WHY ATTACKER TOOLSETS DO WHAT THEY DO



Similar documents
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Networking for Caribbean Development

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of

RSA Security Anatomy of an Attack Lessons learned

Penetration Testing Report Client: Business Solutions June 15 th 2015

Secret Server Qualys Integration Guide

Getting Started with Clearlogin A Guide for Administrators V1.01

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewall Design Principles Firewall Characteristics Types of Firewalls

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

NSFOCUS Web Application Firewall White Paper

Trend Micro Worry- Free Business Security st time setup Tips & Tricks

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

AVG Business Secure Sign On Active Directory Quick Start Guide

Proxies. Chapter 4. Network & Security Gildas Avoine

Workday Mobile Security FAQ

Application Note. Onsight Connect Network Requirements v6.3

Firewalls. Chapter 3

Five Steps to Improve Internal Network Security. Chattanooga ISSA

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Network Traffic Analysis

Basic & Advanced Administration for Citrix NetScaler 9.2

Tenable for CyberArk

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Learn Ethical Hacking, Become a Pentester

Where every interaction matters.

How To - Implement Clientless Single Sign On Authentication with Active Directory

Test Case 3 Active Directory Integration

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright Palo Alto Networks

Internal Penetration Test

User Guide. You will be presented with a login screen which will ask you for your username and password.

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

CS5008: Internet Computing

Xerox Mobile Print Cloud

Setting Up Scan to SMB on TaskALFA series MFP s.

1. LAB SNIFFING LAB ID: 10

Firewalls and Software Updates

XIA Configuration Server

Web App Security Audit Services

Kaseya Server Instal ation User Guide June 6, 2008

Penetration Testing with Kali Linux

Firewall Firewall August, 2003

Exploiting Transparent User Identification Systems

Penetration Test Report

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

WhatsUp Gold v16.3 Installation and Configuration Guide

Network Architecture & Active Directory Considerations for the PI System. Bryan Owen - OSIsoft Joel Langill - SCADAhacker

F-Secure Messaging Security Gateway. Deployment Guide

FREQUENTLY ASKED QUESTIONS

A Guide to New Features in Propalms OneGate 4.0

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Actuality of SMBRelay in Modern Windows Networks

What is Web Security? Motivation

System Administration Training Guide. S100 Installation and Site Management

Cyber Essentials. Test Specification

Sitefinity Security and Best Practices

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

FortiWeb 5.0, Web Application Firewall Course #251

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Intro to Firewalls. Summary

How To - Implement Single Sign On Authentication with Active Directory

What is the Barracuda SSL VPN Server Agent?

Deploy Remote Desktop Gateway on the AWS Cloud

Introduction to Mobile Access Gateway Installation

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

Citrix Access Gateway Plug-in for Windows User Guide

Concierge SIEM Reporting Overview

Locking down a Hitachi ID Suite server

Preparing for GO!Enterprise MDM On-Demand Service

Chapter 9 Firewalls and Intrusion Prevention Systems

Integrating LANGuardian with Active Directory

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

IP Application Security Manager and. VMware vcloud Air

Web Application Security

PC Monitor Enterprise Server. Setup Guide

Migration Project Plan for Cisco Cloud Security

Security Correlation Server Quick Installation Guide

M2M Series Routers. Port Forwarding / DMZ Setup

Grandstream Networks, Inc. UCM6100 Security Manual

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

NEFSIS DEDICATED SERVER

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP

Deployment Scenarios

FortKnox Personal Firewall

Introduction to the EIS Guide

Protecting Your Organisation from Targeted Cyber Intrusion

Securing the Microsoft Platform on Amazon Web Services

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

File Share Navigator Online 1

Windows Remote Access

Installing and Configuring Active Directory Agent

Transcription:

WHY ATTACKER TOOLSETS DO WHAT THEY DO (or.. Reasons they just keep working ) Matt McCormack

OVER THE LAST YEAR 50+ engagements Good chunk of different verticals, industries, etc. Varying qualities and effectiveness of defenses Collective noun of different Threat Groups but really? Similar tools and tactics

THE MAGIC OF INTERPRETIVE DANCE Pick through this year s interesting engagements Construct a convenient narrative Discuss the common blind-spots the tools keep leveraging Explore Reasons They Just Keep Working (RIJKW)

OUR SCENARIO

RTJKW #1: AD HOC DEPLOYMENTS Deploy and forget (bonus: default configurations) External teams not looping in the security team Third-party systems without patch management Cloud infrastructure: the new frontier of terrible

THE VOLUME GAME Scan and exploit; because eventually it will work

CHINACHOPPER POST Webshell all the things

OWA: WHO NEEDS THE DC? ISAPI filter (.NET) OwaAuth.Application_EndRequest() - Receives request after submitted - Extract username and password from login, save to text file - Parse traffic for magic key, password, and params for backdoor

OwaAuth.ShowError() - List, read, write, delete, modify, files and directories Timestomp file or directory Download file from URL Launch process Connect, query, write to SQL server

OUR SCENARIO SO FAR

ACEHASH: ALL THE HASHES Mimikatz Custom-compiled PE executes sekurlsa:: logonpasswords command automatically Ace1 Custom DLL, uses samsrv.dll APIs to dump hashes from disk/registry Ace2 Custom DLL, based on WCE, uses msv1_0.dll APIs for LM/NTLM InjectMemDll Inject above when required

OUR SCENARIO SO FAR

RTJKW #2: CREDENTIAL ISSUES Golden images are convenient, as is scripting installs Same local Admin passwords is not great Failing to restrict local Admin over network Insecurely storing passwords on network

"whoami" "ipconfig" /all "net" time /domain "net" start query "netstat" -an "ping" -n 1 www.nba.com "net" view /domain "net" localgroup administrators "net" user adm_it /domain "cmd" /c dir C:\users\ "net" group "Domain Admins" /domain "C:\Windows\system32\net1 group "Domain Admins" /domain "nltest" /trust_domain

C:\windows\temp\nbtscan.exe 10.16.2.1/24 ">C:\windows\temp\nb.txt" "net" use \\10.16.2.208 "Changeme!" /user:corp\cs_adm_it "cmd" /c dir \\10.16.2.208\c$ "dir \\10.16.2.208\c$ "net" use \\10.16.2.208\c$ "Changeme!" /user:corp\cs_adm_it "C:\windows\temp\acehash64.exe -s adm_qa:corp: AAD3B435B51404EEAAD3B435B51404EE:A5B440A4C4E1965E6F5905A08AF6F2DE "dir \\10.16.2.233\c$" "C:\windows\temp\acehash64.exe -s Administrator:123: AAD3B435B51404EEAAD3B435B51404EE:A67C071444ED771589B736189B08F2AD "dir \\10.16.2.208\c$" "C:\windows\temp\acehash64.exe -s Administrator:123: AAD3B435B51404EEAAD3B435B51404EE:A67C071444ED771589B736189B08F2AD "dir \\10.16.2.204\c$\inetpub\"

OUR SCENARIO SO FAR

RTJKW #3: BOTTLENCK BRO? Chokepoints using (authenticating) proxies Central point to log, gather/apply intel, block, etc. Many basic RATs/Toolsets/Malware won t work Unfettered internet access is a terrible idea

POISON IVY Grandfather of Chinese targeted RATs (circa 2004) Custom TCP C&C protocol Still deployed, updated but only basic proxy support seen this year Volatility + Chopshop + metasploit modules available

hellointra.no-ip.org,3460 hellointra.myftp.org,3440 namesvrtwo.serveftp.com,8888 namesvrone.myftp.org,8989 m2013.no-ip.org,443 update17.ignorelist.com,443 sap123.no-ip.biz,3480 sap123.servehttp.com,5460 statictwo.myftp.org,9999 staticone.hopto.org,9898 banse.zapto.org,4444 gserverhost.no-ip.biz,6666 gserverhost.myftp.org,5555 connektme.no-ip.org,6460 connektme.hopto.org,7539 easyconnect.zapto.org,3333 easyconnect.no-ip.org,4444 swepc.no-ip.biz,3460 cmdexe.no-ip.biz microsoft32.no-ip.biz ga2a.no-ip.biz exw.no-ip.info 60.235.12.64 hack43mila.no-ip.biz cool-t.no-ip.biz alnweer2009.no-ip.info alnweer2009.no-ip.org test.no-ip.org sero.ddns.net serix21.no-ip.biz evil3322.no-ip.biz zxoo.no-ip.biz m55m55m44.no-ip.org

OUR SCENARIO SO FAR

RTJKW #4: DOMAIN SEPARATION Strict separation, limited accounts, hardcore logging Extends to shared infrastructure, third parties, BYOD Trying to avoid these points being like those really fun ball pits, but for privileged credentials

OUR SCENARIO SO FAR

RTJKW #5: POROUS FIREWALLS Don t forget about the non-tcp protocols Unit test and regression test the perimeter Segmentation is a thing

EXPOSING YOUR BITS Windows update component for file transfer

PLUGX Been around since 2011, actively developed Modular construction to evade sandboxing, etc. C&C via UDP, DNS over UDP, CUSTOM over TCP, HTTP, HTTPS, ICMP, customer over IP Plugin infrastructure

PLUGINS - Read/write/enumerate files, registry Download/execute files Enumerate, read, write, inject, kill processes Port forward/proxy traffic, enumerate network Full SQL driver interface RDP, keylog, screenshot, video..

OUR SCENARIO SO FAR

RIJKW #6: INTERNAL BLINDNESS Some visibility inside the network is useful Common for newer RATs to have P2P Routing traffic through the network to reach other targets

RBDOOR Alternative to PlugX, full RAT functionality too Both 64 and 32 bit versions C&C via TCP, UDP, HTTP, HTTPS,... Traffic relay is also built in...

RBDOOR ROUTING Everything done via IP/TCP header modification Main functionality: - Drop packets from blacklist - Route packets to new destination port in whitelist - Capture session cookies by routing to magic port

NOT EVEN NORTON DSE WILL SAVE YOU Sometimes you just want to load your dodgy network driver on an x64 system DSE from Vista onwards stops that Unless it doesn t?

OUR SCENARIO SO FAR

TL; DR APT s - mostly not very A, but usually very P 80/20 of network security will thwart the average intruder The adversary reuses tools and tactics; if they get in, you should have home ground advantage. Use it.

REFERENCES & QUESTIONCES DYNDNS LIST https://github. com/emergingthreats/et-luajit-scripts DNSTUNNEL https://github.com/iagox86/dnscat2 FWUNIT http://fwunit.readthedocs.org/en/latest/