From Defence to offence

Slides:



Advertisements
Similar presentations
1 Automated SFTP Windows and SUN Linux and SUN. 2 Vocabulary  Client = local=the machine generating the SFTP request  Server = remote = the machine.
Advertisements

SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
SUK KI KIM New architecture for enhanced security system in linux.
FTP Using FileZilla CS10001 – Computer Literacy. Step 1: Understanding the Interface Quickconnect Bar Message Log Area Local site navigation (either lab.
Network Security Testing Techniques Presented By:- Sachin Vador.
Creating WordPress Websites. Creating a site on your computer Local server Local WordPress installation Setting Up Dreamweaver.
VCT May 20, 2009 Sapna Blesson Advisor: Dr.Christopher Pollett.
Report Distribution Report Distribution in PeopleTools 8.4 Doug Ostler & Eric Knapp 7264.
Using FileZilla to FTP CS10001 – Computer Literacy Kent State University.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Information Networking Security and Assurance Lab National Chung Cheng University Backdoors and Remote Access Tools INSA Laboratory.
Log Analysis and Intrusion Detection By Srikrishna Gudavalli Venkata Naga Vamsi Krishna Ravi Kiran Yellepeddy.
INTRODUCTION Toomeeting Conference (TMC) is the easiest and more accessible multimedia videoconferencing solution on market. TMC offers a large portfolio.
GreenSQL Yuli Stremovsky /MSN/Gtalk:
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.
1 Backdoors and Trojans. ECE Internetwork Security 2 Agenda Overview Netcat Trojans/Backdoors.
4/13/2010.  CSS Meeting  Stephen Crane on Programming Contests  1pm  Building 8 room /11/10.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Introduction to Android Swapnil Pathak Advanced Malware Analysis Training Series.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
1 Web Server Administration Chapter 9 Extending the Web Environment.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Honeypot and Intrusion Detection System
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
KFSensor Vs Honeyd Honeypot System Sunil Gurung
FORESEC Academy FORESEC Academy Security Essentials (III)
11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11.
Kali Linx Attacks Jim Nasto. Window 8 Computer On my Windows 8 64 bit OS machine. I started using a Virtual Machine using Hyper V Manager and shared the.
Hybrid Approaches Towards Optimized Network Discovery Techniques By David Meltzer.
Trojan Horses What you need to know about one of the world’s most dangerous forms of malicious code.
A powerful network monitoring system
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
RUBRIC IP1 Ruben Botero Web Design III. The different approaches to accessing data in a database through client-side scripting languages. – On the client.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
Project proposal for the WS_FTP by Percy Wu, Quake Software Production Company.
FTP Using FileZilla CS10001 – Computer Literacy. Step 1: Understanding the Interface Quickconnect Bar Message Log Area Local site navigation (either lab.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Internet FTP to network. Preliminary Steps a FTP program is used and executed such as WS_FTP LE Information needed –host name –user id –password.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
A CROSS PLATFORM REMOTE DESKTOP CONNECTION SUITE A.V.D.S.S.BHADRI RAJU D.RAMESH BABU U.JAYASREE G.NANIBABU.
Mac OS X backdoor Trojan, now in beta? 報告人:劉旭哲. Introduction It targets users of Mac OS X As even the malware itself admits, it is not yet finished. It.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
By Collin Donaldson. What is it? Shodan is a search engine that allows you to look for devices connected to the internet using service banners. When you.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
PostExploitation CIS 5930/4930 Offensive Computer Security Spring 2014.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Traffic Analysis– Wireshark Simple Example
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild By Jun Hao Xu Authors: Brown Farinholt, Mohammad Rezaeiradt,
To Catch a Ratter: Monitoring the Behavior of
Article by:. rown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh
Remote Control and Advanced Techniques
Cisco Exam Securing Cisco Networks with Sourcefire FireAMP Endpoints Version: Demo practice-questions.html.
Cisco Exam Securing Cisco Networks with Sourcefire FireAMP Endpoints Version: Demo practice-questions.html.
NET 311 Information Security
Traffic Analysis– Wireshark Simple Example
ECA – Endpoint Context Agent
Penetration Testing & Network Defense
Windows without windows...
Presentation transcript:

From Defence to offence DarkComet From Defence to offence

# whoami Kevin Breen @kevthehermit GCIA GREM GCFE Security+ Independent Researcher Part time blogger

What my friends think I do

What Work thinks I do

What I really do

Disclaimers Disclaimer One: Disclaimer Two: Disclaimer Three: All views expressed here are mine and are not the views or opinions of my employer. Disclaimer Two: I am not a lawyer. Disclaimer Three: Any use of the tools and techniques described here are at your own discretion and I am not responsible for your actions. Final Disclaimer: The Case Study data that you will see was all generated in my Lab and not from a live engagement.

Agenda What is DarkComet? Who Uses DarkComet? Defence: Offensive: The Usual Stuff Offensive: Discovery Traffic Load Testing AKA DOS Remote File Read Case Study

The What & The Who Attribution

What is DarkComet Remote Access Trojan (RAT) Free and Public 2008 Feature Rich File Access, Keylogger, Download and Execute, WebCam, Audio, Fun Syrian Conflict No Longer Developed No Longer Updated

Who uses Dark Comet Script Kiddies

Who uses Dark Comet Script Kiddies E Crime https://heimdalsecurity.com/blog/darkcomet-rat-phishing-campaigns/

Who uses Dark Comet https://heimdalsecurity.com/blog/darkcomet-rat-phishing-campaigns/

Who uses Dark Comet Script Kiddies E Crime

Who uses Dark Comet Script Kiddies E Crime https://heimdalsecurity.com/blog/darkcomet-rat-phishing-campaigns/

Who uses Dark Comet Script Kiddies E Crime http://www.ibtimes.co.uk/criminals-use-jesuischarlie-slogan-spread-darkcomet-malware-1483553

Who uses Dark Comet Script Kiddies E Crime Governments

Who uses Dark Comet Script Kiddies E Crime Governements

Defensive

Defensive Network IOC’s Intelligence Static Decode Host Port Files Reg Keys Intelligence Passwords Campaign IDs Static Decode http://malwareconfig.com https://kevthehermit.github.io/RATDecoders

Offensive Discovery

Offensive From Binary Host Port Password FTP Credentials Additional Files LOGS Uploads from victims Downloads from our attacker

Offensive From Shodan Banners Port Banners DC_2 - 8EA4AB05FA7E - 10 1604 Banners Banners DC_2 - 8EA4AB05FA7E - 10 DC_2_PASS - C4A6EB42FC74 - 2 DC_4 - B47CB892B702 - 1 DC_4_PASS - 00798B4A0595 - 0 DC_42 - C7CF9C7CD932 - 1 DC_42_PASS - 61A49CF4910B - 0 DC_42F - 155CAD31A61F - 2 DC_42F_PASS - 82695EF04B68 - 2 DC_5 - 1164805C82EE - 13 DC_5_PASS - 2ECB29F71503 - 0 DC_51 - BF7CAB464EFB - 863 DC_51_PASS - DACA20185D99 - 2

Offensive From Shodan Banners Nmap script MassScan Port Banners 1604 Banners Nmap script MassScan Banners DC_2 - 8EA4AB05FA7E DC_2_PASS - C4A6EB42FC74 DC_4 - B47CB892B702 DC_4_PASS - 00798B4A0595 DC_42 - C7CF9C7CD932 DC_42_PASS - 61A49CF4910B DC_42F - 155CAD31A61F DC_42F_PASS - 82695EF04B68 DC_5 - 1164805C82EE DC_5_PASS - 2ECB29F71503 DC_51 - BF7CAB464EFB DC_51_PASS - DACA20185D99

Offensive Traffic Load testing

Traffic Load Testing Host + Port + Password Reverse Connection Infected Host Sends Data Controller Trusts

DEMO GODS BE KIND DC_Trafficgenerator.py

Remote File Read The fun stuff

Remote File Read Credits What did they find? 2012 Shawn Denbow @sdenbow_ Jesse Hertz @hectohertz http://matasano.com/research/PEST-CONTROL.pdf What did they find? You can request any file from the DC Controller: In the context of the current user Full Path or Relative to the DC Folder

Remote File Read Demo Windows

Remote File Read Demo Kali

Remote File Read

Remote File Read

Remote File Read

Remote File Read Remote Remotes

Remote File Read

Remote File Read

Remote File Read

Remote File Read

Remote File Read VNC Logs Windows Linux Event Logs C:\users\%USERNAME%\Appdata\Local\RealVNC\vncserver.log Linux /var/log/vncserver-x11.log ~/.vnc/vncserver-x11.log /var/log/vncserver-virtuald.log

Remote File Read Many more file paths Use Your Imagination

Questions ???

Thanks for Listening All Tools - https://github.com/kevthehermit/dc-toolkit My Blog – https://techanarchy.net My Slides – My Blog & Bsides @kevthehermit mailto: kevin@techanarchy.net