Target Hacker Tools Provide Breach Insight
|
|
|
- Philip Peters
- 10 years ago
- Views:
Transcription
1 19 January 2014 Analyst: Gary Warner, CTO, Malcovery Security On January 16, 2014, isight Partners released a report about the KAPTOXA malware from the Target breach, which was posted publicly on the Wall Street Journal website at the URL: The document was removed from that location for reasons unknown to this analyst. Brian Krebs, of KrebsonSecurity.com, also provided a link to a malware report at ThreatExpert that has also since been removed. What can we learn about the Target breach by studying the reports that have been shared in these two locations? Especially when considered in light of what is known of previous data breaches? First, we will consider a possible scenario involving the Heartland Payments breach. Then we will look at the tools revealed by the isight document from the Wall Street Journal URL.Lastly, we will consider what the ThreatExpert report means with regards to the limitations of anti-virus software as a possibly useful tool for detecting such breaches. Techniques that may be similar to the Target breach were used by the Alberto Gonzalez gang, as illustrated in an indictment against Vladimir Drinkman, Aleksandr Kalinin, Roman Kotov, Mikhail Rytikov, Dmitriy Smilianet. In the indictment, which was only unsealed on December 17, 2013, Drinkman et al were called co-conspirators of Alberto Gonzalez (famous for the TJX breach), Damon Toey, and Vladislav Horohorin (BadB). Drinkman and his gang of Russian hackers were active from at least August 2005 through at least July 2012 and were charged with stealing data from NASDAQ, 7-Eleven, Carrefour, JCPenney, Hannaford Brothers, Heartland Payment Systems, Wet Seal, Commidea, Dexia Bank, JetBlue Airways, Dow Jones, an unspecified bank in Abu Dhabi, Euronet, Visa Jordan, Global Payment Systems, Diners Singapore (a regional branch of Diner s Club), Ingenicard. In each of these cases, an SQL Injection attack resulted in malware being placed on the network and credit card or personal information being exfiltrated from the network.
2 According to the indictment for the above, Gonzalez and Toey would travel to retail outlets and make observations about which Point of Sale terminal software was being used, afterwards, they would pass the information to the hacker crew who would penetrate the network, customize and load the malware, and exfiltrate the stolen data. The breaches continued even after Gonzalez and Toey were in custody. Here is a timeline of those cases: NASDAQ initial point of entry, an SQL injection in the Password Reminder website (May 19, 2007). By August 12, 2007 the hackers communicated that they had cracked the admin password and identified 30 SQL servers and we can run whatever on them. 7-Eleven - (August 2007) - SQL Injection lead to malware that extracted card data from databases) Carrefour S.A - (October 2007) - - SQL injection lead to malware that extracted card data for 2 million credit cards JCPenney - (October 2007) - SQL Injection lead to malware placed on the network that extracted card data from databases Hannaford Brothers - (November 2007) - SQL Injection lead to malware placed on the network that extracted card data for 4.2 million credit cards Heartland Payment Systems (December 2007) - SQL Injection lead to malware placed on the network that extracted card data for 130 million credit cards, leading to $200 Million in losses Wet Seal - (January 2008) - SQL Injection lead to malware placed on the network that extracted card data from databases Commidea Ltd. - (March-November 2008) - malware was used to extract card data and exfiltrate the data for 30 million credit cards Dexia Bank Belgium - (February 2008 to February 2009) - SQL Injection resulted in malware placed on the network that exfiltrated card data leading to a $1.7 Million loss JetBlue Airways - (Jan February 2011) - malware placed on network exfiltrated Personal Data of employees Dow Jones, Inc. - (2009) - at least 10,000 sets of Log-In Credentials stolen via malware placed on network "Bank A" - (Dec 2010 to March 2011) - malware placed on an unnamed bank HQ'ed in Abu Dhabi, United Arab Emirates used to facilitated theft of Card Numbers. Euronet - (July 2010 to October 2011) - SQL injection lead to malware that extracted login credentials resulting in more than 2 million cards being stolen 2014 Malcovery Security, LLC Page 2
3 Visa Jordan Card Services - (Feb 2011 to March 2011) - SQL Injection lead to malware placed on network that exfiltrated card data for 800,000 cards Global Payment Systems - (January 2011 to March 2012) - SQL Injection lead to malware placed on network that exfiltrated card data for 950,000 cards, leading to $92.7 Million in losses Diners Club International, Singapore - (June 2011) - SQL Injection lead to malware placed on network that exfiltrated card data for 500,000 Diners Club cards resulting in $312,000 in losses Ingenicard US, Inc. - (March 2012 to December 2012) - SQL Injection resulted in malware placed on the network that was used to facilitate ATM withdrawals of more than $9 million in 24 hours I. Heartland Payments One of the first truly sizable carding breaches happened in 2007, when data on 130 million credit cards was stolen. As an active security blogger at that time, I received an anonymous that walked through some of the back story of the breach. While I cannot confirm the details, it certainly seems a plausible method of attack. So, please consider the story below as a PLAUSIBLE method for the Heartland Payments breach, rather than a confirmed factual account. First, Heartland Payments had a public facing website that provided a front-end to a Microsoft SQL Server. According to our possible scenario, a hacker exploited the SQL server through SQL Injection and was able to cause a command to execute on the server, because of MS-SQL s ability to execute a system call to launch a third party command with the authority of the MS-SQL userid. In this case, the command that was given was to use TFTP (Trivial FTP) to download a copy of NetCat from a webserver in Russia. NetCat is a tool that allows a computer INSIDE the network to establish an OUTBOUND connection to an OUTSIDE address which then is provided a network terminal allowing the person at the remote computer to issue commands in what appears to be a DOS CMD Window running on the inside computer. After executing NetCat, the remote user was able to issue commands to download several tools. They downloaded a password hash dumper and a port scanner. After dumping the cache of userids and password hashes from the local machine, the hacker realized that a domain-level admin account, VERITAS, existed on the local machine. The password cracked easily, as it was actually the default password for the Veritas backup software BACKUP. Distributed network backup systems have to have administrative privileges on the computers that they are scheduled to backup, because they need to be able to backup all of the files on the server, regardless of who owns the local file. After using the Administrator equivalent account to create their own userids, the hackers went exploring, using their port scanner to identify other database servers on the network and interacting with them through an SQL Query tool to learn more about their structure and contents. Scripts were created to schedule certain queries to dump credit card related data from the databases to flat files 2014 Malcovery Security, LLC Page 3
4 which were then zipped up and exported from the network via an outbound FTP File Transfer call, which posted the daily card transactions to an external network site from which the hacker could retrieve them. This script ran daily for many months before being discovered. II. isight Partners list of Target files found When we retrieved the PDF file from the Wall Street Journal website, we created a list of all the hashes that were listed in the document. We then went exploring to find out whether any of these were wellknown malware files. We started by submitting the entire list to VirusTotal to search to see whether the file was already known by VirusTotal. Only five of the files had been previously submitted and detected, but none of these were actually malware. Seven additional files had been submitted and declared to be safe by all anti-virus applications. In the table below you can see the hashes, the VirusTotal detection ratio, and some notes by Malcovery about what the tool or file actually is. In several cases the clue to file identification came from the Additional Info tab at VirusTotal where all of the names of all submitted files are provided. MD5 Hash from isight Report VirusTotal Type Notes Detection d975fc6cda111c9eb560254d5eedbe0a VT 29 of 42 HackTool Portforward.exe found in Portforward.rar and Portforward_bin.zip 814b88ca4ef695fea3faf11912a1c807 UNKNOWN df5dbcbcac6e6d12329f1bc8a5c4c0e9 0 of 45 benign osql.rll Microsoft SQL Server file 4b9b36800db395d8a95f331c4608e947 0 of 49 benign osql.exe aka CiscoLog.exe (Version ) normally installs in \mssql7\binn\. Frequently repackaged for distribution with MS-SQL based packages a937f6fbc66dbc59ab73f7b1d3e 0 of 47 Benign NIST osql.exe f4bdc5e507d887d5d2cd2c4c61cfcfe1 0 of 46 Benign OrchestratorRun ProgramService.exe Part of the Microsoft System Center Orchestrator. a35e944762f82aae556da453dcba20d1 UNKNOWN 322e136cb50db03e0d63eb2071da1ba7 24 of 48 HackTool NetCat netc.exe e2db09553f23a8abc85633f6bf1a0b49 UNKNOWN 290c26433a0d9d14f1252e46b UNKNOWN 623e4626d269324da62c ae61f UNKNOWN a77057d30f0ee cdc404 UNKNOWN 6c1bcf0b c8c4c12cc70996a75 18 of 48 HackTool Angry_ip_scanner_2_21.exe 0b33b4d61ea345f16c4a34b33e9276bc UNKNOWN 4352e635046aa624dff59084d5619e82 UNKNOWN 65dd8d2d9604d43a0ebd105024f of 46 HackTool Somarsoft DumpSec dumpsec is a security auditing program for Windows. It dumps the permissions (DACLs) and audit settings (SACLs) for file system, registry, printers, and shares in a concise readable format, so that holes in system security are readily apparent Malcovery Security, LLC Page 4
5 433a d805907aa4848ff UNKNOWN 3f00dd56b1dc9d9910a554023e868dac 0 of 48 Benign NIST BCP.exe (Microsoft product) BCP stands for Bulk CoPy. It is a Microsoft utility for dumping data from SQL servers: technet.microsoft.com/enus/library/ms aspx 93405c57e915680f fb75c47ee UNKNOWN ab6fb405ef8f06ee98be0b9da UNKNOWN d74ee6ed719d57b0a3f of 46 PPA_setup_en.msi (ElcomSoft password cracking tool). Proactive Password Auditor. See: aeee996fd3484f28e5cd85fe26b6bdcd 1 of 48 PsExec.exe (included in password cracking kits such as mimikatz_trunk.zip demonstrated in this YouTube video: but more commonly seen associated with SysInternals tools.) 2cd8dddaf1a821eeff UNKNOWN QuarksPwDump_cr.exe a109c617ecc92c27e9dab972c8964cb4 0 of 47 QueryExpress.exe kb exe that allows queries against SQL server as a stand-alone f d2bd0199ad2f073a391aacde UNKNOWN e2db09553f23a8abc85633f6bf1a0b49 UNKNOWN Given that list of files and what we know about the possible scenario of the Heartland Payments breach, we can describe a likely scenario for the Target Breach. By reviewing this scenario, we hope readers will gain some insights into possible improvements in their own security for detecting such a breach attempt in the future on their own network. a. Getting tools on the net - NetCat While we do not know how the hackers got in at Target, once they were in, NetCat.exe (possibly named something else) was retrieved from the network. If this breach is similar to Heartland Payments, NetCat would have been a primary way in which the hackers were able to load up their tools onto the internal network in order to perform the reconnaissance necessary to customize the malware that we know they put into place. The MD5 of the NetCat executable is 322e136cb50db03e0d63eb2071da1ba7, found in the list provided by isight Partners. b. Passwords we need some! PsExec.exe, the file isight identified as aeee996fd3484f28e5cd85fe26b6bdcd, is a tool originally by SysInternals, now owned and marketed by Microsoft, which allows a system administrator to export a list of password hashes from a Windows computer. Several tutorials on hacking explain how this tool can be used in conjunction with other tools to identify the passwords of Windows accounts. Quarks PW Dump tool (see description in Figure 1) was also among the files reported by isight. While PsExec is great for identifying userids for the local machine, Quarks adds the capability to dump cached Domain passwords Malcovery Security, LLC Page 5
6 Figure 1. Quarks PwDump - One excellent tool for testing the security of Windows passwords is from ElcomSoft, a Russian security company whose excellent tools for cracking both Windows, Archive (zip files), and Office files have helped me on many occasions when an employee departed from my organization or forgot a critical password. The file that isight identified by the MD5 hash d74ee6ed719d57b0a3f3294 is the Microsoft Installer file of the production version of PPA, Elcom s Proactive Password Auditor. (See Figure 2 for description). Figure 2 Proactive Password Auditor Malcovery Security, LLC Page 6
7 Once we have identified an administrative account, the next objective would be to begin exploring which userids on which systems have special privileges and also to begin to explore file collections that may be of high value. One tool mentioned (by its hash) in the isight report is SomarSoft s DumpSec (See Figure 3). SomarSoft s website says that this tool is a security auditing program for Windows that dumps permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers, and network shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group, and replication information. Figure 3. SystemTools DumpSec - c. Databases find them and dump data from them The next objective of a hacker who is seeking databases is to find the database servers. One common way to do this is to use a Port Scanning tool to look for open network ports that are associated with database servers. Did the Target breach hackers use this method? While we can t say for certain, not having been involved in the investigation, it is certainly a likely scenario, especially given the identification of another file reported by isight Partners. The hash 6c1bcf0b c8c4c12cc70996a75 is used by the file for Angry IP Scanner version 2.21, which is a very aggressive and nicely configurable port scanner. Using this tool, it would be easy for a remote hacker to scan the network to identify any other database servers on the network. After the database servers have been identified, the hacker would likely attempt to connect using various administrative passwords and/or passwords that have been recovered from other portions of the Windows domain. We see evidence that the hacker has prepared to connect and query Microsoft SQL server in four of the files identified in the isight Partners report. Three of the files are actually from Microsoft, two versions of osql.exe (a command line SQL query tool) and osql.dll (required for osql.exe to function) were found by matching the MD5s. BCP.exe, a Microsoft tool for doing Bulk 2014 Malcovery Security, LLC Page 7
8 Copy of data out of an SQL server was also found, as was Albahari s Query Express. The advantage of Query Express is that a single 100kb file can be used to query and retrieve data from SQL servers without having to run any installations or having administrative privileges. d. Exfiltrate the Data Assuming that the intruder is able to identify and dump data from databases, the next challenge is exfiltrating the data not just currently but on an on-going basis. Among the files found were a Microsoft System Center Orchestrator (sometimes known as SCORCH) file used for scheduling and launching services. From the ThreatExpert report (see below) we know that malware was being executed AS A WINDOWS SERVICE. It is possible that SCORCH was used to invoke the actual malware and ensure that the malware would be regularly re-executed. The presence of PortForward.exe is also sometimes used to get past local Access Control Lists. If a server or service is only allowed to write to places on the local network, by using PortForward, an exposed local port can serve as a proxy to a remote location. It is also possible that PortForward worked in the opposite direction, allowing an exposed port that had firewall permissions to allow inbound access to be used to redirect traffic to an internal resource that lacks permission to pass through the firewall. III. Threat Expert Report Threat Expert is an online resource where malware files can be uploaded and automatically analyzed by the Threat Expert system. From a privacy perspective, it can be problematic if a ThreatExpert report is generated on malware that has been designed for a custom attack. This seems to be what occurred in this situation, as the ThreatExpert report has been removed from their website. Security researcher and journalist Brian Krebs retrieved a copy from Google Cache prior to it being fully purged and has saved a copy on his website. The malware was uploaded to ThreatExpert on December 18 th, 2013 to be analyzed. The MD5 for the malware was: CE0296E2D77EC3BB112E270FC260F274 and the file was 270,336 bytes. The malware launches a new service, called POSWDS, which is quite likely the search term Krebs used to find it. A hard-coded internal network address, port 80, was found in the malware. The malware also mounts a shared network drive, , mapping the administrative file share C$ and the path \Windows\Twain_32. The network drive map connects using a domain name TTCOPSCLI3ACS with the hard-coded userid and password Best1_user and BackupU$r. It is possible that, similar to the HeartlandPayments system, the administrative share of the entire drive had been previously established to allow backup software to backup that server s full hard drive. The latter is hinted at by the fact that the password is BackupU$r Backup User? Many of the additional files that were listed in the isight Partners report remain unknown and unknowable for us as outsiders to this investigation, but we believe understanding the set of files laid 2014 Malcovery Security, LLC Page 8
9 out above may be helpful for investigators who are trying to determine whether similar vulnerabilities exist on their own networks. IV. Lessons Learned Let s review some of the things that went wrong at Heartland Payments and that may have gone wrong at Target, as examples of questions we could ask about our own networks. Again, Malcovery is not involved in the Target investigation, and we certainly defer to isight Partners, who played an active role for a fuller set of recommendations. However, some observations are worth noting as general best practices questions, regardless of the specific malware in the Target case. Q1. Do you have a process for identifying Administrative Tools that are stored in the wrong places? Many of the tools used above are NOT DETECTED AS MALWARE because they are not malware. They are network or database administrative tools that have legitimate uses as well. Searching for these tools on YOUR network may help to identify users who have tools that do not match their roles. Tools such as Bit9, or really any good network inventory system, could help to identify the location of network and database administrative tools that are on a machine owned by a user who does not have those responsibilities. Even version matches are important. The OSQL.exe files are from No one should have that version present in a production environment. Q2. Are your servers restricted from accessing the Internet? In the Heartland Payments breach, a server was used to execute a download of NetCat, and then that same server was used to make outbound network connections. Server class machines should never have firewall rules that allow general network use. The argument that servers need to have internet access to retrieve patches is doubly negated. First, patches should be distributed from an INTERNAL patch management system, after appropriate testing. Secondly, if direct network access is needed, the DESTINATIONS THAT SERVE UP PATCHES should be hardcoded as the only legitimate outbound traffic allowed from these devices. In both the Target breach and the Heartland Payment breach, the method of data exfiltration was an FTP command. Again, there should be no circumstance where the firewall would allow an FTP command from a server class machine. In addition, because FTP is an insecure protocol that passes userid and password information in plain text on the wire, any internal machine originating an outbound FTP should be reviewed to determine if there is a business reason for the FTP to be occurring. Q3. Is there an inventory of authorized services for your servers? In the Target case, we know that the malware was running as a Windows Service named POSWDS. While it is unknown to this analyst if this was a customary service name for the Point Of Sale service within Target, it certainly would have been a wrong binary to be running as a service. Q4: Are system folders being checked for new or changed files? In the Target case, the data collector was storing information in the Windows folder under the subdirectory \twain_32 with the stolen information being disguised as a.dll file Malcovery Security, LLC Page 9
10 Q5: Is there a way to check for unusual protocols and ports being used for internal LAN communications? In the Target case, many of the binaries, according to isight s report, used ICMP to communicate with one another. ICMP is most commonly associated with the PING command, and is very rarely logged in standard network logging. A periodic check for atypical network protocols being used on the network may be worth considering. Q6: Are internal network honeypots in place to look for port-scanning and other signs of an intruder? In all of the data breaches mentioned in this paper, a key aspect of the criminal s reconnaissance was identifying and mining the internal SQL servers. It would certainly be a worthwhile practice to deploy honeypot versions of internal servers. A criminal intruder port-scanning for databases would certainly encounter your honeypot if it were listening on standard ports. This could be an early warning system that someone is hunting inside your network Malcovery Security, LLC Page 10
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
How We're Getting Creamed
ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for
INDICTMENT. The Grand Jury in and for the District of New Jersey, COUNT 1 (Conspiracy) 18 U.S.C. 371. 1. At various times relevant to this Indictment:
SBK/EL/2009R00080 UNITED STATES DISTRICT COURT DISTRICT OF NEW JERSEY UNITED STATES OF AMERICA v. ALBERT GONZALEZ, a/k/a segvec, a/k/a soupnazi, a/k/a j4guar17, HACKER 1, and HACKER 2 Hon. Criminal No.
Inside a Targeted Point-of-Sale Data Breach
Keith Jarvis and Jason Milletary Dell SecureWorks Counter Threat Unit Threat Intelligence Threat ID: 773 URL: https://portal.secureworks.com/intel/mva?task=showthreat&threatid=773 Release Date: 24 January
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Penetration Testing Walkthrough
Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security
Security+ Supported Labs - V1 Lab 1 Network Devices and Technologies - Capturing Network Using tcpdump to Capture Network with Wireshark with Network Miner 2 Secure Network Administration Principles -
Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals
Five Steps to Improve Internal Network Security Chattanooga Information security Professionals Who Am I? Security Analyst: Sword & Shield Blogger: averagesecurityguy.info Developer: github.com/averagesecurityguy
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes Compass Security AG, Daniel Stirnimann Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel +41 55-214 41 60 Fax +41
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Trend Micro Worry- Free Business Security 8.0. 1 st time setup Tips & Tricks
Trend Micro Worry- Free Business Security 8.0 WFBS installation best practise, preparations and how to Preparation for 2008 Server IIS: Configuring the required Internet Information Services (IIS) roles
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Defending Against Attacks by Modeling Threat Behaviors
Defending Against Attacks by Modeling Threat Behaviors John Benninghoff Transvasive Security Transparent and Pervasive Security 2013 Verizon DBIR Recommendations What can we do about it? Collect, analyze
DMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
WhatsUp Event Archiver v10 and v10.1 Quick Setup Guide
WhatsUp Event Archiver v10 and v10.1 Quick Setup Guide Contents WhatsUp Event Archiver Quick Setup Guide WhatsUp Event Archiver Quick Setup Guide... 2 Installation Requirements... 3 Manually Creating Firewall
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Attacking the Traveling Salesman Point-of-sale attacks on airline travelers DEFCON 2014
Attacking the Traveling Salesman Point-of-sale attacks on airline travelers DEFCON 2014 Alex Zacharis Nikos Tsagkarakis [email protected] Census S.A. http://census-labs.com/ Contents Why target travelers?
WHY ATTACKER TOOLSETS DO WHAT THEY DO
WHY ATTACKER TOOLSETS DO WHAT THEY DO (or.. Reasons they just keep working ) Matt McCormack OVER THE LAST YEAR 50+ engagements Good chunk of different verticals, industries, etc. Varying qualities and
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Hacking databases for owning your data. Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com)
Hacking databases for owning your data Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com) Overview Introduction Why database security? How databases are hacked? Oracle Database Server attacks
Threat Advisory: Accellion File Transfer Appliance Vulnerability
Threat Advisory: Accellion File Transfer Appliance Vulnerability Niara Threat Advisories provide timely information regarding new attacks along with how Niara helps companies quickly detect an attack to
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Need for Database Security. Whitepaper
Whitepaper 2 Introduction The common factor in today s global economy where most of the business is done electronically via B2B [Business to Business] or via B2C [business to consumer] or other more traditional
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Xerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
ScanRouter Lite 2.0.6.0
ScanRouter Lite 2.0.6.0 ScanRouter V2 Lite Distribution software bundled to the MFPs, FAXs, and Scanners ScanRouter V2 Lite helps users create a "paperless office" environment by providing easy distribution
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
INDUSTRY OVERVIEW: FINANCIAL
ii IBM MSS INDUSTRY OVERVIEW: FINANCIAL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: NOVEMBER 5, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW... 1 MAJOR FINANCIAL
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0.
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report Template for PFI Final Incident Report Version 1.0 August 2014 Document Changes Date Version Description August 2014 1.0 To
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Template for PFI Final Incident Report for Remote Investigations
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report for Remote Investigations Template for PFI Final Incident Report for Remote Investigations Version 1.1 February 2015 Document
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Baseline Security Analyzer Microsoft Baseline Security Analyzer (MBSA) is a software tool released by Microsoft to determine security state by assessing missing security updates and lesssecure
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Server Installation, Administration and Integration Guide
Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.1.
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report Template for PFI Final Incident Report Version 1.1 February 2015 Document Changes Date Version Description August 2014 1.0 To
Managed Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year
Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions
Getting started with OWASP WebGoat 4.0 and SOAPUI.
Getting started with OWASP WebGoat 4.0 and SOAPUI. Hacking web services, an introduction. Version 1.0 by Philippe Bogaerts [email protected] www.radarhack.com Reviewed by Erwin Geirnaert
Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM
Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
EntroWatch - Software Installation Troubleshooting Guide
EntroWatch - Software Installation Troubleshooting Guide ENTROWATCH SOFTWARE INSTALLATION TROUBLESHOOTING GUIDE INTRODUCTION This guide is intended for users who have attempted to install the EntroWatch
Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy
Lab 7 - Exploitation 1 NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 2 Item I. (What were you asked to do?) Metasploit Server Side Exploits Perform the exercises
