How to catch your “hacker” or makeshift security

Sergey Soldatov
Sergey SoldatovHead of Security Operations Center @Kaspersky
HOW TO CATCH YOUR “HACKER”
            OR
    MAKESHIFT SECURITY

         Sergey Soldatov
            Igor Gots
AGENDA
• Water
• Fishing
• Fishbite
• Hookset




ZERONIGHTS 2012 GOTS/SOLDATOV   2
AGENDA
• Water
• Fishing
• Fishbite
• Hookset




ZERONIGHTS 2012 GOTS/SOLDATOV   3
W?




ZERONIGHTS 2012 GOTS/SOLDATOV   4
W?




ZERONIGHTS 2012 GOTS/SOLDATOV   5
INFOSECURITY DEPT. HAS TO

• Write corporate regulations
• Make assessments (compliance &/| pentest)
• Monitor logs!




ZERONIGHTS 2012 GOTS/SOLDATOV                 6
INFOSECURITY DEPT. HAS TO

• Write corporate regulations
• Make assessments (compliance &/| pentest)

• Monitor logs!




ZERONIGHTS 2012 GOTS/SOLDATOV                 7
ATTACK STAGES

• Information gathering
• Passive learning
• Active learning
• Obtaining access
• Maintaining access
• Erasing evidence


ZERONIGHTS 2012 GOTS/SOLDATOV   8
FISHING
• Firewall/UTM/… :-)
• IDS/IPS
      • Commercial
      • Opensource/free
• Log analysis
      • Commercial
      • Opensource/free


ZERONIGHTS 2012 GOTS/SOLDATOV   9
WHAT’S HAPPENING WHEN ONE’S BREAKING

• Use or modification of privileged accounts
• Configuration modification
• Unusual activity
• New services or applications




ZERONIGHTS 2012 GOTS/SOLDATOV                  10
TOOL DEPLOYMENT




ZERONIGHTS 2012 GOTS/SOLDATOV   11
RECOMMENDED LIST OF EVENTS
                                • Pros:
                                  • Microsoft recommends
                                • Cons:
                                  • Huge amount of data
                                • Fun:




ZERONIGHTS 2012 GOTS/SOLDATOV                              12
RECOMMENDED LIST OF EVENTS
                                • Pros:
                                  • Microsoft recommends
                                • Cons:
                                  • Huge amount of data
                                • Fun:




ZERONIGHTS 2012 GOTS/SOLDATOV                              13
“IMPROVEMENTS” FOR MICROSOFT GUIDE

• Admin logon from unusual place      • Pros:
• Admin logon at unusual time           • More AI
• From one IP by different accounts   • Cons:
• Lock >1 accounts from one IP          • Need time
• Password/Hash dump
• Run system commands
…


    ZERONIGHTS 2012 GOTS/SOLDATOV                     14
UNIVERSAL METHODS
                                • Pros:
      • Start a service
        (windows)                 • Much more AI
      • Events (almost) never   • Cons:
        seen before               • 100% we’ve
                                    forgotten smth.




ZERONIGHTS 2012 GOTS/SOLDATOV                         15
CONDITIONS
                                • Tested tools:
      • OS default
        configuration             • fgdump
      • Up2date AV is up          • pwdump
        and running               • pwdumpx
      • OS (almost) up2date       • metasploit
                                  • wce
                                  • mimikatz


ZERONIGHTS 2012 GOTS/SOLDATOV                     16
NEVER SEEN BEFORE EVENTS
      • Approaches
            • Timeout for statistic collection (up to 24 hours)
            • Complex filtering (by criteria)
      • Risks
            • Server restart in case of intrusion
            • Intrusion during statistic gathering
            • Complex configuration
            • Details of event happening




ZERONIGHTS 2012 GOTS/SOLDATOV                                     17
NEVER SEEN BEFORE EVENTS
(RULE FOR SEC.PL)




 ZERONIGHTS 2012 GOTS/SOLDATOV   18
FGDUMP
(REMOTE)




 ZERONIGHTS 2012 GOTS/SOLDATOV   19
PWDUMP6
(REMOTE)




  ZERONIGHTS 2012 GOTS/SOLDATOV   20
PWDUMPX
(REMOTE)




   ZERONIGHTS 2012 GOTS/SOLDATOV   21
METASPLOIT




  ZERONIGHTS 2012 GOTS/SOLDATOV   22
WCE (LOCAL)




 ZERONIGHTS 2012 GOTS/SOLDATOV   23
BUT




ZERONIGHTS 2012 GOTS/SOLDATOV   24
BUT




ZERONIGHTS 2012 GOTS/SOLDATOV   25
BUT




ZERONIGHTS 2012 GOTS/SOLDATOV   26
BUT




ZERONIGHTS 2012 GOTS/SOLDATOV   27
MIMIKATZ (LOCAL)




                                … and NO LOGS!


ZERONIGHTS 2012 GOTS/SOLDATOV                    28
MIMIKATZ (LOCAL)




                                … and NO LOGS!


ZERONIGHTS 2012 GOTS/SOLDATOV                    29
MIMIKATZ (LOCAL)




                                … and NO LOGS!


ZERONIGHTS 2012 GOTS/SOLDATOV                    30
MIMIKATZ (LOCAL)




                                … and NO LOGS!


ZERONIGHTS 2012 GOTS/SOLDATOV                    31
MIMIKATZ (LOCAL)




                                … and NO LOGS!


ZERONIGHTS 2012 GOTS/SOLDATOV                    32
DETECTION




ZERONIGHTS 2012 GOTS/SOLDATOV   33
HOPE, READY TO ANSWER YOUR QUESTIONS….


        Thanks for Your attention!
                                   Igor Gots
                                Sergey Soldatov
      reply-to-all.blogspot.com


ZERONIGHTS 2012 GOTS/SOLDATOV                     34
1 of 34

Recommended

Soldatov, gotz how to catch your “hacker” or makeshift security by
Soldatov, gotz   how to catch your “hacker” or makeshift securitySoldatov, gotz   how to catch your “hacker” or makeshift security
Soldatov, gotz how to catch your “hacker” or makeshift securityDefconRussia
744 views25 slides
Drive by-download attack evolution zero nights v3 by
Drive by-download attack evolution zero nights v3Drive by-download attack evolution zero nights v3
Drive by-download attack evolution zero nights v3Sergey Soldatov
1.4K views67 slides
Некриптографическое исследование носителей православной криптографии by
Некриптографическое исследование носителей  православной криптографииНекриптографическое исследование носителей  православной криптографии
Некриптографическое исследование носителей православной криптографииSergey Soldatov
4.7K views23 slides
Drive by downloads-cns by
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cnsmmubashirkhan
3.2K views29 slides
Мониторинг своими руками by
Мониторинг своими рукамиМониторинг своими руками
Мониторинг своими рукамиSergey Soldatov
5.5K views78 slides
A Threat Hunter Himself by
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter HimselfSergey Soldatov
6.3K views31 slides

More Related Content

More from Sergey Soldatov

От мониторинга к форенсике и обратно by
От мониторинга к форенсике и обратноОт мониторинга к форенсике и обратно
От мониторинга к форенсике и обратноSergey Soldatov
272 views48 slides
Роботы среди нас! by
Роботы среди нас!Роботы среди нас!
Роботы среди нас!Sergey Soldatov
1.5K views31 slides
How MITRE ATT&CK helps security operations by
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsSergey Soldatov
4.6K views39 slides
Практика обнаружения атак, использующих легальные инструменты by
Практика обнаружения атак, использующих легальные инструментыПрактика обнаружения атак, использующих легальные инструменты
Практика обнаружения атак, использующих легальные инструментыSergey Soldatov
835 views17 slides
Reducing cyber risks in the era of digital transformation by
Reducing cyber risks in the era of digital transformationReducing cyber risks in the era of digital transformation
Reducing cyber risks in the era of digital transformationSergey Soldatov
1.3K views41 slides
Kaspersky managed protection by
Kaspersky managed protectionKaspersky managed protection
Kaspersky managed protectionSergey Soldatov
727 views2 slides

More from Sergey Soldatov(18)

От мониторинга к форенсике и обратно by Sergey Soldatov
От мониторинга к форенсике и обратноОт мониторинга к форенсике и обратно
От мониторинга к форенсике и обратно
Sergey Soldatov272 views
Роботы среди нас! by Sergey Soldatov
Роботы среди нас!Роботы среди нас!
Роботы среди нас!
Sergey Soldatov1.5K views
How MITRE ATT&CK helps security operations by Sergey Soldatov
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
Sergey Soldatov4.6K views
Практика обнаружения атак, использующих легальные инструменты by Sergey Soldatov
Практика обнаружения атак, использующих легальные инструментыПрактика обнаружения атак, использующих легальные инструменты
Практика обнаружения атак, использующих легальные инструменты
Sergey Soldatov835 views
Reducing cyber risks in the era of digital transformation by Sergey Soldatov
Reducing cyber risks in the era of digital transformationReducing cyber risks in the era of digital transformation
Reducing cyber risks in the era of digital transformation
Sergey Soldatov1.3K views
Hunting Lateral Movement in Windows Infrastructure by Sergey Soldatov
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov9K views
Трудовые будни охотника на угрозы by Sergey Soldatov
Трудовые будни охотника на угрозыТрудовые будни охотника на угрозы
Трудовые будни охотника на угрозы
Sergey Soldatov1.8K views
Охота на угрозы на BIS summit 2016 by Sergey Soldatov
Охота на угрозы на BIS summit 2016Охота на угрозы на BIS summit 2016
Охота на угрозы на BIS summit 2016
Sergey Soldatov901 views
Threat hunting as SOC process by Sergey Soldatov
Threat hunting as SOC processThreat hunting as SOC process
Threat hunting as SOC process
Sergey Soldatov2.4K views
модульный под к документир V5 by Sergey Soldatov
модульный под к документир V5модульный под к документир V5
модульный под к документир V5
Sergey Soldatov1.6K views
IDM - это непросто! by Sergey Soldatov
IDM - это непросто!IDM - это непросто!
IDM - это непросто!
Sergey Soldatov2.1K views
Opensource vs. Non-opensource by Sergey Soldatov
Opensource vs. Non-opensourceOpensource vs. Non-opensource
Opensource vs. Non-opensource
Sergey Soldatov1.4K views
Примерные критерии оценки IDM by Sergey Soldatov
Примерные критерии оценки IDMПримерные критерии оценки IDM
Примерные критерии оценки IDM
Sergey Soldatov1.7K views
PHDays '14 Cracking java pseudo random sequences by egorov & soldatov by Sergey Soldatov
PHDays '14   Cracking java pseudo random sequences by egorov & soldatovPHDays '14   Cracking java pseudo random sequences by egorov & soldatov
PHDays '14 Cracking java pseudo random sequences by egorov & soldatov
Sergey Soldatov1.6K views
Infosecurity management in the Enterprise by Sergey Soldatov
Infosecurity management in the EnterpriseInfosecurity management in the Enterprise
Infosecurity management in the Enterprise
Sergey Soldatov1.4K views
Безопасность мобильных устройств by Sergey Soldatov
Безопасность мобильных устройствБезопасность мобильных устройств
Безопасность мобильных устройств
Sergey Soldatov512 views

Recently uploaded

Top 10 Strategic Technologies in 2024: AI and Automation by
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and AutomationAutomationEdge Technologies
13 views14 slides
Report 2030 Digital Decade by
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital DecadeMassimo Talia
13 views41 slides
The Importance of Cybersecurity for Digital Transformation by
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationNUS-ISS
25 views26 slides
STPI OctaNE CoE Brochure.pdf by
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdfmadhurjyapb
12 views1 slide
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu... by
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...NUS-ISS
32 views54 slides
Understanding GenAI/LLM and What is Google Offering - Felix Goh by
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohNUS-ISS
39 views33 slides

Recently uploaded(20)

The Importance of Cybersecurity for Digital Transformation by NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS25 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb12 views
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu... by NUS-ISS
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
NUS-ISS32 views
Understanding GenAI/LLM and What is Google Offering - Felix Goh by NUS-ISS
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS39 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software91 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 views
DALI Basics Course 2023 by Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg14 views
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... by Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin70 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst449 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab11 views
Perth MeetUp November 2023 by Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price12 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada110 views
Combining Orchestration and Choreography for a Clean Architecture by ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean Architecture
ThomasHeinrichs168 views
RADIUS-Omnichannel Interaction System by RADIUS
RADIUS-Omnichannel Interaction SystemRADIUS-Omnichannel Interaction System
RADIUS-Omnichannel Interaction System
RADIUS14 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... by NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS23 views

How to catch your “hacker” or makeshift security