TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT



Similar documents
Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Software that provides secure access to technology, everywhere.

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Fighting Advanced Threats

Protecting Your Organisation from Targeted Cyber Intrusion

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

All Information is derived from Mandiant consulting in a non-classified environment.

Practical Steps To Securing Process Control Networks

SPEAR PHISHING UNDERSTANDING THE THREAT

Defending Against Data Beaches: Internal Controls for Cybersecurity

Spear Phishing Attacks Why They are Successful and How to Stop Them

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Advanced Threat Protection with Dell SecureWorks Security Services

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Technical Testing. Network Testing DATA SHEET

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Hunting for Indicators of Compromise

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Penetration Testing with Kali Linux

Cyber Essentials. Test Specification

Secret Server Qualys Integration Guide

Post-Access Cyber Defense

RSA Security Anatomy of an Attack Lessons learned

Penetration Testing - a way for improving our cyber security

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

How To Integrate Intelligence Based Security Into Your Organisation

Under the Hood of the IBM Threat Protection System

Advanced Persistent Threats

Concierge SIEM Reporting Overview

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

PowerShell for Penetration Testers

How We're Getting Creamed

Enterprise Cybersecurity: Building an Effective Defense

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX

Breaking the Cyber Attack Lifecycle

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Locking down a Hitachi ID Suite server

Vulnerability Assessment and Penetration Testing

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Unknown threats in Sweden. Study publication August 27, 2014

Data Center security trends

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Marble & MobileIron Mobile App Risk Mitigation

OPC & Security Agenda

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Targeted attacks: Tools and techniques

24/7 Visibility into Advanced Malware on Networks and Endpoints

Networking for Caribbean Development

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Network Security Administrator

Developing Secure Software in the Age of Advanced Persistent Threats

WHY ATTACKER TOOLSETS DO WHAT THEY DO

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

A New Perspective on Protecting Critical Networks from Attack:

Alert (TA14-212A) Backoff Point-of-Sale Malware

Can We Become Resilient to Cyber Attacks?

Agenda. Red Team Difference to a Pen Test Common RT Techniques Blue Team

How Do Threat Actors Move Deeper Into Your Network?

Comprehensive Advanced Threat Defense

Security A to Z the most important terms

INFORMATION SECURITY TRAINING CATALOG (2015)

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

INFORMATION SECURITY TRAINING CATALOG (2016)

Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Penetration Test Report

CYBER SECURITY THREAT REPORT Q1

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

Honeypot that can bite: Reverse penetration

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

CYBERTRON NETWORK SOLUTIONS

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

How To Mitigate A Ddos Attack

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Presented by Evan Sylvester, CISSP

Detailed Description about course module wise:

Malicious Mitigation Strategy Guide

Enterprise Cybersecurity: Building an Effective Defense

2016 TÜBİTAK BİLGEM Cyber Security Institute

Cyber Watch. Written by Peter Buxbaum

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Industrial Security for Process Automation

Transcription:

+ = TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT

HAVE YOU EVER ENCOUNTERED AN ADVERSARY THAT RAN NESSUS FROM A MEETING ROOM?

PENETRATION TESTING vs RED TEAMING Penetration Testing Red Teaming Gain oversight of vulnerabilities Goal Test resilience against real attacks Predefined subset Scope Realistic access paths Focus on preventive controls Tested controls Focus on detection and response Focus on efficiency Test method Focus on realistic simulation Mapping, scanning, exploiting Test techniques Attacker TTPs Very limited Post-exploitation Extensive focus on crown jewels Part of development lifecycle Positioning Periodical exercise

RED TEAMING THE APPROACH The Red Team Uses the same Tactics, Techniques and Procedures (TTPs) as real adversaries Red team members must be on top of threat intelligence Team members must have operational versatility The Blue Team Is not only the security team (but also users, IT, management) Does not know if an incident is real or triggered by a red team Measure improvement: mean time to detect (MTTD) and mean time to recovery (MTTR)

THE APPROACH CYBER KILL CHAIN METHODOLOGY Select targets and determine attack methods Transmission of the attack via physical, email, web, or social engineering Install malware to gain remote control Complete actions and achieve the red flags Before the Hack T-1 T0 After the Hack T+1 Recon Weaponize Deliver Exploit Install Control Execute Develop the attack methods Successful penetration access gained Establish command & control throughout the network Developed by Lockheed Martin, Intelligence-Driven Computer Network Defense

THE ASSUME COMPROMISE MODEL Recon Weaponize Deliver Exploit Install Control Execute Focus on last steps in Kill Chain Realistic assumption that breaches will happen ( when, not if ) Compressed time adversary simulation Less time spent on trivial stuff, more time for crown jewels Being used by many internal red teams (e.g. Microsoft) How to approach this in your test? Have trusted agent click on all files and links sent to him Or give access to a limited number of systems

THE RED TEAM S BAG OF DIRTY TRICKS

RED TEAMING SUMMARY DUTCH BANK Chain step Tactic Technique Recon OSINT Device fingerprinting Social meda, Public sources Javascript browser fingerprinting Weaponize Malware dropper Java signed applet, Malicious Word Macro Deliver Spear phishing Clone parcel delivery website, Personal resumé site Install RAT malware Keylogging CS HTTP beacon Keylogging to Keypass Control Password bruteforce Create persistence Dump hashes Reverse password buteforce on AD Install persistence via Windows services and schtasks Mimikatz and hashdump on DCs and fileservers Execute Credentials abuse Initiate payment in SWIFT gateway

HOW TO DEFEAT ANTIVIRUS?

HOW TO DEFEAT THE BLINKY BOX APPLIANCE TM? * * FILL IN YOUR FAVORITE NETWORK SECURITY APPLIANCE VENDOR HERE

HOW TO OBTAIN A ROGUE CODE SIGNING CERTIFICATE?

TODO: screenshot PostNL mailtje

EGRESS - HTTPS BEACON

EGRESS - SMB BEACON INTERNAL ENVIRONMENT MANAGEMENT ENVIRONMENT Compromise management server (i.e. via keylogger) Establish Command & Control channel (e.g. via SMB linking) Stepping stone Office desktops All traffic blocked! Egress channel Control via malware (i.e. HTTPS beacon) Control C&C C&C Server Hacker INTERNET

EGRESS - DNS BEACON BUSINESS ENVIRONMENT SERVER ENVIRONMENT SUPPORT ENVIRONMENT Tomcat Server Access servers Office desktops Lateral movement Establish Command & Control channel (DNS) DNS Server (AD) Payment Server Outbound traffic blocked Control via malware (i.e. beacon) Control C&C Establish Command & Control channel (e.g. via DNS) C&C Server INTERNET Attack

DEFEATING THE RED TEAM (AND CATCHING THE REAL BAD GUYS AS A BONUS)

THE PYRAMID OF PAIN CONCEPT Layer of detection and response TTPs Tools Artefacts Domain names IP addresses Hash values Pain inflicted on attacker Tough! Challenging Annoying Simple Easy Trivial Idea by David Bianco - http://detect-respond.blogspot.nl/2013/03/the-pyramid-of-pain.html

DON T DO WHAC A MOLE - PLAY A DIFFERENT GAME Forcing the red team to change TTPs and tools Remove persistence instead of hunting for post-exploitation tools The red team likely maintains a low and slow backup method to get back in Lateral movement is more than just PsExec (wmic, at, sc, schtasks, PowerShell, etc) Control and monitor egress Block outbound TCP / UDP Tunnel through proxy with authentication (will break many malware) Control DNS (!= blocking port 53) let proxy handle DNS Tricks Leverage application whitelisting (even in audit mode) A good honeypot can be very attractive for the red team

HONEY HASHES CATCHING PASS-THE-HASH AND CREDENTIALS ABUSE runas /user:domain.com\super.admin /netonly ipconfig Next: setup alert on credentials use http://blogs.technet.com/b/jhoward/archive/2010/06/16/getting-event-log-contents-by-email-on-an-event-log-trigger.aspx Original idea: https://isc.sans.edu/diary/detecting+mimikatz+use+on+your+network/19311

KRBTGT RESET PROACTIVE GOLDEN TICKET PROTECTION Pass-the-ticket attack Attacker can abuse compromised KRBTGT account hash (= Kerberos secret key) to impersonate anybody in a Windows-domain based environment until the Kerberos secret key is reset. CERT-EU Security White Paper 2014-07: Containment by resetting twice the KRBTGT account password But, how do you know if one of your DCs has been owned in the past X years? Solution Proactively reset the KRBTGT account password (e.g. weekly or monthly) No guarantees, but a very large multinational has implemented this without any significant problems

PURPLE TEAMING

PURPLE TEAMING = RED + BLUE The idea of purple teaming Put the red and blue teams together in a room Combine offensive and defensive skillset Real-time tuning of protection and detection NOT a replacement for red teaming The Red Team Simulate latest relevant TTPs Generate data set for the blue team The Blue Team Use generated data set to define observables and indicators Create new monitoring use cases on the fly

PURPLE TEAMING - SIMULATING C2 How to simulate malicious backdoors without having to install the actual malware on your user s systems? Malleable Command and Control Cobalt Strike feature to change beacon communications Simulate malware C2 (from crimeware to APT) Change many indicators (beyond just user agent) Repository at https://github.com/rsmudge/malleable-c2-profiles

FITTING IT ALL TOGETHER EXAMPLE SECURITY TESTING PROGRAM Activity Interval Description Vulnerability scanning Monthly Automated scanning of infrastructure and applications for known vulnerabilities Penetration testing Embedded in SDLC Manual penetration testing of new or modified systems and applications Deep dive Quarterly Whitebox assessment on specific topic (e.g. DDoS resilience) Red teaming Twice a year Unannounced adversary simulation to test resilience against real attacks Purple teaming Quarterly Simulation of latest adversary TTPs and real-time evaluation of protective and detective measures

RESOURCES Microsoft whitepaper on red teaming http://download.microsoft.com/download/c/1/9/c1990dba-502f-4c2a-848d- 392B93D9B9C3/Microsoft_Enterprise_Cloud_Red_Teaming.pdf Cobalt Strike blog on red teaming, purple teaming, etc. http://blog.cobaltstrike.com/ Tradecraft training on red team operations by Cobalt Strike http://www.cobaltstrike.com/training Dark Side Ops training at Blackhat https://www.blackhat.com/us-15/training/dark-side-ops-custom-penetrationtesting.html

CLICK TO EDIT MASTER CONTACT TITLE DETAILS STYLE Stan Hegt T: +31 6 1188 5039 E: hegt.stan@kpmg.nl