SlideShare ist ein Scribd-Unternehmen logo
1 von 57
A Google Event
You Won’t Forget
Mike Felch & Beau Bullock
A journey through red teaming Google Suite
Who We Are
•Mike Felch - @ustayready
•Pentest / Red team at BHIS
•Involved w/ OWASP Orlando and BSides Orlando
•Beau Bullock - @dafthack
•Pentest / Red team at BHIS
•Host of Tradecraft Security Weekly
•Avid OWA enthusiast
Disclaimer: We <3 Google
What We’re Covering
• Brief G Suite Security Overview
• Offense: Real-world Attack Path
• Demo: MailSniper & CredSniper
• Defense: Fighting Back
• Questions / Comments
G Suite Security
G Suite Security
•Not an exhaustive list...
•Suspicious activity alerts/emails
•Additional security dialogs
•Touch this number
•Last location used
•Chrome kind of identifies phish sites
•Easily avoided using SSL! Let’s Encrypt!
•Awesome G Suite Admin console
G Suite 2FA
G Suite 2FA
•Lot’s of different options…
•None are bulletproof
•Convenience vs “Safer”
•Not a Google problem.. so-to-say
•but.. everything w/ G is broken :(
•Advanced Protection Program
•Dual U2F .. come at me bro.
G Suite 2FA - SMS
•Username/Password + SMS token
•Super convenient to enroll
•Default 2FA option for most
•Backup option for Google
•Google is moving away from it
•NIST 800-63B is deprecating
•Mobile carrier redirection?!
•Malicious app?!
•Really bad idea
G Suite 2FA - TOTP
•Username/Password + TOTP
•Little difficult for non-tech
•Token rotates & expires
•Lot’s of apps available
•Backup option for Google
•Switch devices? Uhh ohh..
•Pretty bad idea
Source: https://blog.trezor.io/why-you-should-never-use-google-authenticator-again-e166d09d4324
G Suite 2FA - Phone Prompt
•Username/Password + Smart Phone
•Requires Android/iOS
•Weird login? Touch this number
•Suspicious location? Show me more
•Seamless verification process
•Pretty good alternative
G Suite 2FA - U2F
•Username/Password + USB/BT
•Requires hardware device
•Requires Chrome
•Requires backup option
•Strongest verification
•Strongest option
•Slow adoption rate
Real-world Attack Path
Setting Up
•Quick recon for names/emails
•Create doppelganger Gmail
•Import contacts to resolve profiles
•Setup server environment
•Domain, SSL, Phishing page
•Create fake agenda in GDoc
•Set open sharing permissions
•Redirects users to avoid suspicion
Exploiting Trust
•Needs to look legit
• Needs to trigger a response
• Needs to create urgency
• Needs to go undetected
• Needs to avoid red flags
Don’t email, inject events!
Wait a sec…
Event Injection?
Event Injection
•Silently inject events into calendars
•Creates the urgency via reminders
•Include link to fake agenda
•Mass-exploitation w/o visibility
•Litter calendars for the future
•Remove traces by erasing the event
•Include GoToMeeting
•Don’t forget to record the meeting! :)
•How did we get here???
Event Injection
•One day I got a calendar alert for a
flight that wasn’t mine
•A coworker had sent their flight
details in an email
•Google thought the itinerary was
mine and automatically added to
my calendar
•This was the start of something
very interesting...
Event Injection
•An email isn’t necessary though
•Simply add a Google user to an
event and select to not notify them
•Google will automatically add that
event to their calendar
•This can present a very unique
situation for phishing...
Event Injection & SE
•Here are a few ideas:
•Include a link to a conference call
site but have it pointing to a
credential collection page
•Include a malicious attachment
“agenda”
•Have victims navigate to a fake
Google Auth page and collect creds
(more on that soon…)
Event Injection
•Events get even more fun when
you use the Google API
•It’s possible to make it look like a
user already accepted an invitation
•...they never received and invite
though.
•This bypasses the setting for not
auto-adding events to G-calendar
Personalized Phishing
Personalized Phishing
•Multi-stage process
•Email
•Password
•Two-factor?
• Which one?
• Additional dialogs?
• Can we be done?
•Retrieve 2FA tokens
•Redirect user
•Vanish!
Typical Phishing Workflow
General Login Page
Real
Or
Fake?
General Login Page
Real
Or
Fake?
Fake Real
Personalized Password
•Fetch the profile image
•Google Picasa API
•JavaScript XMLHttpRequest()
•Ask nicely for the password
•Behind the scenes, authenticate
•Is 2FA present?
•No? Redirect them to GDoc agenda
•Doh! 2FA is enabled.
•Which type? Extract information.
Personalized Password
Real
Or
Fake?
Personalized Password
Real
Or
Fake?
Fake Real
Personalized Authenticator
•Contains profile image and email
•Contains 2FA application name
•Make it look pretty
•Ask nicely for the token
•Capture and move quickly
•You have 30 seconds
Personalized Authenticator
Real
Or
Fake?
Personalized Authenticator
Real
Or
Fake?
FakeReal
Personalized SMS
•Contains profile image and email
•Contains last 2 digits of phone number
•Make it look pretty
•Ask nicely for the token
•Capture and move slowly
•You have plenty of time
•SMS token not tied to session
•Unused tokens get re-sent later
•Not sure how long but definitely hours
Personalized SMS
Real
Or
Fake?
Personalized SMS
Real
Or
Fake?
Fake Real
Personalized Phone Prompt
•Contains profile image and email
•Contains saved device name
•May contain a ‘touch number’
•If it seems suspicious
•Make it look pretty
•Ask nicely for a touch
•Requires double trigger
•First: We identify enrollment
•Second: Our authentication
•Move quick, they won’t notice
Normal Phone Prompt Suspicious Additional Prompt
Personalized Phone Prompt
Real
Or
Fake?
Personalized Phone Prompt
Real
Or
Fake?
Real Fake
...and the dreaded U2F
•Contains profile image and email
• Can capture signed message
• Replay w/ SendKeys doesn’t work
•Virtual keyboard lacks KeyCode
•Replay w/ Ducky doesn’t work
•Changed VID/PID
•Modified USB Composite firmware
•Doesn’t conform to FIDO U2F spec
•… for another day
•Instead, let’s force a bypass!
...and the dreaded U2F
•U2F only works w/ Chrome
•Requires backup SMS or TOTP
•What about other browsers?
•Downgrades to backup options :)
•Change our backend user agent
•CriOS or Python-urllib/2.7
•Triggers SMS token
•Redirect to SMS phish page
•Continue as normal :)
Additional 2FA Points
•Might get asked for last location
•GeoIP it from IP during capturing
•Immediately clear red alert bar
•Clear for one, clear for all
•Multiple failed phone prompts
•Disables phone prompt for few hours
•Automatically switches 2FA option
•May also contain attacker location/device
•Pass session from backend to attacker
•Haven’t tried but I also haven’t needed to
Persisting Access
Persisting Access
•Create email rule to erase Google alerts
• Allow a new authorized app
•‘Permit-all-teh-thingz’ scope
• Generate an app password
• Snag the backup codes
• Add new 2FA device
• Change recovery email
• Create forwarder
Persisting Access
• FullScope App Access!
SCOPES = '
https://www.googleapis.com/auth/calendar
https://mail.google.com/
https://www.googleapis.com/auth/drive
https://www.googleapis.com/auth/groups
https://www.googleapis.com/auth/admin.directory.user
'
Pilfering Data
Pilfering Data
•Search GMail for sensitive data
•Just like how MailSniper works with Exchange you can now search
Gmail for sensitive data as well
•A bonus is that it works with Google’s search operators
•Will soon include Google Drive, Google Groups and export Contacts
Pilfering Data
•Let’s talk about Google’s data export for a moment…
•It literally has everything
•You can export every piece of data Google knows about you including:
•Search history
•Location history
•All G-Drive files
•All Emails
•All Contacts
•and much more....
Pivoting Systems
Pivoting Systems
• Victim using Google Drive? Synchronize payloads!
• Any third party systems in the email?
•Probably password re-use
•If not, just reset the password!
•What about a company Slack?
•Salesforce? Corp apps?
•Phish other employees!
•Corporate VPN
•Easy gateway into the internal network
Demo time!
Fighting Back
Fighting Back: Admins
• Get familiar with Google Admin console
•Admin SDK available for CLI
• Search by IP address
• Don’t just change passwords
•Remove backdoors
•Look for rogue email forwards
•Generate a timeline
•Communicate better!
Fighting Back: Users
• If you didn’t expect it, question it
• Don’t let urgency cause a misstep
• Security Check-up is awesome
• Look for suspicious activity
•Weird activity/devices/apps?
•Weird email rules?
•Weird recovery/forwarding email?
•Careful where you click/login!!!
•Pay close attention to the domain
Let’s Recap...
Recap
• SMS/TOTP 2FA is DEAD if tokens aren’t tied to sessions
• U2F is USELESS if SMS/TOTP are default alternative options
•Phishing training should be on BEHAVIOR not specific red flags
•Convenience for the company means convenience for ATTACKERS
If you use G Suite literally anyone can inject an event into your
calendar… and there’s nothing you can do about it. ¯_(ツ)_/¯
Questions to Google
• Do we need the ability to force Event responses for users?
• Can we have the ability to whitelist auto-add events by domain?
• Can we have Phone Prompt AND U2F instead of SMS/TOTP?
• Can we have 2FA tokens tied to sessions?
• Why are the same SMS tokens re-sent instead of cancelling them?
End Slide
• Black Hills Information Security
• http://www.blackhillsinfosec.com/
• MailSniper
•https://github.com/dafthack/MailSniper
•CredSniper
•https://github.com/ustayready/CredSniper
•Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterMike Felch
 
Fade from Whitehat... to Black
Fade from Whitehat... to BlackFade from Whitehat... to Black
Fade from Whitehat... to BlackBeau Bullock
 
Offensive Python for Pentesting
Offensive Python for PentestingOffensive Python for Pentesting
Offensive Python for PentestingMike Felch
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNEDChris Gates
 
Introduction to LavaPasswordFactory
Introduction to LavaPasswordFactoryIntroduction to LavaPasswordFactory
Introduction to LavaPasswordFactoryChristopher Grayson
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudBen Johnson
 
Top Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayChris Gates
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani GolandCODE BLUE
 
Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016Karl Fosaaen
 
presentation
presentationpresentation
presentationaaron bishop
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear DenESET
 
Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1Michael Gough
 
Windows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to beWindows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to beMichael Gough
 
The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the InternetAndrew Morris
 
Externally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - ArcticconExternally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - ArcticconKarl Fosaaen
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud SecuritySBWebinars
 
Do you lose sleep at night?
Do you lose sleep at night?Do you lose sleep at night?
Do you lose sleep at night?Nathan Van Gheem
 
Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...
Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...
Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...Andrew Morris
 
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niqu...
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niqu...Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niqu...
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niqu...Daniel Bohannon
 

Was ist angesagt? (20)

Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite Perimeter
 
Fade from Whitehat... to Black
Fade from Whitehat... to BlackFade from Whitehat... to Black
Fade from Whitehat... to Black
 
Offensive Python for Pentesting
Offensive Python for PentestingOffensive Python for Pentesting
Offensive Python for Pentesting
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNED
 
Introduction to LavaPasswordFactory
Introduction to LavaPasswordFactoryIntroduction to LavaPasswordFactory
Introduction to LavaPasswordFactory
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the Cloud
 
Top Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions Today
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
 
Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016
 
presentation
presentationpresentation
presentation
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear Den
 
Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1
 
Windows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to beWindows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to be
 
The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the Internet
 
Externally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - ArcticconExternally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - Arcticcon
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud Security
 
Do you lose sleep at night?
Do you lose sleep at night?Do you lose sleep at night?
Do you lose sleep at night?
 
Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...
Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...
Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...
 
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niqu...
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niqu...Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niqu...
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niqu...
 

Ähnlich wie A Google Event You Won't Forget

Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdfBrute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdfLior Rotkovitch
 
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Michael Pirnat
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedFelipe Prado
 
WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 stk_jj
 
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 clean
WAF ASM / Advance WAF - Brute force   lior rotkovitch  f5 sirt v5 cleanWAF ASM / Advance WAF - Brute force   lior rotkovitch  f5 sirt v5 clean
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 cleanLior Rotkovitch
 
Red Team Apocalypse (RVAsec Edition)
Red Team Apocalypse (RVAsec Edition)Red Team Apocalypse (RVAsec Edition)
Red Team Apocalypse (RVAsec Edition)Beau Bullock
 
A (not-so-quick) Primer on iOS Encryption David Schuetz - NCC Group
A (not-so-quick) Primer on iOS Encryption David Schuetz - NCC GroupA (not-so-quick) Primer on iOS Encryption David Schuetz - NCC Group
A (not-so-quick) Primer on iOS Encryption David Schuetz - NCC GroupEC-Council
 
WordPress Security 101 - WordCamp Nairobi 2019
WordPress Security 101 -  WordCamp Nairobi 2019WordPress Security 101 -  WordCamp Nairobi 2019
WordPress Security 101 - WordCamp Nairobi 2019stk_jj
 
Tech IT Easy x DevTalk : "Secure Your Coding with OWASP"
Tech IT Easy x DevTalk : "Secure Your Coding with OWASP"Tech IT Easy x DevTalk : "Secure Your Coding with OWASP"
Tech IT Easy x DevTalk : "Secure Your Coding with OWASP"Andi Rustandi Djunaedi
 
Implementing Certificate Based Authentication for HCL Traveler Access - Enga...
 Implementing Certificate Based Authentication for HCL Traveler Access - Enga... Implementing Certificate Based Authentication for HCL Traveler Access - Enga...
Implementing Certificate Based Authentication for HCL Traveler Access - Enga...Milan Matejic
 
Django production
Django productionDjango production
Django productionpythonsd
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEPENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEChris Gates
 
Hacking iOS with Proxies - dc612
Hacking iOS with Proxies - dc612Hacking iOS with Proxies - dc612
Hacking iOS with Proxies - dc612Karl Fosaaen
 
Hacking iOS Applications with Proxies
Hacking iOS Applications with ProxiesHacking iOS Applications with Proxies
Hacking iOS Applications with ProxiesKarl Fosaaen
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
 
BSides Lisbon 2013 - All your sites belong to Burp
BSides Lisbon 2013 - All your sites belong to BurpBSides Lisbon 2013 - All your sites belong to Burp
BSides Lisbon 2013 - All your sites belong to BurpTiago Mendo
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCanSecWest
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...LINE Corporation
 
Finding Needles in Haystacks
Finding Needles in HaystacksFinding Needles in Haystacks
Finding Needles in Haystackssnyff
 

Ähnlich wie A Google Event You Won't Forget (20)

Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdfBrute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
 
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
 
WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020
 
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 clean
WAF ASM / Advance WAF - Brute force   lior rotkovitch  f5 sirt v5 cleanWAF ASM / Advance WAF - Brute force   lior rotkovitch  f5 sirt v5 clean
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 clean
 
Red Team Apocalypse (RVAsec Edition)
Red Team Apocalypse (RVAsec Edition)Red Team Apocalypse (RVAsec Edition)
Red Team Apocalypse (RVAsec Edition)
 
A (not-so-quick) Primer on iOS Encryption David Schuetz - NCC Group
A (not-so-quick) Primer on iOS Encryption David Schuetz - NCC GroupA (not-so-quick) Primer on iOS Encryption David Schuetz - NCC Group
A (not-so-quick) Primer on iOS Encryption David Schuetz - NCC Group
 
WordPress Security 101 - WordCamp Nairobi 2019
WordPress Security 101 -  WordCamp Nairobi 2019WordPress Security 101 -  WordCamp Nairobi 2019
WordPress Security 101 - WordCamp Nairobi 2019
 
Tech IT Easy x DevTalk : "Secure Your Coding with OWASP"
Tech IT Easy x DevTalk : "Secure Your Coding with OWASP"Tech IT Easy x DevTalk : "Secure Your Coding with OWASP"
Tech IT Easy x DevTalk : "Secure Your Coding with OWASP"
 
2FA WTF
2FA WTF2FA WTF
2FA WTF
 
Implementing Certificate Based Authentication for HCL Traveler Access - Enga...
 Implementing Certificate Based Authentication for HCL Traveler Access - Enga... Implementing Certificate Based Authentication for HCL Traveler Access - Enga...
Implementing Certificate Based Authentication for HCL Traveler Access - Enga...
 
Django production
Django productionDjango production
Django production
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEPENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
 
Hacking iOS with Proxies - dc612
Hacking iOS with Proxies - dc612Hacking iOS with Proxies - dc612
Hacking iOS with Proxies - dc612
 
Hacking iOS Applications with Proxies
Hacking iOS Applications with ProxiesHacking iOS Applications with Proxies
Hacking iOS Applications with Proxies
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
BSides Lisbon 2013 - All your sites belong to Burp
BSides Lisbon 2013 - All your sites belong to BurpBSides Lisbon 2013 - All your sites belong to Burp
BSides Lisbon 2013 - All your sites belong to Burp
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...
 
Finding Needles in Haystacks
Finding Needles in HaystacksFinding Needles in Haystacks
Finding Needles in Haystacks
 

Mehr von Beau Bullock

Getting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract AuditingGetting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract AuditingBeau Bullock
 
Getting Started in Pentesting the Cloud: Azure
Getting Started in Pentesting the Cloud: AzureGetting Started in Pentesting the Cloud: Azure
Getting Started in Pentesting the Cloud: AzureBeau Bullock
 
Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!Beau Bullock
 
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front DoorTravelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front DoorBeau Bullock
 
Red Team Apocalypse - BSides Peru (En espaĂąol)
Red Team Apocalypse - BSides Peru (En espaĂąol)Red Team Apocalypse - BSides Peru (En espaĂąol)
Red Team Apocalypse - BSides Peru (En espaĂąol)Beau Bullock
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
 

Mehr von Beau Bullock (6)

Getting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract AuditingGetting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract Auditing
 
Getting Started in Pentesting the Cloud: Azure
Getting Started in Pentesting the Cloud: AzureGetting Started in Pentesting the Cloud: Azure
Getting Started in Pentesting the Cloud: Azure
 
Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!
 
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front DoorTravelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
 
Red Team Apocalypse - BSides Peru (En espaĂąol)
Red Team Apocalypse - BSides Peru (En espaĂąol)Red Team Apocalypse - BSides Peru (En espaĂąol)
Red Team Apocalypse - BSides Peru (En espaĂąol)
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 

KĂźrzlich hochgeladen

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 

KĂźrzlich hochgeladen (20)

Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 

A Google Event You Won't Forget

  • 1. A Google Event You Won’t Forget Mike Felch & Beau Bullock A journey through red teaming Google Suite
  • 2. Who We Are •Mike Felch - @ustayready •Pentest / Red team at BHIS •Involved w/ OWASP Orlando and BSides Orlando •Beau Bullock - @dafthack •Pentest / Red team at BHIS •Host of Tradecraft Security Weekly •Avid OWA enthusiast
  • 4. What We’re Covering • Brief G Suite Security Overview • Offense: Real-world Attack Path • Demo: MailSniper & CredSniper • Defense: Fighting Back • Questions / Comments
  • 6. G Suite Security •Not an exhaustive list... •Suspicious activity alerts/emails •Additional security dialogs •Touch this number •Last location used •Chrome kind of identifies phish sites •Easily avoided using SSL! Let’s Encrypt! •Awesome G Suite Admin console
  • 8. G Suite 2FA •Lot’s of different options… •None are bulletproof •Convenience vs “Safer” •Not a Google problem.. so-to-say •but.. everything w/ G is broken :( •Advanced Protection Program •Dual U2F .. come at me bro.
  • 9. G Suite 2FA - SMS •Username/Password + SMS token •Super convenient to enroll •Default 2FA option for most •Backup option for Google •Google is moving away from it •NIST 800-63B is deprecating •Mobile carrier redirection?! •Malicious app?! •Really bad idea
  • 10. G Suite 2FA - TOTP •Username/Password + TOTP •Little difficult for non-tech •Token rotates & expires •Lot’s of apps available •Backup option for Google •Switch devices? Uhh ohh.. •Pretty bad idea Source: https://blog.trezor.io/why-you-should-never-use-google-authenticator-again-e166d09d4324
  • 11. G Suite 2FA - Phone Prompt •Username/Password + Smart Phone •Requires Android/iOS •Weird login? Touch this number •Suspicious location? Show me more •Seamless verification process •Pretty good alternative
  • 12. G Suite 2FA - U2F •Username/Password + USB/BT •Requires hardware device •Requires Chrome •Requires backup option •Strongest verification •Strongest option •Slow adoption rate
  • 14. Setting Up •Quick recon for names/emails •Create doppelganger Gmail •Import contacts to resolve profiles •Setup server environment •Domain, SSL, Phishing page •Create fake agenda in GDoc •Set open sharing permissions •Redirects users to avoid suspicion
  • 15. Exploiting Trust •Needs to look legit • Needs to trigger a response • Needs to create urgency • Needs to go undetected • Needs to avoid red flags Don’t email, inject events!
  • 17. Event Injection •Silently inject events into calendars •Creates the urgency via reminders •Include link to fake agenda •Mass-exploitation w/o visibility •Litter calendars for the future •Remove traces by erasing the event •Include GoToMeeting •Don’t forget to record the meeting! :) •How did we get here???
  • 18. Event Injection •One day I got a calendar alert for a flight that wasn’t mine •A coworker had sent their flight details in an email •Google thought the itinerary was mine and automatically added to my calendar •This was the start of something very interesting...
  • 19. Event Injection •An email isn’t necessary though •Simply add a Google user to an event and select to not notify them •Google will automatically add that event to their calendar •This can present a very unique situation for phishing...
  • 20. Event Injection & SE •Here are a few ideas: •Include a link to a conference call site but have it pointing to a credential collection page •Include a malicious attachment “agenda” •Have victims navigate to a fake Google Auth page and collect creds (more on that soon…)
  • 21. Event Injection •Events get even more fun when you use the Google API •It’s possible to make it look like a user already accepted an invitation •...they never received and invite though. •This bypasses the setting for not auto-adding events to G-calendar
  • 23. Personalized Phishing •Multi-stage process •Email •Password •Two-factor? • Which one? • Additional dialogs? • Can we be done? •Retrieve 2FA tokens •Redirect user •Vanish!
  • 27. Personalized Password •Fetch the profile image •Google Picasa API •JavaScript XMLHttpRequest() •Ask nicely for the password •Behind the scenes, authenticate •Is 2FA present? •No? Redirect them to GDoc agenda •Doh! 2FA is enabled. •Which type? Extract information.
  • 30. Personalized Authenticator •Contains profile image and email •Contains 2FA application name •Make it look pretty •Ask nicely for the token •Capture and move quickly •You have 30 seconds
  • 33. Personalized SMS •Contains profile image and email •Contains last 2 digits of phone number •Make it look pretty •Ask nicely for the token •Capture and move slowly •You have plenty of time •SMS token not tied to session •Unused tokens get re-sent later •Not sure how long but definitely hours
  • 36. Personalized Phone Prompt •Contains profile image and email •Contains saved device name •May contain a ‘touch number’ •If it seems suspicious •Make it look pretty •Ask nicely for a touch •Requires double trigger •First: We identify enrollment •Second: Our authentication •Move quick, they won’t notice Normal Phone Prompt Suspicious Additional Prompt
  • 39. ...and the dreaded U2F •Contains profile image and email • Can capture signed message • Replay w/ SendKeys doesn’t work •Virtual keyboard lacks KeyCode •Replay w/ Ducky doesn’t work •Changed VID/PID •Modified USB Composite firmware •Doesn’t conform to FIDO U2F spec •… for another day •Instead, let’s force a bypass!
  • 40. ...and the dreaded U2F •U2F only works w/ Chrome •Requires backup SMS or TOTP •What about other browsers? •Downgrades to backup options :) •Change our backend user agent •CriOS or Python-urllib/2.7 •Triggers SMS token •Redirect to SMS phish page •Continue as normal :)
  • 41. Additional 2FA Points •Might get asked for last location •GeoIP it from IP during capturing •Immediately clear red alert bar •Clear for one, clear for all •Multiple failed phone prompts •Disables phone prompt for few hours •Automatically switches 2FA option •May also contain attacker location/device •Pass session from backend to attacker •Haven’t tried but I also haven’t needed to
  • 43. Persisting Access •Create email rule to erase Google alerts • Allow a new authorized app •‘Permit-all-teh-thingz’ scope • Generate an app password • Snag the backup codes • Add new 2FA device • Change recovery email • Create forwarder
  • 44. Persisting Access • FullScope App Access! SCOPES = ' https://www.googleapis.com/auth/calendar https://mail.google.com/ https://www.googleapis.com/auth/drive https://www.googleapis.com/auth/groups https://www.googleapis.com/auth/admin.directory.user '
  • 46. Pilfering Data •Search GMail for sensitive data •Just like how MailSniper works with Exchange you can now search Gmail for sensitive data as well •A bonus is that it works with Google’s search operators •Will soon include Google Drive, Google Groups and export Contacts
  • 47. Pilfering Data •Let’s talk about Google’s data export for a moment… •It literally has everything •You can export every piece of data Google knows about you including: •Search history •Location history •All G-Drive files •All Emails •All Contacts •and much more....
  • 49. Pivoting Systems • Victim using Google Drive? Synchronize payloads! • Any third party systems in the email? •Probably password re-use •If not, just reset the password! •What about a company Slack? •Salesforce? Corp apps? •Phish other employees! •Corporate VPN •Easy gateway into the internal network
  • 52. Fighting Back: Admins • Get familiar with Google Admin console •Admin SDK available for CLI • Search by IP address • Don’t just change passwords •Remove backdoors •Look for rogue email forwards •Generate a timeline •Communicate better!
  • 53. Fighting Back: Users • If you didn’t expect it, question it • Don’t let urgency cause a misstep • Security Check-up is awesome • Look for suspicious activity •Weird activity/devices/apps? •Weird email rules? •Weird recovery/forwarding email? •Careful where you click/login!!! •Pay close attention to the domain
  • 55. Recap • SMS/TOTP 2FA is DEAD if tokens aren’t tied to sessions • U2F is USELESS if SMS/TOTP are default alternative options •Phishing training should be on BEHAVIOR not specific red flags •Convenience for the company means convenience for ATTACKERS If you use G Suite literally anyone can inject an event into your calendar… and there’s nothing you can do about it. ÂŻ_(ツ)_/ÂŻ
  • 56. Questions to Google • Do we need the ability to force Event responses for users? • Can we have the ability to whitelist auto-add events by domain? • Can we have Phone Prompt AND U2F instead of SMS/TOTP? • Can we have 2FA tokens tied to sessions? • Why are the same SMS tokens re-sent instead of cancelling them?
  • 57. End Slide • Black Hills Information Security • http://www.blackhillsinfosec.com/ • MailSniper •https://github.com/dafthack/MailSniper •CredSniper •https://github.com/ustayready/CredSniper •Questions?