red team testing and password security

22
intelligent information security ANITIAN Red Team Testing

Upload: anitian

Post on 15-Apr-2017

35 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Red Team Testing and Password Security

intelligent information securityANIT IANRed Team Testing

Page 2: Red Team Testing and Password Security

intelligent information securityANIT IAN

Outline

1. Penetration Test vs. Red Team2. External Enumeration3. Social Engineering4. Remote Access5. Live Demo

1. Local Privilege Escalation2. Domain Privilege Escalation

6. How to Defend Against These Attacks

Page 3: Red Team Testing and Password Security

intelligent information securityANIT IAN

Penetration Test vs. Red TeamPenetration Testing• Scope defined and provided by client• Remote access is provided for internal testing• Employees are typically aware of the test• Rules are well defined• Systems are tested independently

Red Team• Red team identifies potential scope• External / Internal / Web applications / Social Engineering• Limited number of employees are aware• Almost anything goes• Systems are tested simultaneously

Page 4: Red Team Testing and Password Security

intelligent information securityANIT IAN

External Techniques

Page 5: Red Team Testing and Password Security

intelligent information securityANIT IAN

External Enumeration - Passive

Passive Intelligence Gathering - What• Brands• Domain names• Hostnames• IP addresses• Employee names and contact information• Technical information• Website browsing

• What is your footprint?

Page 6: Red Team Testing and Password Security

intelligent information securityANIT IAN

External Enumeration - Passive

Passive Intelligence Gathering - How• Whois/DNS• Domainbigdata.com• Google searching/dorking (passive)• Shodan/Maltego• Social media/Pastebin/Github• Haveibeenpwned.com• Sales tools• Website browsing• OSINT tools (theHarvester, Spiderfoot, etc…)

Page 7: Red Team Testing and Password Security

intelligent information securityANIT IAN

External Enumeration - Active

Active Intelligence Gathering - What• Running services and version information• Web applications• Hidden pages or applications• Missing patches• Phone and PBX information• Google Dorking (active)

Page 8: Red Team Testing and Password Security

intelligent information securityANIT IAN

External Enumeration - Active

Active Intelligence Gathering - How• nmap• netcat• Burpsuite• Nikto• Vulnerability Scanning platforms (Nessus, Nexpose, Qualys)• Phone calls

Page 9: Red Team Testing and Password Security

intelligent information securityANIT IAN

Social Engineering

• “Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail” –Kevin Mitnick

• Humans just want to help

• Exploit kindness, annoyance, fear

• Testing policies and procedures rather than systems or software

• Almost always a weak link

Page 10: Red Team Testing and Password Security

intelligent information securityANIT IAN

Social EngineeringEmail• Ask for passwords• Send malicious links• Malicious attachments (back door)

Phone• Ask for passwords• Convince victim to perform actions

In Person• Access to terminals, documents, trash• Plant rogue devices• Take photos

Page 11: Red Team Testing and Password Security

intelligent information securityANIT IAN

Breaking In

Page 12: Red Team Testing and Password Security

intelligent information securityANIT IAN

Information Gathering – Employee Data

Page 13: Red Team Testing and Password Security

intelligent information securityANIT IAN

Social Engineering - Email

Page 14: Red Team Testing and Password Security

intelligent information securityANIT IAN

Social Engineering - Email

Page 15: Red Team Testing and Password Security

intelligent information securityANIT IAN

Active Testing – Lockouts and Remote Access

Page 16: Red Team Testing and Password Security

intelligent information securityANIT IAN

Social Engineering - Phone

Page 17: Red Team Testing and Password Security

intelligent information securityANIT IAN

Remote Access

Page 18: Red Team Testing and Password Security

intelligent information securityANIT IAN

PreventionPolicies and Procedures• Verify employee identification for password resets• Secret questions• Call-back

• Discourage use of auto responders

Technical controls• MFA for remote access• Tarpitting: prevent username enumeration techniques• Disable external access to helpdesk, or require stronger

verification procedures

Page 19: Red Team Testing and Password Security

intelligent information securityANIT IAN

Privilege Escalation – Demonstration

Page 20: Red Team Testing and Password Security

intelligent information securityANIT IAN

PreventionPolicies and Procedures• Discourage storing passwords in plaintext• Educate employees to choose strong passwords

Technical controls• Provide a secure password storage solution• Do not use group policy preferences for passwords• Microsoft LAPS

• Use unique passwords between accounts and systems• Configure least privilege access• Configure SIEM logging and alerts

Page 21: Red Team Testing and Password Security

intelligent information securityANIT IAN

Red Teaming

Why?• Test your entire security program• Discover the weak links• Simulate a real-world motivated attacker (no constraints)

Who?• You feel your security is strong and you want to test it• You need ammunition for management buy-in

Page 22: Red Team Testing and Password Security

intelligent information securityANIT IAN

Thank you! Questions?

Use the chat feature to ask your questions

Rick Osgood – [email protected] Cooper – [email protected]