SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
Export Controls on
Intrusion Software
Collin Anderson (@CDA)
Tom Cross (@_decius_)
Do Export Controls on Intrusion Software
Threaten Security Research?
Truth is… we don’t know.
(We’re not lawyers and this isn’t legal advice.)
Truth is… the Government doesn’t know.
(At least they are asking questions.)
Truth is… nobody knows.
(We don’t even agree about this...)
Outline:
1. Some Basics
a. What is the problem?
b. How do export controls work generally?
2. How these new Wassenaar rules work
a. IP Network Surveillance Systems
b. Intrusion Software
c. “Technology” for the development of Intrusion Software
3. Implications
a. Could these rules regulate “full disclosure” and “open source?”
b. Do these rules apply to Vulnerability Research?
c. Could these rules regulate coordinated disclosure or bug bounties?
d. Could these rules regulate training classes?
e. What if I leave pen testing tools on my laptop when I travel?
f. What about foreign coworkers or my company’s offices in other countries?
g. What about reverse engineering tools? Debuggers? Exploit generators? Jailbreakers?
h. If I ask BIS for permission, will I get a license?
4. What can we do about it?
The Basics
Surveillance is Big Business!
What’s the problem?
The Problem:
1. The Citizen Lab correctly identified 21 customers of Hacking Team.
2. The US DEA and US Army are customers. DEA are using the technology out of their embassy in Bogota, Colombia.
3. Hacking Team sold its technology to three agencies in Morocco. The Moroccan government's intimidation of civil society… is
nothing more than an attempt to silence legitimate criticism.
4. Hacking Team have been evading the legitimate questions from UN investigators regarding the sale of
technology to Sudan.
5. NICE Systems appears to have sold Hacking Team spyware to Azerbaijan, Uzbekistan, and Denmark.
6. Hacking Team are trying to secure a sale to the Rapid Action Battalion (RAB), a Bangladesh police unit
described by Human Rights Watch as a “death squad” involved in torture and extrajudicial killings.
7. Hacking team reinstated support contracts with the Ethiopian government despite reports of the targeting of Ethiopian US-based
journalists by Hacking Team's spyware.
8. Our lobbying of the Italian government on export controls worked. We wrote to the Italian Ministry of Economic
Development, over 100 parliamentarians, and to the regional Government calling for unilateral export controls on Hacking Team's spyware. We were
successful in that the Italian government implemented the controls that we had been calling for and temporarily suspended Hacking Team's operations,
citing “possible uses concerning internal repression and violations of human rights”.
The Solution:
What is the Wassenaar Arrangement?
How do export controls work in the US?
<-------- ITAR (International Traffic in Arms Regs)
● Governed by the State Department
● Controls Military Items (US Munitions List)
● Includes items for “National Police” forces
● Includes Military Encryption Items
● Includes items that hinder the operation of
adversary electronics
● Includes items that “exploit” the
electromagnetic spectrum (regardless of
transmission medium).
EAR (Export Administration Regulations) -------------------------------------------------------->
● Governed by the US Bureau of Industry and Security (BIS)
● Controls “Dual Use Items” - Civilian items that have military applications
● Includes controls on Cryptography
● The new controls on “Intrusion Software” fit here
Wait, didn’t we win the crypto wars?
License Exception TSU
The New Rules
IP Network Surveillance Systems
5. A. 1. j. IP network communications surveillance systems or equipment, and specially designed components therefor, having all of the
following:
1. Performing all of the following on a carrier class IP network (e.g., national grade IP backbone):
● Analysis at the application layer (e.g., Layer 7 of Open Systems Interconnection (OSI) model (ISO/IEC 7498-1));
● Extraction of selected metadata and application content (e.g., voice, video, messages, attachments); and
● Indexing of extracted data; and
2. Being specially designed to carry out all of the following:
● Execution of searches on the basis of ‘hard selectors’; and
● Mapping of the relational network of an individual or of a group of people.
What is “Intrusion Software?”
“Software” specially designed or modified to avoid detection by ‘monitoring
tools’, or to defeat ‘protective countermeasures’, of a computer or network
capable device, and performing any of the following:
• The extraction of data or information, from a computer or network capable
device, or the modification of system or user data; or
• The modification of the standard execution path of a program or process in
order to allow the execution of externally provided instructions.
● ‘Monitoring tools’: “software” or hardware devices, that monitor system behaviours or processes running on a device. This includes
antivirus (AV) products, end point security products, Personal Security Products (PSP), Intrusion Detection Systems (IDS), Intrusion
Prevention Systems (IPS) or firewalls.
● ‘Protective countermeasures’: techniques designed to ensure the safe execution of code, such as Data Execution Prevention (DEP),
Address Space Layout Randomisation (ASLR) or sandboxing
Is “Intrusion Software” Controlled?
NO
Then what IS controlled?
4. A. 5. Systems, equipment, and components therefore,
specially designed or modified for the generation, operation
or delivery of, or communication with, “Intrusion Software”.
4. D. 4. “Software” specially designed or modified for the
generation, operation or delivery of, or communication with,
“Intrusion Software”.
“Technology” is also controlled
4. E. 1. c. “Technology” for the “development” of “Intrusion
Software”.
Technology - Specific information necessary for the “development”,
“production”, or “use” of a product. The information takes the form of ‘technical
data’ or ‘technical assistance’.
NOTE: “Intrusion Software” itself is NOT controlled, but information necessary
for the “development” of “Intrusion Software” IS controlled, including “technical
data” and “technical assistance.”
The Implications
What about Full Disclosure and Open Source?
15 CFR 734.3 - The following items are not subject to the EAR:
Publicly available technology and software… that:
(i) Are already published or will be published as described in §734.7 of this
part;
(ii) Arise during, or result from, fundamental research, as described in §734.8
of this part;
(iii) Are educational, as described in §734.9 of this part;
Encryption vs. “Intrusion Software” Stuff
Encryption:
● License Exception TSU
● Must be publicly available
● Must be open source
● You must email BIS and notify them
Controlled Stuff related to “Intrusion Software”:
● 15 CFR 734.3(b)(4)
● Must be publicly available
● Does NOT need to be open source
● BIS does NOT need to be notified
Is Vulnerability Research Covered?
BIS, in the federal register: “Technology for the development of intrusion software
includes proprietary research on the vulnerabilities and exploitation of computers and network-
capable devices.”
BIS, in the FAQ on their website: “The proposed rule would not control… Information
about the vulnerability, including causes of the vulnerability.”
BIS, also in the FAQ on their website: “Neither the disclosure of the vulnerability
nor the disclosure of the exploit code would be controlled under the proposed rule.”
However: “The proposed rule would control…
Technical data to create a controllable exploit that can reliably and predictably defeat
protective countermeasures and extract information
Information on how to prepare the exploit for delivery or integrate it into a command and
delivery platform.”
Coordinated Disclosure and Bug Bounties
From the BIS FAQ: “Any technical data sent to an
anti-virus company or software manufacturer with the
understanding that the information will be made publicly
available, would not be subject to the EAR.
However, "technology" that is not intended to be
published would be subject to the control.”
Planning to disclose a mitigation bypass?
Sharing Exploit Toolkit Samples?
If you discover an exploit toolkit in the wild and want to
share it with other infosec professionals or software
vendors across borders, apparently, this may not be
allowed under the proposed rule.
BIS, in their FAQ: “Exploit toolkits would be described in
proposed ECCN 4D004… There are no end user or end use
license exceptions in the proposed rule.”
What about training classes?
On the one hand: Technical data to create a controllable exploit that can reliably and
predictably defeat protective countermeasures and extract information. Information on how to
prepare the exploit for delivery or integrate it into a command and delivery platform.
On the other hand, 15 CFR 734.7(a)(4): Release at an open conference, meeting,
seminar, trade show, or other open gathering.
(i) A conference or gathering is “open” if all technically qualified members of the public are eligible to
attend and attendees are permitted to take notes or otherwise make a personal record (not
necessarily a recording) of the proceedings and presentations.
(ii) All technically qualified members of the public may be considered eligible to attend a conference or
other gathering notwithstanding a registration fee reasonably related to cost and reflecting an intention
that all interested and technically qualified persons be able to attend, or a limitation on actual
attendance, as long as attendees either are the first who have applied or are selected on the basis of
relevant scientific or technical competence, experience, or responsibility (See Supplement No. 1 to
this part, Questions B(1) through B(6)).
Planning to travel outside the USA?
§ 740.14 Baggage (BAG).
(a) Scope. This License Exception authorizes individuals leaving the United States either temporarily
(i.e., traveling) or longer-term (i.e., moving) and crew members of exporting or reexporting carriers to
take to any destination, as personal baggage, the classes of commodities, software and technology
described in this section.
BIS, in the Federal Register: “No license exceptions would be available for these items,
except certain provisions of License Exception GOV, e.g., exports to or on behalf of the United States
Government pursuant to § 740.11(b) of the EAR.”
What about foreign coworkers & offices?
BIS, in their FAQ: “The proposed rule does not provide for any exceptions to
deemed export license requirements.”
BIS on “Deemed Export” - “Release of controlled technology to foreign
persons in the U.S. are "deemed" to be an export to the person’s country or
countries of nationality.”
Also, BIS, in their FAQ: “There is no license exception for intra-company
transfers or internal use by a company headquartered in the United States
under the proposed rule.”
Debuggers and exploit generators?
BIS, in their FAQ: “General purpose tools, such as IDEs, are not described
under proposed ECCN 4D004 because they are not "specially designed" for the
generation of "intrusion software." Some penetration testing tools (FAQ #12)
and exploit toolkits (FAQ #18) are described in proposed ECCN 4D004, as they
are command and delivery platforms for "intrusion software."”
Jailbreaking Software?
BIS, in their FAQ: “If particular jailbreak software did meet all the
requirements for classification under ECCN 4D004 (such as a commercially
sold delivery tool "specially designed" to deliver jailbreaking exploits) then it
would be subject to control and a license would be required to export it from
the United States. Note that if such software were "publicly available," it
would not be subject to the Export Administration Regulations.”
Will I get a license?
BIS, in the Federal Register: “Note that there is a policy
of presumptive denial for items that have or support
rootkit or zero-day exploit capabilities.”
Dave Aitel: “If you are modular in any way, you facilitate
0day. An 0day is just a program after all. So anything that
can execute commands or auto update is now "default
deny" for export.”
What do we do about it?
Comment Period?
At the time these slides were composed, the
open comment period will close before
Defcon, on July 20th, 2015.
However, we anticipate that BIS may extend
this comment period, or open up a new one in
the future.
Key Points:
● At least, the US has published their interpretations and asked for feedback.
○ The Wassenaar Negotiators did not.
○ Many countries in Europe have enacted this without publishing information about how
they plan to interpret it.
● Regulators will probably be responsive to clear, negative impacts the regs will have on:
○ Legitimate information security research.
○ Legitimate computer security work.
○ Legitimate business activity and the economy as a whole.
● Regulators will not be responsive to vitriol or paranoid, overly broad misinterpretations of
their proposed regs.
○ Its important to relate potential problems to the specific statements that regulators
have made about how they interpret the regulations.
Stay Informed:
Federal Register: https://www.federalregister.
gov/articles/2015/05/20/2015-11642/wassenaar-arrangement-2013-plenary-
agreements-implementation-intrusion-and-surveillance-items
BIS FAQ: http://www.bis.doc.gov/index.php/licensing/embassy-faq
Regs list: https://lists.alchemistowl.org/mailman/listinfo/regs

Contenu connexe

Tendances

Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesDavid Shepherd
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersVi Tính Hoàng Nam
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentOnward Security
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityGreat Bay Software
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsRoger Johnston
 
Nova Technical Services Tscm
Nova Technical Services TscmNova Technical Services Tscm
Nova Technical Services Tscmmjbergstrom
 
TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-SweepingPaul Andrews
 
Cybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdCybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdDr. Idris Ahmed
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?Alan Tatourian
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulipTheMindSmith
 
Feisal nanji himss 13 -- finalfinalfinal
Feisal nanji   himss 13 -- finalfinalfinalFeisal nanji   himss 13 -- finalfinalfinal
Feisal nanji himss 13 -- finalfinalfinalFeisal Nanji
 
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksHunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksF _
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingCellebrite
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 

Tendances (20)

Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
Hacking3e ppt ch06
Hacking3e ppt ch06Hacking3e ppt ch06
Hacking3e ppt ch06
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insiders
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
 
Nova Technical Services Tscm
Nova Technical Services TscmNova Technical Services Tscm
Nova Technical Services Tscm
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-Sweeping
 
Cybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdCybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics Ltd
 
ICS CERT- Incidence Reports
ICS CERT- Incidence ReportsICS CERT- Incidence Reports
ICS CERT- Incidence Reports
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulip
 
Feisal nanji himss 13 -- finalfinalfinal
Feisal nanji   himss 13 -- finalfinalfinalFeisal nanji   himss 13 -- finalfinalfinal
Feisal nanji himss 13 -- finalfinalfinal
 
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksHunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 

Similaire à DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion software

The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceValdez Ladd MBA, CISSP, CISA,
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsUltraUploader
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxInfosectrain3
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Yuval Sinay, CISSP, C|CISO
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxinfosec train
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisAntonio Parata
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdfSoniaCristina49
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Travis
 

Similaire à DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion software (20)

The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documents
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ht r32
Ht r32Ht r32
Ht r32
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware Analysis
 
security onion
security onionsecurity onion
security onion
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 

Plus de Felipe Prado

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryFelipe Prado
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...Felipe Prado
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsFelipe Prado
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionFelipe Prado
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101Felipe Prado
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentFelipe Prado
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareFelipe Prado
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...Felipe Prado
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationFelipe Prado
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceFelipe Prado
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionistFelipe Prado
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksFelipe Prado
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityFelipe Prado
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsFelipe Prado
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchFelipe Prado
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...Felipe Prado
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksFelipe Prado
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationFelipe Prado
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncFelipe Prado
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesFelipe Prado
 

Plus de Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Dernier

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Dernier (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion software

  • 1. Export Controls on Intrusion Software Collin Anderson (@CDA) Tom Cross (@_decius_)
  • 2. Do Export Controls on Intrusion Software Threaten Security Research? Truth is… we don’t know. (We’re not lawyers and this isn’t legal advice.) Truth is… the Government doesn’t know. (At least they are asking questions.) Truth is… nobody knows. (We don’t even agree about this...)
  • 3. Outline: 1. Some Basics a. What is the problem? b. How do export controls work generally? 2. How these new Wassenaar rules work a. IP Network Surveillance Systems b. Intrusion Software c. “Technology” for the development of Intrusion Software 3. Implications a. Could these rules regulate “full disclosure” and “open source?” b. Do these rules apply to Vulnerability Research? c. Could these rules regulate coordinated disclosure or bug bounties? d. Could these rules regulate training classes? e. What if I leave pen testing tools on my laptop when I travel? f. What about foreign coworkers or my company’s offices in other countries? g. What about reverse engineering tools? Debuggers? Exploit generators? Jailbreakers? h. If I ask BIS for permission, will I get a license? 4. What can we do about it?
  • 7. The Problem: 1. The Citizen Lab correctly identified 21 customers of Hacking Team. 2. The US DEA and US Army are customers. DEA are using the technology out of their embassy in Bogota, Colombia. 3. Hacking Team sold its technology to three agencies in Morocco. The Moroccan government's intimidation of civil society… is nothing more than an attempt to silence legitimate criticism. 4. Hacking Team have been evading the legitimate questions from UN investigators regarding the sale of technology to Sudan. 5. NICE Systems appears to have sold Hacking Team spyware to Azerbaijan, Uzbekistan, and Denmark. 6. Hacking Team are trying to secure a sale to the Rapid Action Battalion (RAB), a Bangladesh police unit described by Human Rights Watch as a “death squad” involved in torture and extrajudicial killings. 7. Hacking team reinstated support contracts with the Ethiopian government despite reports of the targeting of Ethiopian US-based journalists by Hacking Team's spyware. 8. Our lobbying of the Italian government on export controls worked. We wrote to the Italian Ministry of Economic Development, over 100 parliamentarians, and to the regional Government calling for unilateral export controls on Hacking Team's spyware. We were successful in that the Italian government implemented the controls that we had been calling for and temporarily suspended Hacking Team's operations, citing “possible uses concerning internal repression and violations of human rights”.
  • 9. What is the Wassenaar Arrangement?
  • 10. How do export controls work in the US? <-------- ITAR (International Traffic in Arms Regs) ● Governed by the State Department ● Controls Military Items (US Munitions List) ● Includes items for “National Police” forces ● Includes Military Encryption Items ● Includes items that hinder the operation of adversary electronics ● Includes items that “exploit” the electromagnetic spectrum (regardless of transmission medium). EAR (Export Administration Regulations) --------------------------------------------------------> ● Governed by the US Bureau of Industry and Security (BIS) ● Controls “Dual Use Items” - Civilian items that have military applications ● Includes controls on Cryptography ● The new controls on “Intrusion Software” fit here
  • 11. Wait, didn’t we win the crypto wars?
  • 14. IP Network Surveillance Systems 5. A. 1. j. IP network communications surveillance systems or equipment, and specially designed components therefor, having all of the following: 1. Performing all of the following on a carrier class IP network (e.g., national grade IP backbone): ● Analysis at the application layer (e.g., Layer 7 of Open Systems Interconnection (OSI) model (ISO/IEC 7498-1)); ● Extraction of selected metadata and application content (e.g., voice, video, messages, attachments); and ● Indexing of extracted data; and 2. Being specially designed to carry out all of the following: ● Execution of searches on the basis of ‘hard selectors’; and ● Mapping of the relational network of an individual or of a group of people.
  • 15. What is “Intrusion Software?” “Software” specially designed or modified to avoid detection by ‘monitoring tools’, or to defeat ‘protective countermeasures’, of a computer or network capable device, and performing any of the following: • The extraction of data or information, from a computer or network capable device, or the modification of system or user data; or • The modification of the standard execution path of a program or process in order to allow the execution of externally provided instructions. ● ‘Monitoring tools’: “software” or hardware devices, that monitor system behaviours or processes running on a device. This includes antivirus (AV) products, end point security products, Personal Security Products (PSP), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) or firewalls. ● ‘Protective countermeasures’: techniques designed to ensure the safe execution of code, such as Data Execution Prevention (DEP), Address Space Layout Randomisation (ASLR) or sandboxing
  • 16. Is “Intrusion Software” Controlled? NO
  • 17. Then what IS controlled? 4. A. 5. Systems, equipment, and components therefore, specially designed or modified for the generation, operation or delivery of, or communication with, “Intrusion Software”. 4. D. 4. “Software” specially designed or modified for the generation, operation or delivery of, or communication with, “Intrusion Software”.
  • 18. “Technology” is also controlled 4. E. 1. c. “Technology” for the “development” of “Intrusion Software”. Technology - Specific information necessary for the “development”, “production”, or “use” of a product. The information takes the form of ‘technical data’ or ‘technical assistance’. NOTE: “Intrusion Software” itself is NOT controlled, but information necessary for the “development” of “Intrusion Software” IS controlled, including “technical data” and “technical assistance.”
  • 20. What about Full Disclosure and Open Source? 15 CFR 734.3 - The following items are not subject to the EAR: Publicly available technology and software… that: (i) Are already published or will be published as described in §734.7 of this part; (ii) Arise during, or result from, fundamental research, as described in §734.8 of this part; (iii) Are educational, as described in §734.9 of this part;
  • 21. Encryption vs. “Intrusion Software” Stuff Encryption: ● License Exception TSU ● Must be publicly available ● Must be open source ● You must email BIS and notify them Controlled Stuff related to “Intrusion Software”: ● 15 CFR 734.3(b)(4) ● Must be publicly available ● Does NOT need to be open source ● BIS does NOT need to be notified
  • 22. Is Vulnerability Research Covered? BIS, in the federal register: “Technology for the development of intrusion software includes proprietary research on the vulnerabilities and exploitation of computers and network- capable devices.” BIS, in the FAQ on their website: “The proposed rule would not control… Information about the vulnerability, including causes of the vulnerability.” BIS, also in the FAQ on their website: “Neither the disclosure of the vulnerability nor the disclosure of the exploit code would be controlled under the proposed rule.” However: “The proposed rule would control… Technical data to create a controllable exploit that can reliably and predictably defeat protective countermeasures and extract information Information on how to prepare the exploit for delivery or integrate it into a command and delivery platform.”
  • 23. Coordinated Disclosure and Bug Bounties From the BIS FAQ: “Any technical data sent to an anti-virus company or software manufacturer with the understanding that the information will be made publicly available, would not be subject to the EAR. However, "technology" that is not intended to be published would be subject to the control.”
  • 24. Planning to disclose a mitigation bypass?
  • 25. Sharing Exploit Toolkit Samples? If you discover an exploit toolkit in the wild and want to share it with other infosec professionals or software vendors across borders, apparently, this may not be allowed under the proposed rule. BIS, in their FAQ: “Exploit toolkits would be described in proposed ECCN 4D004… There are no end user or end use license exceptions in the proposed rule.”
  • 26. What about training classes? On the one hand: Technical data to create a controllable exploit that can reliably and predictably defeat protective countermeasures and extract information. Information on how to prepare the exploit for delivery or integrate it into a command and delivery platform. On the other hand, 15 CFR 734.7(a)(4): Release at an open conference, meeting, seminar, trade show, or other open gathering. (i) A conference or gathering is “open” if all technically qualified members of the public are eligible to attend and attendees are permitted to take notes or otherwise make a personal record (not necessarily a recording) of the proceedings and presentations. (ii) All technically qualified members of the public may be considered eligible to attend a conference or other gathering notwithstanding a registration fee reasonably related to cost and reflecting an intention that all interested and technically qualified persons be able to attend, or a limitation on actual attendance, as long as attendees either are the first who have applied or are selected on the basis of relevant scientific or technical competence, experience, or responsibility (See Supplement No. 1 to this part, Questions B(1) through B(6)).
  • 27. Planning to travel outside the USA? § 740.14 Baggage (BAG). (a) Scope. This License Exception authorizes individuals leaving the United States either temporarily (i.e., traveling) or longer-term (i.e., moving) and crew members of exporting or reexporting carriers to take to any destination, as personal baggage, the classes of commodities, software and technology described in this section. BIS, in the Federal Register: “No license exceptions would be available for these items, except certain provisions of License Exception GOV, e.g., exports to or on behalf of the United States Government pursuant to § 740.11(b) of the EAR.”
  • 28. What about foreign coworkers & offices? BIS, in their FAQ: “The proposed rule does not provide for any exceptions to deemed export license requirements.” BIS on “Deemed Export” - “Release of controlled technology to foreign persons in the U.S. are "deemed" to be an export to the person’s country or countries of nationality.” Also, BIS, in their FAQ: “There is no license exception for intra-company transfers or internal use by a company headquartered in the United States under the proposed rule.”
  • 29. Debuggers and exploit generators? BIS, in their FAQ: “General purpose tools, such as IDEs, are not described under proposed ECCN 4D004 because they are not "specially designed" for the generation of "intrusion software." Some penetration testing tools (FAQ #12) and exploit toolkits (FAQ #18) are described in proposed ECCN 4D004, as they are command and delivery platforms for "intrusion software."”
  • 30. Jailbreaking Software? BIS, in their FAQ: “If particular jailbreak software did meet all the requirements for classification under ECCN 4D004 (such as a commercially sold delivery tool "specially designed" to deliver jailbreaking exploits) then it would be subject to control and a license would be required to export it from the United States. Note that if such software were "publicly available," it would not be subject to the Export Administration Regulations.”
  • 31. Will I get a license? BIS, in the Federal Register: “Note that there is a policy of presumptive denial for items that have or support rootkit or zero-day exploit capabilities.” Dave Aitel: “If you are modular in any way, you facilitate 0day. An 0day is just a program after all. So anything that can execute commands or auto update is now "default deny" for export.”
  • 32. What do we do about it?
  • 33. Comment Period? At the time these slides were composed, the open comment period will close before Defcon, on July 20th, 2015. However, we anticipate that BIS may extend this comment period, or open up a new one in the future.
  • 34. Key Points: ● At least, the US has published their interpretations and asked for feedback. ○ The Wassenaar Negotiators did not. ○ Many countries in Europe have enacted this without publishing information about how they plan to interpret it. ● Regulators will probably be responsive to clear, negative impacts the regs will have on: ○ Legitimate information security research. ○ Legitimate computer security work. ○ Legitimate business activity and the economy as a whole. ● Regulators will not be responsive to vitriol or paranoid, overly broad misinterpretations of their proposed regs. ○ Its important to relate potential problems to the specific statements that regulators have made about how they interpret the regulations.
  • 35. Stay Informed: Federal Register: https://www.federalregister. gov/articles/2015/05/20/2015-11642/wassenaar-arrangement-2013-plenary- agreements-implementation-intrusion-and-surveillance-items BIS FAQ: http://www.bis.doc.gov/index.php/licensing/embassy-faq Regs list: https://lists.alchemistowl.org/mailman/listinfo/regs