{"id":270,"date":"2017-06-05T17:49:56","date_gmt":"2017-06-05T17:49:56","guid":{"rendered":"http:\/\/securitycurve.com\/?p=270"},"modified":"2017-06-05T17:49:56","modified_gmt":"2017-06-05T17:49:56","slug":"hacback-so-dumb","status":"publish","type":"post","link":"https:\/\/securitycurve.com\/?p=270","title":{"rendered":"Hackback: Dumb yet apparently still a thing"},"content":{"rendered":"<p><a href=\"https:\/\/securitycurve.com\/wp-content\/uploads\/2017\/06\/d391eafb2ac1cf528cb5d16efbe439de41fbb851ef2650481aca4c52b1371610.jpg\"><img decoding=\"async\" class=\"alignright size-medium wp-image-272 lazyload\" data-src=\"https:\/\/securitycurve.com\/wp-content\/uploads\/2017\/06\/d391eafb2ac1cf528cb5d16efbe439de41fbb851ef2650481aca4c52b1371610-300x217.jpg\" alt=\"\" width=\"300\" height=\"217\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/217;\" \/><\/a>So the <a href=\"https:\/\/tomgraves.house.gov\/uploadedfiles\/discussion_draft_active_cyber_defense_certainty_act_2.0_rep._tom_graves_ga-14.pdf\">Active Cyber Defense Certainty Act<\/a> (the &#8220;ACDC&#8221; Act) is now apparently making the rounds. \u00a0The gist is that it would make it legal for someone to attack someone else provided two things are true: 1) that &#8220;someone else&#8221; is in the process of conducting a cyberattack against\u00a0you and 2) the attack is done for the purposes of &#8220;attribution&#8221; (i.e. for gathering information to give to law enforcement.)<\/p>\n<p>If you&#8217;re not familiar with this particular bit of legislation, there&#8217;s a great article on <a href=\"https:\/\/www.engadget.com\/2017\/06\/02\/if-hacking-back-is-law-what-could-possibly-go-wrong\/\">why it&#8217;s dumb over on Engadget<\/a> that&#8217;s worth a read &#8212; and another over on <a href=\"https:\/\/www.forbes.com\/sites\/patricklin\/2016\/09\/26\/forget-about-law-and-ethics-is-hacking-back-even-effective\/#3928d76f47d8\">Forbes that explains why hackback doesn&#8217;t work anyway<\/a>. \u00a0All good reading, but what I find fascinating is why this particular debate continues to resurface. \u00a0Meaning, this argument has been going on for at least twenty years (that I can recall) and it continues to not go away,\u00a0despite the fact that it makes absolutely no sense logistically, technically, or practically. \u00a0 It&#8217;s\u00a0kind of thing that sounds good unless you&#8217;ve actually try doing it and then you realize that its applicable only in certain situations, that it really only applies to a few very specific activities (and then even arguably), and that in most cases what you&#8217;re likely to want to do is already arguably legal anyway.<\/p>\n<p>Before going into that though, let me first of all take a moment to separate out &#8220;Active Defense&#8221; from &#8220;Hack-Back&#8221;. \u00a0I&#8217;m not talking about active defense when I say &#8220;hack back is dumb&#8221;. \u00a0Active defense is just that &#8211; defending yourself actively; it can encompass a number of things from deception, to honeypots, to recon, to enhanced analysis, to intelligence-gathering, and even to manipulating attacker requests or providing certain manipulated output. \u00a0If you want to read an excellent paper on Active Defense &#8211; and get a flavor for why its useful in the process &#8211; check out the <a href=\"https:\/\/cchs.gwu.edu\/sites\/cchs.gwu.edu\/files\/downloads\/CCHS-ActiveDefenseReportFINAL.pdf\">CCHS &#8220;Into the Gray Zone&#8221; paper<\/a>.\u00a0 Specifically, the section on Google&#8217;s response to Operation Aurora (starts on numbered page 14) really makes the point.<\/p>\n<p>But all that stuff that you do on your side of the fence (from a blue team point of view) in an &#8220;active defense&#8221; scenario isn&#8217;t really &#8220;hack back&#8221; &#8211; at least not in the way that many people who use that term mean it. \u00a0For example running <a href=\"https:\/\/github.com\/BinaryDefense\/artillery\">Artillery<\/a>\u00a0or\u00a0<a href=\"https:\/\/opencanary.org\/\">OpenCanary<\/a>\u00a0is not hack-back. \u00a0Doing stuff to waste an intruder&#8217;s time (e.g. <a href=\"https:\/\/github.com\/adhdproject\/adhdproject.github.io\/blob\/master\/Tools\/Spidertrap.md\">Spidertrap<\/a>, <a href=\"http:\/\/portspoof.org\/\">Portspoof<\/a>)? Irritating to the attacker I&#8217;m sure &#8211; but not &#8220;hack back&#8221;. \u00a0Heck, even\u00a0<a href=\"https:\/\/beefproject.com\/\">BeEF <\/a>hooks are (IMHO) not really &#8220;hack-back.&#8221; \u00a0While it&#8217;s a vehicle to gather information for law enforcement, it does so without any &#8220;hacking&#8221;, &#8220;backing&#8221; &#8211; or for that matter &#8220;whacking&#8221;, &#8220;smacking&#8221; or otherwise <a href=\"https:\/\/www.youtube.com\/watch?v=2Fc1wr3dYxU\">chopping that meat<\/a>\u00a0(<em>see what I did there&#8230; because beef vs. BeEF&#8230; and Pete was a butcher&#8230; nevermind<\/em>).<\/p>\n<p>I&#8217;d argue that even what some people call &#8220;weaponized documents&#8221; aren&#8217;t really hack back the way that people typically mean it. \u00a0First of all, note that I take issue with the word &#8220;weaponized&#8221; in this context. \u00a0Do these documents have some functionality specifically built into them for the situation where they&#8217;re exfiltrated? \u00a0Yes. \u00a0Yes they do. \u00a0But weaponized implies that they&#8217;re somehow offensive in a way that I don&#8217;t think they really are. \u00a0Like if I have Lojack in my car or a mobile phone &#8220;find my device&#8221; feature &#8211; they can both alert law enforcement to criminal activity when it happens, right? \u00a0But does that mean my\u00a0car or phone has been &#8220;weaponized&#8221;? \u00a0No. \u00a0Because that&#8217;d be ridiculous, right?\u00a0 So let&#8217;s instead call them what they really are: &#8220;decoy documents that may or may not have call-home or other intelligence gathering or reconnaissance functionality&#8221;. Since I don&#8217;t want to write that every time, maybe &#8220;safe docs&#8221; for short? \u00a0 Sure, let&#8217;s go with that.<\/p>\n<p>So you&#8217;re maybe asking yourself why I say that &#8220;hack back&#8221; is dumb when I&#8217;m also in the same breath saying that active defense is\u00a0OK. \u00a0In my opinion, there are a few reasons 1) intent, 2) ability to opt out, and 3) tradecraft. \u00a0Let&#8217;s start with the third one because it&#8217;s easiest. \u00a0First,\u00a0consider\u00a0the tiny question of how exactly you&#8217;d conduct an &#8220;attack&#8221; (hack back &#8211; again, not active defense) for the non-destructive, attribution-only attack referenced by the ACDC Act? \u00a0I mean, specifically how would you &#8211; as a practical matter &#8211; exercise your &#8216;1337 |-|4x0r-ing sk1llz to &#8216;hack back&#8217; over a network? \u00a0You pretty much can&#8217;t, right? \u00a0Consider, for example, what the attack surface\u00a0is of the origination point for an attack in progress. \u00a0When an attacker is coming at you, they have a number of potential targets to select from (i.e. the external footprint of your environment) &#8211; what exactly do you have available to attack them back? \u00a0One IP? \u00a0A specific origination port on what could be a router or proxy? \u00a0Some NAT&#8217;ed address that may or may not have a listening port on the other side of it? \u00a0Some poor schmo&#8217;s system that got owned on the attacker path to you? \u00a0Good luck. \u00a0So really, you&#8217;re limited in what you can do. \u00a0Yes, you can allow exfiltratration of some &#8220;safe docs&#8221; or other beaconing software. \u00a0Maybe that &#8220;beacon&#8221; is even a root shell. \u00a0But it&#8217;s a totally different attack surface and thereby a totally different methodology to subvert it.<\/p>\n<p>&nbsp;<\/p>\n<p>Plus intent matters. \u00a0If your intent is not to break in to the other guy but instead to report a suspected intrusion to law enforcement, it&#8217;s not &#8220;hacking&#8221; but instead active defense. \u00a0Semantics? \u00a0Maybe. \u00a0But words matter.<\/p>\n<p>Lastly, keep in mind the fundamental different between an attacker and a victim: the ability to opt out. \u00a0Like, if I&#8217;m the victim, I don&#8217;t get the ability to opt out of someone haxoring me. \u00a0The BS comes to me whether I seek it or not. \u00a0Whereas, if I&#8217;m an attacker, there&#8217;s one foolproof way for me not to run afoul of someone else&#8217;s\u00a0active defense methods: which is to not attack them in the first place.<\/p>\n<p>The point? \u00a0If 1) my intent is not to pwn you but instead to report your foolishness to the po-po, 2) you get to opt out to prevent me from doing it (or better said you have to explicitly opt in so I do), and 3) I&#8217;m using defensive methods&#8230; how&#8217;s that &#8220;hacking&#8221;? \u00a0If 1) I intend to pwn you, 2) you don&#8217;t get a say in it, and 3) I&#8217;m using offensive methods then it&#8217;s just hacking and not &#8220;hack back&#8221;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So the Active Cyber Defense Certainty Act (the &#8220;ACDC&#8221; Act) is now apparently making the rounds. \u00a0The gist is that it would make it legal for someone to attack someone else provided two things are true: 1) that &#8220;someone else&#8221; is in the process of conducting a cyberattack against\u00a0you and 2) the attack is done [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[61,90],"class_list":["post-270","post","type-post","status-publish","format-standard","hentry","category-security","tag-hack-back","tag-pewpew"],"_links":{"self":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=270"}],"version-history":[{"count":0,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/270\/revisions"}],"wp:attachment":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}