Dailydave mailing list archives

Re: Defeating what's next


From: Vitaly Osipov <vitaly.osipov () gmail com>
Date: Thu, 13 Jun 2013 14:59:49 +1000

… or, Ptolemaic model of the solar system of infosec.

Required reading: https://en.wikipedia.org/wiki/Deferent_and_epicycle

In all enterprise-y security courses they will teach you that there
are several components to defence processes:

10. If you can, try to prevent bad guys getting to you
20. If you cannot, try to detect an attempt to get in before it succeeds
30. If you cannot detect attempts, aim to detect whether you've been compromised
40. If you've been compromised, do incident response and clean up

(Imagine your enterprise assets is the Sun and those 4 items are planets)

When the reality demonstrates that the current approach to any of the
components is inadequate, it gets updated with "smarter" technology.

What this "smarter" technology comprises changes with time, but it
always goes through stages of

1. Signatures, then
2. Some sort of local behaviour analysis, then
3. Big data, then
4. Whatever the market fancies

(These are the epicycles in Ptolemy's system)

Examples:
- AV is stuck on line 20 with a few epicycles under its belt;
- IoC is line 30, only just at the beginning of its series of epicycles.

The main take away here is that the defending side is, unfortunately,
retreating. Those "let's clean up compromises quicker" contests Spaf
was lamenting recently only illustrate this tendency further.
The other take-away is that I love lists…

Oh and if someone comes up with a Copernican concept of security,
please tell me. I have to be part of that.

Regards,
Vitaly


On Thu, Jun 13, 2013 at 12:10 AM, Dave Aitel <dave () immunityinc com> wrote:
Hackers spend a lot of time looking at what's coming down the technology
road at them. In a sense, this business is about learning how to stare
down the barrel of a gun and not blinking for decades at a time. When
you blink, you end up a CISSP. Richer financially, but poorer in 0days,
the only currency that matters to someone with your particular addiction.

Terminology can reveal a lot, as can business strategies. I spent some
time on the phone yesterday with a high level executive in the incident
response industry, and he poo-pooed Immunity's offensive skills, which
made me focus on the industry for a while while watching Covert Affairs
after the kids went to bed.

First of all, here's what's next in the incident response world:
"Indicators of Compromise". And when people say that, they right now
mean MD5s, file names, registry addresses, dns addresses, what addresses
a trojan hooks, and that sort of thing. All of these things can be
changed AT RUN TIME, by your better trojans.

In other words, we have an industry focused highly on "indicators of
compromise", whereas modern high-level attackers have leapfrogged the
entire concept.  The only true indicator of compromise is "computer is
doing something I probably didn't want it to do", and that's not
something you can codify in XML.

Something to think about. :>

-dave



_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
https://lists.immunityinc.com/mailman/listinfo/dailydave

_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Current thread: