Top Banner
1 Building a Cyber Range Kevin Cardwell 1
23

Building a Cyber Range - Kevin Cardwell

Aug 05, 2015

Download

Technology

EC-Council
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Building a Cyber Range - Kevin Cardwell

1

1

Building a Cyber Range

Kevin Cardwell

Page 2: Building a Cyber Range - Kevin Cardwell

Methods◦ New

From scratch◦ Clone

From and existing image◦ Convert

Works only on Windows

Virtual Machine Creation

2

Page 3: Building a Cyber Range - Kevin Cardwell

Use the wizard◦ Has an easy install option

Only works for some operating systems Has two methods

Typical Accepts the standard defaults

Custom Can select memory allocation Network type

New

3

Page 4: Building a Cyber Range - Kevin Cardwell

Custom◦ Preferred method◦ Allows for SCSI or IDE virtual disk◦ Store the virtual disk in another location

New (cont)

4

Page 5: Building a Cyber Range - Kevin Cardwell

Creates a copy of the virtual machine◦ Linked

Related to the VM used as source◦ Full

Complete and separate clone

Cloning

5

Page 6: Building a Cyber Range - Kevin Cardwell

Cloning (cont)

6

Page 7: Building a Cyber Range - Kevin Cardwell

VmWare Converter◦ A tool to convert a physical machine to a virtual

machine◦ Not an exact science◦ Only on Windows

Converting

7

Page 8: Building a Cyber Range - Kevin Cardwell

Network Connection Type

8

Page 9: Building a Cyber Range - Kevin Cardwell

Connects to the network using the host network adapter

Connected to physical network

Bridged

9

Page 10: Building a Cyber Range - Kevin Cardwell

Share the IP and MAC address of the host Not visible outside of the network

NAT

10

Page 11: Building a Cyber Range - Kevin Cardwell

Creates a network completely contained within the host

Can isolate a network Cannot connect to the Internet

Host-Only

11

Page 12: Building a Cyber Range - Kevin Cardwell

Can create sophisticated networks

Custom

12

Page 13: Building a Cyber Range - Kevin Cardwell

Switch

Attacker Box

Vmnet1

Vmnet2Vmnet3

Vmnet4

Web

InfrastructureRC

TAC

13

Page 14: Building a Cyber Range - Kevin Cardwell

Router◦ If do not have a device◦ Use dynamips

www.dynagen.org Requires Cisco IOS

Zeroshell www.zeroshell.org

Bastion Host◦ Any

Smoothwall free version – www.smoothwall.org pfsense

Based on FreeBSD Load balancing

Build it with 3 or 4 interfaces◦ Red◦ Green◦ Orange (DMZ)◦ Purple Wireless

Components

14

Page 15: Building a Cyber Range - Kevin Cardwell

Attacker machine◦ Windows with a VM

Kali Pentoo Build your own custom box

An inside machine◦ Windows

All boxes with at least two network cards configured◦ Can bind and isolate attacks if needed

Start research◦ Lab it up and test it!

Components (cont)

15

Page 16: Building a Cyber Range - Kevin Cardwell

Replaced teams Allows you to power on and off complex

ranges all with one click

Folders

16

Page 17: Building a Cyber Range - Kevin Cardwell

When you do your information gathering Identify the systems, services and software Lab it up and play!

◦ Start with a flat network◦ If you cannot get it with that, you never will

through layers of defense Document what works and does not work

Planning

17

Page 18: Building a Cyber Range - Kevin Cardwell

18

Building the Range

Page 19: Building a Cyber Range - Kevin Cardwell

19

Island Hopping and Pivoting Exploit Proxy

Advanced Techniques

Page 20: Building a Cyber Range - Kevin Cardwell

20

As you compromise assets, the perspective of the attacker changes

You now are located at the point of the compromised system

Allows us to leverage trust relationships

Island Hopping and Pivoting

Page 21: Building a Cyber Range - Kevin Cardwell

21

Island Hopping and Pivoting (cont)

External

Screeningrouter

Internal

Bastionhost

WWWserver

FTPserver

Services subnet

Page 22: Building a Cyber Range - Kevin Cardwell

22

A component of island hopping and pivoting Leverages the inside machine

◦ Plant my exploits there run exploits all from the inside machine

◦ This is fun!!!!! Requires an advanced shell

◦ The inside machine is not going to know about your network Have to add a route on the inside machine

Made easy with the tools Metasploit Meterpreter

Exploit Proxy

Page 23: Building a Cyber Range - Kevin Cardwell

Thank You! Kevin Cardwell [email protected]

Questions?

23

Kevin Cardwell

2nd Edition