SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
W
e
b
A
p
p

interview

Interview with

Yury Chemerkin
– Security Reseacher & Writer

Yury Chemerkin graduated from RSUH in 2010 (http://rggu.com/)
on the BlackBerry diploma thesis. Currently in the postgraduate
program at RSUH on the Cloud Security thesis. Experience in Reverse
Engineering, Software Programming, Cyber & Mobile Security
Research, Documentation, and as a contributing Security Writer.
Also, researching Cloud Security and Social Privacy.

How did you get into
security?

I was around 10 years old and
do not exactly remember how
it happened but there was this
one time I came upon materials discussing reverse engineering, operation systems
hacks, phreaking, etc. Most
of them were not up-to-date
considering that was 10 years
ago but something in me just
clicked like clogs of clockwork
started turning. Some years
past but the interest lingered
on. Soon after I knew I had to
start some practice around reverse engineering using old
Microsoft versions such as
Win95SE2 or Win98. It was
a strong requirement for SoftIce and I found a good manual
on how to use this software on
Windows XP SP1. A bit later,
I found ways to use virtualization tools like Virtual Box but I
still prefer to deal with real instances. First tutorials cover
10/2012(10)

Page 62

http://pentestmag.com
W
e
b
A
p
p

ideas on how to bypass implemented registration
methods in any kind of software. It was a bit strange
but it was easy to crack real programs using ‘TheBat!’ rather than one of the so-called crackmes.
Nowadays you won’t see or hear that except on rare web sites such as WASM.RU and CRACKL@B.
RU. While I’m researching how to find serial numbers or how to make a patch to bypass security,
I also learned what a (dis-)assembler looks like.
I studied several programming languages such as
C++ Builder and Pascal/Delphi because they have
the most suitable GUI for easy developing and an
ability to implement assembler instructions. Also, I
studied cryptography (RSA, and other asymmetric
scheme). I spent the first three years this way and
then I continued to improve on my experience by
getting involved in development of different areas:
a security email infrastructure and RFID systems.
First, my experience grew around mobile developing on.NET and refactoring the existence systems
and programming. Second, I developed some improvements around drivers having access to hybrid-hardware RFID (mix Wi-Fi and serial ports like
COM and USB) to release final product. It was a
commercial and academic product at the same
time and belonged to our “Technical and Engineering Security” sub-department of RSUH. A lyrical digression, The Russian State University for the Humanities (RSUH) is an educational institution that
trains specialists in all areas of knowledge in the
humanities and not only humanities. RSUH has
an Institute for Information Sciences and Security
Technologies (IISST). The first Infosecurity faculty
was founded in Moscow State Institute of History
and Archive Materials in 1985. As it was not related
to any military training colleges, it was considered
the faculty of specialized documents up to 1990.
Nowadays it is an integrated part of the Institute
of Information Sciences and Security Technologies
within the RSUH.
The last 1.5 years towards the Uni diploma, I had
worked at several companies and I had experience in scumware, documentation, and presentation. Most known is the Kaspersky Lab that is a
dynamically growing company that offers its employees a broad range of options for career development. I cannot say that in this company people come first because any much-heralded policy
gives chance to everything to be known by everyone. Anyways, I gained wide experience in scumware research during several months in Kaspersky
Lab only. I got missing valuables to reassemble my
10/2012(10)

vision about low-level security world. With second
lyrical digression, I wanted to change my mobile
device and this why I used BlackBerry as a very interesting platform. BlackBerry is a unique device,
although you do not have enough control to make
the right security policies if you are a BES customer even. AWS (Amazon Web Service) is the best
among of them because you can build your custom policy where each API-method meets the policy restriction. For example, BlackBerry blocks any
attempts to extract sensitive data from the buffer
while the BlackBerry Wallet or Password Keeper
is running but you can just minimize these applications and data will be extracted successfully and
easily! It was an idea from my report at the InfoSecurityRussia 2011 conference in Moscow where I
was a Hakin9 representative. A similar idea moved
to the forensics and was a key of InfoSecurityRussia 2012.
Now I am involved in legal defense (EU & RU) on
the Cloud Security and BlackBerry rather than technical solutions for them. The last several years, I
have worked on mobile social security, cloud security and compliance; mobile security and forensics;
additionally developing solutions based on exploiting, not only OS vulnerabilities but also third-party
products and solutions.

If security is so important, why are
there so many vulnerabilities in popular
products like Adobe?

Unfortunately, compliance wins. It wins in banking, healthcare, and anywhere that a company is
required to run semi-annual or annual penetration
testing. Compliance is a minimal set of security requirements (if your application is non-compliant,
it cannot be safely trusted and unlikely to be secure). Therefore, the companies rarely care about
security. They care about compliance. As we all
know – compliance does not equal security. Audit standards are worthless when you compare the
requirements of security compliance to the common basic techniques and problems that hackers
look for in applications. The basic requirements in
compliance cannot cover the full range of potential
security issues because there are just too many
variations in applications. Compliance rarely talks
about security even. Compliance regulations are
frankly awful. Penetration testing may not be the
answer to security either. One example is that after a penetration test where many important security holes were found, a full detailed report may be

Page 63

http://pentestmag.com
W
e
b
A
p
p

interview

a bad idea because the company might not have
enough money to fix all issues and therefore become discouraged. The company might have an
initial interest to be pentested for the top 10 or 20
vulnerabilities, but because these vulnerabilities
change each year, and the cost of constantly fixing
the vulnerabilities once reported may be too much.
The company may opt to have pentesting done
less frequently. Most companies do not have the
immense resources of Microsoft and cannot setup
a frequent critical patching system – they can only
release vulnerability fixes during their regular release update cycle. You do not care about what the
penetration tester reports on in this case, you are
still vulnerable until the next annual release.

Despite the issues, are there enough
pentesting services in Russia to handle
the market demand?

Of course. Russia houses several professional
and customized pentesting services. However,
when you look deeper at the specific services offered there are fewer options when you split the
audit from penetration testing services. However,
it is an interesting way to advertise advanced skills
and a higher pay-rate if your penetration testers
can break into SAP (Systems, Applications and
Products) – this becomes a full range, more valuable service.

What are the main areas covered by
Russian custom pentesting services?

The basics are covered like PCs, networks, and
web applications but when you move into much
more recent technologies such as mobile, social
engineering, cloud or similar, the pentesting services are much weaker. Cloud services are excluded because of the lack of experience. Audit
standards are weak mainly because of the lack of
knowledge of regulation outside of Russia. I know
only of one company who offers security and personal data compliance in the cloud while other pentesting companies prefer to dispute what is right or
wrong. Social engineering testing is also excluded
for the same reason while mobile pentesting services cannot be included because rarely do you
see a privately implemented MDM (a mobile device management solution that combines datadriven mobile device management and application
management with smartphone and tablet security)
solutions. In the absence of MDM, mobile penetration testing looks like a USB flash drive penetration
10/2012(10)

testing especially when email is not used on mobile
devices. Many vendors are touting this as a new
problem but they do that simply to promote and
sell their products. Professionals have been dealing with information security for 30-40 years that
has led to the access of matrix model/control lists,
public key cryptography, and more. For example,
Kaspersky Labs often says that Android has many
security issues but that Android has a great future.
In other words, Android has a future because it is
easier to build and implement security solutions
for Android than for any other mobile device. Another example, mobile devices present a sandbox
and other NEW SECURITY SOLUTIONS that do
not work because the user has to store his data
in shared folders accessed by any application (the
sandbox protects only application data not user
data). Not one of the users is ready to use certain
applications to keep data in the sandbox’s folders
for only one reason- he will likely have a problem
restoring and accessing the data later. Exceptions
to the rule exists, I am sure.

Is pentesting worth it?

Penetration testing is about someone legally trying
to break into your system and help you then plug
the security holes. Penetration testers may be able
to demonstrate that the company’s security is awful. Sometimes the "consultant effect" takes place
– no one listens to employees but they will listen
to the expensive consultant who comes in from the
outside and says the same thing.
The company should already have security designed and implemented. Moreover, when they
perform specific functions they have to validate that
they perform true to their design. Penetration testing is a look into your infrastructure that was previously viewed as something that was unknown,
huge, and complex. Nevertheless, the pentester
reveals many previous unknown issues about potential backdoors or Wi-Fi weaknesses, infected
PCs and mobiles, etc. It is a test that should be
performed every week or month before and after
implementation. Therefore, it works only for compilation. If a company has a poor security design
then patching may make sense only for compilation again not for improving and fixing security.

Page 64

by PenTest Team

http://pentestmag.com

Mais conteúdo relacionado

Destaque

Gianluca & jake changes to planning
Gianluca & jake changes to planningGianluca & jake changes to planning
Gianluca & jake changes to planninggmisso33
 
My Flippts
My FlipptsMy Flippts
My FlipptsSoloten
 
NU Research Report #2
NU Research Report #2NU Research Report #2
NU Research Report #2Drew West
 
(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013STO STRATEGY
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensicsSTO STRATEGY
 
Digital Accessibility: Tips From the Met App Case Study @ MCN 2015
Digital Accessibility: Tips From the Met App Case Study @ MCN 2015Digital Accessibility: Tips From the Met App Case Study @ MCN 2015
Digital Accessibility: Tips From the Met App Case Study @ MCN 2015Liz Filardi
 

Destaque (7)

Gianluca & jake changes to planning
Gianluca & jake changes to planningGianluca & jake changes to planning
Gianluca & jake changes to planning
 
Vestidos de papel
Vestidos de papelVestidos de papel
Vestidos de papel
 
My Flippts
My FlipptsMy Flippts
My Flippts
 
NU Research Report #2
NU Research Report #2NU Research Report #2
NU Research Report #2
 
(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensics
 
Digital Accessibility: Tips From the Met App Case Study @ MCN 2015
Digital Accessibility: Tips From the Met App Case Study @ MCN 2015Digital Accessibility: Tips From the Met App Case Study @ MCN 2015
Digital Accessibility: Tips From the Met App Case Study @ MCN 2015
 

Mais de STO STRATEGY

(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013STO STRATEGY
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013STO STRATEGY
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013STO STRATEGY
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013STO STRATEGY
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedingsSTO STRATEGY
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013STO STRATEGY
 
(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013STO STRATEGY
 
(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013STO STRATEGY
 
(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013STO STRATEGY
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013STO STRATEGY
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedingsSTO STRATEGY
 
(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013STO STRATEGY
 
(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013STO STRATEGY
 
(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012STO STRATEGY
 
Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012STO STRATEGY
 
(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011STO STRATEGY
 
Pen test career. how to begin
Pen test career. how to beginPen test career. how to begin
Pen test career. how to beginSTO STRATEGY
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesSTO STRATEGY
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiSTO STRATEGY
 

Mais de STO STRATEGY (20)

(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013
 
(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013
 
(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013
 
(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings
 
(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013
 
(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013
 
(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012
 
Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012
 
(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011
 
Pen test career. how to begin
Pen test career. how to beginPen test career. how to begin
Pen test career. how to begin
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 

Último

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Interview

  • 1.
  • 2. W e b A p p interview Interview with Yury Chemerkin – Security Reseacher & Writer Yury Chemerkin graduated from RSUH in 2010 (http://rggu.com/) on the BlackBerry diploma thesis. Currently in the postgraduate program at RSUH on the Cloud Security thesis. Experience in Reverse Engineering, Software Programming, Cyber & Mobile Security Research, Documentation, and as a contributing Security Writer. Also, researching Cloud Security and Social Privacy. How did you get into security? I was around 10 years old and do not exactly remember how it happened but there was this one time I came upon materials discussing reverse engineering, operation systems hacks, phreaking, etc. Most of them were not up-to-date considering that was 10 years ago but something in me just clicked like clogs of clockwork started turning. Some years past but the interest lingered on. Soon after I knew I had to start some practice around reverse engineering using old Microsoft versions such as Win95SE2 or Win98. It was a strong requirement for SoftIce and I found a good manual on how to use this software on Windows XP SP1. A bit later, I found ways to use virtualization tools like Virtual Box but I still prefer to deal with real instances. First tutorials cover 10/2012(10) Page 62 http://pentestmag.com
  • 3. W e b A p p ideas on how to bypass implemented registration methods in any kind of software. It was a bit strange but it was easy to crack real programs using ‘TheBat!’ rather than one of the so-called crackmes. Nowadays you won’t see or hear that except on rare web sites such as WASM.RU and CRACKL@B. RU. While I’m researching how to find serial numbers or how to make a patch to bypass security, I also learned what a (dis-)assembler looks like. I studied several programming languages such as C++ Builder and Pascal/Delphi because they have the most suitable GUI for easy developing and an ability to implement assembler instructions. Also, I studied cryptography (RSA, and other asymmetric scheme). I spent the first three years this way and then I continued to improve on my experience by getting involved in development of different areas: a security email infrastructure and RFID systems. First, my experience grew around mobile developing on.NET and refactoring the existence systems and programming. Second, I developed some improvements around drivers having access to hybrid-hardware RFID (mix Wi-Fi and serial ports like COM and USB) to release final product. It was a commercial and academic product at the same time and belonged to our “Technical and Engineering Security” sub-department of RSUH. A lyrical digression, The Russian State University for the Humanities (RSUH) is an educational institution that trains specialists in all areas of knowledge in the humanities and not only humanities. RSUH has an Institute for Information Sciences and Security Technologies (IISST). The first Infosecurity faculty was founded in Moscow State Institute of History and Archive Materials in 1985. As it was not related to any military training colleges, it was considered the faculty of specialized documents up to 1990. Nowadays it is an integrated part of the Institute of Information Sciences and Security Technologies within the RSUH. The last 1.5 years towards the Uni diploma, I had worked at several companies and I had experience in scumware, documentation, and presentation. Most known is the Kaspersky Lab that is a dynamically growing company that offers its employees a broad range of options for career development. I cannot say that in this company people come first because any much-heralded policy gives chance to everything to be known by everyone. Anyways, I gained wide experience in scumware research during several months in Kaspersky Lab only. I got missing valuables to reassemble my 10/2012(10) vision about low-level security world. With second lyrical digression, I wanted to change my mobile device and this why I used BlackBerry as a very interesting platform. BlackBerry is a unique device, although you do not have enough control to make the right security policies if you are a BES customer even. AWS (Amazon Web Service) is the best among of them because you can build your custom policy where each API-method meets the policy restriction. For example, BlackBerry blocks any attempts to extract sensitive data from the buffer while the BlackBerry Wallet or Password Keeper is running but you can just minimize these applications and data will be extracted successfully and easily! It was an idea from my report at the InfoSecurityRussia 2011 conference in Moscow where I was a Hakin9 representative. A similar idea moved to the forensics and was a key of InfoSecurityRussia 2012. Now I am involved in legal defense (EU & RU) on the Cloud Security and BlackBerry rather than technical solutions for them. The last several years, I have worked on mobile social security, cloud security and compliance; mobile security and forensics; additionally developing solutions based on exploiting, not only OS vulnerabilities but also third-party products and solutions. If security is so important, why are there so many vulnerabilities in popular products like Adobe? Unfortunately, compliance wins. It wins in banking, healthcare, and anywhere that a company is required to run semi-annual or annual penetration testing. Compliance is a minimal set of security requirements (if your application is non-compliant, it cannot be safely trusted and unlikely to be secure). Therefore, the companies rarely care about security. They care about compliance. As we all know – compliance does not equal security. Audit standards are worthless when you compare the requirements of security compliance to the common basic techniques and problems that hackers look for in applications. The basic requirements in compliance cannot cover the full range of potential security issues because there are just too many variations in applications. Compliance rarely talks about security even. Compliance regulations are frankly awful. Penetration testing may not be the answer to security either. One example is that after a penetration test where many important security holes were found, a full detailed report may be Page 63 http://pentestmag.com
  • 4. W e b A p p interview a bad idea because the company might not have enough money to fix all issues and therefore become discouraged. The company might have an initial interest to be pentested for the top 10 or 20 vulnerabilities, but because these vulnerabilities change each year, and the cost of constantly fixing the vulnerabilities once reported may be too much. The company may opt to have pentesting done less frequently. Most companies do not have the immense resources of Microsoft and cannot setup a frequent critical patching system – they can only release vulnerability fixes during their regular release update cycle. You do not care about what the penetration tester reports on in this case, you are still vulnerable until the next annual release. Despite the issues, are there enough pentesting services in Russia to handle the market demand? Of course. Russia houses several professional and customized pentesting services. However, when you look deeper at the specific services offered there are fewer options when you split the audit from penetration testing services. However, it is an interesting way to advertise advanced skills and a higher pay-rate if your penetration testers can break into SAP (Systems, Applications and Products) – this becomes a full range, more valuable service. What are the main areas covered by Russian custom pentesting services? The basics are covered like PCs, networks, and web applications but when you move into much more recent technologies such as mobile, social engineering, cloud or similar, the pentesting services are much weaker. Cloud services are excluded because of the lack of experience. Audit standards are weak mainly because of the lack of knowledge of regulation outside of Russia. I know only of one company who offers security and personal data compliance in the cloud while other pentesting companies prefer to dispute what is right or wrong. Social engineering testing is also excluded for the same reason while mobile pentesting services cannot be included because rarely do you see a privately implemented MDM (a mobile device management solution that combines datadriven mobile device management and application management with smartphone and tablet security) solutions. In the absence of MDM, mobile penetration testing looks like a USB flash drive penetration 10/2012(10) testing especially when email is not used on mobile devices. Many vendors are touting this as a new problem but they do that simply to promote and sell their products. Professionals have been dealing with information security for 30-40 years that has led to the access of matrix model/control lists, public key cryptography, and more. For example, Kaspersky Labs often says that Android has many security issues but that Android has a great future. In other words, Android has a future because it is easier to build and implement security solutions for Android than for any other mobile device. Another example, mobile devices present a sandbox and other NEW SECURITY SOLUTIONS that do not work because the user has to store his data in shared folders accessed by any application (the sandbox protects only application data not user data). Not one of the users is ready to use certain applications to keep data in the sandbox’s folders for only one reason- he will likely have a problem restoring and accessing the data later. Exceptions to the rule exists, I am sure. Is pentesting worth it? Penetration testing is about someone legally trying to break into your system and help you then plug the security holes. Penetration testers may be able to demonstrate that the company’s security is awful. Sometimes the "consultant effect" takes place – no one listens to employees but they will listen to the expensive consultant who comes in from the outside and says the same thing. The company should already have security designed and implemented. Moreover, when they perform specific functions they have to validate that they perform true to their design. Penetration testing is a look into your infrastructure that was previously viewed as something that was unknown, huge, and complex. Nevertheless, the pentester reveals many previous unknown issues about potential backdoors or Wi-Fi weaknesses, infected PCs and mobiles, etc. It is a test that should be performed every week or month before and after implementation. Therefore, it works only for compilation. If a company has a poor security design then patching may make sense only for compilation again not for improving and fixing security. Page 64 by PenTest Team http://pentestmag.com