Netwitness RT - Don’t scratch that patch.pptx

1 ©2021 RSA Security LLC or its affiliates. All rights reserved.
2 ©2021 RSA Security LLC or its affiliates. All rights reserved.
3 ©2021 RSA Security LLC or its affiliates. All rights reserved.
4 ©2021 RSA Security LLC or its affiliates. All rights reserved.
5 ©2021 RSA Security LLC or its affiliates. All rights reserved.
6 ©2021 RSA Security LLC or its affiliates. All rights reserved.
MITRE ATT&ck
We use MITRE framework to definethe techniques to adopt.
In addition,MITRE ATT&ck Frameworksupportthe Customerreadingour final report.
7 ©2021 RSA Security LLC or its affiliates. All rights reserved.
Mapping Tactics & Techniques
 By mappingthe real used techniques, the Team can build the scenario and can decide what tool
to adopt to emulate the outcome of the attacker tools.
8 ©2021 RSA Security LLC or its affiliates. All rights reserved.
9 ©2021 RSA Security LLC or its affiliates. All rights reserved.
10 ©2021 RSA Security LLC or its affiliates. All rights reserved.
11 ©2021 RSA Security LLC or its affiliates. All rights reserved.
12 ©2021 RSA Security LLC or its affiliates. All rights reserved.
13 ©2021 RSA Security LLC or its affiliates. All rights reserved.
 Our tools for the trade are:
 IDA Pro
 BinDiff
 Diaphora
How to find exploits…
 Diaphora is a plugin to IDA and it exports all necessary metadata into a sqlite-database.
To work with Diaphora you should proceed with the following steps:
 BinDiff is a comparison tool for binary files that helps to quickly find differences and similarities in
disassembled code. It is used by security researchers and engineers across the globe to identify and isolate
fixes for vulnerabilities in vendor-supplied patches and to analyze multiple versions of the same binary.
Another common use case is to transfer analysis results from one binary to another, helping to prevent
duplicate analyses of, for example, malware binaries.
 First, we export the databases (the binaries) that we want to compare.
 Then, we diff both generated databases to find matches between them.
 Optionally, we can import matches from one binary to another.
14 ©2021 RSA Security LLC or its affiliates. All rights reserved.
How to find exploits…
 With BinDiff you can identify and
isolate fixes for vulnerabilitiesin
vendor-suppliedpatches, port
symbolsand comments between
disassemblies of multiple versions
of the same binary.
In a typical comparison,as the results are presented, we get a number of tabs with statistics.
The Primary Unmatched tab shows functions that exist in the currently opened IDB that were not found in
the other file, while the Secondary Unmatched and Matched Functions tabs should be self-explanatory.
15 ©2021 RSA Security LLC or its affiliates. All rights reserved.
 We first open a file in IDA and export all the necessary metadata into a sqlite-database before
then opening the second file and comparing the sqlite files:
Diaphora
 The UI after the comparison
finishes is pretty much the
same as BinDiff.
 However when comparing
functions side-by-side it’s all
done in IDA with the option to
get an assembly,a pseudo-
code and a patch-style
comparison.
16 ©2021 RSA Security LLC or its affiliates. All rights reserved.
 The Microsoft patch, solved a privilege escalation vulnerabilitywithin win32k.
Search for an exploit: CVE-2023-29336
 v15 code implementation focused solely on
locking the window object called in the routine,
but it missed to lock the menu object nested
within the window object.
 It means that menu within the object can be left
behind, paving the way for the privilege
escalation.
 In fact, xxxEnableMenuItem function, connected
with v15 object is not properly locked when
exiting is main flow:
This object (v15) is locked properly… but, why in v17 is different?
 Let’s “BinDiff” between win32kunpatched and win32kpatched:
 This results in an exploitable condition to work
with, allowing us to develop a PoC and to go
forward with testing.
17 ©2021 RSA Security LLC or its affiliates. All rights reserved.
 If you found the instructions that are addressedby the patch, it’s time to move forward…
 If you unearthed an API that could be invoked:
− Craft the API call’s arguments carefully in order to trigger the vulnerable condition
− If no callable API is found:
• Look up the chain of calls, looking for hints
− as to how to reach the vulnerable condition
• Make a proof of concept file, network packet, API call, etc.
 Find samples online
− Run through all the samples to see which ones (if any) come near or actually hit the vulnerable function
− Modify the successful samples to focus in on and trigger the vulnerable code.
− Have fun…
Practical exploit creation
18 ©2021 RSA Security LLC or its affiliates. All rights reserved.
Demo: Example of weaponization
of a Patch Tuesday
19 ©2021 RSA Security LLC or its affiliates. All rights reserved.
20 ©2021 RSA Security LLC or its affiliates. All rights reserved.
21 ©2021 RSA Security LLC or its affiliates. All rights reserved.
 Video 1#
• We start with a local access with a standard user (“test”) in an unpatched Windows 11 system
• we launch the exploit code
• Thanks to the exploit we can add an administrative user or execute arbitrary command with
SYSTEM level. In our case we created the “admin” user.
 Video 2#
• This video demonstrate how the exploit can be used by a Red Teamer or a real attacker
• Using Runas from the C2 the attacker started a new implant with a middle integrity
privilege level (administrator)
 Video 3#
• From the new implant created with admin user the attacker use aBypassUAC technique
(fodhelper.exe) to gain high integrity level.
• At this point we can execute almost any program or command on the target machine.
Demo explained
22 ©2021 RSA Security LLC or its affiliates. All rights reserved.
23 ©2021 RSA Security LLC or its affiliates. All rights reserved.
Netwitness RT - Don’t scratch that patch.pptx
1 von 24

Recomendados

IRJET- Development of Uncrackable Software von
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
17 views9 Folien
[Haechi Audit] Pancake Bunny Smart Contract Audit Report von
[Haechi Audit] Pancake Bunny Smart Contract Audit Report[Haechi Audit] Pancake Bunny Smart Contract Audit Report
[Haechi Audit] Pancake Bunny Smart Contract Audit ReportLeighJay1
1.9K views11 Folien
IRJET- A Study on Penetration Testing using Metasploit Framework von
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET Journal
16 views8 Folien
Penetration testing using metasploit framework von
Penetration testing using metasploit frameworkPenetration testing using metasploit framework
Penetration testing using metasploit frameworkPawanKesharwani
89 views8 Folien
Making Security Agile von
Making Security AgileMaking Security Agile
Making Security AgileOleg Gryb
1.4K views48 Folien
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo... von
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...Felipe Prado
92 views84 Folien

Más contenido relacionado

Similar a Netwitness RT - Don’t scratch that patch.pptx

nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code von
nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable codenullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code
nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable coden|u - The Open Security Community
2.1K views14 Folien
Double agent zero-day code injection and persistence technique von
Double agent  zero-day code injection and persistence techniqueDouble agent  zero-day code injection and persistence technique
Double agent zero-day code injection and persistence techniqueKarlFrank99
324 views23 Folien
Mergebase dont-let-vulns-run-wild von
Mergebase dont-let-vulns-run-wildMergebase dont-let-vulns-run-wild
Mergebase dont-let-vulns-run-wildJaredHarris18
43 views43 Folien
July Patch Tuesday 2019 von
July Patch Tuesday 2019July Patch Tuesday 2019
July Patch Tuesday 2019Ivanti
1.9K views59 Folien
How Virtual Compilation Transforms Static Code Analysis von
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisCheckmarx
647 views7 Folien
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way von
OWASP Bay Area Meetup - DevSecOps the Kubernetes WayOWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes WayJimmy Mesta
201 views239 Folien

Similar a Netwitness RT - Don’t scratch that patch.pptx(20)

Double agent zero-day code injection and persistence technique von KarlFrank99
Double agent  zero-day code injection and persistence techniqueDouble agent  zero-day code injection and persistence technique
Double agent zero-day code injection and persistence technique
KarlFrank99324 views
Mergebase dont-let-vulns-run-wild von JaredHarris18
Mergebase dont-let-vulns-run-wildMergebase dont-let-vulns-run-wild
Mergebase dont-let-vulns-run-wild
JaredHarris1843 views
July Patch Tuesday 2019 von Ivanti
July Patch Tuesday 2019July Patch Tuesday 2019
July Patch Tuesday 2019
Ivanti1.9K views
How Virtual Compilation Transforms Static Code Analysis von Checkmarx
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code Analysis
Checkmarx647 views
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way von Jimmy Mesta
OWASP Bay Area Meetup - DevSecOps the Kubernetes WayOWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
Jimmy Mesta201 views
Vulnerability Advisor Deep Dive (Dec 2016) von Canturk Isci
Vulnerability Advisor Deep Dive (Dec 2016)Vulnerability Advisor Deep Dive (Dec 2016)
Vulnerability Advisor Deep Dive (Dec 2016)
Canturk Isci587 views
Vs code extensions required for blockchain development von Blockchain Council
Vs code extensions required for blockchain developmentVs code extensions required for blockchain development
Vs code extensions required for blockchain development
Vulnerabilities are bugs, Let's test for them! von ichikaway
Vulnerabilities are bugs, Let's test for them!Vulnerabilities are bugs, Let's test for them!
Vulnerabilities are bugs, Let's test for them!
ichikaway957 views
Vulnerabilities are bugs, Let's Test For Them! von VAddy
Vulnerabilities are bugs, Let's Test For Them!Vulnerabilities are bugs, Let's Test For Them!
Vulnerabilities are bugs, Let's Test For Them!
VAddy 8.6K views
SPI Dynamics web application security 101 von Wade Malone
SPI Dynamics web application security 101 SPI Dynamics web application security 101
SPI Dynamics web application security 101
Wade Malone518 views
.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019 von Alexandre Borges
.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019
.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019
Alexandre Borges88 views
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US... von Mobodexter
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter719 views
Gimme shelter: Tips on protecting proprietary and open source code von Rogue Wave Software
Gimme shelter: Tips on protecting proprietary and open source codeGimme shelter: Tips on protecting proprietary and open source code
Gimme shelter: Tips on protecting proprietary and open source code
Open Source Power Tools - Opensouthcode 2018-06-02 von Jorge Hidalgo
Open Source Power Tools - Opensouthcode 2018-06-02Open Source Power Tools - Opensouthcode 2018-06-02
Open Source Power Tools - Opensouthcode 2018-06-02
Jorge Hidalgo803 views
Leveraging Standard Buildpacks to Migrate Not-So-Standard Apps von VMware Tanzu
Leveraging Standard Buildpacks to Migrate Not-So-Standard AppsLeveraging Standard Buildpacks to Migrate Not-So-Standard Apps
Leveraging Standard Buildpacks to Migrate Not-So-Standard Apps
VMware Tanzu225 views
DevSecOps von Spv Reddy
DevSecOpsDevSecOps
DevSecOps
Spv Reddy1.1K views
White Paper - Are antivirus solutions enough to protect industrial plants? von TI Safe
White Paper - Are antivirus solutions enough to protect industrial plants?White Paper - Are antivirus solutions enough to protect industrial plants?
White Paper - Are antivirus solutions enough to protect industrial plants?
TI Safe2.2K views

Más de Stefano Maccaglia

Insert coin to continue - Ransomware in the gaming industry.pdf von
Insert coin to continue - Ransomware in the gaming industry.pdfInsert coin to continue - Ransomware in the gaming industry.pdf
Insert coin to continue - Ransomware in the gaming industry.pdfStefano Maccaglia
296 views41 Folien
From velvet to silk there is still a lot of sweat von
From velvet to silk  there is still a lot of sweatFrom velvet to silk  there is still a lot of sweat
From velvet to silk there is still a lot of sweatStefano Maccaglia
90 views39 Folien
Light, Dark and... a Sunburst... dissection of a very sophisticated attack. von
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.Stefano Maccaglia
321 views62 Folien
Oh... that's ransomware and... look behind you a three-headed Monkey von
Oh... that's ransomware and... look behind you a three-headed MonkeyOh... that's ransomware and... look behind you a three-headed Monkey
Oh... that's ransomware and... look behind you a three-headed MonkeyStefano Maccaglia
124 views43 Folien
UN Presentation - 10-17-2018 - Maccaglia von
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaStefano Maccaglia
268 views56 Folien
Chasing the Adder. A tale from the APT world... von
Chasing the Adder. A tale from the APT world...Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...Stefano Maccaglia
219 views36 Folien

Más de Stefano Maccaglia(9)

Insert coin to continue - Ransomware in the gaming industry.pdf von Stefano Maccaglia
Insert coin to continue - Ransomware in the gaming industry.pdfInsert coin to continue - Ransomware in the gaming industry.pdf
Insert coin to continue - Ransomware in the gaming industry.pdf
Stefano Maccaglia296 views
From velvet to silk there is still a lot of sweat von Stefano Maccaglia
From velvet to silk  there is still a lot of sweatFrom velvet to silk  there is still a lot of sweat
From velvet to silk there is still a lot of sweat
Light, Dark and... a Sunburst... dissection of a very sophisticated attack. von Stefano Maccaglia
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Stefano Maccaglia321 views
Oh... that's ransomware and... look behind you a three-headed Monkey von Stefano Maccaglia
Oh... that's ransomware and... look behind you a three-headed MonkeyOh... that's ransomware and... look behind you a three-headed Monkey
Oh... that's ransomware and... look behind you a three-headed Monkey
Stefano Maccaglia124 views
Chasing the Adder. A tale from the APT world... von Stefano Maccaglia
Chasing the Adder. A tale from the APT world...Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...
Stefano Maccaglia219 views
DCC 2016 New strategies, old actors - APT and the evolution of Cybercrimina... von Stefano Maccaglia
DCC 2016   New strategies, old actors - APT and the evolution of Cybercrimina...DCC 2016   New strategies, old actors - APT and the evolution of Cybercrimina...
DCC 2016 New strategies, old actors - APT and the evolution of Cybercrimina...
Stefano Maccaglia169 views
Maccaglia - Cybercrime un approccio tecnologico e sociologico von Stefano Maccaglia
Maccaglia - Cybercrime un approccio tecnologico e sociologicoMaccaglia - Cybercrime un approccio tecnologico e sociologico
Maccaglia - Cybercrime un approccio tecnologico e sociologico
Stefano Maccaglia378 views

Último

PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」 von
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PC Cluster Consortium
27 views68 Folien
The Coming AI Tsunami.pptx von
The Coming AI Tsunami.pptxThe Coming AI Tsunami.pptx
The Coming AI Tsunami.pptxjohnhandby
13 views12 Folien
"Package management in monorepos", Zoltan Kochan von
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan KochanFwdays
34 views18 Folien
Digital Personal Data Protection (DPDP) Practical Approach For CISOs von
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
162 views59 Folien
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... von
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...ShapeBlue
108 views12 Folien
LLMs in Production: Tooling, Process, and Team Structure von
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team StructureAggregage
57 views77 Folien

Último(20)

PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」 von PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
The Coming AI Tsunami.pptx von johnhandby
The Coming AI Tsunami.pptxThe Coming AI Tsunami.pptx
The Coming AI Tsunami.pptx
johnhandby13 views
"Package management in monorepos", Zoltan Kochan von Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs von Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash162 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... von ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue108 views
LLMs in Production: Tooling, Process, and Team Structure von Aggregage
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team Structure
Aggregage57 views
Optimizing Communication to Optimize Human Behavior - LCBM von Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar38 views
Initiating and Advancing Your Strategic GIS Governance Strategy von Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 views
The Power of Generative AI in Accelerating No Code Adoption.pdf von Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri39 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... von ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue199 views
"Running students' code in isolation. The hard way", Yurii Holiuk von Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 views
This talk was not generated with ChatGPT: how AI is changing science von Elena Simperl
This talk was not generated with ChatGPT: how AI is changing scienceThis talk was not generated with ChatGPT: how AI is changing science
This talk was not generated with ChatGPT: how AI is changing science
Elena Simperl32 views
The Power of Heat Decarbonisation Plans in the Built Environment von IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE84 views
Business Analyst Series 2023 - Week 4 Session 8 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 views
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... von BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 views
The Role of Patterns in the Era of Large Language Models von Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li91 views
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell von Fwdays
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell
Fwdays14 views

Netwitness RT - Don’t scratch that patch.pptx

  • 1. 1 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 2. 2 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 3. 3 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 4. 4 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 5. 5 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 6. 6 ©2021 RSA Security LLC or its affiliates. All rights reserved. MITRE ATT&ck We use MITRE framework to definethe techniques to adopt. In addition,MITRE ATT&ck Frameworksupportthe Customerreadingour final report.
  • 7. 7 ©2021 RSA Security LLC or its affiliates. All rights reserved. Mapping Tactics & Techniques  By mappingthe real used techniques, the Team can build the scenario and can decide what tool to adopt to emulate the outcome of the attacker tools.
  • 8. 8 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 9. 9 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 10. 10 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 11. 11 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 12. 12 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 13. 13 ©2021 RSA Security LLC or its affiliates. All rights reserved.  Our tools for the trade are:  IDA Pro  BinDiff  Diaphora How to find exploits…  Diaphora is a plugin to IDA and it exports all necessary metadata into a sqlite-database. To work with Diaphora you should proceed with the following steps:  BinDiff is a comparison tool for binary files that helps to quickly find differences and similarities in disassembled code. It is used by security researchers and engineers across the globe to identify and isolate fixes for vulnerabilities in vendor-supplied patches and to analyze multiple versions of the same binary. Another common use case is to transfer analysis results from one binary to another, helping to prevent duplicate analyses of, for example, malware binaries.  First, we export the databases (the binaries) that we want to compare.  Then, we diff both generated databases to find matches between them.  Optionally, we can import matches from one binary to another.
  • 14. 14 ©2021 RSA Security LLC or its affiliates. All rights reserved. How to find exploits…  With BinDiff you can identify and isolate fixes for vulnerabilitiesin vendor-suppliedpatches, port symbolsand comments between disassemblies of multiple versions of the same binary. In a typical comparison,as the results are presented, we get a number of tabs with statistics. The Primary Unmatched tab shows functions that exist in the currently opened IDB that were not found in the other file, while the Secondary Unmatched and Matched Functions tabs should be self-explanatory.
  • 15. 15 ©2021 RSA Security LLC or its affiliates. All rights reserved.  We first open a file in IDA and export all the necessary metadata into a sqlite-database before then opening the second file and comparing the sqlite files: Diaphora  The UI after the comparison finishes is pretty much the same as BinDiff.  However when comparing functions side-by-side it’s all done in IDA with the option to get an assembly,a pseudo- code and a patch-style comparison.
  • 16. 16 ©2021 RSA Security LLC or its affiliates. All rights reserved.  The Microsoft patch, solved a privilege escalation vulnerabilitywithin win32k. Search for an exploit: CVE-2023-29336  v15 code implementation focused solely on locking the window object called in the routine, but it missed to lock the menu object nested within the window object.  It means that menu within the object can be left behind, paving the way for the privilege escalation.  In fact, xxxEnableMenuItem function, connected with v15 object is not properly locked when exiting is main flow: This object (v15) is locked properly… but, why in v17 is different?  Let’s “BinDiff” between win32kunpatched and win32kpatched:  This results in an exploitable condition to work with, allowing us to develop a PoC and to go forward with testing.
  • 17. 17 ©2021 RSA Security LLC or its affiliates. All rights reserved.  If you found the instructions that are addressedby the patch, it’s time to move forward…  If you unearthed an API that could be invoked: − Craft the API call’s arguments carefully in order to trigger the vulnerable condition − If no callable API is found: • Look up the chain of calls, looking for hints − as to how to reach the vulnerable condition • Make a proof of concept file, network packet, API call, etc.  Find samples online − Run through all the samples to see which ones (if any) come near or actually hit the vulnerable function − Modify the successful samples to focus in on and trigger the vulnerable code. − Have fun… Practical exploit creation
  • 18. 18 ©2021 RSA Security LLC or its affiliates. All rights reserved. Demo: Example of weaponization of a Patch Tuesday
  • 19. 19 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 20. 20 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 21. 21 ©2021 RSA Security LLC or its affiliates. All rights reserved.  Video 1# • We start with a local access with a standard user (“test”) in an unpatched Windows 11 system • we launch the exploit code • Thanks to the exploit we can add an administrative user or execute arbitrary command with SYSTEM level. In our case we created the “admin” user.  Video 2# • This video demonstrate how the exploit can be used by a Red Teamer or a real attacker • Using Runas from the C2 the attacker started a new implant with a middle integrity privilege level (administrator)  Video 3# • From the new implant created with admin user the attacker use aBypassUAC technique (fodhelper.exe) to gain high integrity level. • At this point we can execute almost any program or command on the target machine. Demo explained
  • 22. 22 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 23. 23 ©2021 RSA Security LLC or its affiliates. All rights reserved.

Hinweis der Redaktion

  1. Threat Modeling: Red Teams analyze an organization's systems and networks to identify potential threats, vulnerabilities, and risks. They help organizations prioritize their security efforts by assessing the likelihood and impact of various attack scenarios. Security Architecture Review: Red Teams evaluate an organization's security architecture, including network designs, access controls, and segmentation. They assess the effectiveness of the existing architecture in mitigating risks and provide recommendations for improvements. Zero-day Exploit Testing: Red Teams assess an organization's resilience to zero-day exploits, which are vulnerabilities unknown to software vendors. They test if the organization's systems can withstand unknown attacks, helping identify areas for patch management and incident response improvements. Adversarial Simulation: Red Teams simulate the tactics, techniques, and procedures (TTPs) of real-world threat actors, such as advanced persistent threats (APTs). This involves replicating the attack methodologies and TTPs to assess an organization's ability to detect, respond, and recover from such attacks.
  2. Initial Compromise: The red team will employ spear-phishing or other social engineering techniques to gain an initial foothold in the organization's network, mimicking APT28's attack vectors. This may involve crafting convincing phishing emails or exploiting vulnerabilities in publicly accessible systems. Lateral Movement and Privilege Escalation: Once inside the network, the red team will simulate APT28's tactics for lateral movement and privilege escalation. They will attempt to move laterally within the organization's systems, escalate privileges, and access critical assets or sensitive information. Techniques such as pass-the-hash, credential theft, or exploiting misconfigurations may be employed. Persistence and Evasion: The red team will strive to maintain persistence within the network and evade detection by security controls. They will employ APT28's techniques for hiding their activities, such as leveraging rootkits, backdoors, or anti-forensic tools to evade detection by antivirus or intrusion detection systems. Data Exfiltration: The red team will attempt to exfiltrate sensitive data or intellectual property from the organization's network, mimicking APT28's exfiltration methods. This may involve using covert channels, encryption, or disguising the data within seemingly innocuous network traffic.
  3. Adversarial Emulation requires study, time and tons of patience… Typically our IR Team and our Threat Intel teams are engaged to collect and share tools and details about techniques that could be connected with a specific actor. That is extremely helpful because could ensure we are aligned with the real actors and more importantly we can review their arsenal looking for malcode that we could reliably adopt without much reversing. However, when we discuss about initial exploitation or privilege escalations, these activity need a dedicated resources, and more importantly a ton of tests. Lots of different types of vulnerability research (the following is just a start):
  4. Patch Tuesday, also known as Update Tuesday, is a Microsoft-coined term that refers to the second Tuesday of every month when Microsoft releases security patches and updates for its software products, including Windows operating systems and various Microsoft applications. ‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. In fact, while the primary purpose of Patch Tuesday is to enhance the security of these software products by addressing known vulnerabilities, it can inadvertently provide opportunities for Red Team operations. In this presentation we will elucidate how Patch Tuesday can be exploited by Red Teams to acquire additional exploits and compromise techniques for their security assessments.
  5. Research and Preparation: a. Tracking Patch Tuesday: Red Teamers should actively monitor Patch Tuesday announcements from Microsoft. They can subscribe to Microsoft's security bulletin or use other sources like security blogs and forums to stay informed about the latest updates. b. CVE Identification: As patches are released, Red Teamers must identify the Common Vulnerabilities and Exposures (CVE) associated with the fixed vulnerabilities. Microsoft typically provides detailed information about the vulnerabilities in their security advisories. CVE Analysis: a. CVE Details Examination: Red Teamers should carefully examine the details of each CVE, including the affected software, the nature of the vulnerability, and the potential impact. b. Ranking: Determine the potential severity and exploitability of the identified vulnerabilities. Some CVEs may have a high likelihood of being exploited, while others may be more challenging. Exploit Development: a. Vulnerability Exploitation: If a Red Team identifies a CVE with a high exploitability potential, they can initiate exploit development. This involves creating proof-of-concept (PoC) exploits or leveraging existing ones, especially if the vulnerability is in a widely used software component. b. Payload Crafting: Red Teamers should create malicious payloads that can be delivered to target systems once the vulnerability is successfully exploited. These payloads can be used for various purposes, including gaining remote access or escalating privileges. Testing and Validation: a. Internal Testing: Before using the developed exploits in real-world scenarios, Red Teamers should extensively test them in controlled environments to ensure they work as intended and do not raise suspicions. b. Scenario Simulation: Simulate various attack scenarios to understand the potential impact of the exploits and ensure they align with Red Team objectives. Compromise Techniques: a. Leveraging Exploits: Once exploits are ready, Red Teamers can incorporate them into their attack methodologies. These exploits can be used as initial access points into target systems. b. Post-Exploitation: Red Teams can employ various post-exploitation techniques to maintain access, move laterally, and escalate privileges within the compromised systems. Techniques like privilege escalation, credential theft, and lateral movement can be employed. Reporting and Documentation: a. Comprehensive Reporting: Document all findings, including the CVEs targeted, the exploits developed or used, and the compromise techniques employed during the Red Team engagement. b. Recommendations: Provide recommendations to the organization on how to mitigate the vulnerabilities and improve their security posture.
  6. What options do you think? (Q) Doing a byte by byte analysis of the code? Byte-by-byte comparison is not useful as a generic approach. On the x86 architecture (and others), there are variable-length instructions • X86: 1 instruction can be up to 14 bytes • Swapping sequential, semantically separate instructions can cause up to 28 bytes of change (Q) Disassemble all the code from the before/after files and do a source code comparison of the disassembled code? Possible, but not always practical • Generates lots of noise, due to structural changes • This becomes a search for a needle in a haystack. In fact, noise is usually introduced in a patch.
  7. Release the COM interfaces and clean up the resources: pIWerReport->Release() pIWerStore->Release() pIWerStoreFactory->Release() pIErcLuaSupport->Release() Uninitialize COM by calling CoUninitialize().