Pentests: Exposing real world attacks



Similar documents
Hacking (and securing) JBoss AS

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Penetration Testing //Vulnerability Assessment //Remedy

Passing PCI Compliance How to Address the Application Security Mandates

Penetration Testing Service. By Comsec Information Security Consulting

Web App Security Audit Services

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

A Network Administrator s Guide to Web App Security

NETWORK PENETRATION TESTING

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

A Decision Maker s Guide to Securing an IT Infrastructure

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

IT HEALTHCHECK TOP TIPS WHITEPAPER

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Where every interaction matters.

05.0 Application Development

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Pentests more than just using the proper tools

Pentests more than just using the proper tools

Penetration Testing. Security Testing

Adobe Systems Incorporated

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt

Penetration Testing in Romania

Penetration testing & Ethical Hacking. Security Week 2014

Metasploit The Elixir of Network Security

Information Security Certifications

Hosts HARDENING WINDOWS NETWORKS TRAINING

Vulnerability Assessment and Penetration Testing

locuz.com Professional Services Security Audit Services

Professional Penetration Testing Techniques and Vulnerability Assessment ...

WEB APPLICATION VULNERABILITY STATISTICS (2013)

Payment Card Industry (PCI) Data Security Standard

Internal Penetration Test

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Goals. Understanding security testing

Rational AppScan & Ounce Products

Overview of the Penetration Test Implementation and Service. Peter Kanters

Secure Web Applications. The front line defense

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

FORBIDDEN - Ethical Hacking Workshop Duration

Four Top Emagined Security Services

An Introduction to Network Vulnerability Testing

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Exploiting Transparent User Identification Systems

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

by Debasis Mohanty (Orissa, India)

Database Security Guide

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Penetration Testing - a way for improving our cyber security

An approach to Web Application Penetration Testing. By: Whiskah

Penetration Testing Lessons Learned. Security Research

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

The Top Web Application Attacks: Are you vulnerable?

Protecting Your Organisation from Targeted Cyber Intrusion

Web Application Vulnerability Testing with Nessus

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Information Security Services

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Penetration Testing Report Client: Business Solutions June 15 th 2015

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Define risk and risk management Describe the components of risk management List and describe vulnerability scanning tools Define penetration testing

Security Testing & Load Testing for Online Document Management system

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

FREQUENTLY ASKED QUESTIONS

Presented by Evan Sylvester, CISSP

Penetration Testing Scope Factors

Tools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Network Security Audit. Vulnerability Assessment (VA)

Directory and File Transfer Services. Chapter 7

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Web Application security testing: who tests the test?

Web Applications The Hacker s New Target

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Week 13. Uploading Files to Web Hosting

Transcription:

HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet Security Day 2011 Pentests: Exposing real world attacks Renaud Dubourguais <Renaud.Dubourguais@hsc.fr> Jean-Baptiste Aviat <Jean-Baptiste.Aviat@hsc.f>

Hervé Schauer Consultants Information security consulting company since 1989 Fully independent intellectual expertise services Free of any distribution, integration, outsourcing, staff delegation or thirdparty investors biases Services: consulting, research, audit, penetration tests, training Field of expertise OS Security : Windows, Unix,Linux and embedded components Application security Network security Organizational security Consultants certifications : 2/28 CISSP, ISO 20000-1 Lead Auditor, ISO 27001 Lead Auditor, ISO 27001 Lead Implementor, ISO 27005 Risk Manager, ITIL, ProCSSI, GIAC GCFA

What is a pentest? Simulation of a real attack on: Infrastructure by exploiting badly designed firewall rules, exposed services,... Exposed Web applications by testing user inputs, application bugs, Mainly from two point of view: Blackbox, without information about the remote infrastructure, just a URL Greybox, with a user account Various purposes: Security assessment Decision makers awareness Technical staff awareness 3/28

Security assessment (1/3) Assess the global security level of your infrastructure: Applications Network Websites... Technical skills needed: Dedicated to real hackers Or accessible to script kiddies? 4/28

Security assessment (2/3) Pentest should not to be mistaken with vulnerability scanning or vulnerability assessment. Vulnerability scanning (Qualys, Rapid7, Nessus...) is cheap and automated but : Results are not confirmed by a human assessor Does not necessarily prove that a vulnerability is there and actually exploitable (lots of 'might/could be vulnerable' in reports) Can not look for for tricky vulnerabilities in web applications in an efficient and useful way Can not bounce (from a compromised system to a vulnerable one) to prove that more systems are at risk Has no notion of business risk (all vulnerabilities considered the same) Are tools for regulatory and compliance, but not the ones used by hackers to penetrate systems This presentation is about real pentests, simulating real-world attacks 5/28

Security assessment (3/3) Issues usually summarized in a table: 6/28

Technical staff awareness Provide technical details about the intrusion in order to: Reproduce attacks Check vulnerability corrections Give concrete recommendations for each vulnerability: Best pratices to fix it And both: State of the art practices Pragmatic options to fix the issues 7/28 memcpy(new->pktrtp.pcap.pkt, pktrtp->pcap.pkt, pktrtp >pcap.hdr.caplen); new->pktrtp.len = pktrtp->len; if (rtp_stream->pkts.lh_first == NULL) { LIST_INSERT_HEAD(&rtp_stream->pkts, new,l); } else { if (before) { LIST_INSERT_BEFORE(before, new, l); } else { if (after) LIST_INSERT_AFTER(after, new, l); else FATAL("buffer not empty and before,after NULL"); } }

Decision makers awareness Pentests are not relevant only to technical staff Decision makers want to know: Do we have vulnerabilities? Are they easy to exploit? Are they easy to fix? How good (or bad) are they related to other similar companies? 8/28

Case study Single information provided to the pentesters : http://www.equivalency.co.uk 9/28

At first sight > 10/28

Guessing the infrastructure... 11/28

After browsing for a few minutes 12/28

What does it look like now? 13/28

SQL Injection issue Possibility to extract database information: Using a custom script No sensitive information on such a website Except for the user accounts authorized to edit content Demonstration 14/28

In the vulnerabilities summary... Looks like an SQL injection flaw! 15/28

Weak passwords policy Retrieved accounts passwords are encrypted To be precise : they are 'hashed' ('one-way encryption') If some of them are simple: They can be retrieved! Demonstration 16/28

In the vulnerabilities summary... 17/28

No filtering on file extensions (1/2) Editing users are allowed to upload images 18/28

No filtering on file extensions (2/2) Instead of uploading an image: Let's upload an executable ASP script Which can act as an interface to the operating system Public webshells are easy to found (c99.php, r57.php, ) HSC consultants developed their own webshell Demonstration 19/28

In the vulnerabilities summary... 20/28

Where are we now? 21/28

Bounce to the SQL Server LocalSystem user can extract hashes from the system Public tools exist (fgdump.exe) But also private tools (forestdump for HSC) Such hashes can be broken Using 'Rainbow tables' If a local account is shared accross servers: We can bounce to them! Demonstration 22/28

In the vulnerabilities summary... 23/28

Where are we now? 24/28

Compromising the Active Directory Domain controllers can be identified by querying a DNS record $ dig SRV @192.168.111.110 _ldap._tcp.dc._msdcs.hsc.local [...] ;; ANSWER SECTION: _ldap._tcp.dc._msdcs.hsc.local. 600 IN SRV 0 100 389 win2003-ad.hsc.local. ;; ADDITIONAL SECTION: win2003-ad.hsc.local. 3600 IN A 192.168.111.110 If a critical vulnerability hasn't yet been patched: It can be exploited to take control of the system MS06-040 (netapi), MS08-067 (netapi), MS10-46 (LNK),... Demonstration 25/28

In the vulnerabilities summary... 26/28

Where are we now? 27/28

Conclusion Increasing number of attacks against web applications A vulnerability can be created by mistake very quickly : Unfiltered user inputs, weak passwords, unpatched software Exploitation techniques are now mature Impact can be disastrous : Leak of confidential data Servers and applications compromised or vandalized Pentests make you aware of the issues before the real hackers... 28/28