SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith

Similar documents
Hacking your perimeter. Social-Engineering. Not everyone needs to use zero. David Kennedy (ReL1K) Twitter: Dave_ReL1K

Penetration Testing with Kali Linux

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT

Vulnerability Assessment and Penetration Testing

Bypassing Memory Protections: The Future of Exploitation

Learn Ethical Hacking, Become a Pentester

Information Security Services

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

WHITEPAPER. Nessus Exploit Integration

Custom Penetration Testing

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

Reducing Application Vulnerabilities by Security Engineering

Evolution of Penetration Testing

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Client logo placeholder XXX REPORT. Page 1 of 37

ensuring security the way how we do it

Application Security Testing

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Application Security

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Penetration Testing. Presented by

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Network Security Audit. Vulnerability Assessment (VA)

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

0days: How hacking really works. V 1.0 Jan 29, 2005 Dave Aitel dave@immunitysec.com

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

How To Test For Security On A Network Without Being Hacked

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Penetration Testing Report Client: Business Solutions June 15 th 2015

Audience. Pre-Requisites

The Top Web Application Attacks: Are you vulnerable?

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How To Choose the Right Vendor Information you need to select the IT Security Testing vendor that is right for you.

The Nexpose Expert System

Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Demystifying Penetration Testing

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

90% of data breaches are caused by software vulnerabilities.

Social-Engineering. Hacking a mature security program. Strategic Penetration Testing

Presented by Evan Sylvester, CISSP

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Offensive Security. Advanced Web Attacks and Exploitation. Mati Aharoni Devon Kearns. v. 1.0

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Professional Penetration Testing Techniques and Vulnerability Assessment ...

The Penetration Testing Execution Standard (PTES) Dave Kennedy (ReL1K) Twitter: Dave_ReL1K

Common Criteria Web Application Security Scoring CCWAPSS

Overcoming PCI Compliance Challenges

Ethical Hacking as a Professional Penetration Testing Technique

Security and Vulnerability Testing How critical it is?

Certified Cyber Security Expert V Web Application Development

Chapter 1 Web Application (In)security 1

Web Application security testing: who tests the test?

Penetration Testing Service. By Comsec Information Security Consulting

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Modern Binary Exploitation Course Syllabus

Attack Vector Detail Report Atlassian

PENTEST. Pentest Services. VoIP & Web.

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Penetration Testing in Romania

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Targeted attacks: Tools and techniques

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Web Application Penetration Testing

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Where every interaction matters.

Last update: February 23, 2004

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Continuous Penetration Testing

Enterprise Computing Solutions

Managing IT Security with Penetration Testing

Web Application Security

(WAPT) Web Application Penetration Testing

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Application Code Development Standards

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Sample Report. Security Test Plan. Prepared by Security Innovation

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Secure Web Applications. The front line defense

Penetration Testing 2014

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

The Roles of Software Testing & QA in Security Testing

Bypassing Browser Memory Protections in Windows Vista

Transcription:

SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING Presented by: Dave Kennedy Eric Smith

AGENDA Penetration Testing by the masses Review of current state by most service providers Deficiencies in the testing strategies & results The effects on the target organizations Real world threats How attackers operate Accurate demonstrations of impact to target organizations What REALLY needs to be done Understanding the purpose Improving the methodologies Do real work, don t fake it!

ABOUT US Just two guys with some ideas We like to hug it out Did we even bring a business card? We can talk shop and experience over beers after Mmmmm.Beer

TODAY S UGLY METHODOLOGY Collect Intel Scan Exploit Report

THE REAL WAY TO DO IT Intelligence Gathering Foot printing Vulnerability Analysis Exploitation Post- Exploitation Clean Up

REALITY CHECK Good hackers don t use expensive vulnerability scanners Good hackers don t use automated penetration testing Attackers don t have a scope or timeframes Attackers don t stop after first successful exploit A good hacker doesn t define penetration testing

REPERCUSSIONS OF TODAY Primarily focused on smash and grab tactics Heaviest phase of testing is vulnerability scan(s) Attack vectors are determined by the success of the scans Procedures are dictated by the tools not the testers Focus and prioritization generally stops after one compromise Limited (if any) demonstration of impact

REALITY OF NON- SIMULATED ATTACKS Incident response is poorly handled Resistance to attacks is not measurable No insight into true threats No understanding of financial damage Impact to the business is unknown (See Next Presentation)

WHY TRADITIONAL TESTING IS DEAD Doesn t focus on business risk, but on exposure of vulnerability Clients prescribe their own medicine Replicates testing where an attacker has his hands tied Most testers don t know how to attack Same tests are done year over year Tools have made people lazy and less creative Roots have been forgotten

INFORMATION OVERLOAD Names Aliases Emails? IM? Screen names? Social Networks Used Media Communications Online Profile Communications Leaked Executive/Key Personnel and employee Profiles Blogs Personal ID s Social Landscape Raw Leakage Applications Used IP LEAKAGE Code Leakage Configuration Key Corporate Terms Physical Location Info Technologies used 3 rd party apps Web Apps used Reference Resources Cloud usage Outsourced Data Carriers

PENETRATION TESTING - EVOLUTION True breach simulations tailored for the organization Intelligence gathering and reconnaissance improvements Focused attacks Improved demonstrations of impact Step away from the tools Think more like an attacker and less like an auditor The target is your information, not the perimeter

IN A PERFECT SCOPE AND METHODOLOGY Vulnerability scans Exploit frameworks Application vulnerability assessments That s it? Umm no: Intelligence gathering Personnel profiling Phishing Client side/browser side attacking Post exploitation Social Engineering Fuzzing and 0-day development

INTELLIGENCE GATHERING Often excluded from penetration testing It s the easiest way to learn about your target w/o being detected Hackers do it, so should you Profiling will expedite your chances for success Basis to formulate your own attack matrix

INTELLIGENCE GATHERING - FOCA

FOCA USER HARVESTING

FOCA SOFTWARE ENUMERATION

INTELLIGENCE GATHERING - MALTEGO

INTELLIGENCE GATHERING - MALTEGO

INTELLIGENCE GATHERING - MALTEGO

INTELLIGENCE GATHERING - SHODAN

THE INFORMATION IS ABUNDANT

PERSONAL FAVORITE

INTEL PERSONNEL PROFILING

INTEL PERSONNEL PROFILING

ASSET PROFILING It not just port scans, OS and application fingerprinting Define the role of the system (approved and unknowns) Identifies additional vectors for attack Assigns a value of the asset to the business Only manual inspection will provide useful results Aids in developing an accurate attack matrix

POST EXPLOITATION It doesn t stop at shell or alert ( xss ) Additional vectors of attack Pivot attacks Password reuse Access to sensitive information Keylogging Proxies The list is endless

OK ENOUGH OF YOUR SMOKE AND MIRRORS! DOES THIS STUFF REALLY WORK?

SCENARIO 1 You are performing external penetration test for target company Only ports identified are 80, 443 and 25. No web application flaws were identified No public (or commercial) exploits were found Social Engineering is out of scope L

ZERO DAY ANGLE The only route found is a potential 0 day Enumerating a target you identify a service: MailCarrier 2.51 SMTP Server Research reveals no vulnerability disclosures or exploits Suit up and start fuzzing!

FUZZING Brute force method for closed-source applications Traditional method for identifying vulnerabilities Many programs are available (Peach, Sully, Spike, etc) SMTP is a very easy protocol to recreate Be sure to build the protocol properly or risk inaccurate results

THE BASICS Multiple types of overflows Stack, heap, buffer, integer, etc. Main objective is to hijack execution flow and gain unauthorized access to underlying system Not every overflow is exploitable Most will result in simple DoS Most updates address improper bounds checks, input validation and sanitization

OVERFLOW QUICK GLANCE Main attack vector is through a buffer that doesn t properly check the length a user can input. Example: #include char *code = "AAAABBBBCCCCDDD"; //including the character '\0' size = 16 bytes void main() { char buf[8]; strcpy(buf, code);

THE STACK

AFTER AN EXPLOIT

DEMONSTRATION Fuzz the application in order to obtain a crash. This exploit is a stack based overflow, so we will need to find where our instruction pointer is. Jump to our starter pointer and execute our shell code.

EASY STUFF This is as easy as it gets when coming to exploits. A stack overflow with EIP overwrites is like a hallelujah. Another easy technique is called a Structured Exception Handler (SEH) Stack overflows are easy, harder when exploiting Windows protection mechanisms.

DATA EXECUTION PREVENTION Data Execution Prevention (DEP) would have made this stack Read Only and would not execute the shell code. In order to bypass this we could utilize a technique called return-to-libc and Return Oriented Programming (ROP) can defeat DEP. Can also defeat Address Space Layout Randomization (ASLR)

BROWSER BUGS Heap Sprays - Can defeat ASLR, traditionally used in browser-based exploits, fills the heap (dynamic memory) with shell code and nops.

STACK CANARIES Place random cookie inside stack, if cookie corrupt will not execute. Less frequent and can be defeated by earlier mentioned techniques.

SCENARIO 2 You are performing external penetration test for target company Only ports identified are 80, 443 No web application flaws were identified No public (or commercial) exploits were found Social Engineering is IN scope J

THE BREAKDOWN SSL VPN device is discovered Two factor authentication is implemented Brute force is not an option Intelligence gathering utilized to craft a strategic phishing attack Website is cloned and prepared on attack system Email is delivered to X number of internal resources

GOING A DIFFERENT ROUTE You just saw the ability to defeat two factor authentication Let s attack the client directly in this next scenario and go for internal access

WHAT DID WE LEARN The attacks discussed today aren t included in the majority of routine penetration tests Lack of general skillsets impact success levels Lack of time produce inaccurate results and false sense of security Lack of business buy off to perform full scope testing continues the vicious cycle Organizations must demand more focused attacks and more nitch security assessments.

GRADUAL PROGRESSION The commodity tests are surfacing Clients are beginning to understand they need more than the past Survival in this industry means providing value to the target organization

RETURN ON INVESTMENT A penetration test has no ROI if the report is filled with irrelevant findings Demonstrating impact will justify the cause and drive demand Relating testing strategies to the business and understanding what makes them tick will provide value

QUESTIONS?