{"id":8970,"date":"2020-09-16T09:23:36","date_gmt":"2020-09-16T07:23:36","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/?p=8970"},"modified":"2020-12-03T10:29:21","modified_gmt":"2020-12-03T09:29:21","slug":"lifecycle-remote-code-execution","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/","title":{"rendered":"The Lifecycle of a Remote Code Execution Security Incident"},"content":{"rendered":"\t\t\t\t<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-2788d460      \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t>\n\t\t\t\t<div class=\"uagb-toc__wrap\">\n\t\t\t\t\t\t<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\tTable Of Contents\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-toc__list-wrap \">\n\t\t\t\t\t\t<ol class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#the-problem-with-remote-code-execution-attacks\" class=\"uagb-toc-link__trigger\">The problem with Remote Code Execution attacks<\/a><li class=\"uagb-toc__list\"><a href=\"#from-penetration-testing-to-bug-detection\" class=\"uagb-toc-link__trigger\">From penetration testing to bug detection<\/a><li class=\"uagb-toc__list\"><a href=\"#how-to-recover-from-remote-code-execution\" class=\"uagb-toc-link__trigger\">How to recover from Remote Code Execution<\/a><li class=\"uagb-toc__list\"><a href=\"#how-we-can-mitigate-this-risk-of-the-remote-code-execution-attack-and-keep-the-system-online\" class=\"uagb-toc-link__trigger\">How we can mitigate this risk of the remote code execution attack and keep the system online?<\/a><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\n\n<p>It&#8217;s not always easy to understand the trust value of a <span id=\"urn:enhancement-953c4c7d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/penetration_test\">penetration testing<\/span> until a critical <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/security-responsibility-security-manager\/\">security <\/a>incident happens to you. Last year at Codemotion Rome,&nbsp; Giovanni Mellini is Head of Information, <span id=\"urn:enhancement-41a46c18\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span>, and network <span id=\"urn:enhancement-1767ff22\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">security<\/span> at ENAV S.pA., the Italian air navigation <span id=\"urn:enhancement-2e32c816\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/service_provider\">service provider<\/span>, shared a demonstration based on a remote code execution critical incident he had faced in his work.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Giovanni is also the founder and president of <a href=\"https:\/\/www.cybersaiyan.it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Saiyan<\/a> &#8211; a <span id=\"urn:enhancement-875045d7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/nonprofit_organization\">not for profit<\/span> <span id=\"urn:enhancement-f1a2e5fa\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/organization\">organization<\/span> founded to promote social initiatives to spread <span id=\"urn:enhancement-3db60d12\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">cybersecurity<\/span> and ethical <span id=\"urn:enhancement-f39c58b8\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/hacker_programmer_subculture\">hacking culture<\/span>. Cyber Saiyan organizes <a href=\"https:\/\/www.romhack.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">RomHack,<\/a> a <span id=\"urn:enhancement-f72a4936\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/free_software\">free<\/span> <span id=\"urn:enhancement-734a20ca\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">cybersecurity<\/span> conference held yearly in <span id=\"urn:enhancement-cf30ed06\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/rome\">Rome<\/span>.&nbsp;<\/p>\n\n\n\n<p>Giovanni demonstrated how we can <span style=\"user-select: auto;\" id=\"urn:enhancement-a7bfd1c1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/error_detection_and_correction\">detect<\/span> remote code execution <span style=\"user-select: auto;\" id=\"urn:enhancement-77bee57b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attacks<\/span> and how can we mitigate the risk. This included how you can respond and what kind of <span style=\"user-select: auto;\" id=\"urn:enhancement-c77a1f76\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/countermeasure_computer\">countermeasures<\/span> can be used to respond and react. <\/p>\n\n\n\n<p>We&#8217;re sharing some of the central points of his presentation here, but you&#8217;ll want to view the video of his talk below to gain an appreciation of the <span style=\"user-select: auto;\" id=\"urn:enhancement-58caeed\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/live_coding\">live coding<\/span> in detail.<\/p>\n\n\n\n<p>[jwp-video n=&#8221;1&#8243;]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The problem with Remote Code Execution attacks<\/h2>\n\n\n\n<p>In Remote Code Execution (<span id=\"urn:enhancement-3783f721\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/arbitrary_code_execution\">RCE<\/span>), &nbsp;an attacker is able to run code of their choosing with system-level <span id=\"urn:enhancement-6c69fb44\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/privilege_computing\">privileges<\/span> on a <span id=\"urn:enhancement-f6ebc442\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">server<\/span> that possesses the appropriate <span id=\"urn:enhancement-b58f033b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">weakness<\/span>. Once sufficiently <span id=\"urn:enhancement-aa53c169\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/exploit_computer_security\">compromised<\/span> the attacker may be able to access any and all information on a <span id=\"urn:enhancement-d2a72216\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">server<\/span> such as <span id=\"urn:enhancement-8a588347\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/database\">databases<\/span> containing information that unsuspecting <span id=\"urn:enhancement-4c560729\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/client_computing\">clients<\/span> provided.<\/p>\n\n\n\n<p>Giovanni shared &#8220;You can execute everything on the <span id=\"urn:enhancement-eccbdef3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> just by uploading something.&nbsp; You can download software, do <span id=\"urn:enhancement-5d6cea4f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/exploit_computer_security\">pivoting<\/span>, moving to another <span id=\"urn:enhancement-62b2cd9f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">server<\/span>, shut down the <span id=\"urn:enhancement-d835113d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span>, by rebooting the serve. You have to fix this now.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"description\">From penetration testing to bug detection<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/bug-4297771_1280-1024x693.jpg\" alt=\"\" class=\"wp-image-8987\"\/><\/figure><\/div>\n\n\n\n<p>Giovanni began by sharing that a problem was unearthed during <span id=\"urn:enhancement-9d14d467\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/penetration_test\">penetration testing<\/span>: &#8220;We had a <span id=\"urn:enhancement-8c502614\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> check on a production system which revealed a critical <span id=\"urn:enhancement-24a30cdb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> problem.&#8221;&nbsp;<\/p>\n\n\n\n<p>He notes the importance of <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/\">security<\/a> by <span id=\"urn:enhancement-ae7ab2c4\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/design\">design<\/span>, &#8220;When you do a <span id=\"urn:enhancement-ca8be5d3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/project\">project<\/span>, a lot of people that have to work together and <span id=\"urn:enhancement-4ad17f37\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/interaction\">interact<\/span>. In the ideal world, everyone is happy. However, it&#8217;s a huge effort for everyone to react to do something. After we <span id=\"urn:enhancement-6908b1eb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software_deployment\">deploy<\/span> something it can be quite hard to fix, and go back and fix again. This is why we talk about the value of <span id=\"urn:enhancement-200deb71\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">security<\/span> by <span id=\"urn:enhancement-beb66a5d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/design\">design<\/span>. From my <span id=\"urn:enhancement-e71d04f2\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/experience\">experience<\/span>, if you don&#8217;t have <span id=\"urn:enhancement-8028656\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">security<\/span> since the beginning of the <span id=\"urn:enhancement-93375dd0\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/project\">project<\/span>, probably, you will have <span id=\"urn:enhancement-32da0d7c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> issues at the end.&#8221;<\/p>\n\n\n\n<p>If you are fortunate enough to have an effective <span id=\"urn:enhancement-3878b31e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> process somewhere in <span id=\"urn:enhancement-4feeb180\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/company\">your company<\/span>, there is a chance you will intercept a <a href=\"https:\/\/www.codemotion.com\/magazine\/articles\/news\/full-time-bug-hunting-pros-and-cons-of-an-emerging-career\/\">security problem<\/a> before it goes live. However, according to Giovanni &#8220;For us, this was not the case. We found out about the problem in the web <span id=\"urn:enhancement-731d9d4d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">application<\/span> only after the IT department deployed it and it was being actively used.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to recover from Remote Code Execution<\/h2>\n\n\n\n<p>There are two options: <br>1. <span id=\"urn:enhancement-dd50376f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/shutdown_computing\">Shutdown<\/span> your <span id=\"urn:enhancement-e3f11888\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> until fixed<br>2. Mitigate the risk and keep the <span id=\"urn:enhancement-2cc94c8f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> <span id=\"urn:enhancement-7f7aa055\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/online_and_offline\">online<\/span><\/p>\n\n\n\n<p>Giovanni notes that that shutting down is the easiest solution, however, it takes time, which may not be appropriate for mission-critical <span id=\"urn:enhancement-cbe5104b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">applications<\/span>: &#8220;You have to shut down, do a new fix, do a test again and come back when you&#8217;re done. It typically takes at least a month and during this month, this <span id=\"urn:enhancement-cd3cbfeb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> is not available to uses.&#8221;<\/p>\n\n\n\n<p>Or you can mitigate the risk and system while remaining <span id=\"urn:enhancement-2ba5bef4\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/online_and_offline\">online<\/span>:<\/p>\n\n\n\n<p>&#8220;Like a defender, you have to think about how can you detect this kind of <span id=\"urn:enhancement-739b694e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerability<\/span> in the live <span id=\"urn:enhancement-29e19749\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span>, so you can intercept this kind of behaviour. And after you intercept this, you can have an alert and with your security team, you can react and say okay, we found that the <span id=\"urn:enhancement-c40d2626\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerability<\/span> is <span id=\"urn:enhancement-df183028\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/exploit_computer_security\">exploited<\/span>, used by someone, and now we investigate.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How we can mitigate this risk of the remote code execution attack and keep the system online?<\/h2>\n\n\n\n<p>Giovanni suggests you need to understand your <span id=\"urn:enhancement-e996591d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/scenario\">scenario<\/span> and collect relevant <span id=\"urn:enhancement-9787d99d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data_logger\">logs<\/span>: to mitigate the risk first as a defender, you have to know this <span id=\"urn:enhancement-6e1f74b5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> and you have to know of the <span id=\"urn:enhancement-75df56f4\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> works and you have to collect the data that can help you to find the <span id=\"urn:enhancement-b7835120\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerability<\/span>.<\/p>\n\n\n\n<p>Specifically, the <span id=\"urn:enhancement-37e40110\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/context_computing\">Context<\/span> is <span id=\"urn:enhancement-d8841879\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/internet_information_services\">IIS<\/span> Web series +<span id=\"urn:enhancement-3c991e17\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/asp-net\">ASPX<\/span> on <span id=\"urn:enhancement-fed1be0c\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/microsoft_windows\">Windows<\/span>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Collect the logs<\/li><li>Send to a central log collector<\/li><li>Analyze<\/li><li>Find a pattern<\/li><\/ul>\n\n\n\n<p>Giovanni showed a live demo of how to do this using <span id=\"urn:enhancement-f51b6b90\" class=\"textannotation disambiguated wl-organization\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/splunk\">Splunk<\/span>.<\/p>\n\n\n\n<p>&#8220;First of all, we have to find to the <span id=\"urn:enhancement-66ba1208\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_hardware\">device<\/span> and get these <span id=\"urn:enhancement-90e94ae1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_file\">files<\/span> in the put to the central see so useful. In this case, I use <span id=\"urn:enhancement-d0c8be4\" class=\"textannotation disambiguated wl-organization\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/splunk\">Splunk<\/span>. You have to extract from the <span id=\"urn:enhancement-c50ad16a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software\">software<\/span>, you have to think just about doing this operation.<br>This is in <span id=\"urn:enhancement-49d1b91d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/real-time_data\">real-time<\/span> so you have to work with adjuncts that are real-time. So you have to keep the logs while written. So the agents are listening to the <span id=\"urn:enhancement-e5c3ac6c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_hardware\">device<\/span> and when something is brought to the <span id=\"urn:enhancement-8e80adde\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_file\">file<\/span> they keep and send. So this is important for doing <span id=\"urn:enhancement-17b90f77\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">security<\/span> &#8211; keep a copy of the logs.<\/p>\n\n\n\n<p>Also for <span id=\"urn:enhancement-c5db7765\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/forensic_science\">forensic<\/span> activity, imagine that this remote <span id=\"urn:enhancement-9b0c3947\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> is compromised It is a good question if this is compromised, so we cannot rely for <span id=\"urn:enhancement-ff72904d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/forensic_science\">forensic<\/span> <span id=\"urn:enhancement-9429b43c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/analysis\">analysis<\/span> to the <span id=\"urn:enhancement-a2b07a20\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data_logger\">logs<\/span> because the <span id=\"urn:enhancement-339196c7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> is not <span id=\"urn:enhancement-84348d9f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">secure<\/span> for us. It&#8217;s something that we don&#8217;t trust anymore.&#8221;<\/p>\n\n\n\n<p>Write your own detection rule:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Identify pattern unique fields<\/li><li>Lower the false positives<\/li><li>Schedule a search for the pattern<\/li><li>Create an alert<\/li><li>Risk mitigation<\/li><\/ul>\n\n\n\n<p>Giovanni warns, &#8220;You have to keep in mind that you need to be very precise and lower the <span id=\"urn:enhancement-61101ee9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/false_positives_and_false_negatives\">false positive<\/span> because imagine that you work in a <span id=\"urn:enhancement-75f489d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> with a lot of <span id=\"urn:enhancement-18794999\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data_logger\">logs<\/span>, if you have a <span id=\"urn:enhancement-c403f0ad\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/false_positives_and_false_negatives\">false positive<\/span>, this means that we are not working well. You have to be precise.&#8221;<\/p>\n\n\n\n<p><span id=\"urn:enhancement-a3e32544\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/automation\">Automation<\/span> is everything<\/p>\n\n\n\n<p>However, you cannot just put people in front of a <span id=\"urn:enhancement-6a46fb5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cheating\">screen looking<\/span> at the <span id=\"urn:enhancement-c37ef94e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/logfile\">logs<\/span>, you need to automate. In this case, Giovanni&#8217;s <span id=\"urn:enhancement-2e2b69cb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/team\">team<\/span> utilized a functionality of <span id=\"urn:enhancement-dc05c0b0\" class=\"textannotation disambiguated wl-organization\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/splunk\">Splunk<\/span> but he suggests that elastic <span id=\"urn:enhancement-e34914a1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/search_engine_technology\">search<\/span> can also provide these <span id=\"urn:enhancement-daa8905c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/capability-based_security\">capabilities<\/span>.&nbsp;<\/p>\n\n\n\n<p>&#8220;After we detect, we launch the script and so we can create a ticket on a service desk platform so other people can work on this and check for events.&#8221;<\/p>\n\n\n\n<p>Giovanni stresses that when it comes to <span id=\"urn:enhancement-926a801a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">security<\/span>, there is no magic potion and that often <span id=\"urn:enhancement-a1ffb62a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> problems can be attributed to a chain of missing controls\/configurations.&nbsp;<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s not always easy to understand the trust value of a penetration testing until a critical security incident happens to you. Last year at Codemotion Rome,&nbsp; Giovanni Mellini is Head of Information, systems, and network security at ENAV S.pA., the Italian air navigation service provider, shared a demonstration based on a remote code execution critical&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/\">Read more<\/a><\/p>\n","protected":false},"author":85,"featured_media":8971,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":4,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4329],"tags":[38],"collections":[],"class_list":{"0":"post-8970","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity","8":"tag-security-manager","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Lifecycle of a Remote Code Execution Security Incident - Codemotion<\/title>\n<meta name=\"description\" content=\"Giovanni Mellini responds to a Remote Code Execution attack, consisting in malware disabling parts of a system and disrupting business operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Lifecycle of a Remote Code Execution Security Incident\" \/>\n<meta property=\"og:description\" content=\"Giovanni Mellini responds to a Remote Code Execution attack, consisting in malware disabling parts of a system and disrupting business operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-16T07:23:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-03T09:29:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cate Lawrence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cate Lawrence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/\"},\"author\":{\"name\":\"Cate Lawrence\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1\"},\"headline\":\"The Lifecycle of a Remote Code Execution Security Incident\",\"datePublished\":\"2020-09-16T07:23:36+00:00\",\"dateModified\":\"2020-12-03T09:29:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/\"},\"wordCount\":1100,\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg\",\"keywords\":[\"Security Manager\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/\",\"name\":\"The Lifecycle of a Remote Code Execution Security Incident - Codemotion\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg\",\"datePublished\":\"2020-09-16T07:23:36+00:00\",\"dateModified\":\"2020-12-03T09:29:21+00:00\",\"description\":\"Giovanni Mellini responds to a Remote Code Execution attack, consisting in malware disabling parts of a system and disrupting business operations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#primaryimage\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Manager\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/tag\/security-manager\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Lifecycle of a Remote Code Execution Security Incident\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Codemotion.Italy\/\",\"https:\/\/x.com\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1\",\"name\":\"Cate Lawrence\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"caption\":\"Cate Lawrence\"},\"url\":\"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Lifecycle of a Remote Code Execution Security Incident - Codemotion","description":"Giovanni Mellini responds to a Remote Code Execution attack, consisting in malware disabling parts of a system and disrupting business operations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/","og_locale":"en_US","og_type":"article","og_title":"The Lifecycle of a Remote Code Execution Security Incident","og_description":"Giovanni Mellini responds to a Remote Code Execution attack, consisting in malware disabling parts of a system and disrupting business operations.","og_url":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2020-09-16T07:23:36+00:00","article_modified_time":"2020-12-03T09:29:21+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg","type":"image\/jpeg"}],"author":"Cate Lawrence","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Cate Lawrence","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/"},"author":{"name":"Cate Lawrence","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1"},"headline":"The Lifecycle of a Remote Code Execution Security Incident","datePublished":"2020-09-16T07:23:36+00:00","dateModified":"2020-12-03T09:29:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/"},"wordCount":1100,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg","keywords":["Security Manager"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/","url":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/","name":"The Lifecycle of a Remote Code Execution Security Incident - Codemotion","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg","datePublished":"2020-09-16T07:23:36+00:00","dateModified":"2020-12-03T09:29:21+00:00","description":"Giovanni Mellini responds to a Remote Code Execution attack, consisting in malware disabling parts of a system and disrupting business operations.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/lifecycle-remote-code-execution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Security Manager","item":"https:\/\/www.codemotion.com\/magazine\/tag\/security-manager\/"},{"@type":"ListItem","position":3,"name":"The Lifecycle of a Remote Code Execution Security Incident"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1","name":"Cate Lawrence","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","caption":"Cate Lawrence"},"url":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-600x600.jpg","author_info":{"display_name":"Cate Lawrence","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg",1200,675,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-300x169.jpg",300,169,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-768x432.jpg",768,432,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg",1200,675,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg",1200,675,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security.jpg",100,56,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-896x504.jpg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/security-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Cate Lawrence","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"},"uagb_comment_info":0,"uagb_excerpt":"It&#8217;s not always easy to understand the trust value of a penetration testing until a critical security incident happens to you. Last year at Codemotion Rome,&nbsp; Giovanni Mellini is Head of Information, systems, and network security at ENAV S.pA., the Italian air navigation service provider, shared a demonstration based on a remote code execution critical&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/8970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=8970"}],"version-history":[{"count":6,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/8970\/revisions"}],"predecessor-version":[{"id":12465,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/8970\/revisions\/12465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/8971"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=8970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=8970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=8970"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=8970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}