Top Banner
Date[Edit in slide master] © Context Information Security Limited / Commercial in Confidence © Context Information Security Limited / Commercial in Confidence Red Teaming RUXCON 2010
28

A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Mar 08, 2018

Download

Documents

phamminh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence © Context Information Security Limited / Commercial in Confidence

Red Teaming

RUXCON 2010

Page 2: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Me – Michael Jordon

• Principal Security Consultant – Context IS

• London

• Developer of CAT

• Advisories in:

• Outlook Web Access

• Sophos Anti-Virus

• Citrix

• Squirrel Mail

Page 3: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

What is Red Teaming?

• Military Term

• Red Team – Attackers

• Blue Team - Defenders

• Stage a real world attack against an organisation

• Different to Pen Testing

• No Scope (except the law and morality)

• Go for the kill

• Includes the people

Page 4: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Attack Vectors

• Client Side Attack

• Physical Social Engineering

• Wireless

• External Infrastructure

• Internal Infrastructure

• Kitchen Sink

Page 5: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

The Defences

• Firewalls

• Anti-Virus

• Web Content Checkers

• Corporate Policies and Procedures

• Like anyone follows them

• Low Priv Users

• Web Proxies

Page 6: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Information

• What do we attack?

• Who do we attack?

• What are we after?

• Where is it?

Page 7: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Step 1 – Acquire Target

• Open Source Info – LinkedIn, Facebook etc.

• Google it

• We want:

• Names, Positions

• Email addresses

• Personal Information

• Mobile Phones numbers

• Landline numbers

• Snail mail addresses

• Cooperate terminology

Page 8: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking
Page 9: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking
Page 10: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking
Page 11: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Page 12: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Step 2 – Exploit Target

• Malicious Document

• PDF, DOC, XLS vulnerabilities

• Vulnerabilities in Custom/Bespoke Software

• Delivery Mechanism:

• Malicious Web Site

• Malicious USB

• Malicious Links

• Malicious CDs

Page 13: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Finding a Vuln

• Identify any applications that process file extensions

• Hit the weak apps

• File format fuzzing

• Why go for PDFs when they have a weak corporate

app

Page 14: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Fuzzers – Example Basic File Format

Template Case #nMutate

Application

under Test

Fe

ed

Monitor Result –

Debug Events

Results

Next Test Case

Page 15: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Fuzzers – Demo File format Fuzzer

Page 16: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Snag It Exploit

• Font Length

• Double Linked list

• Can write arbitrary DWord to an arbitrary location

• Custom Shell Code

• Low Priv User

• Download and exec

• C:\recycler is your friend

• Provide Cover

Page 17: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Exploitation

Page 18: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

USB

• Bypass content checking

• Reflash firmware

• Composite Device – CDRom autoruns

• Disabled on cooperate machines

• Going Postal

• The personal touch

Page 19: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Email

• Impersonating corporate emails

• Has to look good, very good

• Make it personal

• Start a dialog

• Build and then abuse the trust

• Limited options for files

• Content checkers

• Outlook restrictions

• Deliver Links

Page 20: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

What does Malware do?

• Remote Control Local Users

• Command Execution

• Upload/Download Files

• Data Egress Large Files

• Key Logging

• Alter Users Web Pages

• Proxy Network Traffic

Page 21: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Creating Custom Malware

• Build from scratch

• Anti-AV

• Getting a beach head

• Network Traffic

• HTTPS – Perfect

• Use URLMON to get out of proxies

• Too much stealth and you might get caught

Page 22: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

CHorse Command & Control

Page 23: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

So we are in what next?

• Priv Esc

• Explorer current access

• Find internal targets

• No-one tests internal systems

• Hop from one system to another

• Internal Infrastructure techniques

• AV will get standard tools

• You are going through a trojan

• Windows token abuse

Page 24: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Gain Administrative Control of Internal Machines

Page 25: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Gain Sensitive Client Data

• Access to internal databases

• Client Data

• Backup files

• Files Shares

• Internal and External Emails

• Anywhere on the internal network

• Can jump from one system to another

• Create real accounts

Page 26: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Data Ingress / Egress

• Getting our gigs of data

• Chunking

• Rar files

• Locked files

Page 27: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Conclusion

• Find a target

• Exploit target

• Get the data

• Get out without being caught

Page 28: A Presentation to [Company] - 2010.ruxcon.org.au2010.ruxcon.org.au/assets/Presentations/michael-jordon.red-teaming... · ... [Edit in slide master] USB • Bypass content checking

Date[Edit in slide master]© Context Information Security Limited / Commercial in Confidence

Thank you

Questions?

[email protected]

www.contextis.com