SlideShare uma empresa Scribd logo
1 de 53
Baixar para ler offline
BOSTON 10-11
SEPT 2018
Busted Computing
Conor Walsh
Busted Computing
Analyzing the Console Gaming Threat Model
DevSecCon Boston 2018
Conor Walsh
September, 2018
$whoami
● Conor Walsh
● Lodestone Security LLC
○ Principal Security Engineer, Head of R&D
● Modding since ‘95
○ Aware of it since ‘00
● Previous Employment
2
Agenda
Lodestone Security LLC
● HQ: Westport, CT
● Information Security Professional Services Firm
● Founded in Jan 2017 by Beazley Plc
○ London-based insurance provider
3
Agenda
4
Agenda
$$$$
5
Agenda
Why Video Game Security?
● Game consoles were some of the first “IoT”
● Trusted Computing is everywhere
○ IoT, Medical devices, ICS/SCADA
● Concepts apply to all execution stacks
● Video Games are awesome!
○ Massive, complex, distributed, resource intensive
○ Modding can be both harmful, and awesome!
6
Agenda
Why?
7
Agenda
Agenda
● Gaming Threat Landscape
● Defining Trusted Computing
● Console Gaming Threat Modelling
● Looking to the Future
● Solving The Problem
8
Agenda
Gaming Threat Landscape
9
Who Are They?
Establishing our lexicon…
● ‘Mod’, ‘Modding’
○ Modifying the physical or logical aspects of a game system
● Modder
○ An individual who ‘mods’
■ Not a hacker
○ Includes producers and users
● Not all games are considered equal
○ Focused on consoles today
○ Massively Multiplayer Online Games
○ Sony, Microsoft specifically
10
Threat Landscape
What Do They Want?
● Free Games
● #Winning
● Notoriety
● Profit
11
Threat Landscape
How Do They Do This?
● 80/20 rule
● ‘SPT’ - Simple Persistent Threat
● Operating in public
● Reputation, and respect thereof, plays a major role
12
Threat Landscape
Where Are They?
● Forums, Websites
○ Next Gen Update
○ Se7ensins
○ Multiplayer Gaming Hacking
○ Ps3Hax
○ Many more...
● Chat Groups
○ IRC
○ Slack
○ Skype
○ Discord
13
Threat Landscape
David v. Goliath
14
Threat Landscape
● Gaming == Safe Zone
● MMO: Active user account -> User experience
Histories’ first reported critical hit.
Sony v. George “Geohot” Hotz
15
Threat Landscape
● January 26, 2010
○ Hotz releases first PS3 jailbreak
● March 28, 2010
○ Sony releases firmware update
● December 29, 2010
○ fail0verflow presents PS3 exploit developments at CCC
● January 2, 2011
○ Hotz posts PS3 root keys on website
● January 11, 2011
○ Sony sues Hotz and others
● Then…...
Anon?
16
Threat Landscape
Is Sony Down?
17
Threat Landscape
We discovered that the intruders had planted a file on one of our
Sony Online Entertainment servers named “Anonymous” with the
words “We are Legion.”
-Patrick Seybold, Sr. Director, Corporate Communications & Social Media
Fighting Your Customers
18
Threat Landscape
● Blades in the crowd
● Not everyone is a pirate
● Signal in the Data in the Noise
○ False Positives more severe!
● Security vs Usability
Trusted Computing
19
Trusted Computing
With Trusted Computing, the computer will consistently behave in
expected ways, and those behaviors will be enforced by computer
hardware and software.
20
Trusted Computing
Trusted Computing (cont.)
21
Trusted Computing
● Internet of Things (IoT)
● Medical Devices
● Industrial Control Systems (ICS)
● Payment Processing Systems (PCI)
Mobile Computing
22
Trusted Computing
● Application Sandboxing
● Trusted Application Sources
● Restricted User Interface
● OWASP Mobile Top-10
○ M1: Improper Platform Usage
○ M2: Insecure Data Storage
○ M3: Insecure Communication
○ M4: Insecure Authentication
○ M5: Insufficient Cryptography
○ M6: Insecure Authorization
○ M9: Reverse Engineering
○ M10: Extraneous Functionality
Video Game Consoles
● Restricted user interface
● Signed Physical Media and Binaries
○ By 1st Party (Sony, MS)
● Peer-based network sessions
○ 1st Party handles QoS, sessioning
○ Peer chosen as session “Host”
○ Devs may employ game service API
● Network Session State
○ All must agree
○ One conclusion must be reached...
23
Trusted Computing
Developer Consoles
● Powerful, unlocked hardware
● Unrestricted user interface
● No code signing required
● Platform SDK’s and Tools
● Can sometimes disappear...
○ Just like my socks
24
Trusted Computing
Console Exploits and Modifications
● Hardware
○ Disk drive emulators - xk3y, 3k3y (X360, PS3)
○ Joint Test Action Group (JTAG) Interfaces (X360)
○ Reset Glitch Hack (RGH) (X360)
● Software
○ PS3 Firmware version 3.55 Exploits
■ CEX, DEX, Rebug, Rogero, etc.
○ Xenon Linux Loader (Xell) (X360)
○ Xecuter Fusion (X360)
25
Trusted Computing
Modder Recap
What We’ve Covered So Far
● Modders are many, relentless, and not always $$ driven
● Finding and stopping them is hard
● Trusted Computing is a security control, but not perfect
● The tools available allow the user developer-level access
○ Just like on a PC!
26
Busted Computing
Console Gaming Threat Model
27
Console Threat Model
28
Threat Model
Hold on...
Attack Vectors
● File Modification
○ “ISO Modding”
○ Editing static files found on disk
○ Low barrier to entry
● Binary Patching
○ Modifying instructions of executable
○ “Crack” - DRM bypass
○ Higher complexity
29
Threat Model
Attack Vectors
● Memory Manipulation
○ R/W memory of game process
○ API’s expose RAM to companion PC
■ TMAPI, CCAPI (PS3)
■ Xbox Neighborhood, XMDB (X360)
● Process Injection
○ Mimics DLL injection
○ SPRX (PS3), XEX (X360)
○ Complex to produce
○ High portability
30
Threat Model
● Business Logic (Scripting)
○ Games employ scripting engines
■ Lua, Python, Perl, home grown, etc.
○ Updates without compilation
○ Stored, consumed in plaintext
○ “Sideload” custom script files
○ Forwards compatibility
○ Strap on your own interpreter
Attack Vectors
31
Threat Model
● Script file extension for CoD Games
○ At least as far back as CoD:MW (2007)
● Rendered in plaintext
○ Community made GSC editors available
● API extensively documented by Modders
GSC Scripting
32
Threat Model
33
Threat Model
34
Threat Model
Attack Vectors
● API Server Attacks
○ Standard Web-service AppSec
● Peer-based Attacks
○ Console peer-to-peer channels
■ Communicated over UDP
■ Not encrypted by default
■ Little modder focus
○ Denial of Service attacks
35
Threat Model
Network Attacks
● Charles Proxy
● MS DoS Notice
36
Threat Model
Into The Future
37
XboxOne
● Hyper-V-based Hypervisor OS
○ Windows 10, Metro-UI Based Environment
○ Xenon (Xbox) processes run in separate sandbox
○ Public developer program
● Exploit released, then patched
○ Based on MS Edge exploits; ‘Chakra’
38
Into the Future
PlayStation 4
● FreeBSD-based OS
● PS4 SDK leaked to the public
● ‘CTurt’ discovers Webkit exploit
○ Releases ‘PS4-Playground’ toolkit
39
Into the Future
Then vs Now
● Now: MS Edge, Webkit, SDK
● Then: JTAG, RGH, E3 Flasher
40
Into the Future
SSL Certificate Hunter
● SSL Certificate Pinning
○ Hard-set certificate for a client to expect
41
Into the Future
Solving the Problem
42
What can we do?
43
Solving the Problem
● Fight the Good Fight
○ Security for Breakfast
○ Security in Layers
○ Player Profile
○ It’s a Game
○ Build Your Tool Set
○ Another Perspective
● Not Just Video Games!
Security for Breakfast
● Address security from the start
○ Cheaper, faster and easier
● Threat Modeling
● Cook in your session state
44
Solving the Problem
Security in Layers
● Trust Boundaries
● User Data
○ Input Validation
○ Output Sanitization
● All the things, everywhere, everytime
45
Solving the Problem
Player Profile
● Assumption: player data is already being collected
● One log to rule them all
● Behavior Profiling
● Piggyback on what’s exists
○ Or, build your own
46
Solving the Problem
It’s a Game
● Keep it fun
● Aim for perfect; Accept reality
● Old tricks, new label
47
Solving the Problem
Man is a tool-using animal. Without tools he is nothing, with tools he is all
-Thomas Carlyle
● Don’t bring malware home to see mom
● Build into your environment
● Start simple
● Use what’s available
● Build a team
Build Your Tool Set
48
Solving the Problem
Another Perspective
● Builders can’t assess their own work
○ Just like QA or AppSec
● Good developers fix the issues they find
○ It’s the ones they didn’t see...
● A Dev, QA, and a Hacker walk into a bar...
● Hired guns
○ [SHAMELESS SELF PLUG]
49
Solving the Problem
Fight the Good Fight
● Security for Breakfast
● Security in Layers
● Player Profile
● It’s a Game
● Build a Toolset
● Another Perspective
50
Solving the Problem
Tell Them Goodbye
51
Questions?
52
Goodbye
● conor@lodestonesecurity.com
● https://github.com/myfoostrong/busted-comp-preso
● Twitter: @drtrik

Mais conteúdo relacionado

Semelhante a DevSecCon Boston 2018: Busted computing by Conor Walsh

An Introduction to Game Programming with Flash: Kinect
An Introduction to Game Programming with Flash: KinectAn Introduction to Game Programming with Flash: Kinect
An Introduction to Game Programming with Flash: KinectKrzysztof Opałka
 
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.hacktivity
 
Don't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesDon't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesMichael Scovetta
 
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018Mender.io
 
Iot development from prototype to production
Iot development from prototype to productionIot development from prototype to production
Iot development from prototype to productionMender.io
 
Pen Testing Development
Pen Testing DevelopmentPen Testing Development
Pen Testing DevelopmentCTruncer
 
Linux IoT Botnet Wars - ESC Boston 2018
Linux IoT Botnet Wars - ESC Boston 2018Linux IoT Botnet Wars - ESC Boston 2018
Linux IoT Botnet Wars - ESC Boston 2018Mender.io
 
IoT Development from Prototype to Production
IoT Development from Prototype to ProductionIoT Development from Prototype to Production
IoT Development from Prototype to ProductionMender.io
 
Optimizing Unity games for mobile devices
Optimizing Unity games for mobile devicesOptimizing Unity games for mobile devices
Optimizing Unity games for mobile devicesBruno Cicanci
 
Beat Your Mom At Solitaire—Reverse Engineering of Computer Games
Beat Your Mom At Solitaire—Reverse Engineering of Computer GamesBeat Your Mom At Solitaire—Reverse Engineering of Computer Games
Beat Your Mom At Solitaire—Reverse Engineering of Computer GamesChristoph Matthies
 
GDD 2011 - How to build kick ass video games for the cloud
GDD 2011 - How to build kick ass video games for the cloudGDD 2011 - How to build kick ass video games for the cloud
GDD 2011 - How to build kick ass video games for the cloudChris Schalk
 
Voxxed Days Villnius 2015 - Burning Marshmallows
Voxxed Days Villnius 2015 - Burning MarshmallowsVoxxed Days Villnius 2015 - Burning Marshmallows
Voxxed Days Villnius 2015 - Burning MarshmallowsRon Munitz
 
PRESENTATION ON Game Engine
PRESENTATION ON Game EnginePRESENTATION ON Game Engine
PRESENTATION ON Game EngineDiksha Bhargava
 
Building game cloud with python
Building game cloud with pythonBuilding game cloud with python
Building game cloud with pythonElmn Huang
 
DEF CON 23 - Zack Allen and Rusty Bower - malware in gaming
DEF CON 23 - Zack Allen and Rusty Bower - malware in gamingDEF CON 23 - Zack Allen and Rusty Bower - malware in gaming
DEF CON 23 - Zack Allen and Rusty Bower - malware in gamingFelipe Prado
 
Castle Game Engine and the joy of making and using a custom game engine
Castle Game Engine and the joy  of making and using a custom game engineCastle Game Engine and the joy  of making and using a custom game engine
Castle Game Engine and the joy of making and using a custom game engineMichalis Kamburelis
 

Semelhante a DevSecCon Boston 2018: Busted computing by Conor Walsh (20)

Indie Game Development Intro
Indie Game Development IntroIndie Game Development Intro
Indie Game Development Intro
 
An Introduction to Game Programming with Flash: Kinect
An Introduction to Game Programming with Flash: KinectAn Introduction to Game Programming with Flash: Kinect
An Introduction to Game Programming with Flash: Kinect
 
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.
 
Don't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesDon't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade Machines
 
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
 
I Develop Videogames
I Develop VideogamesI Develop Videogames
I Develop Videogames
 
Iot development from prototype to production
Iot development from prototype to productionIot development from prototype to production
Iot development from prototype to production
 
Pen Testing Development
Pen Testing DevelopmentPen Testing Development
Pen Testing Development
 
Linux IoT Botnet Wars - ESC Boston 2018
Linux IoT Botnet Wars - ESC Boston 2018Linux IoT Botnet Wars - ESC Boston 2018
Linux IoT Botnet Wars - ESC Boston 2018
 
IoT Development from Prototype to Production
IoT Development from Prototype to ProductionIoT Development from Prototype to Production
IoT Development from Prototype to Production
 
GP Intro.pptx
GP Intro.pptxGP Intro.pptx
GP Intro.pptx
 
Optimizing Unity games for mobile devices
Optimizing Unity games for mobile devicesOptimizing Unity games for mobile devices
Optimizing Unity games for mobile devices
 
Beat Your Mom At Solitaire—Reverse Engineering of Computer Games
Beat Your Mom At Solitaire—Reverse Engineering of Computer GamesBeat Your Mom At Solitaire—Reverse Engineering of Computer Games
Beat Your Mom At Solitaire—Reverse Engineering of Computer Games
 
GDD 2011 - How to build kick ass video games for the cloud
GDD 2011 - How to build kick ass video games for the cloudGDD 2011 - How to build kick ass video games for the cloud
GDD 2011 - How to build kick ass video games for the cloud
 
IT in 2017
IT in 2017IT in 2017
IT in 2017
 
Voxxed Days Villnius 2015 - Burning Marshmallows
Voxxed Days Villnius 2015 - Burning MarshmallowsVoxxed Days Villnius 2015 - Burning Marshmallows
Voxxed Days Villnius 2015 - Burning Marshmallows
 
PRESENTATION ON Game Engine
PRESENTATION ON Game EnginePRESENTATION ON Game Engine
PRESENTATION ON Game Engine
 
Building game cloud with python
Building game cloud with pythonBuilding game cloud with python
Building game cloud with python
 
DEF CON 23 - Zack Allen and Rusty Bower - malware in gaming
DEF CON 23 - Zack Allen and Rusty Bower - malware in gamingDEF CON 23 - Zack Allen and Rusty Bower - malware in gaming
DEF CON 23 - Zack Allen and Rusty Bower - malware in gaming
 
Castle Game Engine and the joy of making and using a custom game engine
Castle Game Engine and the joy  of making and using a custom game engineCastle Game Engine and the joy  of making and using a custom game engine
Castle Game Engine and the joy of making and using a custom game engine
 

Mais de DevSecCon

DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon
 
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon
 
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon
 
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon
 
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon
 
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon
 

Mais de DevSecCon (20)

DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
 
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
 
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
 
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
 
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
 
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for Kubernetes
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heel
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificates
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOps
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

DevSecCon Boston 2018: Busted computing by Conor Walsh

  • 1. BOSTON 10-11 SEPT 2018 Busted Computing Conor Walsh
  • 2. Busted Computing Analyzing the Console Gaming Threat Model DevSecCon Boston 2018 Conor Walsh September, 2018
  • 3. $whoami ● Conor Walsh ● Lodestone Security LLC ○ Principal Security Engineer, Head of R&D ● Modding since ‘95 ○ Aware of it since ‘00 ● Previous Employment 2 Agenda
  • 4. Lodestone Security LLC ● HQ: Westport, CT ● Information Security Professional Services Firm ● Founded in Jan 2017 by Beazley Plc ○ London-based insurance provider 3 Agenda
  • 7. Why Video Game Security? ● Game consoles were some of the first “IoT” ● Trusted Computing is everywhere ○ IoT, Medical devices, ICS/SCADA ● Concepts apply to all execution stacks ● Video Games are awesome! ○ Massive, complex, distributed, resource intensive ○ Modding can be both harmful, and awesome! 6 Agenda
  • 9. Agenda ● Gaming Threat Landscape ● Defining Trusted Computing ● Console Gaming Threat Modelling ● Looking to the Future ● Solving The Problem 8 Agenda
  • 11. Who Are They? Establishing our lexicon… ● ‘Mod’, ‘Modding’ ○ Modifying the physical or logical aspects of a game system ● Modder ○ An individual who ‘mods’ ■ Not a hacker ○ Includes producers and users ● Not all games are considered equal ○ Focused on consoles today ○ Massively Multiplayer Online Games ○ Sony, Microsoft specifically 10 Threat Landscape
  • 12. What Do They Want? ● Free Games ● #Winning ● Notoriety ● Profit 11 Threat Landscape
  • 13. How Do They Do This? ● 80/20 rule ● ‘SPT’ - Simple Persistent Threat ● Operating in public ● Reputation, and respect thereof, plays a major role 12 Threat Landscape
  • 14. Where Are They? ● Forums, Websites ○ Next Gen Update ○ Se7ensins ○ Multiplayer Gaming Hacking ○ Ps3Hax ○ Many more... ● Chat Groups ○ IRC ○ Slack ○ Skype ○ Discord 13 Threat Landscape
  • 15. David v. Goliath 14 Threat Landscape ● Gaming == Safe Zone ● MMO: Active user account -> User experience Histories’ first reported critical hit.
  • 16. Sony v. George “Geohot” Hotz 15 Threat Landscape ● January 26, 2010 ○ Hotz releases first PS3 jailbreak ● March 28, 2010 ○ Sony releases firmware update ● December 29, 2010 ○ fail0verflow presents PS3 exploit developments at CCC ● January 2, 2011 ○ Hotz posts PS3 root keys on website ● January 11, 2011 ○ Sony sues Hotz and others ● Then…...
  • 18. Is Sony Down? 17 Threat Landscape We discovered that the intruders had planted a file on one of our Sony Online Entertainment servers named “Anonymous” with the words “We are Legion.” -Patrick Seybold, Sr. Director, Corporate Communications & Social Media
  • 19. Fighting Your Customers 18 Threat Landscape ● Blades in the crowd ● Not everyone is a pirate ● Signal in the Data in the Noise ○ False Positives more severe! ● Security vs Usability
  • 21. Trusted Computing With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by computer hardware and software. 20 Trusted Computing
  • 22. Trusted Computing (cont.) 21 Trusted Computing ● Internet of Things (IoT) ● Medical Devices ● Industrial Control Systems (ICS) ● Payment Processing Systems (PCI)
  • 23. Mobile Computing 22 Trusted Computing ● Application Sandboxing ● Trusted Application Sources ● Restricted User Interface ● OWASP Mobile Top-10 ○ M1: Improper Platform Usage ○ M2: Insecure Data Storage ○ M3: Insecure Communication ○ M4: Insecure Authentication ○ M5: Insufficient Cryptography ○ M6: Insecure Authorization ○ M9: Reverse Engineering ○ M10: Extraneous Functionality
  • 24. Video Game Consoles ● Restricted user interface ● Signed Physical Media and Binaries ○ By 1st Party (Sony, MS) ● Peer-based network sessions ○ 1st Party handles QoS, sessioning ○ Peer chosen as session “Host” ○ Devs may employ game service API ● Network Session State ○ All must agree ○ One conclusion must be reached... 23 Trusted Computing
  • 25. Developer Consoles ● Powerful, unlocked hardware ● Unrestricted user interface ● No code signing required ● Platform SDK’s and Tools ● Can sometimes disappear... ○ Just like my socks 24 Trusted Computing
  • 26. Console Exploits and Modifications ● Hardware ○ Disk drive emulators - xk3y, 3k3y (X360, PS3) ○ Joint Test Action Group (JTAG) Interfaces (X360) ○ Reset Glitch Hack (RGH) (X360) ● Software ○ PS3 Firmware version 3.55 Exploits ■ CEX, DEX, Rebug, Rogero, etc. ○ Xenon Linux Loader (Xell) (X360) ○ Xecuter Fusion (X360) 25 Trusted Computing
  • 27. Modder Recap What We’ve Covered So Far ● Modders are many, relentless, and not always $$ driven ● Finding and stopping them is hard ● Trusted Computing is a security control, but not perfect ● The tools available allow the user developer-level access ○ Just like on a PC! 26 Busted Computing
  • 29. Console Threat Model 28 Threat Model Hold on...
  • 30. Attack Vectors ● File Modification ○ “ISO Modding” ○ Editing static files found on disk ○ Low barrier to entry ● Binary Patching ○ Modifying instructions of executable ○ “Crack” - DRM bypass ○ Higher complexity 29 Threat Model
  • 31. Attack Vectors ● Memory Manipulation ○ R/W memory of game process ○ API’s expose RAM to companion PC ■ TMAPI, CCAPI (PS3) ■ Xbox Neighborhood, XMDB (X360) ● Process Injection ○ Mimics DLL injection ○ SPRX (PS3), XEX (X360) ○ Complex to produce ○ High portability 30 Threat Model
  • 32. ● Business Logic (Scripting) ○ Games employ scripting engines ■ Lua, Python, Perl, home grown, etc. ○ Updates without compilation ○ Stored, consumed in plaintext ○ “Sideload” custom script files ○ Forwards compatibility ○ Strap on your own interpreter Attack Vectors 31 Threat Model
  • 33. ● Script file extension for CoD Games ○ At least as far back as CoD:MW (2007) ● Rendered in plaintext ○ Community made GSC editors available ● API extensively documented by Modders GSC Scripting 32 Threat Model
  • 36. Attack Vectors ● API Server Attacks ○ Standard Web-service AppSec ● Peer-based Attacks ○ Console peer-to-peer channels ■ Communicated over UDP ■ Not encrypted by default ■ Little modder focus ○ Denial of Service attacks 35 Threat Model
  • 37. Network Attacks ● Charles Proxy ● MS DoS Notice 36 Threat Model
  • 39. XboxOne ● Hyper-V-based Hypervisor OS ○ Windows 10, Metro-UI Based Environment ○ Xenon (Xbox) processes run in separate sandbox ○ Public developer program ● Exploit released, then patched ○ Based on MS Edge exploits; ‘Chakra’ 38 Into the Future
  • 40. PlayStation 4 ● FreeBSD-based OS ● PS4 SDK leaked to the public ● ‘CTurt’ discovers Webkit exploit ○ Releases ‘PS4-Playground’ toolkit 39 Into the Future
  • 41. Then vs Now ● Now: MS Edge, Webkit, SDK ● Then: JTAG, RGH, E3 Flasher 40 Into the Future
  • 42. SSL Certificate Hunter ● SSL Certificate Pinning ○ Hard-set certificate for a client to expect 41 Into the Future
  • 44. What can we do? 43 Solving the Problem ● Fight the Good Fight ○ Security for Breakfast ○ Security in Layers ○ Player Profile ○ It’s a Game ○ Build Your Tool Set ○ Another Perspective ● Not Just Video Games!
  • 45. Security for Breakfast ● Address security from the start ○ Cheaper, faster and easier ● Threat Modeling ● Cook in your session state 44 Solving the Problem
  • 46. Security in Layers ● Trust Boundaries ● User Data ○ Input Validation ○ Output Sanitization ● All the things, everywhere, everytime 45 Solving the Problem
  • 47. Player Profile ● Assumption: player data is already being collected ● One log to rule them all ● Behavior Profiling ● Piggyback on what’s exists ○ Or, build your own 46 Solving the Problem
  • 48. It’s a Game ● Keep it fun ● Aim for perfect; Accept reality ● Old tricks, new label 47 Solving the Problem
  • 49. Man is a tool-using animal. Without tools he is nothing, with tools he is all -Thomas Carlyle ● Don’t bring malware home to see mom ● Build into your environment ● Start simple ● Use what’s available ● Build a team Build Your Tool Set 48 Solving the Problem
  • 50. Another Perspective ● Builders can’t assess their own work ○ Just like QA or AppSec ● Good developers fix the issues they find ○ It’s the ones they didn’t see... ● A Dev, QA, and a Hacker walk into a bar... ● Hired guns ○ [SHAMELESS SELF PLUG] 49 Solving the Problem
  • 51. Fight the Good Fight ● Security for Breakfast ● Security in Layers ● Player Profile ● It’s a Game ● Build a Toolset ● Another Perspective 50 Solving the Problem