+ All Categories
Home > Documents > Hacking Techniques

Hacking Techniques

Date post: 25-Feb-2016
Category:
Upload: milo
View: 39 times
Download: 0 times
Share this document with a friend
Description:
Hacking Techniques. and Mitigations Brady Bloxham. About Us. Services Vulnerability assessments Wireless assessments Compliance testing Penetration testing Eat, breathe, sleep, talk, walk, think, act security!. Agenda. Old methodology New methodology Techniques in action - PowerPoint PPT Presentation
35
HACKING TECHNIQUES and Mitigations Brady Bloxham
Transcript
Page 1: Hacking Techniques

HACKING TECHNIQUESand Mitigations

Brady Bloxham

Page 2: Hacking Techniques

About Us• Services

• Vulnerability assessments• Wireless assessments• Compliance testing• Penetration testing

• Eat, breathe, sleep, talk, walk, think, act security!

Page 3: Hacking Techniques

Agenda• Old methodology• New methodology• Techniques in action• Conclusion

Page 4: Hacking Techniques

The Old Way• Footprinting• Network Enumeration• Vulnerability Identification• Gaining Access to the Network• Escalating Privileges• Retain Access• Return and Report

Page 5: Hacking Techniques

The Old Way (continued)

Page 6: Hacking Techniques

The New Way (my way!)• Recon• Plan• Exploit• Persist• Repeat

• Simple, right?!

Page 7: Hacking Techniques

The New Way (continued)Recon

Plan

Exploit

Domain Admin?

No

Persist

Report! Yes

Page 8: Hacking Techniques

Old vs. New• So what you end up with is…

Page 9: Hacking Techniques

Recon• Two types

• Pre-engagement• On the box

Page 10: Hacking Techniques

Recon – Pre-engagment• Target IT• Social Networking

• LinkedIn• Facebook• Google• Bing

• Create profile• Play to their ego• Play to desperation• Play to what you know

Page 11: Hacking Techniques

Recon – Pre-engagment• Social Engineering

Page 12: Hacking Techniques

Recon – On the box• Netstat

Page 13: Hacking Techniques

Recon – On the box• Set

Page 14: Hacking Techniques

Recon – On the box• Net

Page 15: Hacking Techniques

Recon – On the box• Net

Page 16: Hacking Techniques

Recon – On the box• Net

Page 17: Hacking Techniques

Recon • Registry

• Audit Settings• HKLM\Security\Policy\PolAdtEv

• Dump hashes• Local hashes• Domain cached credentials• Windows credential editor• Application credentials (Pidgin, Outlook, browsers, etc.)

• RDP history• HKU\Software\Microsoft\Terminal Server Client\Default

• Installed software• HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall

Page 18: Hacking Techniques

Recon• What do we have?

• High value servers (domain controller, file servers, email, etc.)• Group and user list

• Domain admins• Other high value targets

• Installed applications• Detailed account information• Hashes and passwords

Page 19: Hacking Techniques

Plan

Page 20: Hacking Techniques

Plan

Page 21: Hacking Techniques

Plan• Test, test test!

• Real production environment!• Recreate target environment

• Proxies• AV• Domain

• Verify plan with customer• Think outside the box!

Page 22: Hacking Techniques

Plan

Page 23: Hacking Techniques

Plan

Page 24: Hacking Techniques

Exploit

Page 25: Hacking Techniques

Exploit• The reality is…it’s much easier than that!

• No 0-days necessary!• Macros• Java applets• EXE PDFs

Page 26: Hacking Techniques

Exploit• Java Applet

• Domain – $4.99/year• Hosting – $9.99/year• wget – Free!• Pwnage – Priceless!

• Macros• Base64 encoded payload• Convert to binary • Write to disk• Execute binary• Shell!

Page 27: Hacking Techniques

Exploit• The problem? A reliable payload!

• Obfuscation• Firewalls• Antivirus• Proxies

Page 28: Hacking Techniques
Page 29: Hacking Techniques
Page 30: Hacking Techniques
Page 31: Hacking Techniques

Persist

Page 32: Hacking Techniques

Persist• Separates the men from the boys!• Custom, custom, custom!• Nothing good out there…

• Meterpreter – OSS• Core Impact – Commercial• Poison Ivy – Private• DarkComet – Private• Who’s going to trust these?

Page 33: Hacking Techniques

Persist• How?

• Registry• Service• Autorun• Startup folder• DLL hijacking

• What?• Beaconing backdoor• Stealthy• Blend with the noise• Modular

Page 34: Hacking Techniques

Repeat?!

Page 35: Hacking Techniques

Conclusion• Old methodology is busted!• Compliance != Secure• It’s not practice makes perfect…


Recommended