SlideShare a Scribd company logo
1 of 23
Hacking Techniques &
Intrusion Detection
Ali Al-Shemery
arabnix [at] gmail
All materials is licensed under a Creative Commons
“Share Alike” license.
• http://creativecommons.org/licenses/by-sa/3.0/
2
# whoami
• Ali Al-Shemery
• Ph.D., MS.c., and BS.c., Jordan
• More than 14 years of Technical Background (mainly
Linux/Unix and Infosec)
• Technical Instructor for more than 10 years (Infosec,
and Linux Courses)
• Hold more than 15 well known Technical Certificates
• Infosec & Linux are my main Interests
3
Post-Exploitation
“Shell is Only the Beginning” Darkoperator
Outline
• Why Post-Exploitation
• Post-Exploitation RoE
• Infrastructure Analysis
• Pillaging
• Sensitive Data
• User Information
• System Configurations
• High Value/Profile Target
• Data Exfiltration
• Persistence
• Cleanup
5
Why?
• Determine the value of the machine compromised,
• Maintain control of the machine for later use,
• Value depends on sensitivity of data and
usefulness in further compromising the network,
• Helps identify and document:
– sensitive data,
– identify configuration settings,
– communication channels,
– and relationships with other network devices.
• Go beyond Exploit verification
• Shows how vulnerabilities can be chained to gain
higher level of access (real-life attacks!!!) 6
Post-Exploitation RoE
• Protect the client
• Protect yourself
7
Infrastructure Analysis
Network Config.
• Interfaces
• Routing
• DNS Servers
• Proxy Servers (Net/App Level)
• ARP Table
9
Network Services
• Listening Services (TCP, UDP, etc),
• VPN Connections,
• Directory Services,
• Neighbors
10
Pillaging
• Obtaining information from targeted hosts
– files containing personal information,
– credit card information,
– passwords, etc.
• Satisfy the goals or as part of the pivoting process.
• Location of this data will vary depending on the
type of data.
• Knowledge of commonly used applications, server
software and middleware is very important.
• Special tools may be necessary to obtain, extract or
read the targeted data from some systems.
11
Check?
• Installed Software,
• Installed Services:
– Security Services
– File/Printer Shares
– Database Servers
– Directory Servers
– Name Servers
– Deployment Services
– Certificate Authority
– Source Code Management Server
– Dynamic Host Configuration Server
– Virtualization
– Messaging
– Monitoring and Management
– Backup Systems
– Others please add…
12
Sensitive Data
• Key-logging,
• Screen Capture,
• Network Traffic Capture,
• Previous Audit Reports (lucky day)!
13
User Information
• On System,
• Web Browsers,
• IM Clients
14
System Configuration
• Password Policy,
• Security Policies,
• Configured WiFi Networks and Keys.
15
High Value/Profile Targets
• Can be identified and further expanded from the
targets identified in the pre-engagement meetings
thru the analysis of:
– Data gathered,
– Interactions of those systems,
– Services they run.
• This view of the operation and interactions of these
high value/profile targets helps in the identification
and measurement of impact that can be gained to
the business do to the data and processes and to
the overall integrity of the client’s infrastructure
and services.
16
Data Exfiltration
• Mapping of all possible exfil paths,
• Testing exfiltration paths,
• Measuring control strengths
17
Persistence
• Autostart Malware
• Reverse Connections
• Rootkits
– User Mode
– Kernel Based
• C&C medium (http, dns, tcp, icmp)
• Backdoors
• VPN with credentials
18
Diving Further (Infra.)
• From Compromised System:
– Upload tools, local system tools, ARP
Scan, Sweeping, DNS Enum, Directory
Services Enum, Brute force, Execute
Further Exploits
• Thru Compromised System:
– Port Forwarding, Proxy, VPN, Execute
Further Exploits
19
Cleanup
• Process of cleaning the system after completing the
penetration test.
– User account: connect-back users
– Binaries installed: executables, scripts,
backdoors, rootkits, etc
– Temp Files
• Restore original configuration setting if modified.
• Leave no trace
• Proper archiving and encryption of evidence to be
handed back to customer
Note: Ensure documented steps of exploitation 20
Special Thanks
to the Penetration Testing Execution
Standard (PTES) Team …
Summary
• Explained what is PE, and why its needed,
• The need to check the Post-Exploitation RoE,
• What do we mean by Infrastructure Analysis,
• What is Pillaging,
• What is Sensitive Data, and how to identify it,
• What User Information we need to gather,
• What are System Configurations, and where to check
for them,
• Explained what is High Value/Profile Target, and what
business impact they could lead if compromised,
• What do we mean by Data Exfiltration,
• What is Persistence, and methods to perform it,
• What is the Cleanup phase, and why is it necessary.
22
References
• Penetration Testing Execution Standard, http://www.pentest-
standard.org/index.php/Main_Page,
• Linux/Unix/BSD Post-Exploitation Command List,
https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5
NMH034VDM-1N-EWPRz2770K4/edit?pli=1,
• Windows Post-Exploitation Command List,
https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-
K1WHTJm4fgG3joiuz43rw/edit?pli=1,
• OSX Post-Exploitation,
https://docs.google.com/document/d/10AUm_zUdAQGgoHNo_eS0
SO1K-24VVYnulUD2x3rJD3k/edit?pli=1,
• Metasploit Post Exploitation Command List,
https://docs.google.com/document/d/1ZrDJMQkrp_YbU_9Ni9wMN
F2m3nIPEA_kekqqqA2Ywto/edit?pli=1,
• Post-Exploitation Command List,
http://www.room362.com/blog/2012/8/25/post-exploitation-
command-lists-request-to-edit.html, 23

More Related Content

Similar to Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx

Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure InfrastructuresPROIDEA
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesSam Bowne
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001eaiti
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptxams1ams11
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
System analyst
System analystSystem analyst
System analystreturnasap
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
Making pentesting sexy ossams - BSidesQuebec2013
Making pentesting sexy ossams - BSidesQuebec2013Making pentesting sexy ossams - BSidesQuebec2013
Making pentesting sexy ossams - BSidesQuebec2013BSidesQuebec2013
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're InfectedTripwire
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...Robert Conti Jr.
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1Lahav Savir
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksSecurity Bootcamp
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your systemRevital Lapidot
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your systemRevital Lapidot
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)NCC Group
 

Similar to Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx (20)

Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
System analyst
System analystSystem analyst
System analyst
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Making pentesting sexy ossams - BSidesQuebec2013
Making pentesting sexy ossams - BSidesQuebec2013Making pentesting sexy ossams - BSidesQuebec2013
Making pentesting sexy ossams - BSidesQuebec2013
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx

  • 1. Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail
  • 2. All materials is licensed under a Creative Commons “Share Alike” license. • http://creativecommons.org/licenses/by-sa/3.0/ 2
  • 3. # whoami • Ali Al-Shemery • Ph.D., MS.c., and BS.c., Jordan • More than 14 years of Technical Background (mainly Linux/Unix and Infosec) • Technical Instructor for more than 10 years (Infosec, and Linux Courses) • Hold more than 15 well known Technical Certificates • Infosec & Linux are my main Interests 3
  • 4. Post-Exploitation “Shell is Only the Beginning” Darkoperator
  • 5. Outline • Why Post-Exploitation • Post-Exploitation RoE • Infrastructure Analysis • Pillaging • Sensitive Data • User Information • System Configurations • High Value/Profile Target • Data Exfiltration • Persistence • Cleanup 5
  • 6. Why? • Determine the value of the machine compromised, • Maintain control of the machine for later use, • Value depends on sensitivity of data and usefulness in further compromising the network, • Helps identify and document: – sensitive data, – identify configuration settings, – communication channels, – and relationships with other network devices. • Go beyond Exploit verification • Shows how vulnerabilities can be chained to gain higher level of access (real-life attacks!!!) 6
  • 7. Post-Exploitation RoE • Protect the client • Protect yourself 7
  • 9. Network Config. • Interfaces • Routing • DNS Servers • Proxy Servers (Net/App Level) • ARP Table 9
  • 10. Network Services • Listening Services (TCP, UDP, etc), • VPN Connections, • Directory Services, • Neighbors 10
  • 11. Pillaging • Obtaining information from targeted hosts – files containing personal information, – credit card information, – passwords, etc. • Satisfy the goals or as part of the pivoting process. • Location of this data will vary depending on the type of data. • Knowledge of commonly used applications, server software and middleware is very important. • Special tools may be necessary to obtain, extract or read the targeted data from some systems. 11
  • 12. Check? • Installed Software, • Installed Services: – Security Services – File/Printer Shares – Database Servers – Directory Servers – Name Servers – Deployment Services – Certificate Authority – Source Code Management Server – Dynamic Host Configuration Server – Virtualization – Messaging – Monitoring and Management – Backup Systems – Others please add… 12
  • 13. Sensitive Data • Key-logging, • Screen Capture, • Network Traffic Capture, • Previous Audit Reports (lucky day)! 13
  • 14. User Information • On System, • Web Browsers, • IM Clients 14
  • 15. System Configuration • Password Policy, • Security Policies, • Configured WiFi Networks and Keys. 15
  • 16. High Value/Profile Targets • Can be identified and further expanded from the targets identified in the pre-engagement meetings thru the analysis of: – Data gathered, – Interactions of those systems, – Services they run. • This view of the operation and interactions of these high value/profile targets helps in the identification and measurement of impact that can be gained to the business do to the data and processes and to the overall integrity of the client’s infrastructure and services. 16
  • 17. Data Exfiltration • Mapping of all possible exfil paths, • Testing exfiltration paths, • Measuring control strengths 17
  • 18. Persistence • Autostart Malware • Reverse Connections • Rootkits – User Mode – Kernel Based • C&C medium (http, dns, tcp, icmp) • Backdoors • VPN with credentials 18
  • 19. Diving Further (Infra.) • From Compromised System: – Upload tools, local system tools, ARP Scan, Sweeping, DNS Enum, Directory Services Enum, Brute force, Execute Further Exploits • Thru Compromised System: – Port Forwarding, Proxy, VPN, Execute Further Exploits 19
  • 20. Cleanup • Process of cleaning the system after completing the penetration test. – User account: connect-back users – Binaries installed: executables, scripts, backdoors, rootkits, etc – Temp Files • Restore original configuration setting if modified. • Leave no trace • Proper archiving and encryption of evidence to be handed back to customer Note: Ensure documented steps of exploitation 20
  • 21. Special Thanks to the Penetration Testing Execution Standard (PTES) Team …
  • 22. Summary • Explained what is PE, and why its needed, • The need to check the Post-Exploitation RoE, • What do we mean by Infrastructure Analysis, • What is Pillaging, • What is Sensitive Data, and how to identify it, • What User Information we need to gather, • What are System Configurations, and where to check for them, • Explained what is High Value/Profile Target, and what business impact they could lead if compromised, • What do we mean by Data Exfiltration, • What is Persistence, and methods to perform it, • What is the Cleanup phase, and why is it necessary. 22
  • 23. References • Penetration Testing Execution Standard, http://www.pentest- standard.org/index.php/Main_Page, • Linux/Unix/BSD Post-Exploitation Command List, https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5 NMH034VDM-1N-EWPRz2770K4/edit?pli=1, • Windows Post-Exploitation Command List, https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu- K1WHTJm4fgG3joiuz43rw/edit?pli=1, • OSX Post-Exploitation, https://docs.google.com/document/d/10AUm_zUdAQGgoHNo_eS0 SO1K-24VVYnulUD2x3rJD3k/edit?pli=1, • Metasploit Post Exploitation Command List, https://docs.google.com/document/d/1ZrDJMQkrp_YbU_9Ni9wMN F2m3nIPEA_kekqqqA2Ywto/edit?pli=1, • Post-Exploitation Command List, http://www.room362.com/blog/2012/8/25/post-exploitation- command-lists-request-to-edit.html, 23