+ All Categories
Home > Documents > CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE...

CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE...

Date post: 25-Mar-2018
Category:
Upload: duongdan
View: 227 times
Download: 6 times
Share this document with a friend
70
CYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady, Security Researcher, Microsoft ATA, @ItaiGrady
Transcript
Page 1: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

CYBER JUDO: OFFENSIVE CYBER DEFENSETal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySecItai Grady, Security Researcher, Microsoft ATA, @ItaiGrady

Page 2: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 3: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 4: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 5: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Intro

Page 6: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

https://en.wikipedia.org/wiki/Sun_Tzu#/media/File:Enchoen27n3200.jpg

Page 7: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 8: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 9: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Defenders Attackers

Network Deployment Proxy / Network Monitoring MITM / Eavesdropper

Host Deployment Agent (but the prefer to refrain: compatibility, performance)

Malware (but the prefer to refrain: compatibility, performance, detection)

Privileges Least, o.w. part of the problem (see:

@taviso)

Least, privileged user are more

monitored

Integrations “living off the land”. Core functionality must be delivered independently, opportunistic integrations

“living off the land”. Core functionality must be delivered independently,opportunistic existing non-default capabilities abuse

Expertise OS internals, networking OS internals, networking

Page 10: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 11: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 12: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 13: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 14: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 15: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

waza1234/

des_cbc_md5 f8fd987fa7153185

LSASS (kerberos)

rc4_hmac_nt(NTLM/md4)

cc36cf7a8514893efccd332446158b1a

aes128_hmac8451bb37aa6d7ce3d2a5c2d24d317af3

aes256_hmac

1a7ddce7264573ae1f498ff41614cc78001cbf6e3142857cce2

566ce74a7f25b

DC

DC

TGT

TGS

③ TGS-REQ (Server)

④ TGS-REP

⑤ UsageUser

Server

Page 16: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

• Authentication

• Authorization

DC

waza1234/

LSASS (NTLM)

NTLM(rc4_hmac_nt)

cc36cf7a8514893efccd332446158b1a

User

Server① Negotiate

③ Response

② Challenge

⑥ Auth verified

Page 17: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Lateral Movement Reconnaissance

Page 18: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

HERE

THERE

Page 19: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

HERE THERE

Page 20: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 21: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Logged-on User Recon

Page 22: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Computer’s Local Admin Recon

Page 23: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Users + Group Membership Recon

Page 25: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 26: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 27: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 28: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 29: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Lateral Movement Reconnaissance: Defense

Page 30: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Win version Who can query SAMR by default Can default be changed

< Win10 Any domain user No

Win10 Any domain user Yes (only via registry)

> Win10 (e.g.

anniversary)

Only local administrators Yes (registry or GPO)

Page 31: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 33: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 34: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 35: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 36: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Cyber Judo with NetSess

Page 37: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

• Authentication

• Authorization

DC

waza1234/

LSASS (NTLM)

NTLM(rc4_hmac_nt)

cc36cf7a8514893efccd332446158b1a

User

Server① Negotiate

③ Response

② Challenge

⑥ Auth verified

Page 38: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 39: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 40: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 41: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 42: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Cyber Judo with SAMR

Page 43: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 45: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 46: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 47: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 48: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 49: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 50: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 51: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Kerberos Error Message Injection

Page 52: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

waza1234/

des_cbc_md5 f8fd987fa7153185

LSASS (kerberos)

rc4_hmac_nt(NTLM/md4)

cc36cf7a8514893efccd332446158b1a

aes128_hmac8451bb37aa6d7ce3d2a5c2d24d317af3

aes256_hmac

1a7ddce7264573ae1f498ff41614cc78001cbf6e3142857cce2

566ce74a7f25b

DC

DC

TGT

TGS

③ TGS-REQ (Server)

④ TGS-REP

⑤ UsageUser

Server

Page 53: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 55: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

KDC

waza1234/

User1

des_cbc_md5 f8fd987fa7153185

LSASS (kerberos)

rc4_hmac_nt(NTLM/md4)

cc36cf7a8514893efccd332446158b1a

aes128_hmac8451bb37aa6d7ce3d2a5c2d24d317af3

aes256_hmac

1a7ddce7264573ae1f498ff41614cc78001cbf6e3142857cce2

566ce74a7f25b

user rc4_hmac_nt

aes256_hmac

Joe 21321… 543..

user1 cc36cf7a…

1a7ddc…

Doe

TGT

Page 56: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 57: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

• RC4-HMAC does not have any!

• RC4-HMAC does not have any!https://commons.wikimedia.org/wiki/File:Jodsalz_mit_Fluor_und_Folsaeure.jpg

Page 58: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 59: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

KDC

waza1234/

User1

des_cbc_md5 f8fd987fa7153185

LSASS (kerberos)

rc4_hmac_nt(NTLM/md4)

cc36cf7a8514893efccd332446158b1a

aes128_hmac8451bb37aa6d7ce3d2a5c2d24d317af3

aes256_hmac

1a7ddce7264573ae1f498ff41614cc78001cbf6e3142857cce2

566ce74a7f25b

user rc4_hmac_nt

aes256_hmac

Joe 21321… 543..

user1 cc36cf7a…

1a7ddc…

Doe

TGT

Page 60: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Kerberos Error Injection: Defense

Page 61: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 62: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 63: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Cyber Judo with Kerberos Error Injection

Page 65: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Parting Thoughts

Page 66: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 67: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 68: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 69: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,
Page 70: CYBER JUDO: OFFENSIVE CYBER DEFENSE - Black Hat · PDF fileCYBER JUDO: OFFENSIVE CYBER DEFENSE Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec Itai Grady,

Recommended