SlideShare a Scribd company logo
Attacker Ghost Stories
Mostly free defenses that give attackers nightmares
About me...
Mubix “Rob” Fuller
o Father
o Husband
o NoVA Hacker
o Marine
Why are we here?
Rob "Mubix" Fuller: Attacker Ghost Stories
Memory Corruption
Bugs
EMET (Enhanced Mitigation Experience Toolkit)
What is EMET?
o  http://www.microsoft.com/emet
o  Think of it like a big bouncer
that protects any kind of
memory funny business, but
only for things you tell it to
protect
o Deployable by GPO
o Logs
o FREE
Protections
What about EMET bypasses?
http://goo.gl/QrJZdd
Another good resource about EMET
http://goo.gl/ELlBsi
Protections
Rob "Mubix" Fuller: Attacker Ghost Stories
Good percentage of Java bugs are non-
memory corruption
What about Java?
Protections Commonly Discussed
•  “Just patch all of them”
•  This person never had a developer on staff
•  Or never had to install ArcSight
•  “Disable the plugin in GPO”
•  Not only is this just a Windows solution but not a
very popular one
•  “Just upgrade everyone to Java 7 update
200 so you can use the block list
functionality”
•  “Everyone should just use Linux…”
Internet Explorer User Agent
Mozilla/4.0 (compatible; MSIE 8.0;
Windows NT 6.1; WOW64; Trident/
4.0; SLCC2; .NET CLR
2.0.50727; .NET CLR
3.5.30729; .NET CLR 3.0.30729;
Media Center PC 6.0; MS-RTC LM 8;
InfoPath.3; .NET4.0C; .NET4.0E)
chromeframe/8.0.552.224
Block Java UA at the Proxy
Examples:
JNLP/6.0 javaws/1.6.0_29
Java/1.6.0_26
Mozilla/4.0 (Windows 7 6.1) Java/
1.7.0_45
Block Java UA at the Proxy
o Java apps (exploits) require the use of Java,
which uses it’s own User-Agent
Block Java UA at the Proxy
o Java apps (exploits) require the use of Java,
which uses it’s own User-Agent
This never
happens if they
can’t pull the
code!
Block Java UA at the Proxy
o Java apps (exploits) require the use of Java,
which uses it’s own User-Agent
o Pull a report of every domain your users
went to using the Java User-Agent. Parse
the list and make them the exclusions.
o FREE
o Stops java exploits loaded by a browser.
o Attacker cannot modify UA pre-exploit
Update: Block Java UA at the Proxy
And according to “Z” this works for SSL too
http://goo.gl/4mtwqN
Block Java UA at the Proxy
Oh yea, it protects Macs too…
Rob "Mubix" Fuller: Attacker Ghost Stories
But do all wrong…
The stuff we know about
Logging / Vuln Scanning / AV / HIPS
o PWDump removed on an internal IIS box
doesn’t mean the job is done.
o Logon alerting - ADAudit Plus (only product
in this presentation simply because I can’t
find anyone else who does it) (Netwrix?)
o HIPS (enable the prevention part)
o Vuln Scanning is what a tool does. Lets start
Vuln Reporting.
o Get your pentester/red team involved!
Rob "Mubix" Fuller: Attacker Ghost Stories
Stop buying Typo-Squatted Domains
•  Huge cost every year, and no way to keep up.
•  Large risk as typo-squatted domains are easily
used as phishing sources
•  Use URLCrazy
•  Add all of the Typo domains to your
INTERNAL DNS servers
•  Benefits
•  No cost (except for upkeep/initial add)
•  Phishing gets null-routed or even better, sent to
“Phishing education” page
•  Bad guy has no idea what is wrong
•  Bad guy has no idea which domains are intra-squatted
Rob "Mubix" Fuller: Attacker Ghost Stories
Crowdsourcing Security
Security Incident / Phishing Incentive Program
o Reward “top” users for reporting malicious or
“phishy” content.
o Make a big deal out of it (company / section
wide emails)
o Every employee becomes an IDS
o Quarterly “Think Evil” games
Crowdsourcing Security
Internal Bug Bounty Program
o Developers Developers Developers ….
o Incorporate the entire company though, if
anyone reports a bug in a system they don’t
own, they’ll be entered in the bounty.
o Make it _EASY_
o Payout in gift cards instead of incident
response and forensics
Rob "Mubix" Fuller: Attacker Ghost Stories
WPAD
My _favorite_ vulnerability:
WPAD
o Make null routed (127.0.0.1) DNS entry for
WPAD
o Make null routed (::1) for DNS entry
WPADWPADWPAD
o Disable NetBIOS resolution domain wide.
Your DNS servers can handle it.
o It’s also a privacy concern NetBIOS traffic is
broadcasted to everyone
o FREE
Rob "Mubix" Fuller: Attacker Ghost Stories
Seriously
Turn off DNS.
Believe me… would I lie to you?
DNS
o There is no reason a user needs to resolve
Google.com internally
o Let your web proxies do all the DNS
o FREE
o Turn off forward lookups on your internal
DNS servers.
o Point your proxies at DNS servers that only
they are allowed to use.
Rob "Mubix" Fuller: Attacker Ghost Stories
But we rarely do
anything more than
set a password policy
for it.
Passwords
suck!
Dump your own hashes!
Dump your own hashes!
o Crackers
o  John the Ripper
o  Rockyou.txt
o Dumpers
o  Depends…
o  Goes back to the, “don’t use code you don’t trust”.
o  List by Bernardo Damele - http://goo.gl/wDpJHc
o  Ask your Pentesters/Red Teamers to do the dump
and maybe even the audit. They will jump at it.
o  (under supervision)
Rob "Mubix" Fuller: Attacker Ghost Stories
Port-forwarding Honeypots
If you have public IP space, use it.
1.  Spin up a VPS (Like Linode)
2.  Add vulnerable looking software to the VPS
3.  Install snort / other sensor on the VPS
4.  Port forward 80, 1433, etc on your IP to the
VPS via your firewall.
5.  Watch as attacks roll in without endangering
your infrastructure at all.
Note: Don’t share passwords from real
infrastructure to VPS.
Rob "Mubix" Fuller: Attacker Ghost Stories
Authenticated. Splash.
Proxy.
Authenticated Splash Proxies
o Use a web form with fields other than
“username=” and “password=”
o Block all “uncategorized”
o Splash page requirement (every domain is
blocked every day, first person to go to the
page is shown a big red button that says
“approve this domain”) any automated C2
will fail.
Authenticated Splash Proxies
THIS DOMAIN HAS BEEN BLOCKED!
Don’t worry, this could be the first time today
someone is attempting to go there. Click on
“UNBLOCK” to ALLOW THIS DOMAIN
THROUGH
UNBLOCK BLOCK
Rob "Mubix" Fuller: Attacker Ghost Stories
CAUGHT
Evil Canaries
o  Domain User called “DomainAdmin_Temp”
with password in the description, and
actually in Domain Admins group. Logon
hours was 0. CAUGHT
o  Public share called “Password Audit 2014”,
EXLS docs about 4 MB, but
“Everyone:Deny” permission. CAUGHT
o  Computer called BACKUPDB, with out of
date version of MySQL on Windows.
CAUGHT
Evil Canaries
o  Web developer made .htaccess file forward
common scanner (ala /nikto.html) requests
to custom 402 (Payment Required) page,
correlated hits and alerted. CAUGHT
o  Credit card database: http://
www.getcreditcardnumbers.com/
CAUGHT
o  VPN main page edited to include “default”
credentials in HTML source. CAUGHT
Evil Canaries
o  Web server had /admin/login.html and
supposedly tied to AD which always
returned “SUCCESS” but didn’t do anything
except, report what creds were used,
browser and IP information. CAUGHT
o  Machine that does absolutely nothing, saw
traffic to port 23 (not listening). CAUGHT
Rob "Mubix" Fuller: Attacker Ghost Stories
Tell your helpdesk!
o Most of your actionable security alerts go
through your helpdesk.
o Stop leaving them out of the loop.
Rob "Mubix" Fuller: Attacker Ghost Stories
Contact Me
Rob Fuller
@mubix
Blog - http://www.room362.com/
Wiki - http://pwnwiki.io/
Email - mubix@hak5.org
Campfire image from http://campfirewtx.org/wp-content/uploads/2013/11/campfire-pic.jpg
Appendix I - Psychology
The attacker is on your turf. Hackers freeze
when they think they are caught. Nation
states have “visibility assessment protocols”
that take time. The more you can cause a
visibility score to go up either by perceived or
actual detection will cause more intelligence
opportunities on the defence side.
Appendix II - Other free wins
o  Monitor anything that is tied to AD and is
accessible from the Internet. OWA / MDM /
SharePoint / VPN, or your web site.
o  Baseline internal network traffic. Spider
patterns mean scanning.
o  MAC addresses that aren’t in the same OUI
class should be investigated. (DELL/HP/
Wewei)
Appendix II - Other free wins
o  Allow users a way to specify when they are
on vacation. Or integrate your vacation
system with the authentication alerting
system. If the user isn’t there, there
shouldn’t be authenticating to anything be
email and maybe the VPN for you
workaholics.

More Related Content

PDF
Practical Exploitation - Webappy Style
PDF
Attacker Ghost Stories - ShmooCon 2014
PDF
Hacking Windows 95 #33c3
PPTX
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
PDF
44CON London 2015 - Is there an EFI monster inside your apple?
PDF
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
PDF
44CON London 2015 - reverse reverse engineering
PPTX
W.E.B. 2010 - Web, Exploits, Browsers
Practical Exploitation - Webappy Style
Attacker Ghost Stories - ShmooCon 2014
Hacking Windows 95 #33c3
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
44CON London 2015 - Is there an EFI monster inside your apple?
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
44CON London 2015 - reverse reverse engineering
W.E.B. 2010 - Web, Exploits, Browsers

What's hot (20)

PDF
Owning the bad guys
PDF
Be ef presentation-securitybyte2011-michele_orru
PDF
Hacktivity2011 be ef-preso_micheleorru
PDF
Advances in BeEF - AthCon2012
PDF
Writing malware while the blue team is staring at you
PDF
A @textfiles approach to gathering the world's DNS
PDF
Ultimate Guide to Setup DarkComet with NoIP
PPTX
Attacking Big Data Land
PDF
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
PPTX
Unsecuring SSH
PPTX
Node.js Anti Patterns
PPT
RIT 2009 Intellectual Pwnership
PPTX
WordPress Security - Dealing With Today's Hacks
PPTX
How to hide your browser 0-day @ Disobey
PPTX
Flash it baby!
PDF
Active Https Cookie Stealing
PPTX
Summer of Fuzz: macOS
PDF
Make CSRF Again
PDF
DNS hijacking using cloud providers – No verification needed
PDF
Delete prefetch automatically
Owning the bad guys
Be ef presentation-securitybyte2011-michele_orru
Hacktivity2011 be ef-preso_micheleorru
Advances in BeEF - AthCon2012
Writing malware while the blue team is staring at you
A @textfiles approach to gathering the world's DNS
Ultimate Guide to Setup DarkComet with NoIP
Attacking Big Data Land
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
Unsecuring SSH
Node.js Anti Patterns
RIT 2009 Intellectual Pwnership
WordPress Security - Dealing With Today's Hacks
How to hide your browser 0-day @ Disobey
Flash it baby!
Active Https Cookie Stealing
Summer of Fuzz: macOS
Make CSRF Again
DNS hijacking using cloud providers – No verification needed
Delete prefetch automatically
Ad

Similar to Rob "Mubix" Fuller: Attacker Ghost Stories (20)

PPTX
Why internal pen tests are still fun
PDF
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
PPT
BSides Philly Finding a Company's BreakPoint
PPT
BSidesJXN 2016: Finding a Company's BreakPoint
PDF
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PPT
BSidesJXN 2017 - Improving Vulnerability Management
ODP
BSides Columbus: Active Defense - Helping threat actors hack themselves!
PPTX
BSides_Charm2015_Info sec hunters_gathers
PDF
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
PPT
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
PDF
Invited Talk - Cyber Security and Open Source
PPTX
Ethical hacking 101 - Singapore RSA 2019
PPTX
Red Team Apocalypse
PPT
Introduction to Web Server Security
PPT
The Top 10/20 Internet Security Vulnerabilities – A Primer
PDF
The Web Application Hackers Toolchain
PDF
The Infosec Revival
ODP
BSides Cincy: Active Defense - Helping threat actors hack themselves!
PPT
Sembang2 Keselamatan It 2004
PDF
Lares from LOW to PWNED
Why internal pen tests are still fun
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
BSides Philly Finding a Company's BreakPoint
BSidesJXN 2016: Finding a Company's BreakPoint
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
BSidesJXN 2017 - Improving Vulnerability Management
BSides Columbus: Active Defense - Helping threat actors hack themselves!
BSides_Charm2015_Info sec hunters_gathers
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Invited Talk - Cyber Security and Open Source
Ethical hacking 101 - Singapore RSA 2019
Red Team Apocalypse
Introduction to Web Server Security
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Web Application Hackers Toolchain
The Infosec Revival
BSides Cincy: Active Defense - Helping threat actors hack themselves!
Sembang2 Keselamatan It 2004
Lares from LOW to PWNED
Ad

More from Area41 (11)

PDF
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
PDF
Juriaan Bremer und Marion Marschalek: Curing A 15 Year Old Disease
PDF
Marc Ruef: Adventures in a Decade of Tracking and Consolidating Security Vuln...
PPTX
Halvar Flake: Why Johnny can’t tell if he is compromised
PDF
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
PDF
hashdays 2011: Mikko Hypponen - Keynote
PDF
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
PDF
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
PDF
hashdays 2011: Christian Bockermann - Protecting Databases with Trees
PDF
hashdays 2011: Ange Albertini - Such a weird processor - messing with x86 opc...
PDF
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. Reality
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Juriaan Bremer und Marion Marschalek: Curing A 15 Year Old Disease
Marc Ruef: Adventures in a Decade of Tracking and Consolidating Security Vuln...
Halvar Flake: Why Johnny can’t tell if he is compromised
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
hashdays 2011: Mikko Hypponen - Keynote
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
hashdays 2011: Christian Bockermann - Protecting Databases with Trees
hashdays 2011: Ange Albertini - Such a weird processor - messing with x86 opc...
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. Reality

Recently uploaded (20)

PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
August Patch Tuesday
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Getting Started with Data Integration: FME Form 101
PPTX
A Presentation on Touch Screen Technology
PDF
Enhancing emotion recognition model for a student engagement use case through...
SOPHOS-XG Firewall Administrator PPT.pptx
Group 1 Presentation -Planning and Decision Making .pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
TLE Review Electricity (Electricity).pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Hybrid model detection and classification of lung cancer
Accuracy of neural networks in brain wave diagnosis of schizophrenia
DP Operators-handbook-extract for the Mautical Institute
A comparative study of natural language inference in Swahili using monolingua...
August Patch Tuesday
1 - Historical Antecedents, Social Consideration.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cloud_computing_Infrastucture_as_cloud_p
Getting Started with Data Integration: FME Form 101
A Presentation on Touch Screen Technology
Enhancing emotion recognition model for a student engagement use case through...

Rob "Mubix" Fuller: Attacker Ghost Stories

  • 1. Attacker Ghost Stories Mostly free defenses that give attackers nightmares
  • 2. About me... Mubix “Rob” Fuller o Father o Husband o NoVA Hacker o Marine
  • 3. Why are we here?
  • 6. EMET (Enhanced Mitigation Experience Toolkit) What is EMET? o  http://www.microsoft.com/emet o  Think of it like a big bouncer that protects any kind of memory funny business, but only for things you tell it to protect o Deployable by GPO o Logs o FREE
  • 8. What about EMET bypasses? http://goo.gl/QrJZdd
  • 9. Another good resource about EMET http://goo.gl/ELlBsi
  • 12. Good percentage of Java bugs are non- memory corruption What about Java?
  • 13. Protections Commonly Discussed •  “Just patch all of them” •  This person never had a developer on staff •  Or never had to install ArcSight •  “Disable the plugin in GPO” •  Not only is this just a Windows solution but not a very popular one •  “Just upgrade everyone to Java 7 update 200 so you can use the block list functionality” •  “Everyone should just use Linux…”
  • 14. Internet Explorer User Agent Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/ 4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; MS-RTC LM 8; InfoPath.3; .NET4.0C; .NET4.0E) chromeframe/8.0.552.224
  • 15. Block Java UA at the Proxy Examples: JNLP/6.0 javaws/1.6.0_29 Java/1.6.0_26 Mozilla/4.0 (Windows 7 6.1) Java/ 1.7.0_45
  • 16. Block Java UA at the Proxy o Java apps (exploits) require the use of Java, which uses it’s own User-Agent
  • 17. Block Java UA at the Proxy o Java apps (exploits) require the use of Java, which uses it’s own User-Agent This never happens if they can’t pull the code!
  • 18. Block Java UA at the Proxy o Java apps (exploits) require the use of Java, which uses it’s own User-Agent o Pull a report of every domain your users went to using the Java User-Agent. Parse the list and make them the exclusions. o FREE o Stops java exploits loaded by a browser. o Attacker cannot modify UA pre-exploit
  • 19. Update: Block Java UA at the Proxy And according to “Z” this works for SSL too http://goo.gl/4mtwqN
  • 20. Block Java UA at the Proxy Oh yea, it protects Macs too…
  • 22. But do all wrong… The stuff we know about
  • 23. Logging / Vuln Scanning / AV / HIPS o PWDump removed on an internal IIS box doesn’t mean the job is done. o Logon alerting - ADAudit Plus (only product in this presentation simply because I can’t find anyone else who does it) (Netwrix?) o HIPS (enable the prevention part) o Vuln Scanning is what a tool does. Lets start Vuln Reporting. o Get your pentester/red team involved!
  • 25. Stop buying Typo-Squatted Domains •  Huge cost every year, and no way to keep up. •  Large risk as typo-squatted domains are easily used as phishing sources •  Use URLCrazy •  Add all of the Typo domains to your INTERNAL DNS servers •  Benefits •  No cost (except for upkeep/initial add) •  Phishing gets null-routed or even better, sent to “Phishing education” page •  Bad guy has no idea what is wrong •  Bad guy has no idea which domains are intra-squatted
  • 27. Crowdsourcing Security Security Incident / Phishing Incentive Program o Reward “top” users for reporting malicious or “phishy” content. o Make a big deal out of it (company / section wide emails) o Every employee becomes an IDS o Quarterly “Think Evil” games
  • 28. Crowdsourcing Security Internal Bug Bounty Program o Developers Developers Developers …. o Incorporate the entire company though, if anyone reports a bug in a system they don’t own, they’ll be entered in the bounty. o Make it _EASY_ o Payout in gift cards instead of incident response and forensics
  • 31. WPAD o Make null routed (127.0.0.1) DNS entry for WPAD o Make null routed (::1) for DNS entry WPADWPADWPAD o Disable NetBIOS resolution domain wide. Your DNS servers can handle it. o It’s also a privacy concern NetBIOS traffic is broadcasted to everyone o FREE
  • 34. Believe me… would I lie to you?
  • 35. DNS o There is no reason a user needs to resolve Google.com internally o Let your web proxies do all the DNS o FREE o Turn off forward lookups on your internal DNS servers. o Point your proxies at DNS servers that only they are allowed to use.
  • 37. But we rarely do anything more than set a password policy for it. Passwords suck!
  • 38. Dump your own hashes!
  • 39. Dump your own hashes! o Crackers o  John the Ripper o  Rockyou.txt o Dumpers o  Depends… o  Goes back to the, “don’t use code you don’t trust”. o  List by Bernardo Damele - http://goo.gl/wDpJHc o  Ask your Pentesters/Red Teamers to do the dump and maybe even the audit. They will jump at it. o  (under supervision)
  • 41. Port-forwarding Honeypots If you have public IP space, use it. 1.  Spin up a VPS (Like Linode) 2.  Add vulnerable looking software to the VPS 3.  Install snort / other sensor on the VPS 4.  Port forward 80, 1433, etc on your IP to the VPS via your firewall. 5.  Watch as attacks roll in without endangering your infrastructure at all. Note: Don’t share passwords from real infrastructure to VPS.
  • 44. Authenticated Splash Proxies o Use a web form with fields other than “username=” and “password=” o Block all “uncategorized” o Splash page requirement (every domain is blocked every day, first person to go to the page is shown a big red button that says “approve this domain”) any automated C2 will fail.
  • 45. Authenticated Splash Proxies THIS DOMAIN HAS BEEN BLOCKED! Don’t worry, this could be the first time today someone is attempting to go there. Click on “UNBLOCK” to ALLOW THIS DOMAIN THROUGH UNBLOCK BLOCK
  • 48. Evil Canaries o  Domain User called “DomainAdmin_Temp” with password in the description, and actually in Domain Admins group. Logon hours was 0. CAUGHT o  Public share called “Password Audit 2014”, EXLS docs about 4 MB, but “Everyone:Deny” permission. CAUGHT o  Computer called BACKUPDB, with out of date version of MySQL on Windows. CAUGHT
  • 49. Evil Canaries o  Web developer made .htaccess file forward common scanner (ala /nikto.html) requests to custom 402 (Payment Required) page, correlated hits and alerted. CAUGHT o  Credit card database: http:// www.getcreditcardnumbers.com/ CAUGHT o  VPN main page edited to include “default” credentials in HTML source. CAUGHT
  • 50. Evil Canaries o  Web server had /admin/login.html and supposedly tied to AD which always returned “SUCCESS” but didn’t do anything except, report what creds were used, browser and IP information. CAUGHT o  Machine that does absolutely nothing, saw traffic to port 23 (not listening). CAUGHT
  • 52. Tell your helpdesk! o Most of your actionable security alerts go through your helpdesk. o Stop leaving them out of the loop.
  • 54. Contact Me Rob Fuller @mubix Blog - http://www.room362.com/ Wiki - http://pwnwiki.io/ Email - mubix@hak5.org Campfire image from http://campfirewtx.org/wp-content/uploads/2013/11/campfire-pic.jpg
  • 55. Appendix I - Psychology The attacker is on your turf. Hackers freeze when they think they are caught. Nation states have “visibility assessment protocols” that take time. The more you can cause a visibility score to go up either by perceived or actual detection will cause more intelligence opportunities on the defence side.
  • 56. Appendix II - Other free wins o  Monitor anything that is tied to AD and is accessible from the Internet. OWA / MDM / SharePoint / VPN, or your web site. o  Baseline internal network traffic. Spider patterns mean scanning. o  MAC addresses that aren’t in the same OUI class should be investigated. (DELL/HP/ Wewei)
  • 57. Appendix II - Other free wins o  Allow users a way to specify when they are on vacation. Or integrate your vacation system with the authentication alerting system. If the user isn’t there, there shouldn’t be authenticating to anything be email and maybe the VPN for you workaholics.