We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site



Similar documents
APT Advanced Persistent Threat Time to rethink?

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Practical Steps To Securing Process Control Networks

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Continuous Network Monitoring

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Penetration Testing: Lessons from the Field

How We're Getting Creamed

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

IDS and Penetration Testing Lab ISA 674

How To Test For Security On A Network Without Being Hacked

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Penetration Testing - a way for improving our cyber security

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Analyze. Secure. Defend. Do you hold ECSA credential?

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Presented by Evan Sylvester, CISSP

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Rational AppScan & Ounce Products

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Penetration Testing in Romania

Penetration Testing Services. Demonstrate Real-World Risk

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

The Top Web Application Attacks: Are you vulnerable?

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Vinny Hoxha Vinny Hoxha 12/08/2009

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Defending Against Data Beaches: Internal Controls for Cybersecurity

Information Security Services

Attack and Penetration Testing 101

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

A New Era. A New Edge. Phishing within your company

FedRAMP Penetration Test Guidance. Version 1.0.1

Cyber R &D Research Roundtable

Critical Controls for Cyber Security.

Virtual Learning Tools in Cyber Security Education

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

!!!!!!!!!!!!!!!!!!!!!!

Penetration Test Report

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

CRYPTUS DIPLOMA IN IT SECURITY

Metasploit The Elixir of Network Security

HackMiami Web Application Scanner 2013 PwnOff

AGENDA HIP Ho AA w i rivacy d The B reach Happen? I P nc AA Secu dent R rit esp y o nse Corrective Action Plan What We Learned ACRONYMS USED

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

PENTEST. Pentest Services. VoIP & Web.

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Five Steps to Improve Internal Network Security. Chattanooga ISSA

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Security Testing for Web Applications and Network Resources. (Banking).

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Assuring Application Security: Deploying Code that Keeps Data Safe

Web Security School Final Exam

AUTOMATED PENETRATION TESTING PRODUCTS

Hackers are here. Where are you?

What is Penetration Testing?

PENETRATION TESTING GUIDE. 1

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

SCOPING QUESTIONNAIRE FOR PENETRATION TESTING

IDS and Penetration Testing Lab ISA656 (Attacker)

Effective Penetration Testing Netwerk Guardian LLC

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier

Top 20 Critical Security Controls

White Paper: Consensus Audit Guidelines and Symantec RAS

WHITEPAPER. Nessus Exploit Integration

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Penetration Testing. Presented by

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Information Technology Risk Management

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

(WAPT) Web Application Penetration Testing

Technical Testing. Network Testing DATA SHEET

Scoping Questionnaire for Penetration Testing

The Evolution of Application Monitoring

Reducing Application Vulnerabilities by Security Engineering

EC-Council Certified Security Analyst (ECSA)

Security and Privacy

Attack Intelligence: Why It Matters

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

I N T E L L I G E N C E A S S E S S M E N T

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Using Free Tools To Test Web Application Security

Network and Host-based Vulnerability Assessment

Learn Ethical Hacking, Become a Pentester

Bellevue University Cybersecurity Programs & Courses

Security Analytics for Smart Grid

RFP No C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST

Hackers are here. Where are you?

The Peak of Chaos Shane D. Shook, PhD 10/31/2012

Transcription:

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site April 18, 2012

Outline Motivation What is Pen Testing? Establishing the Program Our Approach Pen Test Results Conclusion

DOE Hanford Site To make our customers extraordinarily successful in our unified mission of cleaning up the Hanford Site Hanford Site IT Scope 586 square miles 8,000+ PCs 500+ servers 400+ applications 1,000+ miles fiber to 300 bldgs 12,500+ phones

Motivation

Motivation Why establish a Pen Test Program? Pen Testers found vulnerabilities my cyber team missed Why establish an in-house team? Typical Pen Tests run for a week, APT-style attacks run for weeks and months Outstanding opportunity to grow my cyber team

Motivation Program Goal: Identify HLAN vulnerabilities and risks to provide management with an assessment of the general security posture of HLAN resources from an internal attacker perspective. Identify and validate technical weaknesses in HLAN security architecture, configuration, and/or controls relative to protection of HLAN system and information confidentiality, integrity and availability.

What is Pen Testing?

What is Pen Testing? National Institute of Standards and Technology (NIST) Special Publication 800-115: Security testing in which evaluators mimic real-world attacks in an attempt to identify ways to circumvent the security features of an application, system, or network. Penetration testing often involves issuing real attacks on real systems and data, using the same tools and techniques used by actual attackers.

What is Pen Testing? Why Pen Testing? Complements Assessments and Vulnerability scanning Finds more real world risks Many vulnerabilities found by scanners are not exploitable in the network environment Pen Testing can use a mosaic of vulnerabilities to actually exploit (penetrate) a system Pen Testing communicates the actual risk in a powerful way: Pen Tester to System Owner: Let me show you screen shots from inside your application. Let me show you your information I took out of your system Note: Pen Testing requires solid cyber security technical understanding and experience and disciplined processes to be effective and to minimize impact to the systems - it s not a game

What is Pen Testing? Typical Pen Test Approach Planning Recon Scanning Exploitation Report

Establishing the Program

Success Factors Very capable people that: Are trained in Pen Testing & tools Have solid domain knowledge and experience Think like a hacker but are disciplined and thorough Solid processes in place Pen Test Authorization (Scope, ROE, Trusted Agent, ) Templates for Pen Test Log, Final Report, Access to the right tools Tool suite(s) that cover all phases of Pen Testing: Scanning, Exploit Tools that enable the staff to be productive

Deliverables Develop Penetration Test Program Plan At least two staff trained and certified in Pen Testing Establish procedures for Pen Testing Acquire tools for Pen Testing Conduct Pen Test Pilot Exercise Develop FY 2011 Pen Test Schedule

Tools Some experience with Core Impact and WebInspect Selected Backtrack as primary distribution Metasploit, nmap, Purchased for the team Burp Suite Pro High-end Windows laptops Vmware Workstation Image snap software

Process Plan and Procedure Templates (Pen Test Authorization, Pen Test Log) Pen Test Pilots #1 was a table top exercise - validate procedures #2 was against a server subnet #3 was against a client subnet

People Selecting the right candidates: Aptitude Attitude Experience: Windows/Unix/Network admin, programming Established a 4 person team Training selected: SANS 560 - Network Penetration Testing and Ethical Hacking SANS 542 - Web App Penetration Testing and Ethical Hacking

Our Approach

Issues No one on team had done Pen Testing If we can t exploit our network, is it because our network is very secure? our Pen Test skills are very limited? If we demonstrate multiple exploits, is it because... our team is very good? our network is very insecure?

FY 2011 Pen Test Overview FY 2011 Q1 Developed Pen Test program FY 2011 Q2 Focused on approach/items found by FY 2010 ST&E FY 2011 Q3 Focused on Personally Identifiable Information (PII) FY 2011 Q4 Focused on Pen Test team members' skills & more realistic attacks

Approach Start with a valid network account Zero day attacks achieve PC compromise Insider attacks have a valid account Seek teachable moments Seek exploits that motivate change

Approach, cont Partner with the IT staff Don t trade Pen Test ego for IT staff cooperation Exploit using non-privileged information Work together as a Pen Test Team Not as a room of individual Pen Testers!

Pen Test #1

Pen Test #1 Pen Test Focus FY 2010 ST&E techniques and results Pen Test Schedule Recon over whole period 2/7/2011 3/11/2011 Exploits over a single Pen Test week Results Lessons learned

Screen Shots Removed X Windows Cold Fusion JBoss Server Power Down

Pen Test #2

Screen Shots Removed PII in speadsheet Replicated accounts/pass-the-hash DBMS w/pii Meterpreter shell access to server with PII

Pen Test #2 Pen Test Focus Objective-focused target: PII Pen Test Schedule Recon/Scanning/Exploitation 05/02/2011 to 06/17/2011 Analysis to identify likely (productive) sources of PII Shares on SAN, servers, clients Exchange public folders ftp servers Document Management System Key applications: Medical, HR, Finance, Security

Pen Test #3

Pen Test #3 Q4 Pen Test Focus Build Pen Test team members skills More closely model attackers behavior seen in DOE and other major breaches (RSA, ) Spear phishing email Drive-by downloads from web sites Chained Exploits Focused on more sophisticated objectives Multiple campaigns Q4 Pen Test Schedule Recon/Scanning/Exploitation: 07/25/11 9/17/11

Campaign 1 (Leveraging Cold Fusion Console) Cold Fusion Server Cold Fusion Server Test SQL Database Test SQL Database Test Web App Production Web App (Administrator)

Campaign 1, cont Cold Fusion Server Cold Fusion Server Test SQL Database (Production Data?) Test SQL Database Production SQL Database (Administrator)

Campaign 2 (Going after target users) USER_AUTH Content Mgmt System Admin Modify Web Site for Drive By Shell on 176 PCs Control of Target Users Key logging of username/passwords

Campaign 3 (Attacking privileged users) Spear Phish Support Group Web App XSS Load Active X Control Shell on 6 PCs RDP to additional PCs Shell on 2 PCs

Screen Shots Removed (various)

Pen Test #4 - Conclusions This Pen Test more closely paralleled the real-world attacks Use of spear phishing Use of drive-by downloads Compromise and control of multiple user PCs Undetected by Cyber incident or IT staff

Concluding Thoughts

Offense Informs Defense Security Architecture Security Testing Incident Management

Lessons Learned Pen Tester aptitude, attitude, discipline and skills are key to success Think like a tester systematic, tedious, documented The importance of persistence The importance of indirect attacks/chained exploits

Lessons Learned, cont Web-based applications are weak Older web apps have poor security architecture and coding Developers don t realize what proxies can do Very positive response from developers Shifting focus to SDLC and security testing Beginning to think like a Pen Tester.you see your program very differently

Final Thoughts The Pen Testing program exceed objectives We found many weaknesses we would not have found otherwise... including program weaknesses It s changed how we think about cyber security It s become an essential part of our continuous monitoring

Questions?