Branden Carter – EMET

Microsoft EMET
an UPDATED view from the trenches
Branden Carter
May 14, 2015
Intro
A little about ITD…
Our Mission:
Your Safety
Your Mobility
Your Economic Opportunity
For more information: http://itd.idaho.gov
Intro
ITD’s Computing Environment
Approximately:
• 1600 Employees
• 2000 PCs
• Over 100 locations across Idaho
What is EMET?
Intro
Enhanced Mitigation Experience Toolkit
EMET anticipates the most common attack
techniques attackers might use to exploit
vulnerabilities in computer systems, and helps
protect by diverting, terminating, blocking, and
invalidating those actions and techniques.*
* Quoted from EMET 5.1 Users guide
Intro
Why did ITD start looking at EMET?
1. ITD had a very specific, high caffeine program
that was being hammered with zero day exploits
that weren’t getting patched by the vendor.
(Hint: an oracle couldn’t even tell us when
patches were going to be released)
2. ‘Cause a few people who some might consider
knowledgeable said it was a good idea for
stopping exploits.
Exploits and Mitigations
What is an exploit?
An exploit is a piece of code that uses
software vulnerabilities to access
information on a computer or install
malware. Exploits target
vulnerabilities in operating systems,
web browsers, applications, or
software components that are
installed on a computer.
-Microsoft Security Intelligence Report, Volume 17
What has been done to stop exploits?
Nerdy moms choose
Exploits and Mitigations
DEP
Since XP SP2
ASLR
64bits of random goodness
Since Vista SP1
And Even Better Together!
*Caveat: Unless you have peanut allergies. 
Exploits and Mitigations
Are exploits that big of a problem?
Microsoft Security Intelligence Report, Volume 17 (2014)
Exploits and Mitigations
Are exploits that big of a problem?
Cisco 2015 Annual Security Report
Exploits and Mitigations
Are exploits that big of a problem?
2014 Verizon DBIR
Do existing tools offer protection?
Exploits and Mitigations
• Network Protection (IDS/IPS, Web Filter, NGFW)
– Offer some protection but may be limited by encryption
– Someone has to take a hit for the team
• Endpoint Protection
– Patching is most effective, but what about 0 day or patch
lag?
– AV, although many AV products traditionally focus on just
detecting exploit payloads
– Tools directly targeting exploit mitigation:
• App segregation/virtualization – Bromium, Invincea
• Anti Exploit – Malwarebytes AntiExploit, Microsoft EMET, PaloAlto
Traps
• Host Intrusion Prevention Software
*Products listed are just examples - not an endorsement or recommendation on my part
Exploits and Mitigations
“With a few notable exceptions, endpoint
[AV] products are not providing adequate
protection from exploits.”
– NSS Labs Corporate AV/EPP Comparative
Analysis – Exploit Protection 2013
Where does EMET fit?
Exploits and Mitigations
• EMET:
– EMET uses in-memory application behavior to stop memory
based exploits BEFORE a PC is infected
– is geared towards disrupting 0-day exploits in Applications
– makes it easier to manage built in mitigations like DEP, ASLR,
and SEHOP
– Provides new mitigations for exploits that bypass DEP/ASLR
• EMET is not :
–
–
–
–
AntiMalware/AV/HIPS
signature based
Capable of detecting pre-installed malware
a program that will prevent a local admin from installing
malware attachments in emails (.scr files anyone?)
Exploits and Mitigations
How does EMET stop exploits?
System Mitigations – EMET
aids in configuration
Application Specific Mitigations –
EMET unique protections
All Application Mitigation
Settings
Data Execution Prevention
DEP
Stop on Exploit/Audit Only
SEHOP
SEHOP
Deep Hooks (ROP)
ASLR
Null Page
Anti Detours (ROP)
Certificate Trust (Pinning)
HeapSpray
Banned Functions (ROP)
EAF
EAF+
Mandatory ASLR
BottomUP ASLR
LoadLib (ROP)
MemProt (ROP)
Caller (ROP – 32 bit)
SimExecFlow (ROP – 32 bit)
StackPivot (ROP)
ASR
How is EMET deployed?
Managing EMET
• Deployed like any other enterprise software
– Test first (check out my demo later for some tips!)
– Rollout is well covered - Step by Step for Microsoft
SCCM and GPO deployments
– Configuration can be managed through GPO addons or .xml file pushes and scripts
– Strongly recommend configuring reporting
services BEFORE deployment
– Plan on updating at least once a year
What has it done at ITD?
Managing EMET
• EMET impacts approx. 10-20% of ITD PCs in a given
month. Most mitigations are not seen by end users.
• On again off again love hate with the metrics:
– Indicators of malicious activity
– Indicators of user interference (false positives)
– What do the numbers mean?
Total EMET Hits
45,000
40,000
35,000
30,000
25,000
20,000
15,000
10,000
5,000
0
Unique Machines Reporting
EMET Events
1000
800
600
400
200
0
Managing EMET
Any negative experiences?
• Can crash legitimate
appliations (DEP, ASR) –
Testing! Testing! Testing!
• Technician acceptance
• Configuration drift
• Something happened
with IE starting April 22
that SimExec doesn’t like
Any negative experiences?
• No central administration console!
Managing EMET
(rumored to change soon)
– Configuration tweaks are a challenge
– Challenges with metrics…
– …but a federal TLA has made getting them much easier!
• https://www.nsa.gov/ia/_files/app/spotting_the_adversary_with_
windows_event_log_monitoring.pdf
• I can’t say enough about the value of this document – write the
URL down!!!!
Looking Forward
What excites me about EMET?
• Interesting opportunities for ASR
customizations (Ever tried to disable Java in
IE? Die old Java, DIE!)
• Cert pinning for internal servers annoys the
pen testers (SSL/TLS MiTM no more workey)
• EMET can protect sever processes (IIS, SMB,
RDP) from memory based exploits too
• Keeping the watcher web filter/IDS honest
Should I install EMET?
Looking Forward
• Out of the box, EMET seems like a no brainer for:
– Home Computers
– Smaller organizations with minimal signature based
protection tools and/or budget
– Computers with old OS and/or software vulnerable to
memory exploits
• With lots of testing, EMET may be good for:
– Medium or large organizations with limited budget
and enough time and staff to provide care, feeding,
and reporting on EMET activity
Looking Forward
Final Words
• Focus on things like NIST 800-53 or SANS top 20
controls – EMET isn’t a cure all.
• That new 0 day just announced – you just might
already be protected
• If you have a specific piece of old software that
you think/know is vulnerable – EMET can help.
Mitigations aren’t limited to defaults.
• Realize that EMET takes time and management
overhead. If you don’t have lots of time, a more
enterprise focused anti-exploit solution might be
a better option for you.
There are 10 types of people in this world… Those who understand binary and those who do not.
Resources and Credits
-Brian Krebs EMET Overviewhttp://krebsonsecurity.com/2013/06/windows-security-101-emet-4-0/
-Cisco 2015 Annual Security Report-Microsoft EMET Mitigations and Guidelineshttp://support.microsoft.com/kb/2909257
-Microsoft EMET Users Guide (Program Files Directory)-Microsoft Security Intelligence Report, Volume 17, 2014-NSA on Windows Event Log Analysis and Reportinghttps://www.nsa.gov/ia/_files/app/spotting_the_adversary_with_windows_event_log_monitoring.pdf
-NSS Labs Corporate AV/EPP Comparative Analysis – Exploit Protection, 2013-Verizon Data Breach Investigation Report, 2014And thanks to en.wikipedia.org and Microsoft Technet for datum on several of the specific mitigations!
Have questions for me? brandenm at gmail dot com
Chuck Norris can get meaningful data from /dev/null
Questions?