Soldatov, gotz how to catch your “hacker” or makeshift security

HOW TO CATCH YOUR “HACKER”
            OR
    MAKESHIFT SECURITY

         Sergey Soldatov
            Igor Gots
AGENDA
• Water
• Fishing
• Fishbite
• Hookset




ZERONIGHTS 2012 GOTS/SOLDATOV   2
W?




ZERONIGHTS 2012 GOTS/SOLDATOV   3
W?




ZERONIGHTS 2012 GOTS/SOLDATOV   4
INFOSECURITY DEPT. HAS TO

• Write corporate regulations
• Make assessments (compliance &/| pentest)
• Monitor logs!




ZERONIGHTS 2012 GOTS/SOLDATOV                 5
INFOSECURITY DEPT. HAS TO

• Write corporate regulations
• Make assessments (compliance &/| pentest)

• Monitor logs!




ZERONIGHTS 2012 GOTS/SOLDATOV                 6
ATTACK STAGES

• Information gathering
• Passive learning
• Active learning
• Obtaining access
• Maintaining access
• Erasing evidence


ZERONIGHTS 2012 GOTS/SOLDATOV   7
FISHING
• Firewall/UTM/… :-)
• IDS/IPS
      • Commercial
      • Opensource/free
• Log analysis
      • Commercial
      • Opensource/free


ZERONIGHTS 2012 GOTS/SOLDATOV   8
WHAT’S HAPPENING WHEN ONE’S BREAKING

• Use or modification of privileged accounts
• Configuration modification
• Unusual activity
• New services or applications




ZERONIGHTS 2012 GOTS/SOLDATOV                  9
TOOL DEPLOYMENT




ZERONIGHTS 2012 GOTS/SOLDATOV   10
RECOMMENDED LIST OF EVENTS
                                • Pros:
                                  • Microsoft recommends
                                • Cons:
                                  • Huge amount of data
                                • Fun:




ZERONIGHTS 2012 GOTS/SOLDATOV                              11
“IMPROVEMENTS” FOR MICROSOFT GUIDE

• Admin logon from unusual place      • Pros:
• Admin logon at unusual time           • More AI
• From one IP by different accounts   • Cons:
• Lock >1 accounts from one IP          • Need time
• Password/Hash dump
• Run system commands
…


    ZERONIGHTS 2012 GOTS/SOLDATOV                     12
UNIVERSAL METHODS
                                • Pros:
      • Start a service
        (windows)                 • Much more AI
      • Events (almost) never   • Cons:
        seen before               • 100% we’ve
                                    forgotten smth.




ZERONIGHTS 2012 GOTS/SOLDATOV                         13
CONDITIONS
                                • Tested tools:
      • OS default
        configuration             • fgdump
      • Up2date AV is up          • pwdump
        and running               • pwdumpx
      • OS (almost) up2date       • metasploit
                                  • wce
                                  • mimikatz


ZERONIGHTS 2012 GOTS/SOLDATOV                     14
NEVER SEEN BEFORE EVENTS
      • Approaches
            • Timeout for statistic collection (up to 24 hours)
            • Complex filtering (by criteria)
      • Risks
            • Server restart in case of intrusion
            • Intrusion during statistic gathering
            • Complex configuration
            • Details of event happening




ZERONIGHTS 2012 GOTS/SOLDATOV                                     15
NEVER SEEN BEFORE EVENTS
(RULE FOR SEC.PL)




 ZERONIGHTS 2012 GOTS/SOLDATOV   16
FGDUMP
(REMOTE)




 ZERONIGHTS 2012 GOTS/SOLDATOV   17
PWDUMP6
(REMOTE)




  ZERONIGHTS 2012 GOTS/SOLDATOV   18
PWDUMPX
(REMOTE)




   ZERONIGHTS 2012 GOTS/SOLDATOV   19
METASPLOIT




  ZERONIGHTS 2012 GOTS/SOLDATOV   20
WCE (LOCAL)




 ZERONIGHTS 2012 GOTS/SOLDATOV   21
BUT




ZERONIGHTS 2012 GOTS/SOLDATOV   22
MIMIKATZ (LOCAL)




                                … and NO LOGS!


ZERONIGHTS 2012 GOTS/SOLDATOV                    23
DETECTION




ZERONIGHTS 2012 GOTS/SOLDATOV   24
HOPE, READY TO ANSWER YOUR QUESTIONS….


        Thanks for Your attention!
                                   Igor Gots
                                Sergey Soldatov
      reply-to-all.blogspot.com


ZERONIGHTS 2012 GOTS/SOLDATOV                     25
1 of 25

More Related Content

More from DefconRussia(20)

HTTP HOST header attacksHTTP HOST header attacks
HTTP HOST header attacks
DefconRussia19.2K views
Weakpass - defcon russia 23Weakpass - defcon russia 23
Weakpass - defcon russia 23
DefconRussia9.2K views
nosymbols - defcon russia 20nosymbols - defcon russia 20
nosymbols - defcon russia 20
DefconRussia1.2K views
static  - defcon russia 20static  - defcon russia 20
static - defcon russia 20
DefconRussia1.2K views
Zn task  - defcon russia 20Zn task  - defcon russia 20
Zn task - defcon russia 20
DefconRussia829 views
Vm ware fuzzing  - defcon russia 20Vm ware fuzzing  - defcon russia 20
Vm ware fuzzing - defcon russia 20
DefconRussia2.8K views
Nedospasov defcon russia 23Nedospasov defcon russia 23
Nedospasov defcon russia 23
DefconRussia1K views
Miasm defcon russia 23Miasm defcon russia 23
Miasm defcon russia 23
DefconRussia1K views

Soldatov, gotz how to catch your “hacker” or makeshift security