................":, .....................,?......................................................, .................../...........................................................,} ................./......................................................,:`^`..} .............../...................................................,:"........./ ..............?.....__.........................................:`.........../ ............./__.(....."~-,_..............................,:`........../ .........../(_...."~,_........"~,_....................,:`........_/ ..........{.._$;_......"=,_......."-,_.......,.-~-,},.~";/....} ...........((.....*~_......."=-._......";,,./`..../"............../ ...,,,___.`~,......"~.,....................`.....}............../ ............(....`=-,,.......`........................(......;_,,-" ............/.`~,......`-...................................../ .............`~.*-,.....................................|,./.....,__ ,,_..........}.>-._...................................|..............`=~-, .....`=~-,__......`,................................. ...................`=~-,,.,............................... ................................`:,,...........................`..............__ .....................................`=-,...................,%`>--==`` ........................................_..........._,-%.......`
  • 13. This way we added new functionality to the server during runtime! http://node.js/myurl Node.js – evil eval()
  • 14. Node.js - npm https://blog.nodejitsu.com/npm-innovation-through-modularity Amount of npm modules in the time Amount of npm-mods/day comparison to node.js and others
  • 15. Node.js – how can? ● Use frameworks: https://npmjs.org/ - carefully ● Npm modules are not validated! Check those: https://nodesecurity.io ● Watch module dependencies! ● must have: your own error handling & logging ● This is server – we need proper server security solutions: ● Monitoring – think how to monitor your app ● Control-groups – set limits for resources ● SELinux sandbox
  • 16. Node.js – SELinux sandbox ●'home_dir' and 'tmp_dir' ● App can r/w from std(in|out) + only defined FDs ● No network access ● No access to foreign processes / files ● We can easily connect sandbox with cgroups :) ● Helpful: semodule -DB (no dontaudit) ● grep XXX /var/log/audit/audit.log | audit2allow -M node.sandbox ● semodule -i node.sandbox.pp
  • 18. Node.js – how can #2 ● Freeze node.js version per project? ● Let’s read & learn: ● https://media.blackhat.com/bh-us-11/Sullivan/BH_US_11_Sullivan_Server_Side_WP.pdf ● http://lab.cs.ttu.ee/dl91 ● https://github.com/toolness/security-adventure ● Pseudo–configuration – set limits in your code (e.g. POST size) ● try...catch ftw ● use strict; - helps even with eval case (partially) ● Bunyan / dtrace: https://npmjs.org/package/bunyan ● node.js OS? Oh and use / build node.js packages (fpm or whatever)
  • 19. Stage 2 – social engineering ● Stage’s target is to verify & check candidate’s security awareness ● Christopher Hadnagy – SE framework (2k10): ● http://www.social-engineer.org/framework/Social_Engineering_Framework ● Everyone can act as recruiter and call anyone ● Building network / connections on Linkedin is very easy ● Trust (lingo, easiness in some env: research) ● Sysop knows really much about env – he’s good target ● So one has to only get sysop’s trust and decrease his carefulness
  • 20. Stage 3 - virtualization ● Our needs? ● Boot process supervision ● Console access ● Resource management ● Redundant storage ● Rescue mode for VMs ● Security by default > AWS > KVM/libvirt > XEN/libvirt > LXC
  • 21. Stage 3 - virtualization boot console resources mgmt. redundant storage rescue VM security
  • 22. Stage 3 - virtualization VS Performance XEN/HVM or KVM?
  • 23. Stage 3 - virtualization VS We had great performance issues with XEN/HVM The winner is „hat in the red” and its PV (but with the cgroups help – under heavy load KVM is not that stable) Performance XEN/HVM or KVM?
  • 24. Stage 3 – network security DMZ (Demilitarized Zone) – logical or physical partition https://en.wikipedia.org
  • 25. Stage 3 – network security https://en.wikipedia.org DMZ (Demilitarized Zone) – logical or physical partition
  • 26. Stage 3 – network security ● Separated, dedicated DMZ (VLAN?) for host ● No routing / communication from this DMZ with other segments ● Low – cost solutions? ● OpenWRT / DDWRT way || Pure Linux server ● 802.1Q – VLANs
  • 27. Stage 3 – network security ● Network isolation on KVM host: ● Host/network bridge: L2 switch ● netfilter / nwfilter (IBM) ● By default there’s no packets isolation in the bridged network - ebtables null, no filtering ● ebtables – filtering l2– so we gain isolation ● Or virsh nwfilter-list ● allow-arp,dhcp,dhcp-server,clean-traffic, no- arp-ip-spoofing, no-arp-mac-spoofing, no- arp-spoofing, no-ip-multicast, no-ip-spoofing, no-mac-broadcast, no-mac-spoofing, no- other-l2-traffic ● L2 filtering? /proc/sys/net/bridge https://www.redhat.com/archives/libvir-list/2010-June/msg00762.html http://pic.dhe.ibm.com/infocenter/lnxinfo/v3r0m0/topic/liaat/liaatsecurity_pdf.pdf
  • 28. Stage 3 –boot process, VNC ● Accessing boot process – VNC ● VNC security? SSL? Complications.. ● Maybe VNC over SSH tunnel? ● Encryption ● No certificates issues ● Every admin can easily use VNC
  • 29. Stage 3 – restricted shells ● SSH tunneling requires SSH access (thank You Captain Obvious!) ● SSH access is a threat per se ● Let’s limit this SSH / shell access – use restricted shells Restricted shells by. Google ;) =>
  • 30. Stage 3 – restricted shells ● Restricted shells are threat by default – unless we know how to use those! ● Under some circumstances one could escape the rshell: https://en.wikipedia.org/wiki/Rbash
  • 31. Stage 3 – restricted shells ● Rbash: ● CentOSie / RHEL approved / friendly / legit ;) ● Protects from directory traversal ● Prohibits access to files via direct path ● Prohibits setting PATH or other shell env variables ● No commands output redirection ● PATH=$HOME/bin – and reconsider 2x what to put into this „bin” https://en.wikipedia.org/wiki/Rbash
  • 32. Stage 3 – SSH tunnel / VNC ● We must go deeper! Candidate VM-Proxy screen / ssh tunnel VM host rshell / ibsh rshell / rbash VNC server
  • 33. Stage 3 – restricted shells ● Other restricted shells: ● rssh – allows scp, sftp, rsync ● sudosh - http://sourceforge.net/projects/sudosh ● Allows saving whole user session and replay it ● One can define allowed operations for user ● Little outdated – better use sudosh3 ● Ibsh (small, fast, secure): http://sourceforge.net/projects/ibsh/
  • 34. Stage 3 – control groups ● resource management in a simple way (ulimits, nice, limits.conf).. but.. ● Could you set 50 IOPS for defined process? ● What about 100Kbp/s limit for particular user? ● issues with memory–leaks in Java?
  • 35. Stage 3 – control groups https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Resource_Management_Guide/ch01.html ● Debian & RHEL friendly ● Running apps in cgroup context ● Setting cgroup context for process during runtime
  • 36. Stage 3 – web application ● OpenStack? „Couple” of compliations ;) “Out of the box” – yup – I’ve heard about that ;) Could you deploy it in a few hours – securely?
  • 37. Stage 3 – web application Commodore OS ???
  • 38. Stage 3 – web application Commodore OS Vision FTW!
  • 39. Stage 3 – web application ● Apache + mod_security ● mod_security + OWASP rules ● PHP & Python :) ● Simplicity! ● VM management with simple daemon + screen: ● while(1) do: manage_VMs(); ● And this just works!
  • 40. Stage 3 – recording SSH sessions ● We have to record all sessions – also those under „screen” ● Real time recording ● sudosh3 (sudosh fork) – kinda proxy shell – great ;) ● auditd – lov-lewel tool for recording syscalls ● Asciinema (ascii.io, Marcin Kulik) – great one, but not for audit purposes ● Ttyrec – outdated: http://0xcc.net/ttyrec/index.html.en ● Ssh logging patch - outdated: http://www.kdvelectronics.eu/ssh-logging/ssh-logging.html
  • 41. Stage 3 – data security ● What if we loose any of the VMs...? Brrr.... ● Risk assesement – what would be enough for us? ● RAID1 / Mirror – “usually” is enough for a 3 – month time ● Backups – useful ;) RAID / replication are not backups... ● GlusterFS / DRBD – if you have enough resources – try it :) LVM Gluster brick KVM active host LVM Gluster brick KVM passive host replication