Bypassing Cisco’s Sourcefire AMP endpoint solution – Full demo & comparison with RSA NWE This article will demonstrate one of the key differences between NG AV endpoint protection and EDR solutions such as RSA NetWitness for Endpoints. In this article, we will demonstrate how Cisco’s endpoint protection solutions Sourcefire AMP is easily bypassed by performing a buffer overflow and in-memory post exploitation activities. This test was performed on a fully patched Windows 10 machine with an active MS Defender, MS Firewall, Cisco AMP & RSA NWE agent installed. The setup used for this test was the following: Windows 10 client protection verification
13
Embed
Bypassing cisco’s sourcefire amp endpoint solution – full demo
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Bypassing Cisco’s Sourcefire AMP endpoint solution – Full demo & comparison with RSA NWE
This article will demonstrate one of the key differences between NG AV endpoint protection and EDR solutions such as RSA NetWitness for Endpoints. In this article, we will demonstrate how Cisco’s endpoint protection solutions Sourcefire AMP is easily bypassed by performing a buffer overflow and in-memory post exploitation activities. This test was performed on a fully patched Windows 10 machine with an active MS Defender, MS Firewall, Cisco AMP & RSA NWE agent installed.The setup used for this test was the following:
Windows 10 client protection verification
Vulnerable application is installed and running
Cisco SourceFire AMP does not find any issues on the clean machine
AMP tracking information does not highlight any suspicious activities
RSA NWE does not find any suspicious activities on the clean machine
Attacker – KALI setting up exploit & payload module
Running remote buffer overflow exploit
No alerting from either Cisco AMP or MS Defender…
Attacker runs additional post exploitation activities such as a keylogger
Attacker searches and downloads password.txt & creates a screenshot
Attacker performs a ARP network scan
Attacker start an interactive SHELL and runs WHOAMI & IPCONFIG commands
Still no alerting from either Cisco AMP or MS Defender…
Cisco AMP does not detect or notifies on exploit and post exploit activities….