+ All Categories
Home > Documents > Module 7 – Gaining Access & Privilege Escalation Phase II Controls Assessment Scheduling ○...

Module 7 – Gaining Access & Privilege Escalation Phase II Controls Assessment Scheduling ○...

Date post: 17-Jan-2016
Category:
Upload: rosemary-phillips
View: 213 times
Download: 0 times
Share this document with a friend
19
Module 7 – Gaining Access & Privilege Escalation Phase II Controls Assessment Scheduling Information Gathering Network Mapping Vulnerability Identification Penetration Gaining Access & Privilege Escalation Enumerating Further Compromise Remote Users/Sites Maintaining Access Cover the Tracks Heorot.net
Transcript
Page 1: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Module 7 – Gaining Access &Privilege Escalation

Phase II Controls Assessment Scheduling

○ Information Gathering○ Network Mapping○ Vulnerability Identification○ Penetration○ Gaining Access & Privilege Escalation○ Enumerating Further○ Compromise Remote Users/Sites○ Maintaining Access○ Cover the Tracks

Heorot.net

Page 2: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Gaining Access &Privilege Escalation Gain Least Privilege Gain Intermediate Privilege Compromise Final Compromise

Problem: We don't have access

Heorot.net

Page 3: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Enumerating Further

Phase II Controls Assessment Scheduling

○ Information Gathering○ Network Mapping○ Vulnerability Identification○ Penetration○ Gaining Access & Privilege Escalation○ Enumerating Further○ Compromise Remote Users/Sites○ Maintaining Access○ Cover the Tracks

Heorot.net

Page 4: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

*Enumerating Further

E-mail address gathering Perform Password attacks **Sniff traffic and analyze it **Gather cookies **Identifying routes and networks **Mapping internal networks

*ISSAF does not cover this topic in great detail**Advance topics not covered in this class

Heorot.net

Page 5: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

E-mail Address Gathering

May already have some○ WHOIS information○ Forums○ archive.org

Blind e-mails○ Admin@...○ Webmaster@...○ abuse@...○ Asdfasdf@...

Web site

Heorot.net

Page 6: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

E-mail Address Gathering

Web page Demonstration

Page 7: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Perform Password Attacks

Remote AttackHydraUnicorn

Local AttackJohn the Ripper (JTR)

Additional resources required:WordlistsPatience

Heorot.net

Page 8: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Remote Attack

Hydra Demonstration

Page 9: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Enumerating Further

Perform Password attacksHydra results: Access Gained

What to do next?Continue on with EnumerationReturn to “Gain Access & Privilege Escalation”

Heorot.net

Page 10: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Gaining Access &Privilege Escalation Gain Least Privilege Gain Intermediate Privilege Compromise Final Compromise

We now have access

Heorot.net

Page 11: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Gaining Access &Privilege Escalation Gain Least Privilege through:

Exploitable vulnerabilityMis-configured systemPoor security practices

“In general when someone has physical access to the local host the game is over,because there is usually one or more ways to get all information from the system.” -ISSAF

Heorot.net

Page 12: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Gaining Access &Privilege Escalation Gain Least Privilege Gain Intermediate Privilege Compromise Final Compromise

“How to do this” isnot covered in any methodology

Heorot.net

Page 13: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Gain Intermediate Privilege

Exploitable vulnerabilityApplication exploit

Mis-configured systemApplication running at higher-than-needed

privilegesAccess to applications they shouldn't haveImproper maintenance (core dumps)

Poor security practicesUsers given elevated privileges

Heorot.net

Page 14: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Gain Intermediate Privilege

sudo Demonstration

Page 15: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Gaining Access &Privilege Escalation Gain Least Privilege Gain Intermediate Privilege Compromise Final Compromise

Heorot.net

Page 16: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Compromise

“A system is fully compromised anywhere in the target network and further attack from this system can be

performed. This system can be used as a step stone for other attacks to the final goal.”

Best example of this is “Got Root?”

Page 17: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Gaining Access &Privilege Escalation Gain Least Privilege Gain Intermediate Privilege Compromise Final Compromise

Heorot.net

Page 18: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Final Compromise

“In this step, the “real” victim like the company master DB or a specific system/file is compromised.” - ISSAF

DatabaseWeb PagesMail Serversetc.

Page 19: Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.

Module 7 – Gaining Access &Privilege Escalation

Phase II Controls Assessment Scheduling

○ ...○ Vulnerability Identification○ Penetration○ Gaining Access & Privilege Escalation

Gain Least PrivilegeGain Intermediate PrivilegeCompromiseFinal Compromise

Heorot.net


Recommended