Turning your managed Anti-Virus



Similar documents
Application Security Testing

How to hack VMware vcenter server in 60 seconds

Penetration Testing - a way for improving our cyber security

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

SAST, DAST and Vulnerability Assessments, = 4

Web Application Security Payloads. Andrés Riancho Director of Web Security OWASP AppSec USA Minneapolis

Privilege Escalation via Antivirus Software

Penetration Testing in Romania

Web App Security Audit Services

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

McAfee VirusScan Enterprise for Linux Software

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Web Application Report

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Locking down a Hitachi ID Suite server

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN. Final. Version 1.0

Thick Client Application Security

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Using Nessus In Web Application Vulnerability Assessments

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Learn Ethical Hacking, Become a Pentester

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

IOActive Security Advisory

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Unprecedented Malware Growth

Implementation of Web Application Firewall

Application Security Testing. Generic Test Strategy

Web Applications The Hacker s New Target

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

Penetration Testing: Lessons from the Field

How to hack VMware vcenter server in 60 seconds

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

RBackup Server Installation and Setup Instructions and Worksheet. Read and comply with Installation Prerequisites (In this document)

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Pentests more than just using the proper tools

Pentests more than just using the proper tools

McAfee Endpoint Encryption for PC 7.0

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator Software

Penetration Testing for iphone Applications Part 1

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Common Security Vulnerabilities in Online Payment Systems

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust

Automated Vulnerability Scan Results

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Detecting rogue systems

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Web Intrusion Detection with ModSecurity. Ivan Ristic

Web application security: automated scanning versus manual penetration testing.

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO

Nessus and Antivirus. January 31, 2014 (Revision 4)

Rational AppScan & Ounce Products

Data Security and Governance with Enterprise Enabler

1. LAB SNIFFING LAB ID: 10

McAfee Certified Product Specialist McAfee epolicy Orchestrator

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

Symantec Endpoint Protection Analyzer Report

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

System Management. What are my options for deploying System Management on remote computers?

Offensive Security. Advanced Web Attacks and Exploitation. Mati Aharoni Devon Kearns. v. 1.0

Web application testing

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Securing SharePoint 101. Rob Rachwald Imperva

SSL SSL VPN

Different ways to guess Oracle database SID

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Penetration Testing: Advanced Oracle Exploitation Page 1

Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH

Introduction to the Mobile Access Gateway

The McAfee SECURE TM Standard

Criteria for web application security check. Version

New IBM Security Scanning Software Protects Businesses From Hackers

AV Management Dashboard

That Point of Sale is a PoS

McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

SiteCelerate white paper

Project X Mass interception of encrypted connections

Introduction to Endpoint Security

Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Transcription:

Turning your managed Anti-Virus into my Botnet Jérôme NOKIN http://funoverip.net

About me # id Jérôme Nokin http://funoverip.net jerome.nokin@gmail.com # job Penetration Tester Verizon Enterprise Solutions # sudo certs OSCE OSCP CEH

Research Topic: Managed Antivirus Central server(s) of such software regularly communicate with the endpoints and perform privileged actions against them. From an attacker's perspective, vulnerabilities in such servers might have a very large impact against the whole set of managed stations. Yes, we found vulnerabilities. However: This talk isn t full of reversing/debugging/fuzzing screenshots. Paper will soon address such details. This talk is about how we used these vulnerabilities (impact).

Approach To focus on the non-clear-text traffic between the central server(s) and the managed stations. To reverse engineer both the software and the communication protocol. To develop dedicated Fuzzers able to impersonate end-point agents.

Selected Targets McAfee epolicy Orchestrator Symantec Endpoint Protection

McAfee epolicy Orchestrator

Common deployment

Some notes & protocols Agents must be registered Agents to server Server to Agents Agent GUID Events, Info, Updates, HTTP(S) Wake-up calls (8082/TCP) DSA/RSA keys Regular polling

HTTP request sample (client server)

CVE-2013-0140 SQL Injection SQL Injection issues were discovered inside the XML Full Properties message (data section)

CVE-2013-0141 Directory Path Traversal Below is an Event Request content (data section) This request creates an XML file on the server, which contains data about an event. BLUE Destination filename GREEN Length of the filename RED Length of the data BLACK The data

CVE-2013-0141 Directory Path Traversal What happens if we replace the filename from: 20121210121340871913800000D60.xml to:../../software/00000000000000.jsp

Post-Authenticated vulnerabilities Prior to any communication between an agent and the epo server, the agent must be registered. So far, we can only trigger vulnerabilities by impersonating a registered agent.

Registration request

Reqseckey the published private key How does epo verify the signature if it doesn t know the public key yet? The signature is actually not generated using the agent private key, but using a dedicated epo key which is published to everyone That private key is called "reqseckey" and is embedded in the agent installation package. Additionally, that key is available for download from the epo server: https://epo/software/current/epoagent3000/ins tall/0409/reqseckey.bin

Did you say 3DES? Part of the registration request is encrypted using 3DES The symmetric key is obfuscated inside the binaries and therefore is the same in all epo environments (and versions) At your office, the key is: echo -n '<!@#$%^>' sha1sum 3ef136b8b33befbc3426a7b54ec41a377cd3199b

Sign Up (It s free and always will be)

Post-Authenticated vuln Rogue Agent Registration: (Kind of) Pre-Authenticated

Remote Command Execution

Remote command execution Method 1 Extended stored procedure Using SQLi and 'xp_cmdshell If available (dba privs?) MSSQL isn t always running with SYSTEM privileges Enhancement: In recent epo versions, admin is warned if epo starts with DBA privs

Remote command execution Method 2 Reuse epo features! Registered Executable To be used as an Automatic Response with Rogue Event requests Always run with SYSTEM privileges

So far, so good Registration Published private key Static encryption key (3DES) Database access SQL Injection (CVE-2013-0140) Upload Directory Path Traversal (CVE-2013-0141) Remote Command Execution Download Registered Executable Automatic Responses After all, It s a web server Just have to move files using RCE

Remember this?

Would that be possible?

Creating Rogue McAfee packages

Creating rogue packages (1) Updating catalog.z on the epo server (available software list) XML file containing the software catalog Compressed as a CAB file Digitally signed using: DSA: C:\Program~1\McAfee\Epo\DB\Keystore\sm<hostname>.zip RSA: C:\Program~1\McAfee\Epo\DB\Keystore\sm2048<hostname>.zip Encrypted using 3DES Same key as before. Seems to be an universal key in McAfee world? Creating a McAfee package Generating a PkgCatalog.z file (metadata information). Also XML CAB Signature 3DES Add evil files

Creating rogue packages (2) Updating epo repository files (using Dir Path Traversal ) Kindly ask other epo repositories to update their caches (using SQLi) Creating a Deployment Task (using SQLi) Dears agents, please download and install the following package. I have digitally signed the package so you can trust it Abusing the Wake Up calls (using SQLi) By the way, do you mind to obey now?

epolicy 0wner Tiny Demo (Get the full version here: http://funoverip.net/?p=1405)

Security patch & references McAfee released a security patch in May 2013. All of these issues are resolved in epo 5.0, 4.6.6, and 4.5.7 https://kc.mcafee.com/corporate/index?page=content&id=sb10042 US-CERT advisory http://www.kb.cert.org/vuls/id/209131 CVE http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0140 http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0141

Internet survey Getting data Fingerprint Using epo SSL server certificates Shodan SSL DB not ready yet Zmap Internet wide scan using Zmap at 70Mbps (~13h) + SSL extract (~2 weeks) Crossing Results Thanks to Zmap team for your data!

Internet survey 1701 servers found 140; 8% (Scan date: Sep 1 st 2013) Vulnerable versions Non Vulnerable versions Unknown versions 862; 51% 699; 41% How many managed devices behind?

Internet survey World map view Still a draft picture.. Sorry.. Note: 11 servers vulnerable in this city (Amsterdam)

Conclusion

What did we learn? Security issues can be everywhere In mature products, since years! Hidden by complex protocols or structures It s only a matter of time and energy to find them Chained issues Do not under-estimate a single vulnerability Impact is much more important if coupled with additional weaknesses Do not rely on CVSS score only epo SQL Injection base score: 7.9 epo Dir Path Traversal base score : 4.3 However, impact for chained vulnerabilities: We 0wn the Matrix

Give enough time to your testers Customer I would like you to audit my web application. Security is important for us! Pentester I m your man! I would need 6 days + 1 day for reporting. Customer Awesome! You have 4 days, including reporting. Pentester

Q&A

Btw, about SEP (Symantec) CVE-2013-1612 Remote buffer Overflow