SlideShare a Scribd company logo
1 of 30
Download to read offline
Hacking from the Inside
IP Expo Manchester 2019
What are we going to cover?
▪ Two common internal network attacks.
▪ Prerequisites are enabled by default.
▪ Performed from an unauthenticated internal perspective.
▪ Allows an attacker to quickly gain a foothold.
What is LLMNR / NetBIOS-NS?
Link Local Multicast Name Resolution
NetBIOS-Name Service
Both are used to resolve the IP Addresses of neighbouring computers.
LLMNR / NetBIOS-NS
Host A wants to communicate with Host C
Host A Host C
LLMNR / NetBIOS-NS
For this to happen Host A needs to know
Host C’s IP Address
Host A Host C
LLMNR / NetBIOS-NS
First its local host file and then its local
DNS Cache will be checked.
LLMNR / NetBIOS-NS
If this fails, It will then ask the DNS Server.
LLMNR / NetBIOS-NS
If this fails, the machine will instead
attempt to use LLMNR.
LLMNR / NetBIOS-NS
Which will send a multicast request out to the network.
Are you the host I’m looking for?
LLMNR Spoofing
▪ This process is unauthenticated and broadcasted to the whole
network.
▪ Therefore, any machine on the network can respond and claim to
be the target machine.
LLMNR Spoofing
▪ A classic that still works today, due to low awareness.
▪ Enabled by default in Windows.
▪ Vulnerability assessment tools flag it as Informational
LLMNR Spoofing
The attacker will simply respond to these requests, pretending
(spoof) to be the requested machine!
I’m the host you are looking for.
LLMNR Spoofing
The victim machine will then send their password hash (Net-NTLMv2)
Here is my password hash!
64f12cddaa88057e06a81b54e73b949b
A quick word on hashes
▪ When you choose a password, it isn’t stored in the same way you
type it, it’s stored as a “hash”.
▪ This is a one-way function – you can get the output from the
input but you can’t get the input from the output.
▪ However, we can attempt hashing potential passwords and
seeing if one then matches.
Password Cracking
▪ Attempts can be in the tens of millions per second!
▪ There are even online services that have already hashed
common passwords for you.
Passwords Cracking
Password1
8846f7eaee8fb117ad06bdd830b7586c password
64f12cddaa88057e06a81b54e73b949b Password1
7a21990fcd3d759941e45c490f143d5f 12345
a174546f10272f8948a85839c2af2123 Password88
07fed1cc574723d76b5218d8810a9d35 February19
e19ccf75ee54e06b06a5907af13cef42 P@ssw0rd
c4b0e1b10c7ce2c4723b4e2407ef81a2 Password3
3edc4ede6a1f61126580ae6770a6d0de Qwerty321
MATCH
64f12cddaa88057e06a81b54e73b949b
64f12cddaa88057e06a81b54e73b949b
Demo
LLMNR/NBT-NS Summary
▪ Enabled by default in Windows.
▪ Cracking obtained hashes is dependent on the complexity of the passwords.
▪ Typically we leave this running in the background while we’re working other
attack vectors.
▪ It’s unlikely to fail, but if it does then we’re not out of options…
Service Message Block (SMB) Signing
▪ SMB is a protocol used for accessing shared resources; folders
and printers.
▪ SMB Signing is a feature designed to confirm the authenticity of
SMB packets and to prevent tampering and “man in the middle
(MiTM) attacks”
▪ Signing is disabled by default and only enabled on domain
controllers.
SMB Relaying
▪ Exploits this weakness by modifying and relaying SMB packets between
a client and server in order to establish an authenticated connection.
▪ Not a new issue; it was first documented in 2001.
▪ Is still relevant today; even on a fully patched Windows network.
SMB - NTLM Challenge/Response
Can I have Access?
Encrypt this with your Password Hash
Here you go
Access Granted
SMB Relay Attack Overview
Can I have access?
Encryptthis (X) with your PW
hash
Here is the encrypted
challenge
ACCESS GRANTED!
Can I have access?
Encryptthis (X) with your PW
hash
Here is the encrypted
challenge
ACCESS DENIED!
Executethis command!
Demo
LLMNR/NBT-NS Mitigations
▪ Disable LLMNR and NBT-NS
▪ Implement network segregation (i.e. VLANs)
▪ Use limited user accounts (Principle of least privilege)
▪ Check your organisation’s password policy (mininum length,
complexity, etc)
SMB Relay Mitigations
▪ Enable SMB signing on all devices where possible.
▪ Please note this can have a performance impact.
Next Steps
Infrastructure Testing
The principal aim of infrastructure testing is to highlight where vulnerabilities exist in
computer systems that could provide unauthorised access or serve as an entry point
into private areas of the network and to sensitive data.
Infrastructure testing applies in manyareas including internal, perimeter, and cloud. It also applies
to many technology areas from PCs and laptops to smart phones and Wi-Fi networking. From a
hacker’s perspective each area represents anopportunity to attack, opportunities that canbe
minimised by reviewing your security in the same way you would your buildings or physical assets.
Infrastructure testing canbe deployed as astand-alone exercise to provide
acomprehensive view of the vulnerabilities andassociated exploits or canbe used
as an element in awider simulated attack including web application, social engineering andphysical
access assessments.
Contactus on 01924 284240, or info@sec-1.com,
for a free scoping exercise and quote.
WebApplication Testing
Available to hackers 24x7 and brim-full of data, web applications present
a tempting target for hackers. Our penetration testing relies on the manual
exploitation of vulnerabilities so you get the assessment of business risk
that only an expert tester can provide. Wecombine this with the use of the
best automated tools. All assessments are followed by a comprehensive
report, with both non-technical and technical descriptions, alongside
recommendations for remediation.
Weprovide visibility of risks including:
• Unauthorised access past authentication controls to escalate privileges
• Introduction of malicious code
• Manipulation of the application’s function
• Defacing of the website or causing disruption
• Gaining access to the hosting infrastructure
Contactus on 01924 284240, or info@sec-1.com, for a
free scopingexercise and quote.
Next Steps
Social Engineering
Assessments
Social Engineering is becoming one of the most effective means of gaining access to
secure systems and sensitive information. What is more, the attacker requires little to
no technical knowledge. Preventing an attack of this nature requires a very different set
of defences to traditional cyber security defences.
Raising employee awareness
Your best defensive strategy against social engineering is to raise employee awareness and to
educate on good practices. A social engineering assessment from Claranet Cyber Security allows
you to see how susceptible your staff might bewhen presented with anattempt byan attacker to
trick them. The results of social engineering assessments can be used to direct training, create data
handling guidelines and security policies.
Typical social engineering engagements include:
• Phishing & spear phishing campaigns - tricking users via email
• Physical entry - gaining unauthorised access to buildings
• Baiting - tempting users into plugging in USB drives...
• Staff impersonation - in order to obtain information or access remotely
Contactus on 01924 284240, or
info@sec-1.com,for a free scoping
exerciseand quote.
Next Steps
Claranet CyberSecuritycontinually invests in hiring the mostexperienced, highlytrained teams
in the industry.Acorepartof deliveringthe bestserviceis ourcommitmentto being fully
accredited across allthe majorstandardsinITsecurity. These include:
Our accreditations
For more information
aboutour all our Cyber
SecurityServices please call:
01924 284 240
Or email: info@sec-1.com

More Related Content

What's hot

AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitShah Sheikh
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthIceQUICK
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Breaking and entering how and why dhs conducts penetration tests
Breaking and entering  how and why dhs conducts penetration testsBreaking and entering  how and why dhs conducts penetration tests
Breaking and entering how and why dhs conducts penetration testsPriyanka Aash
 
Penetration Testing
Penetration TestingPenetration Testing
Penetration TestingMayank Singh
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Positive Hack Days
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
 
Intruders
IntrudersIntruders
Intruderstechn
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Edureka!
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Storage Switzerland
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisPriyanka Aash
 
(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chainPriyanka Aash
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPSData#3 Limited
 

What's hot (20)

AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Android Firewall project
Android Firewall projectAndroid Firewall project
Android Firewall project
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Breaking and entering how and why dhs conducts penetration tests
Breaking and entering  how and why dhs conducts penetration testsBreaking and entering  how and why dhs conducts penetration tests
Breaking and entering how and why dhs conducts penetration tests
 
Penetration Testing
Penetration TestingPenetration Testing
Penetration Testing
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
Intruders
IntrudersIntruders
Intruders
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
 
Windows network
Windows networkWindows network
Windows network
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
 
(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 

Similar to Hacking from the Inside

Part 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxdanhaley45372
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeLancope, Inc.
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewRobert Herjavec
 
Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing ServicesCyber 51 LLC
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonksRohit Kapoor
 
LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini PresentationRohit Kapoor
 
Login cat tekmonks - v5 (mini)
Login cat   tekmonks - v5 (mini)Login cat   tekmonks - v5 (mini)
Login cat tekmonks - v5 (mini)Rohit Kapoor
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
Cybersecurity for Small Business - Incident Response.pptx
Cybersecurity for Small Business - Incident Response.pptxCybersecurity for Small Business - Incident Response.pptx
Cybersecurity for Small Business - Incident Response.pptxArt Ocain
 
Login cat tekmonks - v3
Login cat   tekmonks - v3Login cat   tekmonks - v3
Login cat tekmonks - v3TEKMONKS
 
How i'm going to own your organization v2
How i'm going to own your organization v2How i'm going to own your organization v2
How i'm going to own your organization v2RazorEQX
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4TEKMONKS
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4Rohit Kapoor
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
NetworkWorld-SafeBreach
NetworkWorld-SafeBreachNetworkWorld-SafeBreach
NetworkWorld-SafeBreachDan Kunkel
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZeditsRod Soto
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 

Similar to Hacking from the Inside (20)

Part 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docx
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing Services
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini Presentation
 
Login cat tekmonks - v5 (mini)
Login cat   tekmonks - v5 (mini)Login cat   tekmonks - v5 (mini)
Login cat tekmonks - v5 (mini)
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Cybersecurity for Small Business - Incident Response.pptx
Cybersecurity for Small Business - Incident Response.pptxCybersecurity for Small Business - Incident Response.pptx
Cybersecurity for Small Business - Incident Response.pptx
 
Login cat tekmonks - v3
Login cat   tekmonks - v3Login cat   tekmonks - v3
Login cat tekmonks - v3
 
How i'm going to own your organization v2
How i'm going to own your organization v2How i'm going to own your organization v2
How i'm going to own your organization v2
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
NetworkWorld-SafeBreach
NetworkWorld-SafeBreachNetworkWorld-SafeBreach
NetworkWorld-SafeBreach
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 

More from Claranet UK

How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Gaining A Foothold
Gaining A FootholdGaining A Foothold
Gaining A FootholdClaranet UK
 
A world of difference
A world of differenceA world of difference
A world of differenceClaranet UK
 
Moving on up: how agile telephony makes for a better business
Moving on up: how agile telephony makes for a better businessMoving on up: how agile telephony makes for a better business
Moving on up: how agile telephony makes for a better businessClaranet UK
 
Making The Connection
Making The ConnectionMaking The Connection
Making The ConnectionClaranet UK
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
Cybersecurity Toolkit
Cybersecurity ToolkitCybersecurity Toolkit
Cybersecurity ToolkitClaranet UK
 

More from Claranet UK (7)

How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Gaining A Foothold
Gaining A FootholdGaining A Foothold
Gaining A Foothold
 
A world of difference
A world of differenceA world of difference
A world of difference
 
Moving on up: how agile telephony makes for a better business
Moving on up: how agile telephony makes for a better businessMoving on up: how agile telephony makes for a better business
Moving on up: how agile telephony makes for a better business
 
Making The Connection
Making The ConnectionMaking The Connection
Making The Connection
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
Cybersecurity Toolkit
Cybersecurity ToolkitCybersecurity Toolkit
Cybersecurity Toolkit
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Hacking from the Inside

  • 1. Hacking from the Inside IP Expo Manchester 2019
  • 2. What are we going to cover? ▪ Two common internal network attacks. ▪ Prerequisites are enabled by default. ▪ Performed from an unauthenticated internal perspective. ▪ Allows an attacker to quickly gain a foothold.
  • 3. What is LLMNR / NetBIOS-NS? Link Local Multicast Name Resolution NetBIOS-Name Service Both are used to resolve the IP Addresses of neighbouring computers.
  • 4. LLMNR / NetBIOS-NS Host A wants to communicate with Host C Host A Host C
  • 5. LLMNR / NetBIOS-NS For this to happen Host A needs to know Host C’s IP Address Host A Host C
  • 6. LLMNR / NetBIOS-NS First its local host file and then its local DNS Cache will be checked.
  • 7. LLMNR / NetBIOS-NS If this fails, It will then ask the DNS Server.
  • 8. LLMNR / NetBIOS-NS If this fails, the machine will instead attempt to use LLMNR.
  • 9. LLMNR / NetBIOS-NS Which will send a multicast request out to the network. Are you the host I’m looking for?
  • 10. LLMNR Spoofing ▪ This process is unauthenticated and broadcasted to the whole network. ▪ Therefore, any machine on the network can respond and claim to be the target machine.
  • 11. LLMNR Spoofing ▪ A classic that still works today, due to low awareness. ▪ Enabled by default in Windows. ▪ Vulnerability assessment tools flag it as Informational
  • 12. LLMNR Spoofing The attacker will simply respond to these requests, pretending (spoof) to be the requested machine! I’m the host you are looking for.
  • 13. LLMNR Spoofing The victim machine will then send their password hash (Net-NTLMv2) Here is my password hash! 64f12cddaa88057e06a81b54e73b949b
  • 14. A quick word on hashes ▪ When you choose a password, it isn’t stored in the same way you type it, it’s stored as a “hash”. ▪ This is a one-way function – you can get the output from the input but you can’t get the input from the output. ▪ However, we can attempt hashing potential passwords and seeing if one then matches.
  • 15. Password Cracking ▪ Attempts can be in the tens of millions per second! ▪ There are even online services that have already hashed common passwords for you.
  • 16. Passwords Cracking Password1 8846f7eaee8fb117ad06bdd830b7586c password 64f12cddaa88057e06a81b54e73b949b Password1 7a21990fcd3d759941e45c490f143d5f 12345 a174546f10272f8948a85839c2af2123 Password88 07fed1cc574723d76b5218d8810a9d35 February19 e19ccf75ee54e06b06a5907af13cef42 P@ssw0rd c4b0e1b10c7ce2c4723b4e2407ef81a2 Password3 3edc4ede6a1f61126580ae6770a6d0de Qwerty321 MATCH 64f12cddaa88057e06a81b54e73b949b 64f12cddaa88057e06a81b54e73b949b
  • 17. Demo
  • 18. LLMNR/NBT-NS Summary ▪ Enabled by default in Windows. ▪ Cracking obtained hashes is dependent on the complexity of the passwords. ▪ Typically we leave this running in the background while we’re working other attack vectors. ▪ It’s unlikely to fail, but if it does then we’re not out of options…
  • 19. Service Message Block (SMB) Signing ▪ SMB is a protocol used for accessing shared resources; folders and printers. ▪ SMB Signing is a feature designed to confirm the authenticity of SMB packets and to prevent tampering and “man in the middle (MiTM) attacks” ▪ Signing is disabled by default and only enabled on domain controllers.
  • 20. SMB Relaying ▪ Exploits this weakness by modifying and relaying SMB packets between a client and server in order to establish an authenticated connection. ▪ Not a new issue; it was first documented in 2001. ▪ Is still relevant today; even on a fully patched Windows network.
  • 21. SMB - NTLM Challenge/Response Can I have Access? Encrypt this with your Password Hash Here you go Access Granted
  • 22. SMB Relay Attack Overview Can I have access? Encryptthis (X) with your PW hash Here is the encrypted challenge ACCESS GRANTED! Can I have access? Encryptthis (X) with your PW hash Here is the encrypted challenge ACCESS DENIED! Executethis command!
  • 23. Demo
  • 24. LLMNR/NBT-NS Mitigations ▪ Disable LLMNR and NBT-NS ▪ Implement network segregation (i.e. VLANs) ▪ Use limited user accounts (Principle of least privilege) ▪ Check your organisation’s password policy (mininum length, complexity, etc)
  • 25. SMB Relay Mitigations ▪ Enable SMB signing on all devices where possible. ▪ Please note this can have a performance impact.
  • 26. Next Steps Infrastructure Testing The principal aim of infrastructure testing is to highlight where vulnerabilities exist in computer systems that could provide unauthorised access or serve as an entry point into private areas of the network and to sensitive data. Infrastructure testing applies in manyareas including internal, perimeter, and cloud. It also applies to many technology areas from PCs and laptops to smart phones and Wi-Fi networking. From a hacker’s perspective each area represents anopportunity to attack, opportunities that canbe minimised by reviewing your security in the same way you would your buildings or physical assets. Infrastructure testing canbe deployed as astand-alone exercise to provide acomprehensive view of the vulnerabilities andassociated exploits or canbe used as an element in awider simulated attack including web application, social engineering andphysical access assessments. Contactus on 01924 284240, or info@sec-1.com, for a free scoping exercise and quote.
  • 27. WebApplication Testing Available to hackers 24x7 and brim-full of data, web applications present a tempting target for hackers. Our penetration testing relies on the manual exploitation of vulnerabilities so you get the assessment of business risk that only an expert tester can provide. Wecombine this with the use of the best automated tools. All assessments are followed by a comprehensive report, with both non-technical and technical descriptions, alongside recommendations for remediation. Weprovide visibility of risks including: • Unauthorised access past authentication controls to escalate privileges • Introduction of malicious code • Manipulation of the application’s function • Defacing of the website or causing disruption • Gaining access to the hosting infrastructure Contactus on 01924 284240, or info@sec-1.com, for a free scopingexercise and quote. Next Steps
  • 28. Social Engineering Assessments Social Engineering is becoming one of the most effective means of gaining access to secure systems and sensitive information. What is more, the attacker requires little to no technical knowledge. Preventing an attack of this nature requires a very different set of defences to traditional cyber security defences. Raising employee awareness Your best defensive strategy against social engineering is to raise employee awareness and to educate on good practices. A social engineering assessment from Claranet Cyber Security allows you to see how susceptible your staff might bewhen presented with anattempt byan attacker to trick them. The results of social engineering assessments can be used to direct training, create data handling guidelines and security policies. Typical social engineering engagements include: • Phishing & spear phishing campaigns - tricking users via email • Physical entry - gaining unauthorised access to buildings • Baiting - tempting users into plugging in USB drives... • Staff impersonation - in order to obtain information or access remotely Contactus on 01924 284240, or info@sec-1.com,for a free scoping exerciseand quote. Next Steps
  • 29. Claranet CyberSecuritycontinually invests in hiring the mostexperienced, highlytrained teams in the industry.Acorepartof deliveringthe bestserviceis ourcommitmentto being fully accredited across allthe majorstandardsinITsecurity. These include: Our accreditations
  • 30. For more information aboutour all our Cyber SecurityServices please call: 01924 284 240 Or email: info@sec-1.com