SlideShare a Scribd company logo
How we breach small and medium
enterprises (SMEs)
Bernardo Damele, NCC Group
Bernardo Damele
• Principal consultant and lead trainer with NCC Group
• Open source developer of widely used offensive security
tools
• 10 years professional experience in IT
• 8+ years in IT security
Agenda
• What is security?
• Quick recap
• How we assess and breach networks
• Network design mistakes and defective assumptions
• Weakest entry points of a network perimeter
• Leverage access to the network and why
What is security?
“Security is a degree of resistance to, or protection from a
threat.”
Security provides
“A form of protection where a separation is
created between the assets and the threat."
How we assess networks
Lifecycle of an infrastructure security assessment
• Discovery – scan the network to establish live hosts, their open ports
and services exposed
• VulnerabilityAssessment – establish where security issues exist from
an unauthenticated standpoint and investigate potential entry points
into the network
• Exploitation – compromise of a host through a vulnerability, or
misconfiguration
• Post Exploitation – credential harvesting and progression through the
network to achieve maximum compromise within the network
boundaries of the scope
Exploitation and post exploitation
Why is it important to exploit vulnerabilities?
To evaluate their risk and impact in the context of the
network under assessment and produce a high-value report
to the client
External versus internal assessment
External infrastructure assessment is carried out beyond the
network perimeter of the client
Focused on services exposed to the Internet across an IP range
defined by the client
Internal infrastructure assessment is carried out at the client’s site,
with a direct connection to the corporate network or DMZ
depending on the scope
Larger network footprint
Greater number of exposed services
Numerous Layer 2 and Layer 3 weaknesses and attacks
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
Lack of security patches
• Missing patches are easy entry points for attackers
• For a large number of critical publicly known vulnerabilities there
are reliable exploits
• In a typicalWindows network changes are high that one
workstation will not be patched
• Till
• Smart card reader
• Camera
• Embedded devices in general
Lack of security patches – scenario
• Office-based network
• Windows powered
• No centralized solution (e.g.WSUS) to deploy Microsoft patched onto
the workstations
• Different patching levels
• Largely outdated machines – vulnerable to reliable exploits
• Local System is an easy win
• Leverage foothold and compromise theWindows domain / forest
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
Default credentials
• It is a fact that device under test are kept with default credentials
• Application servers and management interfaces too
• Wordlists of default credentials for all these are easily available
• Tools to carry on login brute-force attacks exist
• When they do not, they are easy to develop with limited
development skills
Default credentials – scenario
• DMZ environment
• UNIX / Linux powered production servers
• Exploitation of memory corruption vulnerabilities is not an option
• Avoidance of DoS is mandated
• ApacheTomcat runs with default credentials admin / tomcat
• Used to deploy a customWAR to achieve command execution
• Local users’ password hashes dumped, cracked offline
• Leveraged to access over SSH /Telnet the rest of the servers
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
Excessive network footprint
• Unnecessary services are often exposed internally to the network
perimeter
• Effort to maintain large heterogeneous networks leave room for
oversight in network footprint
• Services that run on localhost may prove helpful to compromise
further the network – post exploitation
Excessive network footprint – scenario
• Despite SSH in use, R*Services are still used for management
purposes
• Easy to brute-force ACL for R*Services remotely
• Or… NIS used to manage users centrally on a UNIX / Linux
network
• Can be queried anonymously to retrieve users’ password hashes
• Cracked offline
• Leverage to compromise the rest of the systems
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
Lack or weak network segregation
• Network segregation by mere DHCP netmask restriction is
ineffective
• Segregating at the application layer is defective
• Leaves room to exfiltration / tunnelling attacks
• MAC filtering is ineffective
• NAC solutions do not always guarantee network segregation /
access
Lack or weak network segregation – scenario
• Two distinctWindows domains: CORP and GUEST
• Not part of the sameWindows forest
• No direct access between the two networks
• They’re physically hosted in two separate buildings, different physical
devices, no apparent interconnections
• Users of the GUEST domain can surf the Internet, so can users of the
CORP domain
• They share the same web proxy on a third network
• This proxy is reachable by both networks
• Hence, it can be used to pivot traffic from the GUEST network to the
CORP network – CONNECT method (enabled by default, for HTTPS)
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
Exceptions
• Temporary firewall rules turn permanent
• Network configurations are usually complex, undocumented and hard
to maintain, hence exceptions are added and rules overwrite / duplicate
one another
• Exceptions and defective regular expressions may lead to more harm
than good
Exceptions – scenario
• Web management interface
• Backed by JBoss Application Server
• Configured manually to prompt user for credentials at any
unauthenticated GET and POST request
• HTTPVerbTampering
• Intercept the login request and replace POST with HEAD
• Get a valid session ID tied to a legitimate user
• Once authenticated, from the web management compromise the
underlying OS
How we breach networks
• Lack of security patches
• Default credentials
• Excessive network footprint
• Lack or weak network segregation
• Exceptions
• White-listing preferred over black-listing
• More
White-listing over black-listing
• Black-list (“reject known bad”)
• Reject data matching a list of known attack strings or patterns
• Accept everything else
• Can hinder simple attacks and automated attack tools
• Highly vulnerable to bypasses using encoding and other techniques
• White-list (“accept known good”)
• Accept data matching a list of known benign strings or patterns
• Reject everything else
• Highly effective method if feasible
Prioritise avenues of attack
• Abuse of intended functionality
• Example: download of files from an anonymous FTP server
• Extended use of functionality
• Example: using xp_cmdshell extended stored procedure on a Microsoft SQL
Server, or deploying additional .war files on an ApacheTomcat Server
• Mature, public exploit
• Example: exploit for MS08-067 vulnerability
• Proof of concept code
• Example: code downloaded from exploit-db.com or other exploit repository to
exploit a third-party product
Move sideways
• Once a foothold onto the target network is gained, next step is to
retain access
• Create an admin user, deploy a backdoor, etc.
• Leverage access to inspect the file system, query the DC, sniff traffic
• Move sideways
• Password reuse for local OS users is a very bad practice
• Once dumped, password hashes can be sprayed, no need to be
cracked offline
• Dual-homed systems – pivot traffic / extend control
Conclusions, once more
• Don’t buy product vendor hype
• Cyber security is not about products
• Cyber security doesn’t have to be costly
• An incident will happen so have a plan
Thank you! Questions?
training@nccgroup.com
Contact us
UK Offices
Manchester - Head Office
London
Leatherhead
Milton Keynes
Cheltenham
Edinburgh
North American Offices
San Francisco
New York
Seattle
Chicago
Austin
Atlanta
Australian Offices
Sydney
European Offices
Amsterdam – Netherlands
Munich – Germany
Zurich - Switzerland

More Related Content

What's hot

Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Digital Bond
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)
Digital Bond
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
Sam Bowne
 
Docking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slidesDocking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slides
NCC Group
 
Extracting Credentials From Windows
Extracting Credentials From WindowsExtracting Credentials From Windows
Extracting Credentials From WindowsNetSPI
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Digital Bond
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
Digital Bond
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
Digital Bond
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access Management
Sam Bowne
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseNetSPI
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)eNetSPI
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
PacSecJP
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
Sam Bowne
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare Infrastructure
Positive Hack Days
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
edavid2685
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
Sam Bowne
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
Sam Bowne
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Positive Hack Days
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
Sam Bowne
 

What's hot (20)

Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
Docking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slidesDocking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slides
 
Extracting Credentials From Windows
Extracting Credentials From WindowsExtracting Credentials From Windows
Extracting Credentials From Windows
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access Management
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash Course
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)e
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare Infrastructure
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 

Viewers also liked

Ppt on ncc
Ppt on  nccPpt on  ncc
Ppt on ncc
Rahul Kumar
 
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 02013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0NCC Group
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_designNCC Group
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a ShoestringNCC Group
 
Pki 202 Architechture Models and CRLs
Pki 202   Architechture Models and CRLsPki 202   Architechture Models and CRLs
Pki 202 Architechture Models and CRLsNCC Group
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
Jignesh Solanki
 
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group
 
SQL injection exploitation internals
SQL injection exploitation internalsSQL injection exploitation internals
SQL injection exploitation internals
Bernardo Damele A. G.
 
Cryptography101
Cryptography101Cryptography101
Cryptography101NCC Group
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsNCC Group
 
USB: Undermining Security Barriers
USB: Undermining Security BarriersUSB: Undermining Security Barriers
USB: Undermining Security BarriersNCC Group
 
2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_room2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_roomNCC Group
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key ManagementNCC Group
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsNCC Group
 
The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security NCC Group
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
NCC Group
 

Viewers also liked (17)

Ppt on ncc
Ppt on  nccPpt on  ncc
Ppt on ncc
 
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 02013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
Pki 202 Architechture Models and CRLs
Pki 202   Architechture Models and CRLsPki 202   Architechture Models and CRLs
Pki 202 Architechture Models and CRLs
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios apps
 
SQL injection exploitation internals
SQL injection exploitation internalsSQL injection exploitation internals
SQL injection exploitation internals
 
Cryptography101
Cryptography101Cryptography101
Cryptography101
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
USB: Undermining Security Barriers
USB: Undermining Security BarriersUSB: Undermining Security Barriers
USB: Undermining Security Barriers
 
2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_room2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_room
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key Management
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
 
The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 

Similar to How we breach small and medium enterprises (SMEs)

Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
LakshyaArora12
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
hibaehed
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
Sam Bowne
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
Sam Bowne
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
LeahRachael
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Sam Bowne
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
Sam Bowne
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systems
fajjarrehman
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PROIDEA
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Precisely
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
Muhammad ismail Shah
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
Sam Bowne
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident Preparation
Sam Bowne
 
Networks1
Networks1Networks1
Networks1Aarti P
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
Tapas Shome
 

Similar to How we breach small and medium enterprises (SMEs) (20)

Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systems
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident Preparation
 
Networks1
Networks1Networks1
Networks1
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

How we breach small and medium enterprises (SMEs)

  • 1. How we breach small and medium enterprises (SMEs) Bernardo Damele, NCC Group
  • 2. Bernardo Damele • Principal consultant and lead trainer with NCC Group • Open source developer of widely used offensive security tools • 10 years professional experience in IT • 8+ years in IT security
  • 3. Agenda • What is security? • Quick recap • How we assess and breach networks • Network design mistakes and defective assumptions • Weakest entry points of a network perimeter • Leverage access to the network and why
  • 4. What is security? “Security is a degree of resistance to, or protection from a threat.” Security provides “A form of protection where a separation is created between the assets and the threat."
  • 5. How we assess networks Lifecycle of an infrastructure security assessment • Discovery – scan the network to establish live hosts, their open ports and services exposed • VulnerabilityAssessment – establish where security issues exist from an unauthenticated standpoint and investigate potential entry points into the network • Exploitation – compromise of a host through a vulnerability, or misconfiguration • Post Exploitation – credential harvesting and progression through the network to achieve maximum compromise within the network boundaries of the scope
  • 6. Exploitation and post exploitation Why is it important to exploit vulnerabilities? To evaluate their risk and impact in the context of the network under assessment and produce a high-value report to the client
  • 7. External versus internal assessment External infrastructure assessment is carried out beyond the network perimeter of the client Focused on services exposed to the Internet across an IP range defined by the client Internal infrastructure assessment is carried out at the client’s site, with a direct connection to the corporate network or DMZ depending on the scope Larger network footprint Greater number of exposed services Numerous Layer 2 and Layer 3 weaknesses and attacks
  • 8. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 9. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 10. Lack of security patches • Missing patches are easy entry points for attackers • For a large number of critical publicly known vulnerabilities there are reliable exploits • In a typicalWindows network changes are high that one workstation will not be patched • Till • Smart card reader • Camera • Embedded devices in general
  • 11. Lack of security patches – scenario • Office-based network • Windows powered • No centralized solution (e.g.WSUS) to deploy Microsoft patched onto the workstations • Different patching levels • Largely outdated machines – vulnerable to reliable exploits • Local System is an easy win • Leverage foothold and compromise theWindows domain / forest
  • 12. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 13. Default credentials • It is a fact that device under test are kept with default credentials • Application servers and management interfaces too • Wordlists of default credentials for all these are easily available • Tools to carry on login brute-force attacks exist • When they do not, they are easy to develop with limited development skills
  • 14. Default credentials – scenario • DMZ environment • UNIX / Linux powered production servers • Exploitation of memory corruption vulnerabilities is not an option • Avoidance of DoS is mandated • ApacheTomcat runs with default credentials admin / tomcat • Used to deploy a customWAR to achieve command execution • Local users’ password hashes dumped, cracked offline • Leveraged to access over SSH /Telnet the rest of the servers
  • 15. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 16. Excessive network footprint • Unnecessary services are often exposed internally to the network perimeter • Effort to maintain large heterogeneous networks leave room for oversight in network footprint • Services that run on localhost may prove helpful to compromise further the network – post exploitation
  • 17. Excessive network footprint – scenario • Despite SSH in use, R*Services are still used for management purposes • Easy to brute-force ACL for R*Services remotely • Or… NIS used to manage users centrally on a UNIX / Linux network • Can be queried anonymously to retrieve users’ password hashes • Cracked offline • Leverage to compromise the rest of the systems
  • 18. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 19. Lack or weak network segregation • Network segregation by mere DHCP netmask restriction is ineffective • Segregating at the application layer is defective • Leaves room to exfiltration / tunnelling attacks • MAC filtering is ineffective • NAC solutions do not always guarantee network segregation / access
  • 20. Lack or weak network segregation – scenario • Two distinctWindows domains: CORP and GUEST • Not part of the sameWindows forest • No direct access between the two networks • They’re physically hosted in two separate buildings, different physical devices, no apparent interconnections • Users of the GUEST domain can surf the Internet, so can users of the CORP domain • They share the same web proxy on a third network • This proxy is reachable by both networks • Hence, it can be used to pivot traffic from the GUEST network to the CORP network – CONNECT method (enabled by default, for HTTPS)
  • 21. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 22. Exceptions • Temporary firewall rules turn permanent • Network configurations are usually complex, undocumented and hard to maintain, hence exceptions are added and rules overwrite / duplicate one another • Exceptions and defective regular expressions may lead to more harm than good
  • 23. Exceptions – scenario • Web management interface • Backed by JBoss Application Server • Configured manually to prompt user for credentials at any unauthenticated GET and POST request • HTTPVerbTampering • Intercept the login request and replace POST with HEAD • Get a valid session ID tied to a legitimate user • Once authenticated, from the web management compromise the underlying OS
  • 24. How we breach networks • Lack of security patches • Default credentials • Excessive network footprint • Lack or weak network segregation • Exceptions • White-listing preferred over black-listing • More
  • 25. White-listing over black-listing • Black-list (“reject known bad”) • Reject data matching a list of known attack strings or patterns • Accept everything else • Can hinder simple attacks and automated attack tools • Highly vulnerable to bypasses using encoding and other techniques • White-list (“accept known good”) • Accept data matching a list of known benign strings or patterns • Reject everything else • Highly effective method if feasible
  • 26. Prioritise avenues of attack • Abuse of intended functionality • Example: download of files from an anonymous FTP server • Extended use of functionality • Example: using xp_cmdshell extended stored procedure on a Microsoft SQL Server, or deploying additional .war files on an ApacheTomcat Server • Mature, public exploit • Example: exploit for MS08-067 vulnerability • Proof of concept code • Example: code downloaded from exploit-db.com or other exploit repository to exploit a third-party product
  • 27. Move sideways • Once a foothold onto the target network is gained, next step is to retain access • Create an admin user, deploy a backdoor, etc. • Leverage access to inspect the file system, query the DC, sniff traffic • Move sideways • Password reuse for local OS users is a very bad practice • Once dumped, password hashes can be sprayed, no need to be cracked offline • Dual-homed systems – pivot traffic / extend control
  • 28. Conclusions, once more • Don’t buy product vendor hype • Cyber security is not about products • Cyber security doesn’t have to be costly • An incident will happen so have a plan
  • 29. Thank you! Questions? training@nccgroup.com Contact us UK Offices Manchester - Head Office London Leatherhead Milton Keynes Cheltenham Edinburgh North American Offices San Francisco New York Seattle Chicago Austin Atlanta Australian Offices Sydney European Offices Amsterdam – Netherlands Munich – Germany Zurich - Switzerland