Top Banner
HACKING TECHNIQUES and Mitigations Brady Bloxham
35

HACKING TECHNIQUES and Mitigations Brady Bloxham.

Mar 29, 2015

Download

Documents

Pedro Holtby
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: HACKING TECHNIQUES and Mitigations Brady Bloxham.

HACKING TECHNIQUESand Mitigations

Brady Bloxham

Page 2: HACKING TECHNIQUES and Mitigations Brady Bloxham.

About Us• Services

• Vulnerability assessments• Wireless assessments• Compliance testing• Penetration testing

• Eat, breathe, sleep, talk,

walk, think, act security!

Page 3: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Agenda• Old methodology• New methodology• Techniques in action• Conclusion

Page 4: HACKING TECHNIQUES and Mitigations Brady Bloxham.

The Old Way• Footprinting• Network Enumeration• Vulnerability Identification• Gaining Access to the Network• Escalating Privileges• Retain Access• Return and Report

Page 5: HACKING TECHNIQUES and Mitigations Brady Bloxham.

The Old Way (continued)

Page 6: HACKING TECHNIQUES and Mitigations Brady Bloxham.

The New Way (my way!)• Recon• Plan• Exploit• Persist• Repeat

• Simple, right?!

Page 7: HACKING TECHNIQUES and Mitigations Brady Bloxham.

The New Way (continued)

Recon

Plan

Exploit

Domain Admin?

No

Persist

Report!Yes

Page 8: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Old vs. New• So what you end up with is…

Page 9: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Recon• Two types

• Pre-engagement• On the box

Page 10: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Recon – Pre-engagment• Target IT• Social Networking

• LinkedIn• Facebook• Google• Bing

• Create profile• Play to their ego• Play to desperation• Play to what you know

Page 11: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Recon – Pre-engagment• Social Engineering

Page 12: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Recon – On the box• Netstat

Page 13: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Recon – On the box• Set

Page 14: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Recon – On the box• Net

Page 15: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Recon – On the box• Net

Page 16: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Recon – On the box• Net

Page 17: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Recon • Registry

• Audit Settings• HKLM\Security\Policy\PolAdtEv

• Dump hashes• Local hashes• Domain cached credentials• Windows credential editor• Application credentials (Pidgin, Outlook, browsers, etc.)

• RDP history• HKU\Software\Microsoft\Terminal Server Client\Default

• Installed software• HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall

Page 18: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Recon• What do we have?

• High value servers (domain controller, file servers, email, etc.)• Group and user list

• Domain admins• Other high value targets

• Installed applications• Detailed account information• Hashes and passwords

Page 19: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Plan

Page 20: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Plan

Page 21: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Plan• Test, test test!

• Real production environment!• Recreate target environment

• Proxies• AV• Domain

• Verify plan with customer

• Think outside the box!

Page 22: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Plan

Page 23: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Plan

Page 24: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Exploit

Page 25: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Exploit• The reality is…it’s much easier than that!

• No 0-days necessary!• Macros• Java applets• EXE PDFs

Page 26: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Exploit• Java Applet

• Domain – $4.99/year• Hosting – $9.99/year• wget – Free!• Pwnage – Priceless!

• Macros• Base64 encoded payload• Convert to binary • Write to disk• Execute binary• Shell!

Page 27: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Exploit• The problem? A reliable payload!

• Obfuscation• Firewalls• Antivirus• Proxies

Page 28: HACKING TECHNIQUES and Mitigations Brady Bloxham.
Page 29: HACKING TECHNIQUES and Mitigations Brady Bloxham.
Page 30: HACKING TECHNIQUES and Mitigations Brady Bloxham.
Page 31: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Persist

Page 32: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Persist• Separates the men from the boys!• Custom, custom, custom!• Nothing good out there…

• Meterpreter – OSS• Core Impact – Commercial• Poison Ivy – Private• DarkComet – Private• Who’s going to trust these?

Page 33: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Persist• How?

• Registry• Service• Autorun• Startup folder• DLL hijacking

• What?• Beaconing backdoor• Stealthy• Blend with the noise• Modular

Page 34: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Repeat?!

Page 35: HACKING TECHNIQUES and Mitigations Brady Bloxham.

Conclusion• Old methodology is busted!• Compliance != Secure• It’s not practice makes perfect…