Maltego Tungsten as a collaborative attack platform BlackHat 2013



Similar documents
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

Livezilla How to Install on Shared Hosting By: Jon Manning

Joomla Security Report

Domain Name. Domain Registrar. Web Site cpanel URL: Username: Password: Username: Password:

WordPress Security Scan Configuration

WHY USE ILLUMIN8 MARKETING FOR HOSTING YOUR WEB SITE?

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

STABLE & SECURE BANK lab writeup. Page 1 of 21

Web Vulnerability Scanner by Using HTTP Method

NeoMail Guide. Neotel (Pty) Ltd

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Client logo placeholder XXX REPORT. Page 1 of 37

Asia Web Services Ltd. (vpshosting.com.hk)

Quick Start Guide Getting started with your Hetzner package

How to hack a website with Metasploit

Ethical Hacking Course Layout

Penetration Testing. Presented by: Elham Hojati Advisor: Dr. Akbar Namin July 2014

Attack Frameworks and Tools

Penetration Testing with Kali Linux

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Hosted Microsoft Exchange Client Setup & Guide Book

The easy way to a nice looking website design. By a total non-designer (Me!)

Web24 Web Hosting Guide

Configuring Web services

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

Cyber Essentials. Test Specification

H-Sphere Reseller Step-By-Step Beginner guide: Welcome To MatrixReseller! Introduction. I. The Reseller Panel

SaskTel Hosted Exchange Administrator Guide

shweclassifieds v 3.3 Php Classifieds Script (Joomla Extension) User Manual (Revision 2.0)

Talk Internet User Guides Controlgate Administrative User Guide

Vulnerability analysis

Joomla Admin Protection

Malicious Network Traffic Analysis

Vulnerability Assessment and Penetration Testing

Hosted Microsoft Exchange Client Setup & Guide Book

Rensselaer Union Club Webhosting CPanel Guide

All the materials and/or graphics included in the IceThemetheme folders MUST be used ONLY with It TheCityTheme from IceTheme.com.

Internal Penetration Test

A Guide to New Features in Propalms OneGate 4.0

Contents. 1. Infrastructure

IBM. Vulnerability scanning and best practices

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

DEVELOP ROBOTS DEVELOPROBOTS. We Innovate Your Business

Volume SYSLOG JUNCTION. User s Guide. User s Guide

This installation guide will help you install your chosen IceTheme Template with the Cloner Installer package.

Parallels Plesk Automation. Customer s Guide. Parallels Plesk Automation 11.5

Important Information

SYWorks Vulnerable Web Applications Compilation For Penetration Testing Installation Guide

SANS Dshield Webhoneypot Project. OWASP November 13th, The OWASP Foundation Jason Lam

1 - Getting Started. Step 1: Your Welcome

Vodafone Hosted Services. Getting your . User guide

Okta/Dropbox Active Directory Integration Guide

MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server

Exim4U. Server Solution For Unix And Linux Systems

Customer Control Panel Manual

WHM Administrator s Guide

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy

itds OAuth Integration Paterva itds OAuth Integration Building and re-using OAuth providers within Maltego 2014/09/22

Secure Messaging Server Console... 2

Reseller Guide. Setting up your Reseller Account in Website Panel

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

1. An Introduction to cpanel. Welcome to Thanks for signing up. 2. How Domain Names work

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

June 2014 WMLUG Meeting Kali Linux

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

User's Guide. Product Version: Publication Date: 7/25/2011

Linux VPS with cpanel. Getting Started Guide

USER GUIDE WEB HOSTING SERVICE

SECURING YOUR REMOTE DESKTOP CONNECTION

Vodafone Hosted Services. Getting started. User guide

BackTrack 5 tutorial Part I: Information gathering and VA tools

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

What is FTH 2.0? replacement for

Lets Get Started In this tutorial, I will be migrating a Drupal CMS using FTP. The steps should be relatively similar for any other website.

SMT v4.0 Users Guide (Linux version)

How To Get The Most Out Of Your From Your Mail Server (For A Small Business)

How to Secure a Groove Manager Web Site

Web Hosting Control Panel

Cloud Services. Anti-Spam. Admin Guide

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

VPOP3 Your post office Getting Started Guide

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

POP3 Connector for Exchange - Configuration

Transferring Hosting to Fasthosts

Using Internet or Windows Explorer to Upload Your Site

EURECOM VPN SSL for students User s guide

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

AJ Matrix V5. Installation Manual

System Admin Module User Guide. Schmooze Com Inc.

Metasploit Pro Getting Started Guide

G-Lock EasyMail7. Client-Server Marketing Software for Windows. Reviewer s Guide

Table of contents 1. IMPORTANT INFORMATION BEFORE YOU START GETTING STARTED EXCHANGE CONTROL PANEL... 2

1. Building Testing Environment

Web Hosting Getting Started Guide

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Transcription:

Maltego Tungsten as a collaborative attack platform BlackHat 2013

About us

Schedule Why did we do this? Introduction to Maltego Tungsten Maltego with Teeth Design principles Infrastructure attacks Attacking people Attacking mobile devices

Why did we do this? Maltego Tungsten is our airframe The plan is to provide a platform that can Visualize complex information Allows humans to spot patterns Share it Anonymously In real time Run actions on entities Based on value, position in graph Actions could be *anything* This is our day job. But we want to show how it can work We built some demo weapons You should really be building it

Introducing Maltego Tungsten Two main features: Collaboration Undo/redo Collaboration (comms) design principles: Uses XMPP Can use public infrastructure (e.g. not Paterva) Encrypted on message layer with symmetric key Aliases separate to XMPP username anonymous, lack of attribution.

Maltego Tungsten Sync entire graph, notes, bookmarks etc. Does not sync attachments (yet!) Syncs layout, not viewport Also chat window / status Can run transforms / machines To join investigation you need to know: The investigation name The key The server (XMPP) used

Tungsten demo

MaltegoTeeth - Intro We wanted to build an attack platform with the following in mind Multiple attackers can work together Large network (think nationwide or multi national) Find the vulnerable host, not the vulnerability on a host No 0 day That s cheating! External, over the Internet Black box, zero knowledge

MaltegoTeeth - Intro Free! Runs on Kali Linux Known platform with goodies pre installed We don t need to re-invent the wheel Using local transforms Real time logging, status reports Runs off the local machine, portable. Open source easy to read Python code Code is REALLY simple You are welcome to improve, change We re not coders so it s hackish. But we like it like that!

Main areas of interest Infrastructure Everyone here knows this space pretty well Mainly web servers, SMTP servers, FTP and the odd open port People Semi automatic social engineering with real tangible results. Spear turret? Personal computing devices PCs But mostly mobile devices Phones Tablet

Machines not people

Infrastructure - Foot printing Most people think Maltego is great for profiling people. Maltego is even better at working with structured data. Maltego is very strong in footprinting Radium machines - L3 footprint

Maltego footprint demo Examples of footprints already done: Pentagon AEOI CIA XXX government (partial) Let s do it live Pick a target from Fortune 1000

What can we get from it? Besides good target selection We re probably dealing with Infrastructure Web servers (HTTP/HTTPS) SMTP servers FTP/VPN Odd 3389, 22, 23 (perhaps)

What can we get from web servers? Remember no 0day! File and directory mining Unlinked files / directories / admin backends SQL / RFI injection On surface level Protected by a single password Content Management System (CMS) Think Wordpress, Joomla, cpanel OWA Web VPN, Citrix, etc.

Directory / File mining Not as easy as you d expect Many scanners do this horribly wrong Need to look at server responses, not HTTP status codes Search for Files In known locations / In discovered directories Directories In known locations / In discovered directories Get known locations? Crawl / mirror the site Look for sitemap.xml or robots.txt Search engines already crawled it (sometimes)

File / Directory mine demo Find directories / files in root Find known locations via Sitemap.xml Crawl / mirror Find directories / files in known locations While you are there Check for indexability of directories

Possible Injection Points (PIPs) When we ve mirrored/crawled site we also know What web forms are on the site URLs with GET parameters Eg /search.php?terms= We can decide which forms are interesting: Parameter value Action=print is likely not interesting Parameter name VIEWSTATE is likely not vulnerable btnsubmit is not interesting

PIP demo Crawl a site Set up ignore fields and values Show PIPs Attack PIP Fire SQLMap for every PIP

Possible Entry Points (PEPs) - OWA We looked at Fortune 1000. About 60% use OWA without additional security. Means username / password gives access to Email Address book, calendar Gold mine for social engineering MS username vs. email address MS domain vs. email address Default domains Lock out / denial of service

Possible Entry Points (PEPs) OWA is protected by Form based login Mechanize NTLM Hydra OWA versions: 2003, 2007, 2010, Office We re lazy. Built fingerprint matching thingy. Side effect: Also identifies Citrix, Cisco Web VPN, SecureID, RSA and 19 others

Identify OWA interface PEP (OWA) demo Look for common names Check open 443 401? NTLM Match fingerprint to list of prints Select email addresses Run brute force

Possible Entry Points (CMS) Joomla / Wordpress / cpanel are mostly on the same spot. Word press use Metasploit plugin Nice template to work with Metasploit Joomla used Mechanize and rolled our own cpanel

CMS Brute demo Find Attack That s really all there is to it. Click, click bang

We looked at scanners. It felt like this: Vulnerability scanners

Vulnerability scanners We settled on Nmap with NSE Free Fast Light Reliable... kind of Scripts seems to be written by hackers. We like that. Easy to integrate Easily extendable More than 400 scripts with Kali

Vuln scanner Depends on the family you using Finds all the usual suspects Weak SSH / MySQL / MSSQL / VNC passwords Anonymous FTP PUT HTTP method FrontPage (90s called!) SMTP relay open etc

Demo Nmap with NSE Configure family auth, default, discovery, external, intrusive, malware, safe and vuln, none, all Where needed Configure extra parameters Configure ports Point Click Bang

People not machines

People - Maltego side The plan Mine email address from target domain Mine email address from address book Get more info from Maltego Social network membership Facebook, LinkedIn, Twitter, Flickr Get more info Manually? Automagically do phishing attack web application (KingPhisher)

People - KingPhisher side Parse info from the graph Select email templates based on info in the graph Based on the info collected and template used Find more info: Facebook / Flickr friends / Twitter profile pic Pretty pictures Interests etc. Populate template with info from Maltego graph Send email Set up collectors

KingPhisher Components

Challenges Getting marked as spam /phishing Their HTML email template Redo the HTML completely from scratch DKIM / SPF Use a different email address, but close enough Certain phrases Facebook, Facebook s physical address Outlook and links with IP addresses Real Time Blacklist (RBLs) Split the email composing and sending components PHP hosting site + SMTP Makes it easier to move the endpoint around

Then when the user clicks on it Serve browser 0day Wait.. that s cheating! You said no 0day! OK.. Collect IP address, user agent Redirect user to fake Social network site Corporate webmail / VPN site Hope to collect credentials Credential re-use: Use on company infrastructure VPN / Webmail Other social networks Profit!

Facebook (picture tag) Twitter (new follower) OWA with web forms OWA NTLM / Generic BA Useful templates Serves Basic Auth prompt Collect creds Rinse repeat (we want to collect everything) Forward to real site

How do you manage the campaign? Maltego! Run 3 transforms perpetually in a machine Controller -> Campaign/Email addresses Emails sent to Email address -> UserAgent and IP That clicked Email address -> Creds collected That supplied credentials

Cool other ideas that we did not implement (or perhaps we did?) Add to graph sent to KP / AmIThePresident.com: IP ranges Country Time of day User agent Use this to filter When your target matches filter Serve 0day / phish When Google/MS/Facebook comes visiting serve Hello World

King Phisher demo

Mobile devices demo (if there s time left!)

RELEASE Maltego Tungsten / Teeth / KingPhisher Released today! Check website / Twitter for details www.paterva.com @paterva Questions?