3. Aug 2016, shadow brokers claimed to have stolen
"cyber weapons“
Over 8 months they leaked exploits.
April 14 2017. They leaked Microsoft exploits.
MS17-010 (Same impact as MS08-067)
13. May 2016 - US looked set to elect there 1st
female president…
14. June 2016, it was
reported that the
networks of the
Democratic National
Committee (DNC)
had been
compromised..
15. No proof of Russian
it is suspected that the
Group known as APT28
government's involvement
Russia-backed hacking
were responsible…
16. A month later, thousands of stolen emails
and attachments were published…
WikiLeaks.
17. The attack was carried out using
phishing emails sent to political
figures.
http://www.nationalcrimeagency.gov.uk - 785-the-cyber-threat-to-uk-business
25. WikiLeaks has published more files
today which it claims show the CIA
went to great lengths to disguise its
own hacking attacks and point
the finger at Russia, China, North
Korea and Iran…
26.
27. “Your never be able to prevent all of
them, everything is penetrable
eventually…”
Michael Daniel - Former Special Assistant to the President and Cybersecurity
Coordinator.
54. 1 According to NSS Labs reports at
https://aka.ms/browser-security
55. NSS Labs conducted independent
global tests measuring how effective
browsers are at protecting against
socially engineered malware (SEM)
and phishing attacks.
57. 78,921 results were collected over 360
hours NSS engineers removed samples
that did not pass the validation criteria,
Ultimately, 991 unique URLs were
included in NSS’ final set of phishing
sites.
58. It had 10 pages of stuff and pretty
charts and more stuff
59.
60. moral of the story Edge blocks
bad sites the quickest.
But Is it officiant against
phishing attacks?
100. Kerberoast…
Tim Medin revealed “Kerberoasting“
To the world.
1. Any user has rights!
2. Targets service accounts.
3. Used to be complex to exploit…
102. Kerberoast - Using poshc2
1. Email a macro in;
2. Select your implant;
3. Run Invoke-Kerberoast;
4. Get hash;
5. Hashcat + Rocktastic;
6. DA…
103. Kerberos provides secure user
authentication with an industry standard
that permits interoperability.
Kerberos Version 5 added to Win2k – Still
used today.
105. MS14-025: Vulnerability in Group Policy…
1. Any user has rights!
2. DNS Servers . . . : 10.1.20.220
3. 10.1.20.220sysvolNAMEPolicies
4. groups.xml, scheduledtasks.xml, & services.xml
services.xml
5. Microsoft published the AES encryption key on
MSDN
134. Microsoft do not salt local hashes.
• “It is difficult to alter the password processing algorithms
without impacting a lot of subsystems and potentially
breaking the backward compatibility, which is the driving
force of the Windows ecosystem.”