SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Welcome

BriForum   |   © TechTarget
So, You Just Inherited Someone
Else's Citrix Environment. How
Do You Figure out What's What?

Denis Gundarev
Consultant
Entisys Solutions

BriForum   |   © TechTarget
About presenter


C:>whoami /all
USER INFORMATION
----------------
User Name       Twitter Name E-Mail
============== ============ ==================
ENTISYSdenisg @fdwl         DenisG@entisys.com
GROUP INFORMATION
-----------------
Group Name                      Type              SID
============================== ================   =================
Citrix Technology Professional Well-known group   S-1-5-32-544
Citrix Certified Instructor     Hobby             S-1-5-32-545
Microsoft Certified Trainer     Hobby             S-1-5-32-546



BriForum   |   © TechTarget                                           3
Disclaimer


● Information in this presentation is intended for
  educational purposes only. Some topics in this
  presentation may contain the information related to
  “Hacking Passwords” or “Elevating permissions” (Or
  Similar terms). This topics provide information about the
  legal ways of retrieving the passwords. You shall not
  misuse the information to gain unauthorized access.
  However you may try out these hacks on your own
  computer at your own risk.
● Some of the stuff that you will learn is dangerous, playing
  with this knowledge on your production environment can
  make you very unhappy
BriForum   |   © TechTarget                                     4
Agenda
●    Why you need to hack your Citrix environment?
●    How to find your servers?
●    pwn Windows boxes
●    pwn Windows-based Citrix products
●    pwn *NIX-based Citrix products
●    How to find your clients




BriForum   |   © TechTarget                          5
Why do you need to hack your Citrix
environment?
1. Install 10 XenApp Servers
2. Wait for one year
3. Try to remember the ODBC password to add more
   servers

1.     Change your password on Friday
2.     Go to the night club
3.     …
4.     PROFIT!!



BriForum   |   © TechTarget                        6
How to start your investigation




BriForum   |   © TechTarget       7
How to find at least one XenApp Server
● Use ipscan to find at least one server with open ports
  1494 and 2598
● Open ICA file downloaded from the
  WebInterface/PNAgent site




BriForum   |   © TechTarget
How to Find Other Servers


● CTX101810 - Communication Ports Used By Citrix
  Technologies – 20 pages
● VMware KB 1012382
● Microsoft - http://technet.microsoft.com/en-
  us/library/cc875824.aspx & KB832017




BriForum   |   © TechTarget
Thank you, Captain Obvious




BriForum   |   © TechTarget                                10
Find all servers in the farm using XML
● Use XmlServiceDigger/XmlServiceExplorer from Nicholas
  Dille (sepago)




BriForum   |   © TechTarget                           11
Find all servers in the farm using ICA Client
1.   set client = WScript.CreateObject("Citrix.ICAClient")
2.   client.SetProp "HTTPBrowseraddress", WScript.Arguments(0)
3.   WScript.Echo("Farm:" +client.GetEnumNameByIndex(client.EnumerateFarms(), 0))
4.    servers = client.EnumerateServers()
5.   do while j < client.GetEnumNameCount(servers)
6.    WScript.Echo("SERVER:" +client.GetEnumNameByIndex(servers, j))
7.    j=j+1
8.   Loop




BriForum   |   © TechTarget                                                         12
Find All HTTP clients
● On XenApp server – change XML Service to be shared
  with IIS
● Look for the IIS logs, all http clients will be there




BriForum   |   © TechTarget                               13
What can be a HTTP Client?
●    WebInterface
●    NetScaler
●    Program Neighborhood
●    ICA files with HTTPBrowserAddress
       - TCP/UDP browser is not supported from ICA Client 11.1




BriForum   |   © TechTarget                                      14
Physical or Virtual?
● Why we need this info?
       - To get administrative access in most cases you need the
         “physical” access to the server
● Get MAC address, lookup it using MAC address DB:
       -       http://www.coffer.com/mac_find
       -       00-15-5D – Hyper-V
       -       00-50-56 – VMWare
       -       Random – XenServer
● Find hypervisor host
       -       Hyper-V – HKLMSOFTWAREMicrosoftVirtual
               MachineGuestParametersPhysicalHostNameFullyQualified
       - Vmware, XenServer – packet capture

BriForum   |   © TechTarget                                              15
Breaking into hypervisor
● XenServer - CTX116019
● VMware ESX - KB1317898, same procedure as for
  XenServer
● VMware ESXi – password reset not supported, but
  possible http://tinyurl.com/ResetESXiPass
● Hyper-V – just a Windows, next topic




BriForum   |   © TechTarget                         16
Get Access to the Windows Box
● Use domain admin account or GPO to get access (if
  possible)
● Sometimes you need to reset local admin password
       - Access to non-domain servers
       - “broken” Provisioning services .vhd
       - Domain controllers




BriForum   |   © TechTarget                           17
Get Access to the Windows Box
● Requirements:
       - Access to the physical console
       - Offline NT Password and Registry editor
         (http://pogostick.net/~pnh/ntpasswd/)
● Bonus – reset domain admin account password
       - SrvAny from resource kit




BriForum   |   © TechTarget                        18
Get Access to the Windows Box - Demo




BriForum   |   © TechTarget            19
XenApp ODBC Password
● SQL Server name and database name is stored in
  MF20.dsn
● Username and password Stored in
  HKEY_LOCAL_MACHINESOFTWAREWow6432Node
  CitrixIMADatastore
● L$ImaDBPassword and L$ImaDBUsername are
  encrypted
● DSMAINT CONFIG is able to encrypt this data




BriForum   |   © TechTarget                        20
XenApp ODBC Password - DEMO




BriForum   |   © TechTarget   21
XenApp ODBC Password - DEMO
● CryptoAPI tracer http://tinyurl.com/CryptoAPITracer
!sym quiet;
bp Crypt32!CryptUnprotectData "bp /t @$thread poi(@esp) "; du poi(poi(@esp-4)+4); G;";
G;";
!sym quiet;
*.srcnoisy 0;
sxi ld
.outmask- 0xFFFFFFEE $$ .outmask /d restores the output mask to default

* Create the log and begin
*
.logopen "c:log.txt";
G
g
q


• Run debugger:
       • cdb -cf c:showpass.txt dsmaint config /user:<username>




BriForum   |   © TechTarget                                                           22
SlimJim
● Deletes all Citrix administrators from the data store to
  allow control of the farm by the local administrator.
● Works only on the CPS/XA5
● Directly execute the SQL commands that delete any
  administrators configured
● Doesn’t work on XA6/6.5 because of new DB schema




BriForum   |   © TechTarget                                  23
SlimJim for XenApp 6.5
1. delete indextable FROM KEYTABLE INNER JOIN
   INDEXTABLE ON KEYTABLE.nodeid = INDEXTABLE.nodeid
   WHERE      (KEYTABLE.parentid = 42)
2. go
3. delete KEYTABLE from KEYTABLE where parentid=42
4. go
● Where this “42” is coming from?
       -       DSView from supportdebug folder on XenApp CD
       -       Directory->ServerNeighborhoods-><FarmName>->AdminTool->Users cid




BriForum   |   © TechTarget                                                       24
SlimJim for XenApp 6.5




BriForum   |   © TechTarget   25
SlimJim for XenApp 6.5 - Easiest way
● Download SlimJim for XenApp 6 from
  http://citrixtechs.com/blog/?p=56 (thanks to Carl
  Lenocker!)
● Install Windows Debugging tools
● Run Batch file




BriForum   |   © TechTarget                           26
SlimJim for XenApp 6.5 - Easiest way (Cont..)
● What it actually do?
1. start ntsd -pn imasrv.exe -pd -c "bu
    ImaRass!CtxSecurityCheck;r $t0 = %loopcount%;.while(@$t0){r
    $t0 = @$t0-1;pa @$ra;r eax=0x00000001;g};pa @$ra;r
    eax=0x00000001;.detach;q"
    - Attaches debugger to the IMA Service and bypass security check
2. cscript addadmin-mod.wsf:
   -   Set theFarm = CreateObject("XenappCOM.XenappFarm")
   -     Set NewAdmin = theFarm.AddAdmin
   -                   NewAdmin.AdminType = MFAdminPermissionFullAccess
   -                   NewAdmin.Enable = 1
   -                   NewAdmin.AAType = MFAccountAuthorityNTDomain
   -                   NewAdmin.AAName = computername
   -                   NewAdmin.AccountType = MFAccountLocalGroup
   -                   NewAdmin.AccountName = "Administrators"
   -                   NewAdmin.SaveData


BriForum   |   © TechTarget                                           27
Get access to the SQL DB
● By default, NT AUTHORITYSYSTEM has a sysadmin
  role




BriForum   |   © TechTarget                        28
BriForum   |   © TechTarget   29
XenDesktop




BriForum   |   © TechTarget   30
XenDesktop
●    Add-PSSnapin citrix.*
●    New-BrokerAdministrator -Name corptest -FullAdmin 1
●    New-AcctAdministrator -Account corptest
●    New-PvsVmAdministrator -Account corptest
●    New-ConfigAdministrator -Account corptest
●    New-HypAdministrator -Account corptest
●    New-ProvAdministrator -Account corptest




BriForum   |   © TechTarget                                 31
Provisioning Services
1. INSERT INTO [AuthGroup]
2. ([authGroupId]
3. ,[authGroupName]
4. ,[authGroupGuidName]
5. ,[description])
6. VALUES (‘UNIQUE00-GUID-4D0D-B834-15EA4A9F41EA'
7. ,N‘DOMAIN.FQDN.COM/Users/Domain Users'
8. ,N'de56c6b1-06ef-4ed6-85b8-a130f036d075'
9. ,'')
10. GO
11. INSERT INTO [AuthGroupFarm]
12. ([authGroupId])
13. VALUES ('UNIQUE00-GUID-4D0D-B834-15EA4A9F41EA')
14. GO

●    de56c6b1-06ef-4ed6-85b8-a130f036d075 –   GUID from adsiedit



BriForum   |   © TechTarget                                        32
Find your clients




BriForum   |   © TechTarget
XenApp
● Configure Resource Manager, then use SQL Report
  Builder to create reports (or just export data to Excel )
● Install EdgeSight, use reports

● OR…

● Use Event Logs
       - Windows 2003 – Security log
       - Windows 2008




BriForum   |   © TechTarget
XenApp on Windows 2003
● Use security log




● Schedule a simple script:
       -       Set objFarm = CreateObject("MetaFrameCOM.MetaFrameFarm")
       -       objFarm.Initialize(1)
       -       For Each objSession In objFarm.Sessions
       -         WScript.Echo objSession.UserName &"," & objSession.ClientAddress
       -       Next
BriForum   |   © TechTarget                                                         35
XenApp on Windows 2008
● Use dedicated log Microsoft-Windows-TerminalServices-
  LocalSessionManager/Operational




●    Attach the same script to event




●    OR read registry:
●    HKEY_LOCAL_MACHINESOFTWARECitrixIcaSession<sessionN>Connection

BriForum   |   © TechTarget                                                 36
XenDesktop
● Configure retention period for a connection log entries
       - HKEY_LOCAL_MACHINESoftwareCitrixDesktopServerL
         oggingConnectionLogLifetimeHours
       - Default period is 2 days
● Use Desktop Director to analyze connections
● OR
● Use Get-BrokerConnectionLog powershell command to
  export log and analyze using excel




BriForum   |   © TechTarget                                 37
NetScaler
● Configure Web Logging on Windows box (or Linux, if you
  like ) to get logs in standard W3C or NCSA formats
       - http://support.citrix.com/article/CTX123504
       - http://support.citrix.com/article/CTX123977




BriForum   |   © TechTarget                            38
What else?
●    XenServer – try to run “xe secret-list ” at home
●    Licensing Server – Just edit configuration files
●    XenServer WLB – reset Postgres password, google it
●    Task Manager -> Dump process -> strings – look for
     username -> look around




BriForum   |   © TechTarget                               39
Conclusion
●    1. Use Goggle
●    2. Explore SQL databases
●    3. Learn how to use Windows Debugger
●    4. Read SDK documentation
●    5. Don’t forget about physical security




BriForum   |   © TechTarget                    40
TBD: put some funny picture on the last slide




BriForum   |   © TechTarget                     41

Weitere ähnliche Inhalte

Was ist angesagt?

Kubernetes dealing with storage and persistence
Kubernetes  dealing with storage and persistenceKubernetes  dealing with storage and persistence
Kubernetes dealing with storage and persistenceJanakiram MSV
 
User authentication and authorizarion in Kubernetes
User authentication and authorizarion in KubernetesUser authentication and authorizarion in Kubernetes
User authentication and authorizarion in KubernetesNeependra Khare
 
Cryptography 101 for Java Developers - JavaZone2019
Cryptography 101 for Java Developers - JavaZone2019Cryptography 101 for Java Developers - JavaZone2019
Cryptography 101 for Java Developers - JavaZone2019Michel Schudel
 
The Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to CompromiseThe Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to CompromiseWill Schroeder
 
Docker Networking with New Ipvlan and Macvlan Drivers
Docker Networking with New Ipvlan and Macvlan DriversDocker Networking with New Ipvlan and Macvlan Drivers
Docker Networking with New Ipvlan and Macvlan DriversBrent Salisbury
 
K8s cluster autoscaler
K8s cluster autoscaler K8s cluster autoscaler
K8s cluster autoscaler k8s study
 
Google Cloud Networking Deep Dive
Google Cloud Networking Deep DiveGoogle Cloud Networking Deep Dive
Google Cloud Networking Deep DiveMichelle Holley
 
[CB20] DeClang: Anti-hacking compiler by Mengyuan Wan
[CB20] DeClang: Anti-hacking compiler by Mengyuan Wan[CB20] DeClang: Anti-hacking compiler by Mengyuan Wan
[CB20] DeClang: Anti-hacking compiler by Mengyuan WanCODE BLUE
 
Security: Odoo Code Hardening
Security: Odoo Code HardeningSecurity: Odoo Code Hardening
Security: Odoo Code HardeningOdoo
 
Windows Privilege Escalation
Windows Privilege EscalationWindows Privilege Escalation
Windows Privilege EscalationRiyaz Walikar
 
K8s network policy bypass
K8s network policy bypassK8s network policy bypass
K8s network policy bypassKaizhe Huang
 
Building secure applications with keycloak
Building secure applications with keycloak Building secure applications with keycloak
Building secure applications with keycloak Abhishek Koserwal
 
Kubernetes + Python = ❤ - Cloud Native Prague
Kubernetes + Python = ❤ - Cloud Native PragueKubernetes + Python = ❤ - Cloud Native Prague
Kubernetes + Python = ❤ - Cloud Native PragueHenning Jacobs
 

Was ist angesagt? (20)

Kubernetes dealing with storage and persistence
Kubernetes  dealing with storage and persistenceKubernetes  dealing with storage and persistence
Kubernetes dealing with storage and persistence
 
Linux Containers (LXC)
Linux Containers (LXC)Linux Containers (LXC)
Linux Containers (LXC)
 
Podman rootless containers
Podman rootless containersPodman rootless containers
Podman rootless containers
 
Open Policy Agent
Open Policy AgentOpen Policy Agent
Open Policy Agent
 
User authentication and authorizarion in Kubernetes
User authentication and authorizarion in KubernetesUser authentication and authorizarion in Kubernetes
User authentication and authorizarion in Kubernetes
 
Introduction to container based virtualization with docker
Introduction to container based virtualization with dockerIntroduction to container based virtualization with docker
Introduction to container based virtualization with docker
 
Cryptography 101 for Java Developers - JavaZone2019
Cryptography 101 for Java Developers - JavaZone2019Cryptography 101 for Java Developers - JavaZone2019
Cryptography 101 for Java Developers - JavaZone2019
 
The Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to CompromiseThe Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to Compromise
 
Docker Networking with New Ipvlan and Macvlan Drivers
Docker Networking with New Ipvlan and Macvlan DriversDocker Networking with New Ipvlan and Macvlan Drivers
Docker Networking with New Ipvlan and Macvlan Drivers
 
Istio on Kubernetes
Istio on KubernetesIstio on Kubernetes
Istio on Kubernetes
 
Defending Your "Gold"
Defending Your "Gold"Defending Your "Gold"
Defending Your "Gold"
 
K8s cluster autoscaler
K8s cluster autoscaler K8s cluster autoscaler
K8s cluster autoscaler
 
Google Cloud Networking Deep Dive
Google Cloud Networking Deep DiveGoogle Cloud Networking Deep Dive
Google Cloud Networking Deep Dive
 
[CB20] DeClang: Anti-hacking compiler by Mengyuan Wan
[CB20] DeClang: Anti-hacking compiler by Mengyuan Wan[CB20] DeClang: Anti-hacking compiler by Mengyuan Wan
[CB20] DeClang: Anti-hacking compiler by Mengyuan Wan
 
Security: Odoo Code Hardening
Security: Odoo Code HardeningSecurity: Odoo Code Hardening
Security: Odoo Code Hardening
 
Windows Privilege Escalation
Windows Privilege EscalationWindows Privilege Escalation
Windows Privilege Escalation
 
K8s network policy bypass
K8s network policy bypassK8s network policy bypass
K8s network policy bypass
 
Building secure applications with keycloak
Building secure applications with keycloak Building secure applications with keycloak
Building secure applications with keycloak
 
Kubernetes security
Kubernetes securityKubernetes security
Kubernetes security
 
Kubernetes + Python = ❤ - Cloud Native Prague
Kubernetes + Python = ❤ - Cloud Native PragueKubernetes + Python = ❤ - Cloud Native Prague
Kubernetes + Python = ❤ - Cloud Native Prague
 

Andere mochten auch

Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIMAlienVault
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationAlienVault
 
How to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSHow to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSDenis Gundarev
 
Zumasys Citrix Top 10 Tips and Tricks
Zumasys Citrix Top 10 Tips and TricksZumasys Citrix Top 10 Tips and Tricks
Zumasys Citrix Top 10 Tips and TricksFrank A. Petillo, Sr.
 
Access Europa 20120531
Access Europa 20120531 Access Europa 20120531
Access Europa 20120531 Intercult
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVaultAlienVault
 
MySQL Audit using Percona audit plugin and ELK
MySQL Audit using Percona audit plugin and ELKMySQL Audit using Percona audit plugin and ELK
MySQL Audit using Percona audit plugin and ELKYoungHeon (Roy) Kim
 
"How about no grep and zabbix?". ELK based alerts and metrics.
"How about no grep and zabbix?". ELK based alerts and metrics."How about no grep and zabbix?". ELK based alerts and metrics.
"How about no grep and zabbix?". ELK based alerts and metrics.Vladimir Pavkin
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than EverAlienVault
 
Real-time data analysis using ELK
Real-time data analysis using ELKReal-time data analysis using ELK
Real-time data analysis using ELKJettro Coenradie
 
ELK Ruminating on Logs (Zendcon 2016)
ELK Ruminating on Logs (Zendcon 2016)ELK Ruminating on Logs (Zendcon 2016)
ELK Ruminating on Logs (Zendcon 2016)Mathew Beane
 
My Bro The ELK
My Bro The ELKMy Bro The ELK
My Bro The ELKTripwire
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmAlienVault
 
Abusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itAbusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itBenjamin Delpy
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...Benjamin Delpy
 
Using ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk Server
Using ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk ServerUsing ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk Server
Using ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk ServerBizTalk360
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynetSina Manavi
 

Andere mochten auch (20)

Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
Got citrix hack it
Got citrix hack itGot citrix hack it
Got citrix hack it
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM Installation
 
How to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSHow to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWS
 
Zumasys Citrix Top 10 Tips and Tricks
Zumasys Citrix Top 10 Tips and TricksZumasys Citrix Top 10 Tips and Tricks
Zumasys Citrix Top 10 Tips and Tricks
 
Access Europa 20120531
Access Europa 20120531 Access Europa 20120531
Access Europa 20120531
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVault
 
elk_stack_alexander_szalonnas
elk_stack_alexander_szalonnaselk_stack_alexander_szalonnas
elk_stack_alexander_szalonnas
 
MySQL Audit using Percona audit plugin and ELK
MySQL Audit using Percona audit plugin and ELKMySQL Audit using Percona audit plugin and ELK
MySQL Audit using Percona audit plugin and ELK
 
"How about no grep and zabbix?". ELK based alerts and metrics.
"How about no grep and zabbix?". ELK based alerts and metrics."How about no grep and zabbix?". ELK based alerts and metrics.
"How about no grep and zabbix?". ELK based alerts and metrics.
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 
Real-time data analysis using ELK
Real-time data analysis using ELKReal-time data analysis using ELK
Real-time data analysis using ELK
 
ELK Ruminating on Logs (Zendcon 2016)
ELK Ruminating on Logs (Zendcon 2016)ELK Ruminating on Logs (Zendcon 2016)
ELK Ruminating on Logs (Zendcon 2016)
 
My Bro The ELK
My Bro The ELKMy Bro The ELK
My Bro The ELK
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
Abusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itAbusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get it
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
 
Using ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk Server
Using ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk ServerUsing ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk Server
Using ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk Server
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 

Ähnlich wie How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment. How Do You Figure out What's What?)

Cloud stack troubleshooting
Cloud stack troubleshooting Cloud stack troubleshooting
Cloud stack troubleshooting AlexTian
 
Qemu device prototyping
Qemu device prototypingQemu device prototyping
Qemu device prototypingYan Vugenfirer
 
Introduction To Managing VMware With PowerShell
Introduction To Managing VMware With PowerShellIntroduction To Managing VMware With PowerShell
Introduction To Managing VMware With PowerShellHal Rottenberg
 
Caching and tuning fun for high scalability
Caching and tuning fun for high scalabilityCaching and tuning fun for high scalability
Caching and tuning fun for high scalabilityWim Godden
 
E2E PVS Technical Overview Stephane Thirion
E2E PVS Technical Overview Stephane ThirionE2E PVS Technical Overview Stephane Thirion
E2E PVS Technical Overview Stephane Thirionsthirion
 
P4 Introduction
P4 Introduction P4 Introduction
P4 Introduction Netronome
 
Cleartext and PtH still alive
Cleartext and PtH still aliveCleartext and PtH still alive
Cleartext and PtH still alivecamsec
 
XPDDS18: Xenwatch Multithreading - Dongli Zhang, Oracle
XPDDS18: Xenwatch Multithreading - Dongli Zhang, OracleXPDDS18: Xenwatch Multithreading - Dongli Zhang, Oracle
XPDDS18: Xenwatch Multithreading - Dongli Zhang, OracleThe Linux Foundation
 
Cloud api之應用與實例
Cloud api之應用與實例Cloud api之應用與實例
Cloud api之應用與實例Simon Su
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI securityDenis Gundarev
 
Zendcon scaling magento
Zendcon scaling magentoZendcon scaling magento
Zendcon scaling magentoMathew Beane
 
BeeGFS Training.pdf
BeeGFS Training.pdfBeeGFS Training.pdf
BeeGFS Training.pdfssusercbaa33
 
Troubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKTroubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKDavid McGeough
 
New Jersey Red Hat Users Group Presentation: Provisioning anywhere
New Jersey Red Hat Users Group Presentation: Provisioning anywhereNew Jersey Red Hat Users Group Presentation: Provisioning anywhere
New Jersey Red Hat Users Group Presentation: Provisioning anywhereRodrique Heron
 
What's New in Kubernetes 1.18 Webinar Slides
What's New in Kubernetes 1.18 Webinar SlidesWhat's New in Kubernetes 1.18 Webinar Slides
What's New in Kubernetes 1.18 Webinar SlidesMirantis
 
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...Bp307 Practical Solutions for Connections Administrators, tips and scrips for...
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...Sharon James
 
Best practices for optimizing Red Hat platforms for large scale datacenter de...
Best practices for optimizing Red Hat platforms for large scale datacenter de...Best practices for optimizing Red Hat platforms for large scale datacenter de...
Best practices for optimizing Red Hat platforms for large scale datacenter de...Jeremy Eder
 
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, KyivKubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, KyivAleksey Asiutin
 
Caching and tuning fun for high scalability
Caching and tuning fun for high scalabilityCaching and tuning fun for high scalability
Caching and tuning fun for high scalabilityWim Godden
 
XPDDS17: NoXS: Death to the XenStore - Filipe Manco, NEC
XPDDS17:  NoXS: Death to the XenStore - Filipe Manco, NECXPDDS17:  NoXS: Death to the XenStore - Filipe Manco, NEC
XPDDS17: NoXS: Death to the XenStore - Filipe Manco, NECThe Linux Foundation
 

Ähnlich wie How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment. How Do You Figure out What's What?) (20)

Cloud stack troubleshooting
Cloud stack troubleshooting Cloud stack troubleshooting
Cloud stack troubleshooting
 
Qemu device prototyping
Qemu device prototypingQemu device prototyping
Qemu device prototyping
 
Introduction To Managing VMware With PowerShell
Introduction To Managing VMware With PowerShellIntroduction To Managing VMware With PowerShell
Introduction To Managing VMware With PowerShell
 
Caching and tuning fun for high scalability
Caching and tuning fun for high scalabilityCaching and tuning fun for high scalability
Caching and tuning fun for high scalability
 
E2E PVS Technical Overview Stephane Thirion
E2E PVS Technical Overview Stephane ThirionE2E PVS Technical Overview Stephane Thirion
E2E PVS Technical Overview Stephane Thirion
 
P4 Introduction
P4 Introduction P4 Introduction
P4 Introduction
 
Cleartext and PtH still alive
Cleartext and PtH still aliveCleartext and PtH still alive
Cleartext and PtH still alive
 
XPDDS18: Xenwatch Multithreading - Dongli Zhang, Oracle
XPDDS18: Xenwatch Multithreading - Dongli Zhang, OracleXPDDS18: Xenwatch Multithreading - Dongli Zhang, Oracle
XPDDS18: Xenwatch Multithreading - Dongli Zhang, Oracle
 
Cloud api之應用與實例
Cloud api之應用與實例Cloud api之應用與實例
Cloud api之應用與實例
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
 
Zendcon scaling magento
Zendcon scaling magentoZendcon scaling magento
Zendcon scaling magento
 
BeeGFS Training.pdf
BeeGFS Training.pdfBeeGFS Training.pdf
BeeGFS Training.pdf
 
Troubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKTroubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDK
 
New Jersey Red Hat Users Group Presentation: Provisioning anywhere
New Jersey Red Hat Users Group Presentation: Provisioning anywhereNew Jersey Red Hat Users Group Presentation: Provisioning anywhere
New Jersey Red Hat Users Group Presentation: Provisioning anywhere
 
What's New in Kubernetes 1.18 Webinar Slides
What's New in Kubernetes 1.18 Webinar SlidesWhat's New in Kubernetes 1.18 Webinar Slides
What's New in Kubernetes 1.18 Webinar Slides
 
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...Bp307 Practical Solutions for Connections Administrators, tips and scrips for...
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...
 
Best practices for optimizing Red Hat platforms for large scale datacenter de...
Best practices for optimizing Red Hat platforms for large scale datacenter de...Best practices for optimizing Red Hat platforms for large scale datacenter de...
Best practices for optimizing Red Hat platforms for large scale datacenter de...
 
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, KyivKubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
 
Caching and tuning fun for high scalability
Caching and tuning fun for high scalabilityCaching and tuning fun for high scalability
Caching and tuning fun for high scalability
 
XPDDS17: NoXS: Death to the XenStore - Filipe Manco, NEC
XPDDS17:  NoXS: Death to the XenStore - Filipe Manco, NECXPDDS17:  NoXS: Death to the XenStore - Filipe Manco, NEC
XPDDS17: NoXS: Death to the XenStore - Filipe Manco, NEC
 

Mehr von Denis Gundarev

VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingDenis Gundarev
 
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableDenis Gundarev
 
Citrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingCitrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingDenis Gundarev
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeDenis Gundarev
 
Citrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityCitrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityDenis Gundarev
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseDenis Gundarev
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityDenis Gundarev
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUGDenis Gundarev
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevDenis Gundarev
 
Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDenis Gundarev
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...Denis Gundarev
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDenis Gundarev
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDenis Gundarev
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDenis Gundarev
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDenis Gundarev
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5Denis Gundarev
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VDenis Gundarev
 
Anton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudAnton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudDenis Gundarev
 
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...Denis Gundarev
 
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterRUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterDenis Gundarev
 

Mehr von Denis Gundarev (20)

VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes Troubleshooting
 
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
 
Citrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingCitrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & Troubleshooting
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
 
Citrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityCitrix Internals: ICA Connectivity
Citrix Internals: ICA Connectivity
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your Enterprise
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobility
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
 
Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix Troubleshooting
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo Murris
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick Dehlinger
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
 
Anton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudAnton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloud
 
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
 
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterRUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment. How Do You Figure out What's What?)

  • 1. Welcome BriForum | © TechTarget
  • 2. So, You Just Inherited Someone Else's Citrix Environment. How Do You Figure out What's What? Denis Gundarev Consultant Entisys Solutions BriForum | © TechTarget
  • 3. About presenter C:>whoami /all USER INFORMATION ---------------- User Name Twitter Name E-Mail ============== ============ ================== ENTISYSdenisg @fdwl DenisG@entisys.com GROUP INFORMATION ----------------- Group Name Type SID ============================== ================ ================= Citrix Technology Professional Well-known group S-1-5-32-544 Citrix Certified Instructor Hobby S-1-5-32-545 Microsoft Certified Trainer Hobby S-1-5-32-546 BriForum | © TechTarget 3
  • 4. Disclaimer ● Information in this presentation is intended for educational purposes only. Some topics in this presentation may contain the information related to “Hacking Passwords” or “Elevating permissions” (Or Similar terms). This topics provide information about the legal ways of retrieving the passwords. You shall not misuse the information to gain unauthorized access. However you may try out these hacks on your own computer at your own risk. ● Some of the stuff that you will learn is dangerous, playing with this knowledge on your production environment can make you very unhappy BriForum | © TechTarget 4
  • 5. Agenda ● Why you need to hack your Citrix environment? ● How to find your servers? ● pwn Windows boxes ● pwn Windows-based Citrix products ● pwn *NIX-based Citrix products ● How to find your clients BriForum | © TechTarget 5
  • 6. Why do you need to hack your Citrix environment? 1. Install 10 XenApp Servers 2. Wait for one year 3. Try to remember the ODBC password to add more servers 1. Change your password on Friday 2. Go to the night club 3. … 4. PROFIT!! BriForum | © TechTarget 6
  • 7. How to start your investigation BriForum | © TechTarget 7
  • 8. How to find at least one XenApp Server ● Use ipscan to find at least one server with open ports 1494 and 2598 ● Open ICA file downloaded from the WebInterface/PNAgent site BriForum | © TechTarget
  • 9. How to Find Other Servers ● CTX101810 - Communication Ports Used By Citrix Technologies – 20 pages ● VMware KB 1012382 ● Microsoft - http://technet.microsoft.com/en- us/library/cc875824.aspx & KB832017 BriForum | © TechTarget
  • 10. Thank you, Captain Obvious BriForum | © TechTarget 10
  • 11. Find all servers in the farm using XML ● Use XmlServiceDigger/XmlServiceExplorer from Nicholas Dille (sepago) BriForum | © TechTarget 11
  • 12. Find all servers in the farm using ICA Client 1. set client = WScript.CreateObject("Citrix.ICAClient") 2. client.SetProp "HTTPBrowseraddress", WScript.Arguments(0) 3. WScript.Echo("Farm:" +client.GetEnumNameByIndex(client.EnumerateFarms(), 0)) 4. servers = client.EnumerateServers() 5. do while j < client.GetEnumNameCount(servers) 6. WScript.Echo("SERVER:" +client.GetEnumNameByIndex(servers, j)) 7. j=j+1 8. Loop BriForum | © TechTarget 12
  • 13. Find All HTTP clients ● On XenApp server – change XML Service to be shared with IIS ● Look for the IIS logs, all http clients will be there BriForum | © TechTarget 13
  • 14. What can be a HTTP Client? ● WebInterface ● NetScaler ● Program Neighborhood ● ICA files with HTTPBrowserAddress - TCP/UDP browser is not supported from ICA Client 11.1 BriForum | © TechTarget 14
  • 15. Physical or Virtual? ● Why we need this info? - To get administrative access in most cases you need the “physical” access to the server ● Get MAC address, lookup it using MAC address DB: - http://www.coffer.com/mac_find - 00-15-5D – Hyper-V - 00-50-56 – VMWare - Random – XenServer ● Find hypervisor host - Hyper-V – HKLMSOFTWAREMicrosoftVirtual MachineGuestParametersPhysicalHostNameFullyQualified - Vmware, XenServer – packet capture BriForum | © TechTarget 15
  • 16. Breaking into hypervisor ● XenServer - CTX116019 ● VMware ESX - KB1317898, same procedure as for XenServer ● VMware ESXi – password reset not supported, but possible http://tinyurl.com/ResetESXiPass ● Hyper-V – just a Windows, next topic BriForum | © TechTarget 16
  • 17. Get Access to the Windows Box ● Use domain admin account or GPO to get access (if possible) ● Sometimes you need to reset local admin password - Access to non-domain servers - “broken” Provisioning services .vhd - Domain controllers BriForum | © TechTarget 17
  • 18. Get Access to the Windows Box ● Requirements: - Access to the physical console - Offline NT Password and Registry editor (http://pogostick.net/~pnh/ntpasswd/) ● Bonus – reset domain admin account password - SrvAny from resource kit BriForum | © TechTarget 18
  • 19. Get Access to the Windows Box - Demo BriForum | © TechTarget 19
  • 20. XenApp ODBC Password ● SQL Server name and database name is stored in MF20.dsn ● Username and password Stored in HKEY_LOCAL_MACHINESOFTWAREWow6432Node CitrixIMADatastore ● L$ImaDBPassword and L$ImaDBUsername are encrypted ● DSMAINT CONFIG is able to encrypt this data BriForum | © TechTarget 20
  • 21. XenApp ODBC Password - DEMO BriForum | © TechTarget 21
  • 22. XenApp ODBC Password - DEMO ● CryptoAPI tracer http://tinyurl.com/CryptoAPITracer !sym quiet; bp Crypt32!CryptUnprotectData "bp /t @$thread poi(@esp) "; du poi(poi(@esp-4)+4); G;"; G;"; !sym quiet; *.srcnoisy 0; sxi ld .outmask- 0xFFFFFFEE $$ .outmask /d restores the output mask to default * Create the log and begin * .logopen "c:log.txt"; G g q • Run debugger: • cdb -cf c:showpass.txt dsmaint config /user:<username> BriForum | © TechTarget 22
  • 23. SlimJim ● Deletes all Citrix administrators from the data store to allow control of the farm by the local administrator. ● Works only on the CPS/XA5 ● Directly execute the SQL commands that delete any administrators configured ● Doesn’t work on XA6/6.5 because of new DB schema BriForum | © TechTarget 23
  • 24. SlimJim for XenApp 6.5 1. delete indextable FROM KEYTABLE INNER JOIN INDEXTABLE ON KEYTABLE.nodeid = INDEXTABLE.nodeid WHERE (KEYTABLE.parentid = 42) 2. go 3. delete KEYTABLE from KEYTABLE where parentid=42 4. go ● Where this “42” is coming from? - DSView from supportdebug folder on XenApp CD - Directory->ServerNeighborhoods-><FarmName>->AdminTool->Users cid BriForum | © TechTarget 24
  • 25. SlimJim for XenApp 6.5 BriForum | © TechTarget 25
  • 26. SlimJim for XenApp 6.5 - Easiest way ● Download SlimJim for XenApp 6 from http://citrixtechs.com/blog/?p=56 (thanks to Carl Lenocker!) ● Install Windows Debugging tools ● Run Batch file BriForum | © TechTarget 26
  • 27. SlimJim for XenApp 6.5 - Easiest way (Cont..) ● What it actually do? 1. start ntsd -pn imasrv.exe -pd -c "bu ImaRass!CtxSecurityCheck;r $t0 = %loopcount%;.while(@$t0){r $t0 = @$t0-1;pa @$ra;r eax=0x00000001;g};pa @$ra;r eax=0x00000001;.detach;q" - Attaches debugger to the IMA Service and bypass security check 2. cscript addadmin-mod.wsf: - Set theFarm = CreateObject("XenappCOM.XenappFarm") - Set NewAdmin = theFarm.AddAdmin - NewAdmin.AdminType = MFAdminPermissionFullAccess - NewAdmin.Enable = 1 - NewAdmin.AAType = MFAccountAuthorityNTDomain - NewAdmin.AAName = computername - NewAdmin.AccountType = MFAccountLocalGroup - NewAdmin.AccountName = "Administrators" - NewAdmin.SaveData BriForum | © TechTarget 27
  • 28. Get access to the SQL DB ● By default, NT AUTHORITYSYSTEM has a sysadmin role BriForum | © TechTarget 28
  • 29. BriForum | © TechTarget 29
  • 30. XenDesktop BriForum | © TechTarget 30
  • 31. XenDesktop ● Add-PSSnapin citrix.* ● New-BrokerAdministrator -Name corptest -FullAdmin 1 ● New-AcctAdministrator -Account corptest ● New-PvsVmAdministrator -Account corptest ● New-ConfigAdministrator -Account corptest ● New-HypAdministrator -Account corptest ● New-ProvAdministrator -Account corptest BriForum | © TechTarget 31
  • 32. Provisioning Services 1. INSERT INTO [AuthGroup] 2. ([authGroupId] 3. ,[authGroupName] 4. ,[authGroupGuidName] 5. ,[description]) 6. VALUES (‘UNIQUE00-GUID-4D0D-B834-15EA4A9F41EA' 7. ,N‘DOMAIN.FQDN.COM/Users/Domain Users' 8. ,N'de56c6b1-06ef-4ed6-85b8-a130f036d075' 9. ,'') 10. GO 11. INSERT INTO [AuthGroupFarm] 12. ([authGroupId]) 13. VALUES ('UNIQUE00-GUID-4D0D-B834-15EA4A9F41EA') 14. GO ● de56c6b1-06ef-4ed6-85b8-a130f036d075 – GUID from adsiedit BriForum | © TechTarget 32
  • 33. Find your clients BriForum | © TechTarget
  • 34. XenApp ● Configure Resource Manager, then use SQL Report Builder to create reports (or just export data to Excel ) ● Install EdgeSight, use reports ● OR… ● Use Event Logs - Windows 2003 – Security log - Windows 2008 BriForum | © TechTarget
  • 35. XenApp on Windows 2003 ● Use security log ● Schedule a simple script: - Set objFarm = CreateObject("MetaFrameCOM.MetaFrameFarm") - objFarm.Initialize(1) - For Each objSession In objFarm.Sessions - WScript.Echo objSession.UserName &"," & objSession.ClientAddress - Next BriForum | © TechTarget 35
  • 36. XenApp on Windows 2008 ● Use dedicated log Microsoft-Windows-TerminalServices- LocalSessionManager/Operational ● Attach the same script to event ● OR read registry: ● HKEY_LOCAL_MACHINESOFTWARECitrixIcaSession<sessionN>Connection BriForum | © TechTarget 36
  • 37. XenDesktop ● Configure retention period for a connection log entries - HKEY_LOCAL_MACHINESoftwareCitrixDesktopServerL oggingConnectionLogLifetimeHours - Default period is 2 days ● Use Desktop Director to analyze connections ● OR ● Use Get-BrokerConnectionLog powershell command to export log and analyze using excel BriForum | © TechTarget 37
  • 38. NetScaler ● Configure Web Logging on Windows box (or Linux, if you like ) to get logs in standard W3C or NCSA formats - http://support.citrix.com/article/CTX123504 - http://support.citrix.com/article/CTX123977 BriForum | © TechTarget 38
  • 39. What else? ● XenServer – try to run “xe secret-list ” at home ● Licensing Server – Just edit configuration files ● XenServer WLB – reset Postgres password, google it ● Task Manager -> Dump process -> strings – look for username -> look around BriForum | © TechTarget 39
  • 40. Conclusion ● 1. Use Goggle ● 2. Explore SQL databases ● 3. Learn how to use Windows Debugger ● 4. Read SDK documentation ● 5. Don’t forget about physical security BriForum | © TechTarget 40
  • 41. TBD: put some funny picture on the last slide BriForum | © TechTarget 41