SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
How we breach small and medium
enterprises (SMEs)
Bernardo Damele, NCC Group
Bernardo Damele
• Principal consultant and lead trainer with NCC Group
• Open source developer of widely used offensive security
tools
• 10 years professional experience in IT
• 8+ years in IT security
Agenda
• What is security?
• Quick recap
• How we assess and breach networks
• Network design mistakes and defective assumptions
• Weakest entry points of a network perimeter
• Leverage access to the network and why
What is security?
“Security is a degree of resistance to, or protection from a
threat.”
Security provides
“A form of protection where a separation is
created between the assets and the threat."
How we assess networks
Lifecycle of an infrastructure security assessment
• Discovery – scan the network to establish live hosts, their open ports
and services exposed
• VulnerabilityAssessment – establish where security issues exist from
an unauthenticated standpoint and investigate potential entry points
into the network
• Exploitation – compromise of a host through a vulnerability, or
misconfiguration
• Post Exploitation – credential harvesting and progression through the
network to achieve maximum compromise within the network
boundaries of the scope
Exploitation and post exploitation
Why is it important to exploit vulnerabilities?
To evaluate their risk and impact in the context of the
network under assessment and produce a high-value report
to the client
External versus internal assessment
External infrastructure assessment is carried out beyond the
network perimeter of the client
Focused on services exposed to the Internet across an IP range
defined by the client
Internal infrastructure assessment is carried out at the client’s site,
with a direct connection to the corporate network or DMZ
depending on the scope
Larger network footprint
Greater number of exposed services
Numerous Layer 2 and Layer 3 weaknesses and attacks
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
Lack of security patches
• Missing patches are easy entry points for attackers
• For a large number of critical publicly known vulnerabilities there
are reliable exploits
• In a typicalWindows network changes are high that one
workstation will not be patched
• Till
• Smart card reader
• Camera
• Embedded devices in general
Lack of security patches – scenario
• Office-based network
• Windows powered
• No centralized solution (e.g.WSUS) to deploy Microsoft patched onto
the workstations
• Different patching levels
• Largely outdated machines – vulnerable to reliable exploits
• Local System is an easy win
• Leverage foothold and compromise theWindows domain / forest
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
Default credentials
• It is a fact that device under test are kept with default credentials
• Application servers and management interfaces too
• Wordlists of default credentials for all these are easily available
• Tools to carry on login brute-force attacks exist
• When they do not, they are easy to develop with limited
development skills
Default credentials – scenario
• DMZ environment
• UNIX / Linux powered production servers
• Exploitation of memory corruption vulnerabilities is not an option
• Avoidance of DoS is mandated
• ApacheTomcat runs with default credentials admin / tomcat
• Used to deploy a customWAR to achieve command execution
• Local users’ password hashes dumped, cracked offline
• Leveraged to access over SSH /Telnet the rest of the servers
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
Excessive network footprint
• Unnecessary services are often exposed internally to the network
perimeter
• Effort to maintain large heterogeneous networks leave room for
oversight in network footprint
• Services that run on localhost may prove helpful to compromise
further the network – post exploitation
Excessive network footprint – scenario
• Despite SSH in use, R*Services are still used for management
purposes
• Easy to brute-force ACL for R*Services remotely
• Or… NIS used to manage users centrally on a UNIX / Linux
network
• Can be queried anonymously to retrieve users’ password hashes
• Cracked offline
• Leverage to compromise the rest of the systems
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
Lack or weak network segregation
• Network segregation by mere DHCP netmask restriction is
ineffective
• Segregating at the application layer is defective
• Leaves room to exfiltration / tunnelling attacks
• MAC filtering is ineffective
• NAC solutions do not always guarantee network segregation /
access
Lack or weak network segregation – scenario
• Two distinctWindows domains: CORP and GUEST
• Not part of the sameWindows forest
• No direct access between the two networks
• They’re physically hosted in two separate buildings, different physical
devices, no apparent interconnections
• Users of the GUEST domain can surf the Internet, so can users of the
CORP domain
• They share the same web proxy on a third network
• This proxy is reachable by both networks
• Hence, it can be used to pivot traffic from the GUEST network to the
CORP network – CONNECT method (enabled by default, for HTTPS)
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
Exceptions
• Temporary firewall rules turn permanent
• Network configurations are usually complex, undocumented and hard
to maintain, hence exceptions are added and rules overwrite / duplicate
one another
• Exceptions and defective regular expressions may lead to more harm
than good
Exceptions – scenario
• Web management interface
• Backed by JBoss Application Server
• Configured manually to prompt user for credentials at any
unauthenticated GET and POST request
• HTTPVerbTampering
• Intercept the login request and replace POST with HEAD
• Get a valid session ID tied to a legitimate user
• Once authenticated, from the web management compromise the
underlying OS
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
White-listing over black-listing
• Black-list (“reject known bad”)
• Reject data matching a list of known attack strings or patterns
• Accept everything else
• Can hinder simple attacks and automated attack tools
• Highly vulnerable to bypasses using encoding and other techniques
• White-list (“accept known good”)
• Accept data matching a list of known benign strings or patterns
• Reject everything else
• Highly effective method if feasible
Prioritise avenues of attack
• Abuse of intended functionality
• Example: download of files from an anonymous FTP server
• Extended use of functionality
• Example: using xp_cmdshell extended stored procedure on a Microsoft SQL
Server, or deploying additional .war files on an ApacheTomcat Server
• Mature, public exploit
• Example: exploit for MS08-067 vulnerability
• Proof of concept code
• Example: code downloaded from exploit-db.com or other exploit repository to
exploit a third-party product
Move sideways
• Once a foothold onto the target network is gained, next step is to
retain access
• Create an admin user, deploy a backdoor, etc.
• Leverage access to inspect the file system, query the DC, sniff traffic
• Move sideways
• Password reuse for local OS users is a very bad practice
• Once dumped, password hashes can be sprayed, no need to be
cracked offline
• Dual-homed systems – pivot traffic / extend control
Conclusions, once more
• Don’t buy product vendor hype
• Cyber security is not about products
• Cyber security doesn’t have to be costly
• An incident will happen so have a plan
Thank you! Questions?
training@nccgroup.com
Contact us
UK Offices
Manchester - Head Office
London
Leatherhead
Milton Keynes
Cheltenham
Edinburgh
North American Offices
San Francisco
New York
Seattle
Chicago
Austin
Atlanta
Australian Offices
Sydney
European Offices
Amsterdam – Netherlands
Munich – Germany
Zurich - Switzerland

Weitere ähnliche Inhalte

Was ist angesagt?

Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Digital Bond
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)Digital Bond
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
 
Docking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slidesDocking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slidesNCC Group
 
Extracting Credentials From Windows
Extracting Credentials From WindowsExtracting Credentials From Windows
Extracting Credentials From WindowsNetSPI
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Digital Bond
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014Digital Bond
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Digital Bond
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementSam Bowne
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseNetSPI
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)eNetSPI
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_finalPacSecJP
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsSam Bowne
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructurePositive Hack Days
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Applicationedavid2685
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingSam Bowne
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsSam Bowne
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingBlack Duck by Synopsys
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingSam Bowne
 

Was ist angesagt? (20)

Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
Docking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slidesDocking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slides
 
Extracting Credentials From Windows
Extracting Credentials From WindowsExtracting Credentials From Windows
Extracting Credentials From Windows
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access Management
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash Course
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)e
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare Infrastructure
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 

Andere mochten auch

2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 02013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0NCC Group
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_designNCC Group
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a ShoestringNCC Group
 
Pki 202 Architechture Models and CRLs
Pki 202   Architechture Models and CRLsPki 202   Architechture Models and CRLs
Pki 202 Architechture Models and CRLsNCC Group
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group
 
SQL injection exploitation internals
SQL injection exploitation internalsSQL injection exploitation internals
SQL injection exploitation internalsBernardo Damele A. G.
 
Cryptography101
Cryptography101Cryptography101
Cryptography101NCC Group
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsNCC Group
 
USB: Undermining Security Barriers
USB: Undermining Security BarriersUSB: Undermining Security Barriers
USB: Undermining Security BarriersNCC Group
 
2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_room2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_roomNCC Group
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key ManagementNCC Group
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsNCC Group
 
The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security NCC Group
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleNCC Group
 

Andere mochten auch (17)

Ppt on ncc
Ppt on  nccPpt on  ncc
Ppt on ncc
 
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 02013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
Pki 202 Architechture Models and CRLs
Pki 202   Architechture Models and CRLsPki 202   Architechture Models and CRLs
Pki 202 Architechture Models and CRLs
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios apps
 
SQL injection exploitation internals
SQL injection exploitation internalsSQL injection exploitation internals
SQL injection exploitation internals
 
Cryptography101
Cryptography101Cryptography101
Cryptography101
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
USB: Undermining Security Barriers
USB: Undermining Security BarriersUSB: Undermining Security Barriers
USB: Undermining Security Barriers
 
2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_room2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_room
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key Management
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
 
The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 

Ähnlich wie How we breach small and medium enterprises (SMEs)

Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy ServerLakshyaArora12
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesSam Bowne
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesSam Bowne
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxLeahRachael
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesSam Bowne
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesSam Bowne
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systemsfajjarrehman
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure InfrastructuresPROIDEA
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architectureMuhammad ismail Shah
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationSam Bowne
 
Networks1
Networks1Networks1
Networks1Aarti P
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat ManagementTapas Shome
 

Ähnlich wie How we breach small and medium enterprises (SMEs) (20)

Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systems
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident Preparation
 
Networks1
Networks1Networks1
Networks1
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

How we breach small and medium enterprises (SMEs)

  • 1. How we breach small and medium enterprises (SMEs) Bernardo Damele, NCC Group
  • 2. Bernardo Damele • Principal consultant and lead trainer with NCC Group • Open source developer of widely used offensive security tools • 10 years professional experience in IT • 8+ years in IT security
  • 3. Agenda • What is security? • Quick recap • How we assess and breach networks • Network design mistakes and defective assumptions • Weakest entry points of a network perimeter • Leverage access to the network and why
  • 4. What is security? “Security is a degree of resistance to, or protection from a threat.” Security provides “A form of protection where a separation is created between the assets and the threat."
  • 5. How we assess networks Lifecycle of an infrastructure security assessment • Discovery – scan the network to establish live hosts, their open ports and services exposed • VulnerabilityAssessment – establish where security issues exist from an unauthenticated standpoint and investigate potential entry points into the network • Exploitation – compromise of a host through a vulnerability, or misconfiguration • Post Exploitation – credential harvesting and progression through the network to achieve maximum compromise within the network boundaries of the scope
  • 6. Exploitation and post exploitation Why is it important to exploit vulnerabilities? To evaluate their risk and impact in the context of the network under assessment and produce a high-value report to the client
  • 7. External versus internal assessment External infrastructure assessment is carried out beyond the network perimeter of the client Focused on services exposed to the Internet across an IP range defined by the client Internal infrastructure assessment is carried out at the client’s site, with a direct connection to the corporate network or DMZ depending on the scope Larger network footprint Greater number of exposed services Numerous Layer 2 and Layer 3 weaknesses and attacks
  • 8. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 9. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 10. Lack of security patches • Missing patches are easy entry points for attackers • For a large number of critical publicly known vulnerabilities there are reliable exploits • In a typicalWindows network changes are high that one workstation will not be patched • Till • Smart card reader • Camera • Embedded devices in general
  • 11. Lack of security patches – scenario • Office-based network • Windows powered • No centralized solution (e.g.WSUS) to deploy Microsoft patched onto the workstations • Different patching levels • Largely outdated machines – vulnerable to reliable exploits • Local System is an easy win • Leverage foothold and compromise theWindows domain / forest
  • 12. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 13. Default credentials • It is a fact that device under test are kept with default credentials • Application servers and management interfaces too • Wordlists of default credentials for all these are easily available • Tools to carry on login brute-force attacks exist • When they do not, they are easy to develop with limited development skills
  • 14. Default credentials – scenario • DMZ environment • UNIX / Linux powered production servers • Exploitation of memory corruption vulnerabilities is not an option • Avoidance of DoS is mandated • ApacheTomcat runs with default credentials admin / tomcat • Used to deploy a customWAR to achieve command execution • Local users’ password hashes dumped, cracked offline • Leveraged to access over SSH /Telnet the rest of the servers
  • 15. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 16. Excessive network footprint • Unnecessary services are often exposed internally to the network perimeter • Effort to maintain large heterogeneous networks leave room for oversight in network footprint • Services that run on localhost may prove helpful to compromise further the network – post exploitation
  • 17. Excessive network footprint – scenario • Despite SSH in use, R*Services are still used for management purposes • Easy to brute-force ACL for R*Services remotely • Or… NIS used to manage users centrally on a UNIX / Linux network • Can be queried anonymously to retrieve users’ password hashes • Cracked offline • Leverage to compromise the rest of the systems
  • 18. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 19. Lack or weak network segregation • Network segregation by mere DHCP netmask restriction is ineffective • Segregating at the application layer is defective • Leaves room to exfiltration / tunnelling attacks • MAC filtering is ineffective • NAC solutions do not always guarantee network segregation / access
  • 20. Lack or weak network segregation – scenario • Two distinctWindows domains: CORP and GUEST • Not part of the sameWindows forest • No direct access between the two networks • They’re physically hosted in two separate buildings, different physical devices, no apparent interconnections • Users of the GUEST domain can surf the Internet, so can users of the CORP domain • They share the same web proxy on a third network • This proxy is reachable by both networks • Hence, it can be used to pivot traffic from the GUEST network to the CORP network – CONNECT method (enabled by default, for HTTPS)
  • 21. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 22. Exceptions • Temporary firewall rules turn permanent • Network configurations are usually complex, undocumented and hard to maintain, hence exceptions are added and rules overwrite / duplicate one another • Exceptions and defective regular expressions may lead to more harm than good
  • 23. Exceptions – scenario • Web management interface • Backed by JBoss Application Server • Configured manually to prompt user for credentials at any unauthenticated GET and POST request • HTTPVerbTampering • Intercept the login request and replace POST with HEAD • Get a valid session ID tied to a legitimate user • Once authenticated, from the web management compromise the underlying OS
  • 24. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 25. White-listing over black-listing • Black-list (“reject known bad”) • Reject data matching a list of known attack strings or patterns • Accept everything else • Can hinder simple attacks and automated attack tools • Highly vulnerable to bypasses using encoding and other techniques • White-list (“accept known good”) • Accept data matching a list of known benign strings or patterns • Reject everything else • Highly effective method if feasible
  • 26. Prioritise avenues of attack • Abuse of intended functionality • Example: download of files from an anonymous FTP server • Extended use of functionality • Example: using xp_cmdshell extended stored procedure on a Microsoft SQL Server, or deploying additional .war files on an ApacheTomcat Server • Mature, public exploit • Example: exploit for MS08-067 vulnerability • Proof of concept code • Example: code downloaded from exploit-db.com or other exploit repository to exploit a third-party product
  • 27. Move sideways • Once a foothold onto the target network is gained, next step is to retain access • Create an admin user, deploy a backdoor, etc. • Leverage access to inspect the file system, query the DC, sniff traffic • Move sideways • Password reuse for local OS users is a very bad practice • Once dumped, password hashes can be sprayed, no need to be cracked offline • Dual-homed systems – pivot traffic / extend control
  • 28. Conclusions, once more • Don’t buy product vendor hype • Cyber security is not about products • Cyber security doesn’t have to be costly • An incident will happen so have a plan
  • 29. Thank you! Questions? training@nccgroup.com Contact us UK Offices Manchester - Head Office London Leatherhead Milton Keynes Cheltenham Edinburgh North American Offices San Francisco New York Seattle Chicago Austin Atlanta Australian Offices Sydney European Offices Amsterdam – Netherlands Munich – Germany Zurich - Switzerland