In the past two years, companies all over the world spent $157 billion on information security products. For comparison, the total expenses of the state government of New York amounted to $150.7 billion in 2016.
Just for our amusement, let's imagine a silver bullet with a cost comparable to information security expenses. It would weigh 302.5 tons since silver costs $515.70 per kilogram (actual price on the day this article was written)! Therefore, it is either a really heavy bullet the size of a 10-story building, or it isn't made of silver. I could continue hypothesizing about potential raw materials for such a bullet, but I'd rather discuss the reasons behind such a state of affairs.
In short, it is unclear what needs to be protected and from what. I will elaborate on these two problems below.
Axa Assurance Maroc - Insurer Innovation Award 2024
Where is my silver bullet?!
1. Where is my
silver bullet?!
Or how to bypass any
intrusion detection system
RUCTF 2017
2. @d0znpp BIO
● Bug bounty
● SSRF bible https://goo.gl/AQiZt8
● Wallarm CEO
● Twitter, Medium, Facebook, Telegram: @d0znpp
3.
4. “Gartner Says Worldwide
Information Security Spending Will
Grow 7.9 Percent to Reach $81.6
Billion in 2016”
2015 $75 B
2016 $81.6 B
This bullet definitely costs more than $156.6 B
It’s not a silver… Or the weight is about 269’400 tons
7. Why? Two important things since the 30s
No documentation (because of the Apple
and UX)
● Try to find documentation for Chrome
:)
● How to understand that it’s the bug but
not a backdoor
Closed source software (because of the
Intel et al.)
● What’s does “Intel inside” really mean?
8. Layer cake
How many layers do you know?
I spent last 10 year for the
security and don't sure that know
about all of them
11. Parsers. Grammars. Interpreters. Layers. Products
AV is a good example here.
● Binary program (ASM)
● Signature (regular
expression)
The same as
● IPS
● IDS
● WAF
● XXX
12. What should we detect?
● What is a vulnerability?
● Taxonomy/classification!
● Is it a bug or a backdoor?
● Can there be one thing malicious in one case and
completely normal in another
13. Classification issues
● CWE. Complicated hierarchy. Overlaps and intersections.
● OWASP. Something strange.
● WASC. Too old and non-formal.
17. Make it science!
Dear students! The world needs your help. It
is necessary to describe what a vulnerability
is in terms of Turing machines or other formal
models.
Do this before you work for someone and
these studies will become a private patents!