SlideShare ist ein Scribd-Unternehmen logo
1 von 159
Step On In, 
The Water’s Fine! 
An Introduction To 
Security Testing Within A 
Virtualized Environment
Thank You! 
…to all of the crew that has a 
part in this amazing 
conference!
About Me: 
• Tom Moore – Twitter: @c0ncealed 
• Christian, Husband, & Father 
• Red Team / Penetration Tester 
• High Hack Society / Proverbs Hackers 
/ 304Geek 
• Unrelenting G33K 
• 2nd Amendment Supporter 
• Should in NO WAY be considered an 
expert in anything that I may say. =) 
• SUPPORT HACKERS FOR CHARITY!
Agenda: 
My goal is to provide 
meaningful information in 
the area of virtualized testing 
environment options. I also wish 
to convey why an understanding 
of this subject is vastly needed 
and for the most part easily 
attainable, even though the 
subject is often avoided 
or overlooked.
Disclaimer:
Disclaimer:
Disclaimer:
Disclaimer:
Role Playing: 
You are applying for a role within an 
organization’s Information Security 
Group... 
One of the questions that a reputable 
organization ‘should’ ask you would be: 
“What you are doing to either maintain, 
or increase your relevant skill-set?” 
What is your response?
What Is Needed: 
Candidates for employment that not only 
have a degree or relevant certifications, 
but also possess a true working 
knowledge of how to leverage their 
toolsets to achieve the expected goal.
What Can Be Done: 
Security Professionals in training need to 
take a more direct approach towards 
ensuring that they understand not only 
the tools introduced to them, but also 
the underlying architectures that they 
operate on. 
A more informed candidate is what is 
being sought after in today’s Information 
Security job market.
How This Can Be 
Accomplished:
What Is Needed: 
Candidates for employment that not only 
have a degree or relevant certifications, 
but also possess a true working 
knowledge of how to leverage their 
toolsets to achieve the expected goal. 
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
What Is Needed: 
Candidates for employment that not only 
have a degree or relevant certifications, 
but also possess a true working 
knowledge of how to leverage their 
toolsets to achieve the expected goal. 
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
What Is Needed: 
Candidates for employment that not only 
have a degree or relevant certifications, 
but also possess a true working 
knowledge of how to leverage their 
toolsets to achieve the expected goal. 
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
How You Can Get There: 
Practice… Practice… Practice… 
Where You Can Practice:
How You Can Get There: 
Practice… Practice… Practice… 
Where You Can Practice:
How You Can Get There: 
Practice… Practice… Practice… 
Where You Can Practice: 
Set up your own virtual lab! 
• The cost is well worth the gain 
• There are many open-source solutions 
• Many toolset distributions now use 
virtual machines as primary medium 
• A wide variety of vulnerable 
environments are also available for 
your learning pleasure
Need Another Reason?: 
More and more, the 
physical environments 
are going away!
Definition of Terms: 
Hypervisor: 
A hypervisor is a virtual machine 
monitor (VMM). 
It is generally a piece of computer 
software, firmware, or hardware that 
creates and runs virtual machines. 
A computer on which a hypervisor is 
running is defined as a host machine. 
The virtual machines that run on this 
host are referred to as guest machines.
Definition of Terms: 
Virtual Machine: 
A virtual machine (VM) is a software 
based emulation of a computer. 
Virtual machines generally operate 
based on the architecture and functions 
of a real computer.
Definition of Terms: 
Snapshot: 
A snapshot preserves the state and data 
of a virtual machine at a specific point in 
time. 
The state includes the VM’s power state. 
(ex: powered-on, powered-off, or 
suspended) 
The data includes all of the files that 
make up the VM. This includes disks, 
memory, and other devices, such as 
virtual network interface cards.
Definition of Terms: 
Snapshot: 
A snapshot preserves the state and data 
of a virtual machine at a specific point in 
time. 
The state includes the VM’s power state. 
(ex: powered-on, powered-off, or 
suspended) 
The data includes all of the files that 
make up the VM. This includes disks, 
memory, and other devices, such as 
virtual network interface cards.
Definition of Terms: 
Snapshot: 
A snapshot preserves the state and data 
of a virtual machine at a specific point in 
time. 
The state includes the VM’s power state. 
(ex: powered-on, powered-off, or 
suspended) 
The data includes all of the files that 
make up the VM. This includes disks, 
memory, and other devices, such as 
virtual network interface cards.
Definition of Terms: 
Bridged / NAT / Host Only : 
The options available to configure virtual 
network adapters within VM’s. 
Bridged: Binds the virtual network adapter directly 
to your physical ethernet adapter. The VM will obtain 
DHCP lease from the physical network. 
NAT: Binds the virtual network adapter behind a NAT 
environment. Obtains internal DHCP address and 
shares the physical ethernet adapter’s public IP 
address for external communication. 
Host Only: Allows internal network communication 
only. DHCP lease obtained behind internal NAT.
Let’s Get Technical: 
Enough with the hypothetical, let’s get 
into the bits… cause this bytes… =P 
Structure for the approach: 
• Hardware considerations 
• Virtualization platform options 
• Example set-up of Vmware ESXi 
• Offensive or Forensic Distributions 
• Ex: Kali, SamuraiWTF, SIFT, etc. 
• Virtual Appliances 
• Vulnerable Distributions 
• Ex: Metasploitable 2 or NOWASP
Hardware Considerations: 
• While the CPU speeds do matter, they 
will not be your primary concern. 
• A quad-core CPU is recommended. 
• What you will need plenty of are: 
• Memory (RAM) 
• Hypervisors are memory hogs. 
• Hard Drive Capacity (HDD) 
• VM’s range drastically in size, 
especially when Snapshotted. 
• A sufficient Power Supply will need to 
be accounted for based on the above 
specifications.
Virtualization Platforms: 
• VMware Fusion (Mac) 
• VMware Player/Workstation (Win/Linux) 
• VMware ESXi/ESX (Server) 
• Parallels (Mac) 
• Oracle VirtualBox (Mac/Win/Linux) 
• ProxMox (Server, running OpenVZ as guest) 
• XenServer (Server, running OpenVZ as guest) 
This list should not be considered all-inclusive. 
These are simply platforms that I have tested and 
that are for the most part easily attainable.
VMware ESXi Setup: 
• For our example, I have set up a 
VMware ESXi Hypervisor on this 
MacBook Pro system. 
• System Specs: 
• CPU: Quad-core Intel i7 2GHz 
• RAM: 16GB 1333MHz DDR3 
• HDD: WD Black 500GB 7200 RPM 
• VMware ESXi is free for educational 
purposes. Register on vmware.com for 
a license key.
VMware ESXi Setup: 
• Further Information… 
• This installation is performed by 
using the following configuration: 
•VMware ESXi .iso image is on host 
MacBook Pro. 
•Created a New virtual machine 
within VMware Fusion. 
•Set the ESXi .iso as the boot media 
for the VM. 
• (This is being done this way for 
demonstration purposes. If you have 
physical hardware for ESXi, use that)
VMware ESXi Setup:
VMware ESXi Setup:
VMware ESXi Setup:
VMware ESXi Management: 
• The one disadvantage to using 
VMware ESXi, in my opinion, is that 
the most effective management 
interface is in the form of a Windows 
fat client. 
• Due to this, we will also go through 
the process of setting up a Windows 8 
VM with the VMware vSphere Client as 
well as the VMware vCenter Converter 
Standalone application. 
• This will be our ESXi management VM.
VMware ESXi Management: 
• Further Information… 
• This installation is performed by 
using the following configuration: 
•Windows 8.1 .iso image is on host 
MacBook Pro. 
•Created a New virtual machine 
within VMware Fusion. 
•Set the Windows 8.1 .iso as the 
boot media for the VM. 
• (This is done so that we don’t have to 
have a physical Windows box for ESXi 
Management.)
VMware ESXi Management:
VMware ESXi Management:
VMware ESXi Management: 
• Now we will register VMware ESXi 
Server through the vSphere Client. 
• The key should have been obtained 
when you registered for your 
vmware.com account and downloaded 
your ESXi iso files and binaries. 
• When its registered, you will see the 
status message in the bottom right-hand 
corner of the client disappear.
VMware ESXi Management: 
• Now we will setup VMware vCenter 
Converter Standalone. 
• This will be used to convert VMware 
images into an ESXi format. 
• It will also transfer VM’s over to our 
ESXi Server after conversion.
Offensive / Forensic 
D• isKtarlii bLuintuiox ns: 
• Arch Assault 
• Pentoo 
• SamuraiWTF 
• MobiSec 
• Backbox Linux 
• Blackbuntu 
• BlackArch Linux 
• REMnux 
• SIFT Workstation 
• DEFT Linux 
• CAINE
Offensive / Forensic 
D• isStcrriebeunstihoontss! :
Virtual Appliances: 
• Routers / Switches 
• Vyatta 
• Firewalls 
• pfSense 
• Intrusion Prevention Systems 
• Intrusion Detection Systems 
• SecurityOnion 
• Security Incident and Event Monitoring 
• AlienVault OSSIM
Vulnerable Distributions: 
• Metasploitable 2 
• NOWASP Mutillidae 
• OWASP Broken Web Apps 
• Web Security DoJo 
• HADES 
• VulnVOiP 
• VulnVPN 
• Dexter 
• Brainpan 
• Relativity
Vulnerable Distributions: 
• VulnHub 
www.vulnhub.com 
• Credit: g0tm1lk
Vulnerable Distributions:
Vulnerable Distributions: 
• Leveraging VulnHub.com, we will pull 
down a copy of Metasploitable2 as our 
vulnerable guest distribution. 
• Now we will use VMware vCenter 
Converter Standalone to convert our 
new vulnerable image and then push 
it to our ESXi server.
Vulnerable Distributions: 
• Now let’s spin it up! 
• Once we have the Metasploitable 2 VM 
powered on, we will go back to our 
Kali VM within VMware Fusion. 
• From the Kali offensive VM, let’s scan 
the virtual DHCP range looking for our 
new vulnerable guest machine!
Congratulations!:
Congratulations!: 
• You have just gone through the 
process of setting up a virtual testing 
lab with a VMware ESXi hypervisor! 
• You have a Windows VM set up to 
manage your hypervisor. 
• You know where to obtain your 
Offensive, Appliance, and Vulnerable 
distributions and VMs. 
• You also know how to convert and 
transfer them to your ESXi server! 
• You then saw how easy it was to 
enumerate guests from your Kali VM!
Summary: 
• InfoSec Recruiters for organizations 
are looking for candidates that KNOW 
how to leverage the needed tools to 
perform an assessment. 
• You can teach yourself skills that may 
not be covered in most curriculums 
through the use of Virtual 
Environments. 
• It takes time, it’s not easy, but it will 
pay off. 
• YOU CAN DO IT!
Summary: 
• InfoSec Recruiters for organizations 
are looking for candidates that KNOW 
how to leverage the needed tools to 
perform an assessment. 
• You can teach yourself skills that may 
not be covered in most curriculums 
through the use of Virtual 
Environments. 
• It takes time, it’s not easy, but it will 
pay off. 
• YOU CAN DO IT!
Resources: 
• Virtualization Platforms 
• VMware ESXi Download - 
https://my.vmware.com/web/vmware/info/slug/datacenter_clo 
ud_infrastructure/vmware_vsphere_hypervisor_esxi/5_5 
• VMware Free vSphere Registration - 
https://my.vmware.com/web/vmware/evalcenter?p=free-esxi5& 
lp=default 
• VMware Player - 
https://my.vmware.com/web/vmware/free#desktop_end_user 
_computing/vmware_player/4_0 
• VMware Fusion - http://www.vmware.com/products/fusion 
• VMware Workstation - 
https://my.vmware.com/web/vmware/info/slug/desktop_end_u 
ser_computing/vmware_workstation/10_0 
• Parallels - http://www.parallels.com/landingpage/pd/general/ 
• Oracle VirtualBox - 
https://www.virtualbox.org/wiki/Downloads 
• ProxMox VE - http://www.proxmox.com/downloads/ 
• Citrix XenServer - 
http://www.citrix.com/products/xenserver/try.html
Resources: 
• Offensive Distributions 
• Kali Linux - http://www.kali.org/downloads/ 
• Arch Assault - https://archassault.org/download/ 
• Pentoo - http://www.pentoo.ch/download/ 
• SamuraiWTF - http://sourceforge.net/projects/samurai/ 
• MobiSec - http://sourceforge.net/projects/mobisec/files/ 
• Backbox Linux - http://www.backbox.org/downloads 
• Blackbuntu - http://sourceforge.net/projects/blackbuntu/ 
• Blackarch Linux - http://blackarch.org/download.html 
• REMnux - http://sourceforge.net/projects/remnux/ 
• SIFT Workstation - http://digital-forensics. 
sans.org/community/downloads 
• Deft Linux - http://www.deftlinux.net/download/ 
• CAINE - http://www.caine-live.net/page5/page5.html
Resources: 
• Virtual Appliances 
• VMware VA Marketplace - 
https://solutionexchange.vmware.com/store/category_groups/ 
19 
• Turnkey Linux - http://www.turnkeylinux.org/it-infrastructure 
• ShareVM - http://sharevm.wordpress.com/2009/09/25/top-ten- 
vmware-virtual-appliances-for-security/ 
• Vyatta - http://www.brocade.com/forms/jsp/vyatta-download/ 
index.jsp 
• pfSense - https://www.pfsense.org/download/ 
• Security Onion - http://sourceforge.net/projects/security-onion/ 
• AlienVault OSSIM - http://www.alienvault.com/open-threat-exchange/ 
projects
Resources: 
• Vulnerable Distributions 
• VulnHub- http://www.vulnhub.com 
(Many worth mentioning, but this site will get you there)
One More Thing: 
• If you want to experience another 
amazing conference with the same feel 
as DerbyCon, go to Hack3rCon! 
• When: November 14-16, 2014 
• Where: Charleston, WV 
• Web: www.hack3rcon.org 
• Twitter: @hack3rcon
I’m Out: 
THANK YOU!
Contact Info: 
• Name: Tom Moore 
• E-mail: c0ncealedx64@gmail.com 
• Twitter: @c0ncealed 
• Slides: 
THANK YOU!

Weitere ähnliche Inhalte

Was ist angesagt?

Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
vivekbhat
 
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamWHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
Symantec
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualization
rsnarayanan
 
images_of_windows_xp_for_system_deployment_using_windows_pe
images_of_windows_xp_for_system_deployment_using_windows_peimages_of_windows_xp_for_system_deployment_using_windows_pe
images_of_windows_xp_for_system_deployment_using_windows_pe
iartem
 

Was ist angesagt? (20)

VMware Interview questions and answers
VMware Interview questions and answersVMware Interview questions and answers
VMware Interview questions and answers
 
100 most vmware q&a
100 most vmware q&a100 most vmware q&a
100 most vmware q&a
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
 
Vmware interview
Vmware interviewVmware interview
Vmware interview
 
VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes Troubleshooting
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamWHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualization
 
Ws80 using VMware
Ws80 using VMwareWs80 using VMware
Ws80 using VMware
 
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...
 
Vmware inter
Vmware interVmware inter
Vmware inter
 
Transitioning to vmWare ESXi
Transitioning to vmWare ESXiTransitioning to vmWare ESXi
Transitioning to vmWare ESXi
 
Vsp 41 config_max
Vsp 41 config_maxVsp 41 config_max
Vsp 41 config_max
 
images_of_windows_xp_for_system_deployment_using_windows_pe
images_of_windows_xp_for_system_deployment_using_windows_peimages_of_windows_xp_for_system_deployment_using_windows_pe
images_of_windows_xp_for_system_deployment_using_windows_pe
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
 
Vmware admin interview questions
Vmware admin interview questionsVmware admin interview questions
Vmware admin interview questions
 
How to configure esx to pass an audit
How to configure esx to pass an auditHow to configure esx to pass an audit
How to configure esx to pass an audit
 

Andere mochten auch

Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Fiorella Chuquipul Palomino
 

Andere mochten auch (15)

Unit 4 pp3
Unit 4 pp3Unit 4 pp3
Unit 4 pp3
 
Bilangan kompleks
Bilangan kompleksBilangan kompleks
Bilangan kompleks
 
Per una societat conscienciada, reflexiva i compromesa
Per una societat conscienciada, reflexiva i compromesaPer una societat conscienciada, reflexiva i compromesa
Per una societat conscienciada, reflexiva i compromesa
 
Presentation1
Presentation1Presentation1
Presentation1
 
It all had to start somewhere!
It all had to start somewhere!It all had to start somewhere!
It all had to start somewhere!
 
Unit 3 pp2
Unit 3 pp2Unit 3 pp2
Unit 3 pp2
 
Made in india sunpreet kaur placemats
Made in india  sunpreet kaur placematsMade in india  sunpreet kaur placemats
Made in india sunpreet kaur placemats
 
Red Teaming Your Bug-out Bag - Hack3rCon^4
Red Teaming Your Bug-out Bag - Hack3rCon^4Red Teaming Your Bug-out Bag - Hack3rCon^4
Red Teaming Your Bug-out Bag - Hack3rCon^4
 
Made in india sunpreet kaur cushions
Made in india   sunpreet kaur cushionsMade in india   sunpreet kaur cushions
Made in india sunpreet kaur cushions
 
Week1
Week1Week1
Week1
 
Unit three pp 3
Unit three pp 3Unit three pp 3
Unit three pp 3
 
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
 
C новым годом!
C новым годом!C новым годом!
C новым годом!
 
Титульный слайд в презентации
Титульный слайд в презентацииТитульный слайд в презентации
Титульный слайд в презентации
 
Тренинг "Эффективная презентация"
Тренинг "Эффективная презентация"Тренинг "Эффективная презентация"
Тренинг "Эффективная презентация"
 

Ähnlich wie Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment

Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
Concentrated Technology
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
Concentrated Technology
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
fangjiafu
 

Ähnlich wie Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment (20)

The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted List
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
 
15 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 201815 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 2018
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Designing virtual infrastructure
Designing virtual infrastructureDesigning virtual infrastructure
Designing virtual infrastructure
 
Building a low cost hack lab
Building a low cost hack labBuilding a low cost hack lab
Building a low cost hack lab
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and Troubleshooting
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
 
Pandora FMS: VMware Enterprise Plugin
Pandora FMS: VMware Enterprise PluginPandora FMS: VMware Enterprise Plugin
Pandora FMS: VMware Enterprise Plugin
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorun
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copy
 
Virtuaization jwneilhw pehfpijwrhfipuwrhiwh iufhgipuhriph riup hiuefhv 9ufeh
Virtuaization jwneilhw pehfpijwrhfipuwrhiwh iufhgipuhriph riup hiuefhv 9ufehVirtuaization jwneilhw pehfpijwrhfipuwrhiwh iufhgipuhriph riup hiuefhv 9ufeh
Virtuaization jwneilhw pehfpijwrhfipuwrhiwh iufhgipuhriph riup hiuefhv 9ufeh
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
 
Lessons On Hyper V
Lessons On Hyper VLessons On Hyper V
Lessons On Hyper V
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment

  • 1. Step On In, The Water’s Fine! An Introduction To Security Testing Within A Virtualized Environment
  • 2.
  • 3. Thank You! …to all of the crew that has a part in this amazing conference!
  • 4. About Me: • Tom Moore – Twitter: @c0ncealed • Christian, Husband, & Father • Red Team / Penetration Tester • High Hack Society / Proverbs Hackers / 304Geek • Unrelenting G33K • 2nd Amendment Supporter • Should in NO WAY be considered an expert in anything that I may say. =) • SUPPORT HACKERS FOR CHARITY!
  • 5. Agenda: My goal is to provide meaningful information in the area of virtualized testing environment options. I also wish to convey why an understanding of this subject is vastly needed and for the most part easily attainable, even though the subject is often avoided or overlooked.
  • 10. Role Playing: You are applying for a role within an organization’s Information Security Group... One of the questions that a reputable organization ‘should’ ask you would be: “What you are doing to either maintain, or increase your relevant skill-set?” What is your response?
  • 11. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal.
  • 12. What Can Be Done: Security Professionals in training need to take a more direct approach towards ensuring that they understand not only the tools introduced to them, but also the underlying architectures that they operate on. A more informed candidate is what is being sought after in today’s Information Security job market.
  • 13. How This Can Be Accomplished:
  • 14. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal. Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
  • 15. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal. Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
  • 16. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal. Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
  • 17. How You Can Get There: Practice… Practice… Practice… Where You Can Practice:
  • 18. How You Can Get There: Practice… Practice… Practice… Where You Can Practice:
  • 19. How You Can Get There: Practice… Practice… Practice… Where You Can Practice: Set up your own virtual lab! • The cost is well worth the gain • There are many open-source solutions • Many toolset distributions now use virtual machines as primary medium • A wide variety of vulnerable environments are also available for your learning pleasure
  • 20. Need Another Reason?: More and more, the physical environments are going away!
  • 21. Definition of Terms: Hypervisor: A hypervisor is a virtual machine monitor (VMM). It is generally a piece of computer software, firmware, or hardware that creates and runs virtual machines. A computer on which a hypervisor is running is defined as a host machine. The virtual machines that run on this host are referred to as guest machines.
  • 22. Definition of Terms: Virtual Machine: A virtual machine (VM) is a software based emulation of a computer. Virtual machines generally operate based on the architecture and functions of a real computer.
  • 23. Definition of Terms: Snapshot: A snapshot preserves the state and data of a virtual machine at a specific point in time. The state includes the VM’s power state. (ex: powered-on, powered-off, or suspended) The data includes all of the files that make up the VM. This includes disks, memory, and other devices, such as virtual network interface cards.
  • 24. Definition of Terms: Snapshot: A snapshot preserves the state and data of a virtual machine at a specific point in time. The state includes the VM’s power state. (ex: powered-on, powered-off, or suspended) The data includes all of the files that make up the VM. This includes disks, memory, and other devices, such as virtual network interface cards.
  • 25. Definition of Terms: Snapshot: A snapshot preserves the state and data of a virtual machine at a specific point in time. The state includes the VM’s power state. (ex: powered-on, powered-off, or suspended) The data includes all of the files that make up the VM. This includes disks, memory, and other devices, such as virtual network interface cards.
  • 26. Definition of Terms: Bridged / NAT / Host Only : The options available to configure virtual network adapters within VM’s. Bridged: Binds the virtual network adapter directly to your physical ethernet adapter. The VM will obtain DHCP lease from the physical network. NAT: Binds the virtual network adapter behind a NAT environment. Obtains internal DHCP address and shares the physical ethernet adapter’s public IP address for external communication. Host Only: Allows internal network communication only. DHCP lease obtained behind internal NAT.
  • 27. Let’s Get Technical: Enough with the hypothetical, let’s get into the bits… cause this bytes… =P Structure for the approach: • Hardware considerations • Virtualization platform options • Example set-up of Vmware ESXi • Offensive or Forensic Distributions • Ex: Kali, SamuraiWTF, SIFT, etc. • Virtual Appliances • Vulnerable Distributions • Ex: Metasploitable 2 or NOWASP
  • 28. Hardware Considerations: • While the CPU speeds do matter, they will not be your primary concern. • A quad-core CPU is recommended. • What you will need plenty of are: • Memory (RAM) • Hypervisors are memory hogs. • Hard Drive Capacity (HDD) • VM’s range drastically in size, especially when Snapshotted. • A sufficient Power Supply will need to be accounted for based on the above specifications.
  • 29. Virtualization Platforms: • VMware Fusion (Mac) • VMware Player/Workstation (Win/Linux) • VMware ESXi/ESX (Server) • Parallels (Mac) • Oracle VirtualBox (Mac/Win/Linux) • ProxMox (Server, running OpenVZ as guest) • XenServer (Server, running OpenVZ as guest) This list should not be considered all-inclusive. These are simply platforms that I have tested and that are for the most part easily attainable.
  • 30. VMware ESXi Setup: • For our example, I have set up a VMware ESXi Hypervisor on this MacBook Pro system. • System Specs: • CPU: Quad-core Intel i7 2GHz • RAM: 16GB 1333MHz DDR3 • HDD: WD Black 500GB 7200 RPM • VMware ESXi is free for educational purposes. Register on vmware.com for a license key.
  • 31. VMware ESXi Setup: • Further Information… • This installation is performed by using the following configuration: •VMware ESXi .iso image is on host MacBook Pro. •Created a New virtual machine within VMware Fusion. •Set the ESXi .iso as the boot media for the VM. • (This is being done this way for demonstration purposes. If you have physical hardware for ESXi, use that)
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. VMware ESXi Management: • The one disadvantage to using VMware ESXi, in my opinion, is that the most effective management interface is in the form of a Windows fat client. • Due to this, we will also go through the process of setting up a Windows 8 VM with the VMware vSphere Client as well as the VMware vCenter Converter Standalone application. • This will be our ESXi management VM.
  • 54. VMware ESXi Management: • Further Information… • This installation is performed by using the following configuration: •Windows 8.1 .iso image is on host MacBook Pro. •Created a New virtual machine within VMware Fusion. •Set the Windows 8.1 .iso as the boot media for the VM. • (This is done so that we don’t have to have a physical Windows box for ESXi Management.)
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 90. VMware ESXi Management: • Now we will register VMware ESXi Server through the vSphere Client. • The key should have been obtained when you registered for your vmware.com account and downloaded your ESXi iso files and binaries. • When its registered, you will see the status message in the bottom right-hand corner of the client disappear.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98. VMware ESXi Management: • Now we will setup VMware vCenter Converter Standalone. • This will be used to convert VMware images into an ESXi format. • It will also transfer VM’s over to our ESXi Server after conversion.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114. Offensive / Forensic D• isKtarlii bLuintuiox ns: • Arch Assault • Pentoo • SamuraiWTF • MobiSec • Backbox Linux • Blackbuntu • BlackArch Linux • REMnux • SIFT Workstation • DEFT Linux • CAINE
  • 115.
  • 116. Offensive / Forensic D• isStcrriebeunstihoontss! :
  • 117. Virtual Appliances: • Routers / Switches • Vyatta • Firewalls • pfSense • Intrusion Prevention Systems • Intrusion Detection Systems • SecurityOnion • Security Incident and Event Monitoring • AlienVault OSSIM
  • 118.
  • 119.
  • 120. Vulnerable Distributions: • Metasploitable 2 • NOWASP Mutillidae • OWASP Broken Web Apps • Web Security DoJo • HADES • VulnVOiP • VulnVPN • Dexter • Brainpan • Relativity
  • 121. Vulnerable Distributions: • VulnHub www.vulnhub.com • Credit: g0tm1lk
  • 123. Vulnerable Distributions: • Leveraging VulnHub.com, we will pull down a copy of Metasploitable2 as our vulnerable guest distribution. • Now we will use VMware vCenter Converter Standalone to convert our new vulnerable image and then push it to our ESXi server.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145. Vulnerable Distributions: • Now let’s spin it up! • Once we have the Metasploitable 2 VM powered on, we will go back to our Kali VM within VMware Fusion. • From the Kali offensive VM, let’s scan the virtual DHCP range looking for our new vulnerable guest machine!
  • 146.
  • 147.
  • 148.
  • 150. Congratulations!: • You have just gone through the process of setting up a virtual testing lab with a VMware ESXi hypervisor! • You have a Windows VM set up to manage your hypervisor. • You know where to obtain your Offensive, Appliance, and Vulnerable distributions and VMs. • You also know how to convert and transfer them to your ESXi server! • You then saw how easy it was to enumerate guests from your Kali VM!
  • 151. Summary: • InfoSec Recruiters for organizations are looking for candidates that KNOW how to leverage the needed tools to perform an assessment. • You can teach yourself skills that may not be covered in most curriculums through the use of Virtual Environments. • It takes time, it’s not easy, but it will pay off. • YOU CAN DO IT!
  • 152. Summary: • InfoSec Recruiters for organizations are looking for candidates that KNOW how to leverage the needed tools to perform an assessment. • You can teach yourself skills that may not be covered in most curriculums through the use of Virtual Environments. • It takes time, it’s not easy, but it will pay off. • YOU CAN DO IT!
  • 153. Resources: • Virtualization Platforms • VMware ESXi Download - https://my.vmware.com/web/vmware/info/slug/datacenter_clo ud_infrastructure/vmware_vsphere_hypervisor_esxi/5_5 • VMware Free vSphere Registration - https://my.vmware.com/web/vmware/evalcenter?p=free-esxi5& lp=default • VMware Player - https://my.vmware.com/web/vmware/free#desktop_end_user _computing/vmware_player/4_0 • VMware Fusion - http://www.vmware.com/products/fusion • VMware Workstation - https://my.vmware.com/web/vmware/info/slug/desktop_end_u ser_computing/vmware_workstation/10_0 • Parallels - http://www.parallels.com/landingpage/pd/general/ • Oracle VirtualBox - https://www.virtualbox.org/wiki/Downloads • ProxMox VE - http://www.proxmox.com/downloads/ • Citrix XenServer - http://www.citrix.com/products/xenserver/try.html
  • 154. Resources: • Offensive Distributions • Kali Linux - http://www.kali.org/downloads/ • Arch Assault - https://archassault.org/download/ • Pentoo - http://www.pentoo.ch/download/ • SamuraiWTF - http://sourceforge.net/projects/samurai/ • MobiSec - http://sourceforge.net/projects/mobisec/files/ • Backbox Linux - http://www.backbox.org/downloads • Blackbuntu - http://sourceforge.net/projects/blackbuntu/ • Blackarch Linux - http://blackarch.org/download.html • REMnux - http://sourceforge.net/projects/remnux/ • SIFT Workstation - http://digital-forensics. sans.org/community/downloads • Deft Linux - http://www.deftlinux.net/download/ • CAINE - http://www.caine-live.net/page5/page5.html
  • 155. Resources: • Virtual Appliances • VMware VA Marketplace - https://solutionexchange.vmware.com/store/category_groups/ 19 • Turnkey Linux - http://www.turnkeylinux.org/it-infrastructure • ShareVM - http://sharevm.wordpress.com/2009/09/25/top-ten- vmware-virtual-appliances-for-security/ • Vyatta - http://www.brocade.com/forms/jsp/vyatta-download/ index.jsp • pfSense - https://www.pfsense.org/download/ • Security Onion - http://sourceforge.net/projects/security-onion/ • AlienVault OSSIM - http://www.alienvault.com/open-threat-exchange/ projects
  • 156. Resources: • Vulnerable Distributions • VulnHub- http://www.vulnhub.com (Many worth mentioning, but this site will get you there)
  • 157. One More Thing: • If you want to experience another amazing conference with the same feel as DerbyCon, go to Hack3rCon! • When: November 14-16, 2014 • Where: Charleston, WV • Web: www.hack3rcon.org • Twitter: @hack3rcon
  • 159. Contact Info: • Name: Tom Moore • E-mail: c0ncealedx64@gmail.com • Twitter: @c0ncealed • Slides: THANK YOU!

Hinweis der Redaktion

  1. In addition to book learning, hands-on experience with these toolsets should be the recipient of your invested time.
  2. Another reason why training yourself to test in virtual environments is so valuable, is that most companies are now
  3. Another reason why training yourself to test in virtual environments is so valuable, is that most companies are now
  4. Another reason why training yourself to test in virtual environments is so valuable, is that most companies are now
  5. Some might argue that familiarizing yourself within a virtual environment will be a more relevant method of training and will give you experience that employers are already looking for in their next-generation of security professionals.
  6. All of this is relative. I’ll be setting up an ESXi VM on my MBP It is running a Quad-core i7 2GHz CPU and has 16GB 1333 MHz DDR3 Ram Western Digital Black 500gb 7200 RPM HDD
  7. All of this is relative. I’ll be setting up an ESXi VM on my MBP It is running a Quad-core i7 2GHz CPU and has 16GB 1333 MHz DDR3 Ram Western Digital Black 500gb 7200 RPM HDD
  8. All of this is relative. I’ll be setting up an ESXi VM on my MBP It is running a Quad-core i7 2GHz CPU and has 16GB 1333 MHz DDR3 Ram Western Digital Black 500gb 7200 RPM HDD
  9. Rob Schneider
  10. Rob Schneider
  11. Rob Schneider
  12. Rob Schneider
  13. Rob Schneider
  14. Rob Schneider