SlideShare a Scribd company logo
1 of 77
Download to read offline
Windows 10 - Endpoint
Security Improvements and
the Implant Since Windows
2000
By: @ChrisTruncer and
@Evan_Pena2003
@ChrisTruncer
Sys Admin turned Red Teamer
Open Source Developer
Trooper
2
@Evan_Pena2003
Open Source Developer
Red Team Lead for West Coast
Former sysadmin
3
What’s this talk about?
◈ Device guard!
◈ Code integrity policies
◈ PowerShell Constrained Language mode
◈ Introduction of a way to live off the land
◈ Data Encoding
◈ C2 Data Storage
◈ Commands
4
Device Guard
5
Device Guard
◈ Defensive technology built into Windows 10
and Server 2016
◈ A change from antivirus technologies where
apps are “trusted” unless flagged as
malicious
◈ You now explicitly state which applications
are trusted
6
Device Guard
◈ New application whitelisting bypass
published?
◆Don’t trust that application anymore!
◈ Matt Graeber is curating a baseline code
integrity policy blocking offending
applications
7
https://github.com/mattifestation/DeviceGuardBypassMitigationRules
Code Integrity Policies
◈ You define trusted applications by creating
Code Integrity policies
◈ Upon creating code integrity policies, they
can be deployed via:
◆GPO
◆SCCM
8
Code Integrity Policies
◈ Code integrity policies are largely based on
digital signatures
◈ For unsigned applications, you can deploy
catalog files which can be tied into code
integrity policies
9
Code Integrity Policies
◈ Catalog files will need to be updated every
time an application is updated
◆If using digital signatures, this won’t be
a problem
◈ Code integrity policies typically are XML
files converted into a binary
10
Code Integrity Policies
◈ Your code integrity policies themselves
should also be signed
◆This can help prevent modification by
users/attackers with administrative rights
11
Creating Code Integrity Policies
◈ The easiest way to create code integrity
policies is through PowerShell
◈ Carlos Perez and Matt Graeber have created
walkthroughs for creating a code integrity
policy
12
https://gist.github.com/darkoperator/7d5b85354c0343c7554e
http://www.exploit-monday.com/2016/09/introduction-to-windows-device-guard.html
Creating Code Integrity Policies
◈ Largely, you will use the New-CIPolicy
cmdlet and specify the file rule levels for
defining trusted applications
◆File hash
◆File name
◆Publisher
◆FilePublisher 13
14
Creating Code Integrity Policies
◈ Convert XML code integrity policy to a
binary file
◆ConvertFrom-CIPolicy
◈ Deploy in audit mode
◆Non-blocking
◆Generates events
15
Creating Code Integrity Policies
◈ After having deployed in audit mode
◆ Review event logs
◆ Make any rule modifications as needed
◆ Deploy in enforcement mode
16
PowerShell Constrained Language Mode
◈ Device Guard auto-configures PowerShell to
run in Constrained Language mode
◆Pure PowerShell elements are allowed,
but the types are limited
◆.Net methods are only allowed on the
permitted types
17
18
Attacker’s Perspective
◈ How can we operate on a Device Guard
protected system?
◆Develop a bypass
◇This will be effective at first, but
could potentially be blocked via CI
Policy.
◇This takes R&D 19
Attacker’s Perspective
◈ How about living off the land?
◆We know the applications most likely to
be whitelisted
◇PowerShell, WMI, etc.
◆Can they be chained together to attack
systems in a useful manner?
20
WMImplant
Invoke-WMImplant
21
WMImplant
◈ Developed in PowerShell
◈ Designed to exclusively operate with WMI
◆The mechanism to trigger actions
◆The C2 channel itself
◆Data storage :)
◈ Menu and commands are reminiscent of
Meterpreter - except all WMI based
22
First, Thanks
◈ Thanks to the incredibly smart Matt Graeber,
Willi Ballenthin, and Claudiu Teodorescu
◈ Their research is what spurred my interest in
WMI
◈ Without their research, I may have never
developed this capability
23https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf
What’s WMI?
◈ WMI == Windows Management
Instrumentation
◈ Installed and enabled by default in Windows
since Windows 2000
◈ Enables administrators to query local and
remote systems for management purposes
24
WMImplant and Device Guard
◈ WMImplant was developed exclusively
against Device Guard protected systems
◆Remember ConstrainedLanguage
Mode? - We’re great friends with it :)
25
WMImplant and Device Guard
◈ Data storage and encoding were problems in
the initial development stages.
◆We want to be able to upload or
download files, run commands, etc.
◆What if all data that we might need to
manipulate isn’t just text?
26
WMImplant and Device Guard
◈ We discovered that encoding and data
storage were problems we were going to
need to solve to write an effective post-
exploitation tool
27
Encoding
Invoke-WMImplant
28
WMImplant and Encoding
◈ The first method of encoding data? Base64!
◆[Convert]::ToBase64String()
◈ Only one problem...
29
30
Encoding - Back to the Drawing Board
◈ Base64 is out
◆We haven’t seen a pure PowerShell
based Base64 encoding/decoding
function
◈ WMImplant can be encoder agnostic,
anything that works can be used.
◆So… let’s turn to Daniel Bohannon 31
WMImplant and Encoding - [Int[]][Char[]]
◈ $encode = [Int[]][char[]]$input -Join ','
◆Breaks input into an array of char, then
converts each char into an int
◆It works with binary and text files - in
constrained mode
◈ $decoded = [char[]][int[]]$encode.Split(',') -
Join '' 32
33
WMImplant Encoding and Storage
◈ Awesome!
◈ We can now encode and
decode data in a
Constrained Language
compliant manner.
◈ Next Question: where
should it be stored?
34
WMImplant and Data Storage
◈ The initial version of WMImplant used the
system registry to store data
◈ We can easily create and modify registry
values remotely
◆This can be done over WMI with the
StdRegProv
35
WMImplant and Data Storage
◈ Registry Pro:
◆Not limited to a very small size
limitations
◈ Registry Con:
◆Lots of parsers for analyzing a system’s
registry
36
WMImplant and Data Storage
◈ This led to a conversation with Matt
Dunwoody discussing APT 29 tactics
◆They were creating custom WMI
classes, adding properties, and storing
data in WMI properties.
◈ Let’s try to recreate this!
37
WMImplant and Data Storage - New WMI Class
◈ Lucky for us, Matt Graeber already
published code that does this!
38https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-
instrumentation.pdf
WMImplant and Data Storage - New WMI Class
◈ But… there’s a
problem...
39
40
WMImplant and Data Storage - WMI Property Fail
◈ WMI class creation is allowed within
Constrained Language Mode
◈ WMI property creation is not…
◈ It looks like this idea won’t work
◈ Unless...
41
WMImplant and Data Storage - Existing Classes!
◈ What about if we look at existing WMI classes?
◆ Are their properties writable?
◆ Can they accept a “string” type or any
length?
◆ Can the property be modified in Constrained
Language Mode?
◆ Won’t blue screen the box?
42
WMImplant and Data Storage - Existing Classes!
◈ Modified an existing script to:
◆Enumerate all WMI classes
◆Enumerate all properties within each
class
◆Find properties of type “string” that are
writable
43https://gist.github.com/ChrisTruncer/f3fe3f04b9fdd1310507363f8bdad8be
WMImplant and Data Storage - Existing Classes!
◈ This returned a somewhat limited number of
properties
◆Some only allowed a fixed (small)
length of data
◆Others would error when modifying the
property value.
44
WMImplant and Data Storage - Then, there was one
◈ However, this did identify a class that we’ve
not seen before
◆Win32_OSRecoveryConfiguration
◈ This class is used to specify the type of
information that is collected when the
system crashes.
45
46
WMImplant and Data Storage - Then, there was one
◈ It does have a single property which is
writable, and is a string
◆DebugFilePath - The location where
Windows places a memory dump
following an operating system crash.
47
48
WMImplant and Data Storage - DebugFilePath
◈ It looks as if it should only accept a file path
location
◈ It looks as if it would be limited in the length
of data it accepts
◈ That’s what it looks like...
49
50
WMImplant and Data Storage - DebugFilePath
◈ Awesome!
◈ Demonstrates we can write arbitrary strings
to the DebugFilePath property
◈ Our encoder can work with this!
◈ What about length..?
51
52
WMImplant and Data Storage - DebugFilePath
◈ This gives us everything we need!
◆Writeable string property
◆Writeable in Constrained Mode
◆Not fixed in length (256+ MB)
◆Doesn’t blue screen the box :)
53
WMImplant and Data Storage - C2 Comms
1.Query the remote machine’s DebugFilePath
property to receive its original value
2.Use WMI to execute a command (ipconfig)
on the targeted machine
3.Encode the results of the command and store
it in the DebugFilePath property
54
WMImplant and Data Storage - C2 Comms
4. Query the remote system (from attacking
machine) to receive DebugFilePath value
5. Decode the value and display the results
6. Set the DebugFilePath property back to its
original value.
55
WMImplant - C2 Comms
◈ Most of WMImplant’s commands will not
require data storage
◆In this case, results are retrieved with
likely a single WMI query
◈ If storage is required, the previous C2
communications methodology is followed
56
WMImplant Commands
Invoke-WMImplant
57
WMImplant - Commands
◈ Broken up by what they do:
◆Meta Functions
◆File Operations
◆Lateral Movement
◆Process Manipulation
◆System Manipulation
◆Log Analysis
58
WMImplant - Meta Functions
◈ help
◈ exit
◈ change_user - change current user context
for all commands
◈ gen_cli - generate command line command
to run non-interactively
59
60
gen_cli
change_user
WMImplant - File Operations
◈ cat - read file contents
◈ download - downloads file from target
◈ ls - directory and file listing
◈ ninjacopy - copy any file
◈ search - search for file or extension
◈ upload - upload file to target
61
62
cat
63
search
WMImplant - Uploads and Downloads
◈ These are the only commands that still use
the registry for data storage
◆This is due to not knowing the size of
potential uploads or downloads
◆Also due to unknown size limits of the
WMI property (tested up to 256 MB)
64
WMImplant - Uploads
1.Read and encode file that will be uploaded
2.Store in remote system’s registry
3.Start PowerShell on remote system via WMI
4.Read and decode registry value
5.Write decoded results to user-specified file
location
65
WMImplant - Lateral Movement Facilitation
◈ command_exec - Run command and receive
output
◈ enable_wdigest - Set UseLogonPassword
key
◈ enable_winrm - enables WinRM
◈ remote_posh - Runs PowerShell script on
target and receives output 66
67
remote_posh
68
Detecting
Malicious WMI
WMI vs. WMI
69
Actively Monitor WMI
1. Use WMI Query Language (WQL) to identify
◆ Recently created “_EventConsumer”
events (persistence)
◆ WMI-based process executions
2. Creates an Event Filter (condition) to perform
an action if any of the above WQL conditions
are true
70
Actively Monitor WMI
3. Creates an Event Consumer (action), to log details of
the newly created “__EventConsumer” or executed
process
a. Set it to log all data to the event log with specific
event ID and event name
b. Very high fidelity!
c. Feed these logs to a SIEM - SNARE or universal
forwarder. Then ALERT!
71
Automating the Process - WMIMonitor
◈ Mandiant WMIMonitor PowerShell Script
found here:
https://github.com/realparisi/WMI_Monitor
◈ Detailed blog post here:
https://www.fireeye.com/blog/threat-
research/2016/08/wmi_vs_wmi_monitor.html
72
The Result (Persistence)
73
The Result (Command Execution
74
Scale Detection with More Signatures
◈ UpRoot IDS
◆https://github.com/Invoke-IR/Uproot
◈ Includes ~14 signatures instead of 2
◈ Centralized logging so if you have a smaller
budget...1 agent instead of 1000+ agents.
75
WMImplant - Future Work
◈ Implement whitelisting bypasses
◈ Examine the changing defensive landscape
and identify means to repurpose existing
tools
76
WMImplant - Where to get it
◈ WMImplant -
https://github.com/ChrisTruncer/WMImplant
◈ Questions?
◆@ChrisTruncer
◆@Evan_Pena2003
77

More Related Content

What's hot

Pentester++
Pentester++Pentester++
Pentester++CTruncer
 
Higher Level Malware
Higher Level MalwareHigher Level Malware
Higher Level MalwareCTruncer
 
Egress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data ExfiltrationEgress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data ExfiltrationCTruncer
 
An EyeWitness View into your Network
An EyeWitness View into your NetworkAn EyeWitness View into your Network
An EyeWitness View into your NetworkCTruncer
 
Bringing Down the House - How One Python Script Ruled Over AntiVirus
Bringing Down the House - How One Python Script Ruled Over AntiVirusBringing Down the House - How One Python Script Ruled Over AntiVirus
Bringing Down the House - How One Python Script Ruled Over AntiVirusCTruncer
 
The Art of AV Evasion - Or Lack Thereof
The Art of AV Evasion - Or Lack ThereofThe Art of AV Evasion - Or Lack Thereof
The Art of AV Evasion - Or Lack ThereofCTruncer
 
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013midnite_runr
 
Hacking - Breaking Into It
Hacking - Breaking Into ItHacking - Breaking Into It
Hacking - Breaking Into ItCTruncer
 
Veil-PowerView - NovaHackers
Veil-PowerView - NovaHackersVeil-PowerView - NovaHackers
Veil-PowerView - NovaHackersVeilFramework
 
CheckPlease - Payload-Agnostic Implant Security
CheckPlease - Payload-Agnostic Implant SecurityCheckPlease - Payload-Agnostic Implant Security
CheckPlease - Payload-Agnostic Implant SecurityBrandon Arvanaghi
 
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
What Goes In Must Come Out: Egress-Assess and Data ExfiltrationWhat Goes In Must Come Out: Egress-Assess and Data Exfiltration
What Goes In Must Come Out: Egress-Assess and Data ExfiltrationCTruncer
 
CheckPlease: Payload-Agnostic Targeted Malware
CheckPlease: Payload-Agnostic Targeted MalwareCheckPlease: Payload-Agnostic Targeted Malware
CheckPlease: Payload-Agnostic Targeted MalwareBrandon Arvanaghi
 
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!CTruncer
 
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleThreat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleDharmalingam Ganesan
 
Finding Needles in Haystacks
Finding Needles in HaystacksFinding Needles in Haystacks
Finding Needles in Haystackssnyff
 
DEF CON 27 - workshop - MAURICIO VELAZCO - writing custom paylods
DEF CON 27 - workshop - MAURICIO VELAZCO - writing  custom paylodsDEF CON 27 - workshop - MAURICIO VELAZCO - writing  custom paylods
DEF CON 27 - workshop - MAURICIO VELAZCO - writing custom paylodsFelipe Prado
 
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...Biblioteca Nacional de España
 
No locked doors, no windows barred: hacking OpenAM infrastructure
No locked doors, no windows barred: hacking OpenAM infrastructureNo locked doors, no windows barred: hacking OpenAM infrastructure
No locked doors, no windows barred: hacking OpenAM infrastructureAndrew Petukhov
 

What's hot (20)

Pentester++
Pentester++Pentester++
Pentester++
 
Higher Level Malware
Higher Level MalwareHigher Level Malware
Higher Level Malware
 
Egress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data ExfiltrationEgress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data Exfiltration
 
An EyeWitness View into your Network
An EyeWitness View into your NetworkAn EyeWitness View into your Network
An EyeWitness View into your Network
 
Bringing Down the House - How One Python Script Ruled Over AntiVirus
Bringing Down the House - How One Python Script Ruled Over AntiVirusBringing Down the House - How One Python Script Ruled Over AntiVirus
Bringing Down the House - How One Python Script Ruled Over AntiVirus
 
The Art of AV Evasion - Or Lack Thereof
The Art of AV Evasion - Or Lack ThereofThe Art of AV Evasion - Or Lack Thereof
The Art of AV Evasion - Or Lack Thereof
 
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
 
Hacking - Breaking Into It
Hacking - Breaking Into ItHacking - Breaking Into It
Hacking - Breaking Into It
 
Veil-PowerView - NovaHackers
Veil-PowerView - NovaHackersVeil-PowerView - NovaHackers
Veil-PowerView - NovaHackers
 
CheckPlease - Payload-Agnostic Implant Security
CheckPlease - Payload-Agnostic Implant SecurityCheckPlease - Payload-Agnostic Implant Security
CheckPlease - Payload-Agnostic Implant Security
 
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
What Goes In Must Come Out: Egress-Assess and Data ExfiltrationWhat Goes In Must Come Out: Egress-Assess and Data Exfiltration
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
 
CheckPlease: Payload-Agnostic Targeted Malware
CheckPlease: Payload-Agnostic Targeted MalwareCheckPlease: Payload-Agnostic Targeted Malware
CheckPlease: Payload-Agnostic Targeted Malware
 
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
 
0d1n
0d1n0d1n
0d1n
 
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleThreat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
 
Finding Needles in Haystacks
Finding Needles in HaystacksFinding Needles in Haystacks
Finding Needles in Haystacks
 
DEF CON 27 - workshop - MAURICIO VELAZCO - writing custom paylods
DEF CON 27 - workshop - MAURICIO VELAZCO - writing  custom paylodsDEF CON 27 - workshop - MAURICIO VELAZCO - writing  custom paylods
DEF CON 27 - workshop - MAURICIO VELAZCO - writing custom paylods
 
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
 
No locked doors, no windows barred: hacking OpenAM infrastructure
No locked doors, no windows barred: hacking OpenAM infrastructureNo locked doors, no windows barred: hacking OpenAM infrastructure
No locked doors, no windows barred: hacking OpenAM infrastructure
 
Raptor web application firewall
Raptor web application firewallRaptor web application firewall
Raptor web application firewall
 

Viewers also liked

Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityKelly Shortridge
 
CSW2017 jun li_car anomaly detection
CSW2017  jun li_car anomaly detectionCSW2017  jun li_car anomaly detection
CSW2017 jun li_car anomaly detectionCanSecWest
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CanSecWest
 
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItAMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItNikhil Mittal
 
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCanSecWest
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017John Maeda
 
Quelles changements de vision dans la cyber sécurité en 2017 ? - ADN OUEST, s...
Quelles changements de vision dans la cyber sécurité en 2017 ? - ADN OUEST, s...Quelles changements de vision dans la cyber sécurité en 2017 ? - ADN OUEST, s...
Quelles changements de vision dans la cyber sécurité en 2017 ? - ADN OUEST, s...Quentin Adam
 
Four Steps to Sure-Fire Live Streaming Success
Four Steps to Sure-Fire Live Streaming SuccessFour Steps to Sure-Fire Live Streaming Success
Four Steps to Sure-Fire Live Streaming SuccessLynn Teatro
 
La blockchain et son impact sur le secteur public
La blockchain et son impact sur le secteur publicLa blockchain et son impact sur le secteur public
La blockchain et son impact sur le secteur publicGenève Lab
 
Invoke-Obfuscation nullcon 2017
Invoke-Obfuscation nullcon 2017Invoke-Obfuscation nullcon 2017
Invoke-Obfuscation nullcon 2017Daniel Bohannon
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon IntroPeter Bihr
 
タイ文字と若干情報科学[修正版]
タイ文字と若干情報科学[修正版]タイ文字と若干情報科学[修正版]
タイ文字と若干情報科学[修正版]. きぷ
 
Les métiers du webmarketing - Conférence IDRAC Sup de com - 23 mars 2017
Les métiers du webmarketing - Conférence IDRAC Sup de com - 23 mars 2017Les métiers du webmarketing - Conférence IDRAC Sup de com - 23 mars 2017
Les métiers du webmarketing - Conférence IDRAC Sup de com - 23 mars 2017Laura Blanchard - Agence KHOSI
 
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CanSecWest
 
Introducton to Convolutional Nerural Network with TensorFlow
Introducton to Convolutional Nerural Network with TensorFlowIntroducton to Convolutional Nerural Network with TensorFlow
Introducton to Convolutional Nerural Network with TensorFlowEtsuji Nakai
 
Portrait of a lady
Portrait of a ladyPortrait of a lady
Portrait of a ladyMakala (D)
 
HPC Top 5 Stories: March 22, 2017
HPC Top 5 Stories: March 22, 2017HPC Top 5 Stories: March 22, 2017
HPC Top 5 Stories: March 22, 2017NVIDIA
 
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...Scott Levine
 
The Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer InterviewsThe Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer InterviewsGood Funnel
 
ELSA France "Teaching is us!"
ELSA France "Teaching is us!" ELSA France "Teaching is us!"
ELSA France "Teaching is us!" Adrian Scarlett
 

Viewers also liked (20)

Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
 
CSW2017 jun li_car anomaly detection
CSW2017  jun li_car anomaly detectionCSW2017  jun li_car anomaly detection
CSW2017 jun li_car anomaly detection
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
 
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItAMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
 
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017
 
Quelles changements de vision dans la cyber sécurité en 2017 ? - ADN OUEST, s...
Quelles changements de vision dans la cyber sécurité en 2017 ? - ADN OUEST, s...Quelles changements de vision dans la cyber sécurité en 2017 ? - ADN OUEST, s...
Quelles changements de vision dans la cyber sécurité en 2017 ? - ADN OUEST, s...
 
Four Steps to Sure-Fire Live Streaming Success
Four Steps to Sure-Fire Live Streaming SuccessFour Steps to Sure-Fire Live Streaming Success
Four Steps to Sure-Fire Live Streaming Success
 
La blockchain et son impact sur le secteur public
La blockchain et son impact sur le secteur publicLa blockchain et son impact sur le secteur public
La blockchain et son impact sur le secteur public
 
Invoke-Obfuscation nullcon 2017
Invoke-Obfuscation nullcon 2017Invoke-Obfuscation nullcon 2017
Invoke-Obfuscation nullcon 2017
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon Intro
 
タイ文字と若干情報科学[修正版]
タイ文字と若干情報科学[修正版]タイ文字と若干情報科学[修正版]
タイ文字と若干情報科学[修正版]
 
Les métiers du webmarketing - Conférence IDRAC Sup de com - 23 mars 2017
Les métiers du webmarketing - Conférence IDRAC Sup de com - 23 mars 2017Les métiers du webmarketing - Conférence IDRAC Sup de com - 23 mars 2017
Les métiers du webmarketing - Conférence IDRAC Sup de com - 23 mars 2017
 
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
 
Introducton to Convolutional Nerural Network with TensorFlow
Introducton to Convolutional Nerural Network with TensorFlowIntroducton to Convolutional Nerural Network with TensorFlow
Introducton to Convolutional Nerural Network with TensorFlow
 
Portrait of a lady
Portrait of a ladyPortrait of a lady
Portrait of a lady
 
HPC Top 5 Stories: March 22, 2017
HPC Top 5 Stories: March 22, 2017HPC Top 5 Stories: March 22, 2017
HPC Top 5 Stories: March 22, 2017
 
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
 
The Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer InterviewsThe Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer Interviews
 
ELSA France "Teaching is us!"
ELSA France "Teaching is us!" ELSA France "Teaching is us!"
ELSA France "Teaching is us!"
 

Similar to Windows 10 Endpoint Security Improvements and Living Off the Land with WMImplant

[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹GangSeok Lee
 
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
DEF CON 27 - workshop - RICHARD GOLD - mind the gapDEF CON 27 - workshop - RICHARD GOLD - mind the gap
DEF CON 27 - workshop - RICHARD GOLD - mind the gapFelipe Prado
 
Oh the compilers you'll build
Oh the compilers you'll buildOh the compilers you'll build
Oh the compilers you'll buildMark Stoodley
 
Fandogh Cloud workshop slides
Fandogh Cloud workshop slides Fandogh Cloud workshop slides
Fandogh Cloud workshop slides ssarabadani
 
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPFA Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPFoholiab
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon
 
Top 5 Encryption Myths for IBM i Users
Top 5 Encryption Myths for IBM i UsersTop 5 Encryption Myths for IBM i Users
Top 5 Encryption Myths for IBM i UsersPrecisely
 
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...PROIDEA
 
COM Hijacking Techniques - Derbycon 2019
COM Hijacking Techniques - Derbycon 2019COM Hijacking Techniques - Derbycon 2019
COM Hijacking Techniques - Derbycon 2019David Tulis
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Velocidex Enterprises
 
BOX of Illusion MOSEC'17
BOX of Illusion MOSEC'17BOX of Illusion MOSEC'17
BOX of Illusion MOSEC'17Python0x0
 
Software Define your Current Storage with Opensource
Software Define your Current Storage with OpensourceSoftware Define your Current Storage with Opensource
Software Define your Current Storage with OpensourceAntonio Romeo
 
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012DefCamp
 
Common technique in Bypassing Stuff in Python.
Common technique in Bypassing Stuff in Python.Common technique in Bypassing Stuff in Python.
Common technique in Bypassing Stuff in Python.Shahriman .
 
ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014Đồng Quốc Vương
 
HKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP WorkshopHKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP WorkshopLinaro
 
DEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning securityDEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning securityFelipe Prado
 
Accelerated .NET Memory Dump Analysis training public slides
Accelerated .NET Memory Dump Analysis training public slidesAccelerated .NET Memory Dump Analysis training public slides
Accelerated .NET Memory Dump Analysis training public slidesDmitry Vostokov
 

Similar to Windows 10 Endpoint Security Improvements and Living Off the Land with WMImplant (20)

[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
 
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
DEF CON 27 - workshop - RICHARD GOLD - mind the gapDEF CON 27 - workshop - RICHARD GOLD - mind the gap
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
 
Oh the compilers you'll build
Oh the compilers you'll buildOh the compilers you'll build
Oh the compilers you'll build
 
Fandogh Cloud workshop slides
Fandogh Cloud workshop slides Fandogh Cloud workshop slides
Fandogh Cloud workshop slides
 
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPFA Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
 
Top 5 Encryption Myths for IBM i Users
Top 5 Encryption Myths for IBM i UsersTop 5 Encryption Myths for IBM i Users
Top 5 Encryption Myths for IBM i Users
 
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
 
COM Hijacking Techniques - Derbycon 2019
COM Hijacking Techniques - Derbycon 2019COM Hijacking Techniques - Derbycon 2019
COM Hijacking Techniques - Derbycon 2019
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3
 
BOX of Illusion MOSEC'17
BOX of Illusion MOSEC'17BOX of Illusion MOSEC'17
BOX of Illusion MOSEC'17
 
Software Define your Current Storage with Opensource
Software Define your Current Storage with OpensourceSoftware Define your Current Storage with Opensource
Software Define your Current Storage with Opensource
 
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
 
Common technique in Bypassing Stuff in Python.
Common technique in Bypassing Stuff in Python.Common technique in Bypassing Stuff in Python.
Common technique in Bypassing Stuff in Python.
 
12 tricks to avoid hackers breaks your CI / CD
12 tricks to avoid hackers breaks your  CI / CD12 tricks to avoid hackers breaks your  CI / CD
12 tricks to avoid hackers breaks your CI / CD
 
ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014
 
HKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP WorkshopHKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP Workshop
 
DEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning securityDEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning security
 
Sonatype DevSecOps Leadership forum 2020
Sonatype DevSecOps Leadership forum 2020Sonatype DevSecOps Leadership forum 2020
Sonatype DevSecOps Leadership forum 2020
 
Accelerated .NET Memory Dump Analysis training public slides
Accelerated .NET Memory Dump Analysis training public slidesAccelerated .NET Memory Dump Analysis training public slides
Accelerated .NET Memory Dump Analysis training public slides
 

Recently uploaded

PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 

Recently uploaded (20)

PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 

Windows 10 Endpoint Security Improvements and Living Off the Land with WMImplant

  • 1. Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000 By: @ChrisTruncer and @Evan_Pena2003
  • 2. @ChrisTruncer Sys Admin turned Red Teamer Open Source Developer Trooper 2
  • 3. @Evan_Pena2003 Open Source Developer Red Team Lead for West Coast Former sysadmin 3
  • 4. What’s this talk about? ◈ Device guard! ◈ Code integrity policies ◈ PowerShell Constrained Language mode ◈ Introduction of a way to live off the land ◈ Data Encoding ◈ C2 Data Storage ◈ Commands 4
  • 6. Device Guard ◈ Defensive technology built into Windows 10 and Server 2016 ◈ A change from antivirus technologies where apps are “trusted” unless flagged as malicious ◈ You now explicitly state which applications are trusted 6
  • 7. Device Guard ◈ New application whitelisting bypass published? ◆Don’t trust that application anymore! ◈ Matt Graeber is curating a baseline code integrity policy blocking offending applications 7 https://github.com/mattifestation/DeviceGuardBypassMitigationRules
  • 8. Code Integrity Policies ◈ You define trusted applications by creating Code Integrity policies ◈ Upon creating code integrity policies, they can be deployed via: ◆GPO ◆SCCM 8
  • 9. Code Integrity Policies ◈ Code integrity policies are largely based on digital signatures ◈ For unsigned applications, you can deploy catalog files which can be tied into code integrity policies 9
  • 10. Code Integrity Policies ◈ Catalog files will need to be updated every time an application is updated ◆If using digital signatures, this won’t be a problem ◈ Code integrity policies typically are XML files converted into a binary 10
  • 11. Code Integrity Policies ◈ Your code integrity policies themselves should also be signed ◆This can help prevent modification by users/attackers with administrative rights 11
  • 12. Creating Code Integrity Policies ◈ The easiest way to create code integrity policies is through PowerShell ◈ Carlos Perez and Matt Graeber have created walkthroughs for creating a code integrity policy 12 https://gist.github.com/darkoperator/7d5b85354c0343c7554e http://www.exploit-monday.com/2016/09/introduction-to-windows-device-guard.html
  • 13. Creating Code Integrity Policies ◈ Largely, you will use the New-CIPolicy cmdlet and specify the file rule levels for defining trusted applications ◆File hash ◆File name ◆Publisher ◆FilePublisher 13
  • 14. 14
  • 15. Creating Code Integrity Policies ◈ Convert XML code integrity policy to a binary file ◆ConvertFrom-CIPolicy ◈ Deploy in audit mode ◆Non-blocking ◆Generates events 15
  • 16. Creating Code Integrity Policies ◈ After having deployed in audit mode ◆ Review event logs ◆ Make any rule modifications as needed ◆ Deploy in enforcement mode 16
  • 17. PowerShell Constrained Language Mode ◈ Device Guard auto-configures PowerShell to run in Constrained Language mode ◆Pure PowerShell elements are allowed, but the types are limited ◆.Net methods are only allowed on the permitted types 17
  • 18. 18
  • 19. Attacker’s Perspective ◈ How can we operate on a Device Guard protected system? ◆Develop a bypass ◇This will be effective at first, but could potentially be blocked via CI Policy. ◇This takes R&D 19
  • 20. Attacker’s Perspective ◈ How about living off the land? ◆We know the applications most likely to be whitelisted ◇PowerShell, WMI, etc. ◆Can they be chained together to attack systems in a useful manner? 20
  • 22. WMImplant ◈ Developed in PowerShell ◈ Designed to exclusively operate with WMI ◆The mechanism to trigger actions ◆The C2 channel itself ◆Data storage :) ◈ Menu and commands are reminiscent of Meterpreter - except all WMI based 22
  • 23. First, Thanks ◈ Thanks to the incredibly smart Matt Graeber, Willi Ballenthin, and Claudiu Teodorescu ◈ Their research is what spurred my interest in WMI ◈ Without their research, I may have never developed this capability 23https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf
  • 24. What’s WMI? ◈ WMI == Windows Management Instrumentation ◈ Installed and enabled by default in Windows since Windows 2000 ◈ Enables administrators to query local and remote systems for management purposes 24
  • 25. WMImplant and Device Guard ◈ WMImplant was developed exclusively against Device Guard protected systems ◆Remember ConstrainedLanguage Mode? - We’re great friends with it :) 25
  • 26. WMImplant and Device Guard ◈ Data storage and encoding were problems in the initial development stages. ◆We want to be able to upload or download files, run commands, etc. ◆What if all data that we might need to manipulate isn’t just text? 26
  • 27. WMImplant and Device Guard ◈ We discovered that encoding and data storage were problems we were going to need to solve to write an effective post- exploitation tool 27
  • 29. WMImplant and Encoding ◈ The first method of encoding data? Base64! ◆[Convert]::ToBase64String() ◈ Only one problem... 29
  • 30. 30
  • 31. Encoding - Back to the Drawing Board ◈ Base64 is out ◆We haven’t seen a pure PowerShell based Base64 encoding/decoding function ◈ WMImplant can be encoder agnostic, anything that works can be used. ◆So… let’s turn to Daniel Bohannon 31
  • 32. WMImplant and Encoding - [Int[]][Char[]] ◈ $encode = [Int[]][char[]]$input -Join ',' ◆Breaks input into an array of char, then converts each char into an int ◆It works with binary and text files - in constrained mode ◈ $decoded = [char[]][int[]]$encode.Split(',') - Join '' 32
  • 33. 33
  • 34. WMImplant Encoding and Storage ◈ Awesome! ◈ We can now encode and decode data in a Constrained Language compliant manner. ◈ Next Question: where should it be stored? 34
  • 35. WMImplant and Data Storage ◈ The initial version of WMImplant used the system registry to store data ◈ We can easily create and modify registry values remotely ◆This can be done over WMI with the StdRegProv 35
  • 36. WMImplant and Data Storage ◈ Registry Pro: ◆Not limited to a very small size limitations ◈ Registry Con: ◆Lots of parsers for analyzing a system’s registry 36
  • 37. WMImplant and Data Storage ◈ This led to a conversation with Matt Dunwoody discussing APT 29 tactics ◆They were creating custom WMI classes, adding properties, and storing data in WMI properties. ◈ Let’s try to recreate this! 37
  • 38. WMImplant and Data Storage - New WMI Class ◈ Lucky for us, Matt Graeber already published code that does this! 38https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management- instrumentation.pdf
  • 39. WMImplant and Data Storage - New WMI Class ◈ But… there’s a problem... 39
  • 40. 40
  • 41. WMImplant and Data Storage - WMI Property Fail ◈ WMI class creation is allowed within Constrained Language Mode ◈ WMI property creation is not… ◈ It looks like this idea won’t work ◈ Unless... 41
  • 42. WMImplant and Data Storage - Existing Classes! ◈ What about if we look at existing WMI classes? ◆ Are their properties writable? ◆ Can they accept a “string” type or any length? ◆ Can the property be modified in Constrained Language Mode? ◆ Won’t blue screen the box? 42
  • 43. WMImplant and Data Storage - Existing Classes! ◈ Modified an existing script to: ◆Enumerate all WMI classes ◆Enumerate all properties within each class ◆Find properties of type “string” that are writable 43https://gist.github.com/ChrisTruncer/f3fe3f04b9fdd1310507363f8bdad8be
  • 44. WMImplant and Data Storage - Existing Classes! ◈ This returned a somewhat limited number of properties ◆Some only allowed a fixed (small) length of data ◆Others would error when modifying the property value. 44
  • 45. WMImplant and Data Storage - Then, there was one ◈ However, this did identify a class that we’ve not seen before ◆Win32_OSRecoveryConfiguration ◈ This class is used to specify the type of information that is collected when the system crashes. 45
  • 46. 46
  • 47. WMImplant and Data Storage - Then, there was one ◈ It does have a single property which is writable, and is a string ◆DebugFilePath - The location where Windows places a memory dump following an operating system crash. 47
  • 48. 48
  • 49. WMImplant and Data Storage - DebugFilePath ◈ It looks as if it should only accept a file path location ◈ It looks as if it would be limited in the length of data it accepts ◈ That’s what it looks like... 49
  • 50. 50
  • 51. WMImplant and Data Storage - DebugFilePath ◈ Awesome! ◈ Demonstrates we can write arbitrary strings to the DebugFilePath property ◈ Our encoder can work with this! ◈ What about length..? 51
  • 52. 52
  • 53. WMImplant and Data Storage - DebugFilePath ◈ This gives us everything we need! ◆Writeable string property ◆Writeable in Constrained Mode ◆Not fixed in length (256+ MB) ◆Doesn’t blue screen the box :) 53
  • 54. WMImplant and Data Storage - C2 Comms 1.Query the remote machine’s DebugFilePath property to receive its original value 2.Use WMI to execute a command (ipconfig) on the targeted machine 3.Encode the results of the command and store it in the DebugFilePath property 54
  • 55. WMImplant and Data Storage - C2 Comms 4. Query the remote system (from attacking machine) to receive DebugFilePath value 5. Decode the value and display the results 6. Set the DebugFilePath property back to its original value. 55
  • 56. WMImplant - C2 Comms ◈ Most of WMImplant’s commands will not require data storage ◆In this case, results are retrieved with likely a single WMI query ◈ If storage is required, the previous C2 communications methodology is followed 56
  • 58. WMImplant - Commands ◈ Broken up by what they do: ◆Meta Functions ◆File Operations ◆Lateral Movement ◆Process Manipulation ◆System Manipulation ◆Log Analysis 58
  • 59. WMImplant - Meta Functions ◈ help ◈ exit ◈ change_user - change current user context for all commands ◈ gen_cli - generate command line command to run non-interactively 59
  • 61. WMImplant - File Operations ◈ cat - read file contents ◈ download - downloads file from target ◈ ls - directory and file listing ◈ ninjacopy - copy any file ◈ search - search for file or extension ◈ upload - upload file to target 61
  • 64. WMImplant - Uploads and Downloads ◈ These are the only commands that still use the registry for data storage ◆This is due to not knowing the size of potential uploads or downloads ◆Also due to unknown size limits of the WMI property (tested up to 256 MB) 64
  • 65. WMImplant - Uploads 1.Read and encode file that will be uploaded 2.Store in remote system’s registry 3.Start PowerShell on remote system via WMI 4.Read and decode registry value 5.Write decoded results to user-specified file location 65
  • 66. WMImplant - Lateral Movement Facilitation ◈ command_exec - Run command and receive output ◈ enable_wdigest - Set UseLogonPassword key ◈ enable_winrm - enables WinRM ◈ remote_posh - Runs PowerShell script on target and receives output 66
  • 68. 68
  • 70. Actively Monitor WMI 1. Use WMI Query Language (WQL) to identify ◆ Recently created “_EventConsumer” events (persistence) ◆ WMI-based process executions 2. Creates an Event Filter (condition) to perform an action if any of the above WQL conditions are true 70
  • 71. Actively Monitor WMI 3. Creates an Event Consumer (action), to log details of the newly created “__EventConsumer” or executed process a. Set it to log all data to the event log with specific event ID and event name b. Very high fidelity! c. Feed these logs to a SIEM - SNARE or universal forwarder. Then ALERT! 71
  • 72. Automating the Process - WMIMonitor ◈ Mandiant WMIMonitor PowerShell Script found here: https://github.com/realparisi/WMI_Monitor ◈ Detailed blog post here: https://www.fireeye.com/blog/threat- research/2016/08/wmi_vs_wmi_monitor.html 72
  • 74. The Result (Command Execution 74
  • 75. Scale Detection with More Signatures ◈ UpRoot IDS ◆https://github.com/Invoke-IR/Uproot ◈ Includes ~14 signatures instead of 2 ◈ Centralized logging so if you have a smaller budget...1 agent instead of 1000+ agents. 75
  • 76. WMImplant - Future Work ◈ Implement whitelisting bypasses ◈ Examine the changing defensive landscape and identify means to repurpose existing tools 76
  • 77. WMImplant - Where to get it ◈ WMImplant - https://github.com/ChrisTruncer/WMImplant ◈ Questions? ◆@ChrisTruncer ◆@Evan_Pena2003 77