Hacker s Perspective on your Windows Infrastructure: Windows 10 Mandatory Check List

Similar documents
Microsoft MVP (Enterprise / Azure Security 9 Years) Microsoft Certified Trainer (20 years) Founder: Cybercrime Security Forum!

Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

5 Steps to Advanced Threat Protection

Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Pass-the-Hash: How Attackers Spread and How to Stop Them

Information Security Services

Networks and Security Lab. Network Forensics

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Presented by Evan Sylvester, CISSP

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

FORBIDDEN - Ethical Hacking Workshop Duration

Operating System Security

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Practical Threat Intelligence. with Bromium LAVA

Windows Operating Systems. Basic Security

Botnets: The dark side of cloud computing

Desktop Virtualization. The back-end

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals


Best Practices for DanPac Express Cyber Security

Exploiting Transparent User Identification Systems

The Value of Physical Memory for Incident Response

Why You Need to Detect More Than PtH. Matt Hathaway, Senior Product Manager, Rapid7 Jeff Myers, Lead Software Engineer, Rapid7

SANS Institute First Five Quick Wins

Application Security Testing

Alert (TA14-212A) Backoff Point-of-Sale Malware

Web Security School Final Exam

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Virtualization for Security

Breach Found. Did It Hurt?

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Top Ten Cyber Threats

How We're Getting Creamed

Loophole+ with Ethical Hacking and Penetration Testing

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Ethical Hacking Course Layout

Windows 7. Qing Liu Michael Stevens

Software that provides secure access to technology, everywhere.

Windows servers. NT networks

ILTA HANDS ON Securing Windows 7

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

Securing Active Directory Correctly

Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5)

Performing Advanced Incident Response Interactive Exercise

Red vs. Blue: Modern Active Directory Attacks, Detection, and Protection Whitepaper

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Guidance End User Devices Security Guidance: Apple OS X 10.9

Penetration testing. A step beyond missing patches and weak passwords

Spyware Doctor Enterprise Technical Data Sheet

Security A to Z the most important terms

All Information is derived from Mandiant consulting in a non-classified environment.

Jort Kollerie SonicWALL

Seven Strategies to Defend ICSs

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu

USM IT Security Council Guide for Security Event Logging. Version 1.1

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Overview of the Penetration Test Implementation and Service. Peter Kanters

Penetration Testing: Lessons from the Field

Concierge SIEM Reporting Overview

The Incident Response Playbook for Android and ios

How Attackers are Targeting Your Mobile Devices. Wade Williamson

FORENSIC ARTIFACTS FROM A PASS THE HASH (PTH) ATTACK BY: GERARD LAYGUI

PowerShell for Penetration Testers

Security & Threat Detection: Go Beyond Monitoring

Feeling Vulnerable? Jamie S. Herman, C CISO, CISM, CISSP Balazs Bucsay, OSCE, OSCP, GIAC, GPEN

Penetration Testing - a way for improving our cyber security

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath


A Decision Maker s Guide to Securing an IT Infrastructure

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

End User Devices Security Guidance: Apple OS X 10.10

Best Practices for DeltaV Cyber- Security

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

NERC CIP Ports & Services. Part 2: Complying With NERC CIP Documentation Requirements

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS

Using TS-ACCESS for Remote Desktop Access

Configuring, Managing and Maintaining Windows Server 2008 Servers

Codes of Connection for Devices Connected to Newcastle University ICT Network

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Transcription:

Hacker s Perspective on your Windows Infrastructure: Windows 10 Mandatory Check List Paula Januszkiewicz CQURE: CEO, Penetration Tester CQURE Offices: New York, Dubai, Warsaw MVP: Enterprise Security, MCT paula@cqure.us http://cqure.us @paulacqure @CQUREAcademy #win10tour

Our tools: http://cqure.pl Tools Check out the following links: http://www.gentilkiwi.com/ - Benjamin Delpy http://www.ntdsxtract.com/ - Csaba Barta

Be familiar with the possibilities of the operating system From the user mode and kernel mode We are NOT talking about the forensics! just doing a little hacking + conclusions My goal: See one of the ways hacker can act

From the network perspective Public services, IP address range etc. Business model Branch connections Potential points of entry From the habits perspective Corporate policy Administrator s friends and hobby User s habits

Users Users rarely have software up to date Awareness issues... But for hacker it may be not enough Administrators Local account Password reuse for workstations Different password for workstations Domain account Domain user being local administrator Domain administrator

Scripts are Cool

Services DLLs Startup (Menu Start) Task Scheduler LSA Providers Run, Run Once GPO Notification Package Winlogon Image Hijacking Drivers Etc.

Stay Persistent

If you are not ready to attack: Stay stealth and do not change the system behavior Hide your traces Processes Files Infrastructure performance Network traffic Server / Client Platform Performance

Stay undetected

and find more victims Make recognition where you can get in (ADMIN$) Service Accounts Connection Strings / Application Pool LSA Secrets Inappropriate permissions

Victim Recon

PASS THE HASH ATTACKS Today s security challenge

TODAY S SECURITY CHALLENGE PASS THE HASH ATTACKS

PASS THE HASH TECHNIQUE Fred s Laptop Sue s Laptop File Server Fred s User Session Sue s User Session User: Fred Password hash: A3D7 2 User: Sue Password hash: C9DF Malware Session User: Administrator Password hash: E1977 User: Adm... Hash:E1977 Malware User Session User: Adm User: Sue Hash: E1977 Hash: C9DF User: Sue Hash:C9DF 1 3 4 1. FRED RUNS MALWARE, HE IS A LOCAL ADMINISTRATOR 2. THERE IS A PASS THE HASH SESSION ESTABLISHED WITH ANOTHER COMPUTER 3. MALWARE INFECTS SUE S LAPTOP AS FRED 4. MALWARE INFECTS FILE SERVER AS SUE

VSM uses Hyper-V powered secure execution environment to protect derived credentials you can get things in but can t get things out P-T-H SOLUTION Decouples NTLM hash from logon secret PASS THE HASH ATTACKS Fully randomizes and manages full length NTLM hash to prevent brute force attack Derived credentials that VSM protected LSA Service gives to Windows are non-replayable

Virtualization VIRTUAL SECURE MODE (VSM) VSM isolates sensitive Windows processes in a hardware based Hyper-V container VSM runs the Windows Kernel and a series of Trustlets (Processes) within it VSM protects VSM kernel and Trustlets even if Windows Kernel is fully compromised Requires processor virtualization extensions (e.g.: VT-X, VT-D)

Local Security Auth Service Virtual TPM Hyper-Visor Code Integrity Virtual Secure Mode Apps Virtual Secure Mode (VSM) Windows

Windows 10: Local Account

Windows 10: Domain Account

and reboot the machine

VSM Enabled Windows 10: VSM Enabled

Create the remotely controlled network Automate next scans Create your own botnet What can be the hacker s goal in your infrastructure?

Stay Anonymous Know your victim Use the social skills Stay persistent Stay undetected Use victims to attack more targets

Learn how to detect malicious situations Know your system when it is safe you need a baseline If you detect a successful attack do not try to fight Report the issue Investigate and do an IT Audit Estimate the range of the attack Know how to recover your data, when necessary