Penetration Testing - a way for improving our cyber security



Similar documents
Penetration Testing in Romania

PuttyRider. With great power comes great responsibility. # Pivoting from Windows to Linux in a penetration test. Adrian Furtunã, PhD adif2k8@gmail.

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Internal Penetration Test

Actuality of SMBRelay in Modern Windows Networks

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Penetration Testing Report Client: Business Solutions June 15 th 2015

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Vulnerability Assessment and Penetration Testing


Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Penetration testing & Ethical Hacking. Security Week 2014

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Overview of the Penetration Test Implementation and Service. Peter Kanters

Thick Client Application Security

Penetration Test Report

Where every interaction matters.

Exploiting Transparent User Identification Systems

Network Security Audit. Vulnerability Assessment (VA)

Penetration Testing with Kali Linux

Criteria for web application security check. Version

Client logo placeholder XXX REPORT. Page 1 of 37

CEH Version8 Course Outline

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Attack and Penetration Testing 101

Protecting Your Organisation from Targeted Cyber Intrusion

Hosts HARDENING WINDOWS NETWORKS TRAINING

OWASP OWASP. The OWASP Foundation Selected vulnerabilities in web management consoles of network devices

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Penetration Testing //Vulnerability Assessment //Remedy

Turning your managed Anti-Virus

FORBIDDEN - Ethical Hacking Workshop Duration

IBM. Vulnerability scanning and best practices

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

APT Advanced Persistent Threat Time to rethink?

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Web App Security Audit Services

SAST, DAST and Vulnerability Assessments, = 4

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

!!!!!!!!!!!!!!!!!!!!!!

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Microsoft Baseline Security Analyzer (MBSA)

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Course Title: Course Description: Course Key Objective: Fee & Duration:

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

SANS Top 20 Critical Controls for Effective Cyber Defense

Reducing Application Vulnerabilities by Security Engineering

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

IT HEALTHCHECK TOP TIPS WHITEPAPER

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

OWASP Top Ten Tools and Tactics

The Top Web Application Attacks: Are you vulnerable?

CYBERTRON NETWORK SOLUTIONS

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Web Security School Final Exam

June 2014 WMLUG Meeting Kali Linux

1. Why is the customer having the penetration test performed against their environment?

White Paper. Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked

PENTEST. Pentest Services. VoIP & Web.

Goal Oriented Pentesting Getting the most value out of Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing

Penetration testing. A step beyond missing patches and weak passwords

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Common Security Vulnerabilities in Online Payment Systems

FREQUENTLY ASKED QUESTIONS

RSA Security Anatomy of an Attack Lessons learned

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Penetration Testing Walkthrough

Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers

Information Security Services

2016 TÜBİTAK BİLGEM Cyber Security Institute

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

INFORMATION SECURITY TRAINING CATALOG (2016)

Hackers are here. Where are you?

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Learn Ethical Hacking, Become a Pentester

TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT

Department of Homeland Security

What is Penetration Testing?

Security and Vulnerability Testing How critical it is?

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site

Experiences from Educating Practitioners in Vulnerability Analysis

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Transcription:

OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH adif2k8@gmail.com Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.

Agenda Who am I Why this topic Case study 1 Case study 2 Lessons learned Conclusions Q & A 2

Who am I Member of the Pentest Team at KPMG Romania Doing pentests against various applications and systems: Internal networks, public networks Web applications Mobile applications Wireless networks Social engineering, etc Speaker at Hacktivity, DefCamp, Hacknet and other local security confs Teaching assistant at Information Security Master programs (UPB, MTA and ASE) Teaching penetration testing classes Organizing Capture the Flag contests 3

Why this topic? The need for more efficient cyber security Penetration testing is part of the defense-in-depth approach Verify the effectiveness of defense mechanisms and people Is my data safe? Find weak spots in defense layers Show the real risk of a vulnerability Suggest corrective measures Re-verify Penetration testing can be used for improving our cyber security 4

To better clarify terms Penetration Testing a.k.a. Pentesting, Ethical Hacking, Red Teaming Method for evaluating the security of an information system or network by simulating attacks from malicious outsiders or insiders Exploit vulnerabilities and dig much deeper Penetration Testing is: Tools find this Authorized Adversary based Ethical (for defensive purposes) Penetration Testing is not Vulnerability Assessment / Scanning Manual tests find this 5

Case Study 1 6

Pentesting the internal network (2011) Objective: See what an internal malicious user could do, given simple network physical access. Malicious user: visitor, contractor, malicious employee Targets: confidential data, client information, strategic business plans, etc Initial access: physical network port in users subnet 7

Pentesting the internal network (2011) cont. 8

Pentesting the internal network (2011) cont. 1.Network mapping IP ranges Host names 9

Pentesting the internal network (2011) cont. 1.Network mapping IP ranges Host names 2.Service and OS discovery Windows 7 Windows 2008 Server R2 Common client ports open IIS, MsSQL, Exchange, etc 10

Pentesting the internal network (2011) cont. 1.Network mapping IP ranges Host names 2.Service and OS discovery Windows 7 Windows 2008 Server R2 Common client ports open IIS, MsSQL, Exchange, etc 3.Vulnerability scanning Nessus: 1 high, 30 medium, 39 low MsSQL server default password for sa user 11

Pentesting the internal network (2011) cont. 4. Exploitation 12

Pentesting the internal network (2011) cont. 4. Exploitation Add local admin 13

Pentesting the internal network (2011) cont. 4. Exploitation Add local admin 5. Post-exploitation Info gathering Credentials to other systems 14

Pentesting the internal network (2011) cont. 4. Exploitation Add local admin 5. Post-exploitation Info gathering Credentials to other systems 6. Pivoting Connect to 2 nd db server Upload Meterpreter 15

Pentesting the internal network (2011) cont. 4. Exploitation Add local admin 5. Post-exploitation Info gathering Credentials to other systems 6. Pivoting Connect to 2 nd db server Upload Meterpreter 7. Post-exploitation List tokens Impersonate Domain Admin token Create Domain Admin user Game Over 16

Pentesting the internal network (2011) cont. Game Over on domain controller: 17

Case Study 2 18

Pentesting the (same) internal network (2012) Objective: See what an internal malicious user could do, given simple network access. Test the findings from previous year Malicious user: visitor, contractor, malicious employee Targets: confidential data, client information, strategic business plans, etc Initial access: network port in users subnet 19

Pentesting the (same) internal network (2012) cont. 1.Network mapping ~ the same as last year 2.Service and OS discovery ~ the same as last year 20

Pentesting the (same) internal network (2012) cont. 1.Network mapping ~ the same as last year 2.Service and OS discovery ~ the same as last year 3.Vulnerability scanning Nessus: 0 high, 21 medium, 20 low 21

Pentesting the (same) internal network (2012) cont. 1.Network mapping ~ the same as last year 2.Service and OS discovery ~ the same as last year 3.Vulnerability scanning Nessus: 0 high, 21 medium, 20 low Now what? No default/weak passwords No missing patches No exploitable config problems No sql injection 22

Pentesting the (same) internal network (2012) cont. 4.Attack the clients method 1 23

Pentesting the (same) internal network (2012) cont. 4.Attack the clients method 1 Setup a fake local NetBIOS server Respond to every request with my IP address Setup multiple local services (HTTP, SMB) Request Windows authentication on connection => capture password hashes 24

Pentesting the (same) internal network (2012) cont. 4.Attack the clients method 1 cont. Captured around NTLM 50 hashes Cracked about 25% using dictionary attack with mangling rules in a few hours Gained network access as domain user (low privileges) Could access some shared files on file server Not enough 25

Pentesting the (same) internal network (2012) cont. 4.Attack the clients method 2 Man in the middle attack between victim and proxy server Setup a fake local proxy server Request Basic authentication Receive user s credentials in clear text (base64 encoded) 26

Pentesting the (same) internal network (2012) cont. 4.Attack the clients method 2 cont The victim sees this: What would you do? 27

Pentesting the (same) internal network (2012) cont. 5.Exploitation Got local admin password (global) from a special user Could connect as admin on any workstation 28

Pentesting the (same) internal network (2012) cont. 5.Exploitation Got local admin password (global) from a special user Could connect as admin on any workstation 6.Pivoting Search the machines from IT subnet for interesting credentials / tokens Found a process running as a domain admin user 29

Pentesting the (same) internal network (2012) cont. 5.Exploitation Got local admin password (global) from a special user Could connect as admin on any workstation 6.Pivoting Search the machines from IT subnet for interesting credentials / tokens Found a process running as a domain admin user 7.Exploitation Impersonate domain admin Add user to domain admin group Game Over 30

Lessons Learned 31

Pentest comparison 2011 2012 Low hanging fruits removed no yes IT personnel vigilance low high Network prepared for pentest no yes Existing vulnerabilities yes yes (lower nr) Overall exploitation difficulty medium high 32

Consultant s advice Make yourself periodic vulnerability assessments (e.g. Nessus scans) Prepare your network before a pentest (you should always be prepared, btw) An homogeneous network is easier to defend then an heterogeneous one Do not allow local admin rights for regular users Patch, patch, patch Educate users for security risks 33

Conclusions Penetration testing can be used for improving our cyber security Do it periodically with specialized people Mandatory for new applications / systems before putting in production Vulnerability assessment is not penetration testing 34

Q & A 35

Thank You! Adrian Furtunǎ, PhD, OSCP, CEH adif2k8@gmail.com http://ro.linkedin.com/in/adrianfurtuna