One of our clients (a major international bank) was attacked in a scenario which involved cleaners.
Peter wood – the ethical hacker
PETER WOOD – THE ETHICAL HACKER 1
The Ultimate Defence: Think Like a HackerAn Ethical Hacker’s View of Corporate Security Peter Wood Chief Executive Officer First•Base Technologies LLP
Who is Peter Wood?Worked in computers & electronics since 1969Founded First Base in 1989 (one of the first ethical hacking firms)CEO First Base Technologies LLPSocial engineer & penetration testerConference speaker and security ‘expert’Member of ISACA Security Advisory GroupVice Chair of BCS Information Risk Management and Audit GroupUK Chair, Corporate Executive ProgrammeFBCS, CITP, CISSP, MIEEE, M.Inst.ISPRegistered BCS Security ConsultantMember of ACM, ISACA, ISSA, Mensa
Thinking like a hacker• Hacking is a way of thinking A hacker is someone who thinks outside the box. Its someone who discards conventional wisdom, and does something else instead. Its someone who looks at the edge and wonders whats beyond. Its someone who sees a set of rules and wonders what happens if you dont follow them. [Bruce Schneier]• Hacking applies to all aspects of life - not just computers
SNMP Simple Network Management Protocol• A protocol developed to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network• Enables network administrators to manage network performance, find and solve network problems, and plan for network growth• SNMP v1 is the de facto network management protocol• SNMP v1 has been criticised for its poor security. Authentication is performed only by a ‘community string’, in effect a type of password, which is transmitted in clear text
SNMP for hackers• If you know the read string (default public) you can read the entire MIB for that device• If you know the read-write string (default private) you may be able to change settings on that device• You may be able to ‘sniff’ community strings off the network if they’ve been changed from the defaults• You may be able to control a router or switch: – Intercept traffic and read sensitive information – ‘Crash’ the network repeatedly – Lock the device out, requiring physical access to reset it• You may be able to list users, groups, shares etc. on servers• You may be able to subvert wireless network security
Windows architecture Domain logonLocal users Domain usersand groups Workstation Domain and groups Controller Global group in local group LoLocal users Workstation ca Domain Domain usersand groups l lo and groups go Controller nLocal users Local usersand groups Workstation Member and groups Server Local users Member and groups Server
List privileged accounts and look for service accounts
Case study: Administrator passwords admin5 crystal financeGlobal firm worth £800million friday macadmin• 67 Administrator accounts monkey orange• 43 simple passwords (64%) password password1 prague• 15 were “password” (22%) pudding rocky4• Some examples we found -> security security1 sparkle webadmin yellow
Case study: password crack• 26,310 passwords from a Windows domain• 11,279 (42.9%) cracked in 2½ minutes• It’s not a challenge!
Desktop & Laptop Security• Physical security on Windows desktops and laptops doesn’t exist• Native Windows security is ineffective if you have physical access• Everything is visible: e-mails, spreadsheets, documents, passwords• If it’s on your machine - it’s stolen!• Encryption is the best defence, coupled with lots of training!
Keyghost log fileKeystrokes recorded so far is 2706 out of 107250 ...<PWR><CAD>fsmith<tab><tab>arabella xxxxxxx <tab><tab> None<tab><tab> None<tab><tab>None<tab><tab> <CAD> arabella<CAD><CAD> arabella<CAD><CAD> arabellaexittracert 192.168.137.240telnet 192.168.137.240cisco
Need more information? Peter Wood Chief Executive OfficerFirst•Base Technologies LLP firstname.lastname@example.org http://firstbase.co.uk http://white-hats.co.uk http://peterwood.com Blog: fpws.blogspot.com Twitter: @peterwoodx