Tactical Exploitation the other way to pen-test. hdm / valsmith

Similar documents
Tactical Exploitation the other way to pen-test

Penetration Testing with Kali Linux


Vulnerability Assessment and Penetration Testing

Security Considerations White Paper for Cisco Smart Storage 1

Learn Ethical Hacking, Become a Pentester

Penetration Testing Report Client: Business Solutions June 15 th 2015

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

My FreeScan Vulnerabilities Report

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Internal Penetration Test

Internet Security [1] VU Engin Kirda

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

STABLE & SECURE BANK lab writeup. Page 1 of 21

Professional Penetration Testing Techniques and Vulnerability Assessment ...

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

Linux Network Security

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Locking down a Hitachi ID Suite server

Client logo placeholder XXX REPORT. Page 1 of 37

IBM. Vulnerability scanning and best practices

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Metasploit The Elixir of Network Security

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Web App Security Audit Services

System Admin Module User Guide. Schmooze Com Inc.

Hands-on Hacking Unlimited

Open Source Security Tool Overview

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Ethical Hacking Course Layout

Audience. Pre-Requisites

Application Security Best Practices. Wally LEE Principal Consultant

Topics in Network Security

CIT 380: Securing Computer Systems

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Hacking Techniques & Intrusion Detection

Firewalls. Chapter 3

June 2014 WMLUG Meeting Kali Linux

Plunder Pillage & Print

Detailed Description about course module wise:

CRYPTUS DIPLOMA IN IT SECURITY

Chris Gates

Metasploit Unleashed. Class 2: Information Gathering and Vulnerability Scanning. Georgia Weidman Director of Cyberwarface, Reverse Space

CYBERTRON NETWORK SOLUTIONS

Actuality of SMBRelay in Modern Windows Networks

Inside-Out Attacks. Security Event April 28, 2004 Page 1. Responses to the following questions

Top 5 Essential Log Reports

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Cyber Essentials. Test Specification

Security of IPv6 and DNSSEC for penetration testers

CS5008: Internet Computing

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Penetration Testing - a way for improving our cyber security

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

What is included in the ATRC server support

1. LAB SNIFFING LAB ID: 10

Introduction to Computer Security Benoit Donnet Academic Year

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Lab Objectives & Turn In

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Pwning Intranets with HTML5

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Using Nessus In Web Application Vulnerability Assessments

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

User Identification (User-ID) Tips and Best Practices

Maltego Tungsten as a collaborative attack platform BlackHat 2013

Targeted attacks: Tools and techniques

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

Device Log Export ENGLISH

Is the Scanning of Computer Networks Dangerous?

Malicious Network Traffic Analysis

Exploiting Transparent User Identification Systems

Firewalls, IDS and IPS

Andreas Dittrich, Philipp Reinecke Testing of Network and System Security. example.

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

CEH Version8 Course Outline

Attack Frameworks and Tools

Certified Ethical Hacker Exam Version Comparison. Version Comparison

ECE 4893: Internetwork Security Lab 12: Web Security

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Step-by-Step Configuration

Barracuda Spam&Virus Firewall v5.1 a Web Filter v5.0 Nové funkce, pluginy a uživatelská vylepšení. Jiří Blažek, Product Manager

Inside-Out Attacks. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Payment Card Industry (PCI) Executive Report. Pukka Software

Network Configuration Settings

We don t need no stinkin badges!

Web Plus Security Features and Recommendations

Transcription:

Tactical Exploitation the other way to pen-test hdm / valsmith

who are we? H D Moore <hdm [at] metasploit.com> BreakingPoint Systems Metasploit Valsmith <valsmith [at] metasploit.com> Offensive Computing Metasploit

why listen? A different approach to pwning New tools, fun techniques Real-world tested :-)

what do we cover? Target profiling Discovery tools and techniques Exploitation Getting you remote access

the tactical approach Vulnerabilites are transient Target the applications Target the processes Target the people Target the trusts You WILL gain access.

the tactical approach Crackers are opportunists Expand the scope of your tests Everything is fair game What you dont test... Someone else will.

the tactical approach Hacking is not about exploits The target is the data, not r00t Hacking is using what you have Passwords, trust relationships Service hijacking, auth tickets

personnel discovery Security is a people problem People write your software People secure your network Identify the meatware first

personnel discovery Identifying the meatware Google Newsgroups SensePost tools www.paterva.com

personnel discovery These tools give us Full names, usernames, email Employment history Phone numbers Personal sites

personnel discovery CASE STUDY

personnel discovery Started with no information but CO name and function Found online personnel directory Found people / email addresses Email name = username = target

personnel discovery DEMO

network discovery Identify your target assets Find unknown networks Find third-party hosts Dozens of great tools... Lets stick to the less-known ones

network discovery The overused old busted Whois, Google, zone transfers Reverse DNS lookups

network discovery The shiny new hotness Other people's services CentralOps.net DigitalPoint.com DomainTools.com Paterva.com

network discovery What does this get us? Proxied DNS probes, transfers List of virtual hosts for each IP Port scans, traceroutes, etc Gold mine of related info

network discovery Active discovery techniques Trigger SMTP bounces Brute force HTTP vhosts Watch outbound DNS Just email the users!

network discovery CASE STUDY

network discovery DEMO

firewalls and ips Firewalls have gotten snobby Content filtering is now common Intrusion prevention is annoying Identify and fingerprint Increase your stealthiness Customize your exploits

firewalls and ips Firewall identification NAT device source port ranges Handling of interesting TCP IPS identification Use drop with no alert sigs Traverse sig tree to find vendor

firewall and ips CASE STUDY

firewall and ips DEMO

application discovery If the network is the toast... Applications are the butter. Each app is an entry point Finding these apps is the trick

application discovery Tons of great tools Nmap, Amap, Nikto, Nessus Commercial tools

application discovery Slow and steady wins the deface Scan for specific port, one port only IDS/IPS can't handle slow scans Ex. nmap -ss -P0 -T 0 -p 1433 ips

application discovery Example target had custom IDS to detect large # of host connections Standard nmap lit up IDS like XMAS One port slow scan never detected Know OS based on 1 port (139/22)

application discovery Some new tools W3AF for locating web apps Metasploit 3 includes scanners

application discovery CASE STUDY

application discovery DEMO

client app discovery Client applications are fun! Almost always exploitable Easy to fingerprint remotely Your last-chance entrance

client app discovery Common probe methods Mail links to the targets Review exposed web logs Send MDNs to specific victims Abuse all, everyone, team aliases

client app discovery Existing tools BEEF for browser fun Not much else...

client app discovery Shiny new tools Metasploit 3 SMTP / HTTP Metasploit 3 SMB services

client app discovery CASE STUDY

client app discovery DEMO

process discovery Track what your target does Activity via IP ID counters Last-modified headers FTP server statistics

process discovery Look for patterns of activity Large IP ID increments at night FTP stats at certain times Web pages being uploaded

process discovery Existing tools? None :-( New tools Metasploit 3 profiling modules More on exploiting this later...

process discovery CASE STUDY

process discovery DEMO

15 Minute Break Come back for the exploits!

re-introduction In our last session... Discovery techniques and tools In this session... Compromising systems!

external network The crunchy candy shell Exposed hosts and services VPN and proxy services Client-initiated sessions

attacking file transfers FTP transfers Active FTP source ports Passive FTP servers NFS transfers TFTP transfers

attacking mail services Four different attack points The mail relay servers The antivirus gateways The real mail server The users mail client File name clobbering...

attacking web servers Brute force files and directories Brute force virtual hosts Standard application flaws Load balancer fun... Clueless users cgi-bin's are often the Achilles heel

attacking dns servers Brute force host name entries Brute force internal hosts XID sequence analysis Return extra answers...

attacking db servers Well-known user/pass combos Business apps hardcode auth Features available to anonymous No-patch bugs (DB2, Ingres, etc)

authentication relays SMB/CIFS clients are fun! Steal hashes, redirect, MITM NTLM relay between protocols SMB/HTTP/SMTP/POP3/IMAP

social engineering Give away free toys CDROMs, USB keys, N800s Replace UPS with OpenWRT Cheap and easy to make

internal network The soft chewy center This is the fun part :) Easy to trick clients

file services SMB is awesome Look for AFP exports of SMB data NAS storage devices Rarely, if ever, patch Samba :-)

file services NFS is your friend Dont forget its easy cousin NIS Scan for port 111 / 2049 showmount -e / showmount -a Whats exported, whose mounting?

file services Exported NFS home directories Important target! If you get control Own every node that mounts it

file services If you are root on home server Become anyone (NIS/su) Harvest known_hosts files Harvest allowed_keys Modify.login, etc. + insert trojans

file services Software distro servers are fun! All nodes access over NFS Write to software distro directories Trojan every node at once No exploits needed!

file services CASE STUDY

netbios services NetBIOS names are magic WPAD ISASRV CALICENSE

dns services Microsoft DNS + DHCP = fun Inject and overwrite DNS Hijack the entire network Impersonate servers

wins services Advertise your WINS service Control name lookups Attack other client apps

license servers A soft spot in desktop apps Computer Associates Bugs and simple to spoof FlexLM network services

remote desktops RDP Great for gathering other targets Domain lists available pre-auth If not available, start your own: net start terminal services

remote desktops VNC The authentication bug is great :) MITM attacks are still viable Install your own with Metasploit 3 vncinject payloads

trust relationships The target is unavailable to YOU Not to another host you can reach... Networks may not trust everyone But they often trust each other :)

trust relationships CASE STUDY

Hijacking SSH CASE STUDY

Hijacking Kerberos CASE STUDY

Hijacking NTLM CASE STUDY

Conclusion Compromise a patched network Determination / creativity wins Lots of new pen-test tools The best tool is still YOU!