Careers in security, ethical hacking and advice on where to get started

Many people will disagree with this post, not so much because it’s flat out wrong but because there are so many different approaches one can take. It’s a very subjective realm but I’m going to put forward some suggestions, make some considered arguments and leave it at that.

The context

Continue reading Careers in security, ethical hacking and advice on where to get started

Get “The Information Security Big Picture” on Pluralsight now!

If you’re here reading this then it probably won’t come as a big surprise but brace yourself anyway – we have a security problem. Yes, yes, I know, it’s all very terrifying and not a day goes by where someone isn’t getting cyber-something’d. As best I can tell from the

Continue reading Get “The Information Security Big Picture” on Pluralsight now!

New Pluralsight course: Exploring the Internet of Vulnerabilities

I’ve done a number of “Play by Play” courses for Pluralsight this year on a range of topics including Social Engineering with my mate Lars Klint, Deconstructing the Hack with my mate Gary Eimerman, Modernizing Your Deployment Strategy with Octopus Deploy with my mate Damo Brady and the latest one

Continue reading New Pluralsight course: Exploring the Internet of Vulnerabilities

New Pluralsight Course: Modernizing Your Deployment Strategy with Octopus Deploy

Here’s a little-known fact for folks that have only tuned in more recently: I had a life before doing security things. I know, it seems like a long time ago now, but there was a time where all the other things that go into the software development process were highly

Continue reading New Pluralsight Course: Modernizing Your Deployment Strategy with Octopus Deploy

Getting to grips with cloud computing security on Pluralsight

Two of the things you’ll have found me most frequently writing about on this blog are “cloud” and “security”. Whilst the latter seems to have been what I’ve gravitated towards most in recent years, the former is something I’ve very heavily involved in, particularly with my work on Have I

Continue reading Getting to grips with cloud computing security on Pluralsight

Understanding firewalls, intrusion detection systems and honeypots with Pluralsight

This was pretty big news 18 months ago:

Sony Hacked By #GOP Screen

It was what greeted Sony Pictures employees when they turned up to the office and switched on their machines. Machines infected with malware was one thing – a very bad thing at that – but it got much, much worse for Sony.

Continue reading Understanding firewalls, intrusion detection systems and honeypots with Pluralsight

New Pluralsight course: Ethical Hacking, Denial of Service

I’ve just launched my latest Pluralsight course titled Ethical Hacking, Denial of Service but before I explain what’s in it, let’s kick off with some trivia: DDoS attacks have increased massively in size in recent years:

DDoS attacks going from 60Gbps in 2011 to 500Gbps in 2015

This is from Arbor Networks’ latest Worldwide Infrastructure Security Report and that was current in October when the study was done. Now, it’s not so current:

A 602Gbps attack

By the time you read this, we may well be at 700 or 800 or who knows where because the trend is very consistently “up and to the right”, as they say. But it’s not just the scale of the attacks which is alarming, it’s the cost. We may think of a DDoS attack as being a simple temporary outage (or a peaceful protest, as some would like to see it), but have a look at how much Arbor found it actually costs organisations in their report:

DDoS costing up to $20k per minute of outage

So about two thirds of company take a hit of $30k an hour or more. 14% of them were seeing costs upwards of ten times that – $300k per hour because of DDoS!

But here’s the other crazy thing about this class of attack – it’s easy, it’s cheap and you don’t need any specific app flaws in order to seriously mess with a site. Here’s a perfect example of how easily DDoS is, go and check out this site (turn your speakers way up first!):

The booter.xyz service

I’m not normally in the habit of linking through to malicious sites, but “booters” are so prevalent and easily accessible on the clear web that you’ll find them within minutes anyway if you want to. The crazy thing with the booters is the sheer prevalence of them and the ease with which they seem to be spun up. For example, the Lizard Squad service of late 2014 which proved to be rather effective at taking down the likes of Sony’s PSN and Microsoft’s Xbox Live. Even kids in their bedrooms are spinning up DDoS services these days:

Now to be clear, I’m not exactly sure how effective Christa’s service really is, but there’s something about DDoS that really appeals to kids. Part of it is likely that they’re just so easy to execute in an impactful way; not only are there many DDoS as a service offerings out there (DDoSaas?), they also don’t need any specific vulnerabilities in the target site in order to cause damage. No SQL injection or XSS or enumeration risks or anything like that, they merely need a site which can handle less traffic than they can send it.

DDoS has also become a favourite with this genre that we know as the hacktivist. For example, we’ve seen successful attacks based on philosophical differences such as #oppayback in the wake of PayPal and co refusing to accept donations to Wikileaks. The legalities of this action aside (and I’ll come back to that), you can understand the ire the hacktivists felt in the wake of PayPal’s decision. Likewise, there probably wasn’t a whole lot of sympathy when hactivists DDoS’d Scientology and I suspect next to zero sympathy when it was Westborough Baptist church being hit.

But the ease of this class of attack also makes for some pretty unreasonable action on behalf of adversaries. For example, just a couple of months ago Nissan was DDoS’d. Why? No, not because they build cars with security flaws, rather it was because of the whales. Hang on – what? This is not because Nissan is upholstering cars in whale skin or testing airbags on them or anything whacky like that, it’s because Nissan is Japanese and there remains “scientific research” there which involves harpooning them. (It’s unclear how scientific turning them into sushi is, but I digress.) The point is that Nissan themselves almost certainly have nothing to do with whaling yet they copped a rather effective DDoS there for a while.

Another reason DDoS attacks remain rampant particularly via hacktivists is that they frequently don’t believe there’ll be any recourse. I recently watched the We Are Legion documentary (not sensational, but worthwhile viewing IMHO), and it was interesting to see just how unaware so many of those involved in the aforementioned #oppayback attacks were. They gave no thought to the fact that what they were doing might be illegal and could have serious consequences. Being entirely objective about it, you can see how they might draw that conclusion; they’re sitting there in their bedrooms firing up a tool like LOIC (a favourite with hacktivists) and then just… going outside and playing. No seriously, here’s a tutorial by Anonymous that tells you to do just that:

Ok, this is funny for many reasons yet it does demonstrate how eager especially kids or young adults are to jump on the DDoS bandwagon. In the aforementioned documentary, many of those interviewed talked about how DDoS was just a form of protest, in fact even their lawyer was quite adamant they were just exercising their freedom of speech rights. The problem is though, when you’re costing an organisation thousands of dollars by the minute, you’re actually doing serious damage and with that comes serious consequences. A few years back I wrote What is LOIC and can I be arrested for DDoS’ing someone? because I was amazed at just how many people thought they couldn’t be arrested for it!

I could go on about DDoS because it’s a genuinely fascinating topic, but I do want to touch on the point of writing the post in the first place which is to launch my latest (and 21st) Pluralsight course titled Ethical Hacking, Denial of Service. This is now the 6th course in the Ethical Hacking series and I decided to break it down into four modules like so:

  1. Understanding Denial of Service Attacks: How this class of attack has grown so rapidly in recent years and the impact it’s having on organisations, as well as some really neat visualisation of attacks such as the Norse map.
  2. Attack Techniques: There’s a lot more to denial of service attacks than a bunch of people pointing LOIC at a site. SYN floods, ICMP and UDP attacks, DNS amplification and even the man on the side style of attack we saw against GitHub last year to name just a few.
  3. Tools and Services: Obviously I touch on LOIC (and it’s web-based counterpart JS LOIC) and I then delve into the operations of booters as mentioned above and the whole DDoSaaS class of offering. In fact I even do a walkthrough of one of these which gives some insight into just how polished these services have become.
  4. Defending Against Attacks: Given the course is aimed at your ethical class of professional, I naturally spend a bunch of time talking about how to limit the effectiveness of these attacks. It’s never foolproof, but there’s a lot that can be done to lessen the blow of an attack.

That’s it for DDoS, the course is now live and ready to be viewed – enjoy!

Continue reading New Pluralsight course: Ethical Hacking, Denial of Service

A social engineering Play by Play on Pluralsight with Lars Klint

The other day, a hacker compromised someone’s email account. It was almost certainly a phishing attack, he probably just sent them over an email claiming to be from the victim’s organisation and then just, well, asked for their credentials. From there, the attacker wandered over to the web portal of the victim’s organisation and attempted to logon, which unfortunately for him didn’t work. No worries, they simply called up the helpdesk who kindly gave him access. So now he’s logged in to the victim’s portal and he heads over to a virtualised environment which he authenticates to using the victim’s credentials from the first step. Now he has access to the victim’s documents and can begin traversing the network under the identity of his target. He grabs tens of thousands of records about the organisation’s employees… and dumps them publicly.

The organisation was the US Department of Justice and the dumped data was 20,000 FBI and 9,000 DHS records, according to Motherboard. Oh – the attacker was also a 16-year-old kid. Allegedly, it was the same kid who socially engineered his way into the director of the CIA’s account last year. Evidently, manipulating humans via these engineering attacks is a rather effective way of breaching systems!

Only a week ago, I launched my latest Pluralsight course, Ethical Hacking: Social Engineering. This was the fifth in the epic Ethical Hacking series I’ve been working on with a co-author and in my humble opinion, perhaps the best course I’ve created to date (I love that it’s so broadly relevant regardless of the viewer’s technical competency). Just as I was wrapping up the editing of the course during my European travels last month, I had the opportunity to record another Play by Play course – that is a video of myself and someone else as opposed to just a screen cast – so I grabbed my good mate and fellow Pluralsight author, Lars Klint. Just to give you a quick sense of what goes into one of these Play by Play courses, Lars snapped this pic of us setting up:

Setting up for the recording

A Play by Play was a really good opportunity to talk about social engineering because it allowed us to demonstrate the nuances of human interaction which is pretty pivotal to this class of attack. The video format allowed me to show devices I was carrying with me, demonstrate how an attacker would execute computer based social engineering (there’s a great demo of BeEF in there), and also show human based attacks which relied on us both being present in the same place.

One of the techniques we show and discuss in the course is “tailgating” or in other words, a social engineer simply following someone else through an otherwise secure door in order to gain access to a premise. Quite coincidentally, I saw a great example of how circumventing physical security measures can be done as I arrived onsite to run a workshop shortly after this. I was waiting at the reception of a financial institution which had turnstiles in the foyer and employees would file through one by one, swiping their access card as they go… except for one lady. She turned up on crutches and was summarily issued around the side of the turnstiles by a friendly security guard without any swipe of her pass. This is precisely the sort of behaviour we demonstrate in the course, albeit with me carrying a box and seeking assistance through the door and it can be that easy.

I really enjoy doing these Play by Plays because they’re very candid discussions and super easy to watch. There’s hardly any editing compared to a normal Pluralsight course delivered as a screencast and the dynamics between the individuals make it a very different viewing experience. This is now the third Play by Play I’ve done and believe it or not, it’s now my twentieth Pluralsight course and I’m enormously happy that it’s now live.

Go and check it out at Play by Play: Social Engineering with Troy Hunt and Lars Klint.

Continue reading A social engineering Play by Play on Pluralsight with Lars Klint