SlideShare a Scribd company logo
Hacking, Breaking In
@ChrisTruncer
What’s this talk about?
● Who I am
● How I got started in the industry
● What is “red teaming” and/or “pen testing”
● What’s a pen test look like?
○ Demos, lots of them
● How can you start learning this?
● Questions
uid=0(@ChrisTruncer)
● Christopher Truncer (@ChrisTruncer)
○ Hacker
○ Open Source Software Developer
■ Veil Framework Developer
○ Florida State Seminole
○ Random certs… blah
● Red Teamer and Pen Tester for Mandiant
How I Started
● College
○ College computer security class
○ Hack my roommate
■ “Wow, hacking is real”
○ Took a security class
○ Decided this is what I wanted to do
■ …. is this even a job?
How I Started
● Start off in a technical role
○ Wanted to get a technical foundation before
moving into security
● First job, not what I wanted
● Became a Sys Admin at Northrop Grumman
○ Stayed for about 2 years
● Began my plunge into security, and haven’t
looked back
What is Penetration
Testing or Red
Teaming?
Hacking - Breaking Into It
Hacking - Breaking Into It
Different Job Descriptions
● Vulnerability Assessment/Assessor
○ Scan a network for vulnerabilities with a
tool
● Penetration Tester
○ Take that output, exploit findings, hack into
systems
● Red Team
○ Adversary emulation, objective oriented,
don’t get caught
Hacking - Breaking Into It
But that’s it…
Kind of boring right?
Hacking - Breaking Into It
Hacking - Breaking Into It
Red Teaming is a little
different, but similar
Hacking - Breaking Into It
Hacking - Breaking Into It
Phishing Our Way In
● Lots of different ways to get in, but phishing is
easiest
○ IT Department rolling out iPad’s for use
○ User selected for development environment
○ Meeting minutes from managers discussing
layoffs…
■ … then telling everyone not to read it
● We can forge it to come from anyone
Don’t Get Caught
Minor Background
Slides
What is a vulnerability?
What is an exploit?
What’s really used?
● We do use exploits, but less and less each year
○ What happens if the exploit doesn’t work?
○ What happens if it does?
● Misconfigurations are the way to go
○ Why hack something when we can just log in?
○ Path of least resistance
What’s the goal?
● Well, let’s first own the domain
○ Get the domain administrator account
● Demonstrate business impact
○ IT Admins understand domain admin, but does
a manager, or a CEO?
○ Target something the business cares about
■ The Coke recipe, database with SSNs?
● Report/Outbrief with fixes
What’s the goal (Red Team)?
● All of the above
● Add to value by working with their blue team
○ Teach them what you did
○ Help them try to detect it
○ Make them up your game
● Soft skills really help here
○ Be able to talk to people and explain you work
to tech and non-tech (muggles) audience
On to the fun stuff
How’s a test work?
● First we get our “get out of jail free” card signed
○ Only thing that keeps it legal, and us not in jail
● We’ll likely get some sort of a scope
○ IP address range
○ Domain Names
● On our marks, get set, go!
Finding Live Systems
● So, we may have thousands of IP addresses…
○ Let’s find the real computers
● Once we have a list of live computers what’s
running on them?
○ Web server?
○ E-mail?
○ Database server?
● NMap to the rescue
Port Scanning with NMap
● NMap finds open ports with services running on it
● It will scan for the top 1000, or whatever you
specify
● It can guess:
○ Service running
○ Operating System
● It can run scripts too!
Hacking - Breaking Into It
Hacking - Breaking Into It
Sweet, what’s next?
● Now we know open ports and the services running
○ Research vulnerabilities for those versions
○ Or run a vulnerability scanner
● MS08-067
○ Basically everyone’s first exploit
○ Get Windows XP stock, and test against it
● We have an exploit for the system, use it!
Hacking - Breaking Into It
Hacking - Breaking Into It
Hacking - Breaking Into It
What about Websites?
● We test these too!
● Probably at least half of what we’re testing
○ Everyone has a website
○ Internal to a network, can be hundreds, or
thousands
● Let’s get breaking into them!
Hacking - Breaking Into It
Hacking - Breaking Into It
What I wish I knew
● Programming
○ Use it all the time for scripts, tools, Veil, etc.
● Mentor
○ You’re always one step in front and one step
behind someone
● Build a lab and play with it
○ You can’t break anything that costs money!
What I wish I knew
● Be prepared to be uncomfortable at times
○ Always in a new environment with new “stuff”
and you’re expected to break it
○ Perk of the job too :)
● Build your process
○ Learn how you best approach networks, web
apps, etc.
○ Use this to face what you don’t know
How to Learn
● Go to security conferences!
○ Might be anywhere from $10 - $300
○ BSides Conferences are local and almost always
free, or super cheap
● Build your own lab
○ VMWare is your best friend
○ VulnHub
● Try free CTFs
● Twitter!
?
Chris Truncer
○ @ChrisTruncer
○ CTruncer@christophertruncer.com
○ https://www.christophertruncer.com
○ https://github.com/ChrisTruncer

More Related Content

PDF
An EyeWitness View into your Network
PDF
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
PDF
Bringing Down the House - How One Python Script Ruled Over AntiVirus
PDF
Ever Present Persistence - Established Footholds Seen in the Wild
PDF
The State of the Veil Framework
PDF
The Art of AV Evasion - Or Lack Thereof
PDF
The Supporting Role of Antivirus Evasion while Persisting
PDF
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
An EyeWitness View into your Network
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
Bringing Down the House - How One Python Script Ruled Over AntiVirus
Ever Present Persistence - Established Footholds Seen in the Wild
The State of the Veil Framework
The Art of AV Evasion - Or Lack Thereof
The Supporting Role of Antivirus Evasion while Persisting
Passive Intelligence Gathering and Analytics - It's All Just Metadata!

What's hot (20)

PDF
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
PDF
CheckPlease: Payload-Agnostic Targeted Malware
PDF
AntiVirus Evasion Reconstructed - Veil 3.0
PDF
Egress-Assess and Owning Data Exfiltration
PDF
Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000
PDF
Veil-Ordnance
PDF
Higher Level Malware
PDF
Pentester++
PPTX
Pen Testing, Red Teaming, and More
PDF
AV Evasion with the Veil Framework
PPTX
CheckPlease - Payload-Agnostic Implant Security
PPTX
The Veil-Framework
PDF
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
PPTX
Pen Testing Development
PDF
Ruxmon feb 2013 what happened to rails
PPTX
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
PDF
Finding Needles in Haystacks
PPTX
Same-origin Policy (SOP)
PDF
Dev and Blind - Attacking the weakest Link in IT Security
PDF
JavaScript From Hell - CONFidence 2.0 2009
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
CheckPlease: Payload-Agnostic Targeted Malware
AntiVirus Evasion Reconstructed - Veil 3.0
Egress-Assess and Owning Data Exfiltration
Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000
Veil-Ordnance
Higher Level Malware
Pentester++
Pen Testing, Red Teaming, and More
AV Evasion with the Veil Framework
CheckPlease - Payload-Agnostic Implant Security
The Veil-Framework
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
Pen Testing Development
Ruxmon feb 2013 what happened to rails
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Finding Needles in Haystacks
Same-origin Policy (SOP)
Dev and Blind - Attacking the weakest Link in IT Security
JavaScript From Hell - CONFidence 2.0 2009

Viewers also liked (12)

PDF
EyeWitness - A Web Application Triage Tool
PDF
Null Mumbai 14th May Lesser Known Webapp attacks by Ninad Sarang
PPTX
Derbycon - Passing the Torch
PDF
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
PPTX
Static analysis for security
PDF
Introduction to burp suite
PPTX
OWASP Zed Attack Proxy
PPTX
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
PPT
Security Maturity Assessment
PPT
Brit India Wiki
PDF
Originales y pre impresi
PDF
Cyber Security Experts Forum
EyeWitness - A Web Application Triage Tool
Null Mumbai 14th May Lesser Known Webapp attacks by Ninad Sarang
Derbycon - Passing the Torch
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
Static analysis for security
Introduction to burp suite
OWASP Zed Attack Proxy
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Security Maturity Assessment
Brit India Wiki
Originales y pre impresi
Cyber Security Experts Forum

Similar to Hacking - Breaking Into It (20)

PDF
Professional Hacking in 2011
PDF
WTF is Penetration Testing
PPTX
How Hacking Works - Web Edtiton - shareable.pptx
PPTX
So You Want to be a Hacker?
PPTX
WTF is Penetration Testing v.2
PDF
So... you want to be a security consultant
PPTX
How To Start Your InfoSec Career
PDF
Introduction to Cybersecurity | IIT(BHU)CyberSec
PPTX
How an Attacker "Audits" Your Software Systems
PPTX
Ethical hacking
PPTX
How I Learnt hacking in High School - BSidesLV - 2015
PDF
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PPT
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
KEY
Simulating Real World Attack
PPT
Software Security Testing
PPTX
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
PPTX
Becoming a better pen tester overview
PPTX
It security the condensed version
PPTX
Hogy néz ki egy pentest meló a gyakorlatban?
Professional Hacking in 2011
WTF is Penetration Testing
How Hacking Works - Web Edtiton - shareable.pptx
So You Want to be a Hacker?
WTF is Penetration Testing v.2
So... you want to be a security consultant
How To Start Your InfoSec Career
Introduction to Cybersecurity | IIT(BHU)CyberSec
How an Attacker "Audits" Your Software Systems
Ethical hacking
How I Learnt hacking in High School - BSidesLV - 2015
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Simulating Real World Attack
Software Security Testing
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Becoming a better pen tester overview
It security the condensed version
Hogy néz ki egy pentest meló a gyakorlatban?

Recently uploaded (20)

PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Testing WebRTC applications at scale.pdf
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Funds Management Learning Material for Beg
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Introduction to Information and Communication Technology
PPTX
Digital Literacy And Online Safety on internet
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
Design_with_Watersergyerge45hrbgre4top (1).ppt
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Triggering QUIC, presented by Geoff Huston at IETF 123
QR Codes Qr codecodecodecodecocodedecodecode
Slides PDF The World Game (s) Eco Economic Epochs.pdf
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
522797556-Unit-2-Temperature-measurement-1-1.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
Testing WebRTC applications at scale.pdf
Tenda Login Guide: Access Your Router in 5 Easy Steps
Introuction about WHO-FIC in ICD-10.pptx
Funds Management Learning Material for Beg
Job_Card_System_Styled_lorem_ipsum_.pptx
Introduction to Information and Communication Technology
Digital Literacy And Online Safety on internet
Decoding a Decade: 10 Years of Applied CTI Discipline
presentation_pfe-universite-molay-seltan.pptx
Sims 4 Historia para lo sims 4 para jugar

Hacking - Breaking Into It

  • 2. What’s this talk about? ● Who I am ● How I got started in the industry ● What is “red teaming” and/or “pen testing” ● What’s a pen test look like? ○ Demos, lots of them ● How can you start learning this? ● Questions
  • 3. uid=0(@ChrisTruncer) ● Christopher Truncer (@ChrisTruncer) ○ Hacker ○ Open Source Software Developer ■ Veil Framework Developer ○ Florida State Seminole ○ Random certs… blah ● Red Teamer and Pen Tester for Mandiant
  • 4. How I Started ● College ○ College computer security class ○ Hack my roommate ■ “Wow, hacking is real” ○ Took a security class ○ Decided this is what I wanted to do ■ …. is this even a job?
  • 5. How I Started ● Start off in a technical role ○ Wanted to get a technical foundation before moving into security ● First job, not what I wanted ● Became a Sys Admin at Northrop Grumman ○ Stayed for about 2 years ● Began my plunge into security, and haven’t looked back
  • 6. What is Penetration Testing or Red Teaming?
  • 9. Different Job Descriptions ● Vulnerability Assessment/Assessor ○ Scan a network for vulnerabilities with a tool ● Penetration Tester ○ Take that output, exploit findings, hack into systems ● Red Team ○ Adversary emulation, objective oriented, don’t get caught
  • 11. But that’s it… Kind of boring right?
  • 14. Red Teaming is a little different, but similar
  • 17. Phishing Our Way In ● Lots of different ways to get in, but phishing is easiest ○ IT Department rolling out iPad’s for use ○ User selected for development environment ○ Meeting minutes from managers discussing layoffs… ■ … then telling everyone not to read it ● We can forge it to come from anyone
  • 20. What is a vulnerability?
  • 21. What is an exploit?
  • 22. What’s really used? ● We do use exploits, but less and less each year ○ What happens if the exploit doesn’t work? ○ What happens if it does? ● Misconfigurations are the way to go ○ Why hack something when we can just log in? ○ Path of least resistance
  • 23. What’s the goal? ● Well, let’s first own the domain ○ Get the domain administrator account ● Demonstrate business impact ○ IT Admins understand domain admin, but does a manager, or a CEO? ○ Target something the business cares about ■ The Coke recipe, database with SSNs? ● Report/Outbrief with fixes
  • 24. What’s the goal (Red Team)? ● All of the above ● Add to value by working with their blue team ○ Teach them what you did ○ Help them try to detect it ○ Make them up your game ● Soft skills really help here ○ Be able to talk to people and explain you work to tech and non-tech (muggles) audience
  • 25. On to the fun stuff
  • 26. How’s a test work? ● First we get our “get out of jail free” card signed ○ Only thing that keeps it legal, and us not in jail ● We’ll likely get some sort of a scope ○ IP address range ○ Domain Names ● On our marks, get set, go!
  • 27. Finding Live Systems ● So, we may have thousands of IP addresses… ○ Let’s find the real computers ● Once we have a list of live computers what’s running on them? ○ Web server? ○ E-mail? ○ Database server? ● NMap to the rescue
  • 28. Port Scanning with NMap ● NMap finds open ports with services running on it ● It will scan for the top 1000, or whatever you specify ● It can guess: ○ Service running ○ Operating System ● It can run scripts too!
  • 31. Sweet, what’s next? ● Now we know open ports and the services running ○ Research vulnerabilities for those versions ○ Or run a vulnerability scanner ● MS08-067 ○ Basically everyone’s first exploit ○ Get Windows XP stock, and test against it ● We have an exploit for the system, use it!
  • 35. What about Websites? ● We test these too! ● Probably at least half of what we’re testing ○ Everyone has a website ○ Internal to a network, can be hundreds, or thousands ● Let’s get breaking into them!
  • 38. What I wish I knew ● Programming ○ Use it all the time for scripts, tools, Veil, etc. ● Mentor ○ You’re always one step in front and one step behind someone ● Build a lab and play with it ○ You can’t break anything that costs money!
  • 39. What I wish I knew ● Be prepared to be uncomfortable at times ○ Always in a new environment with new “stuff” and you’re expected to break it ○ Perk of the job too :) ● Build your process ○ Learn how you best approach networks, web apps, etc. ○ Use this to face what you don’t know
  • 40. How to Learn ● Go to security conferences! ○ Might be anywhere from $10 - $300 ○ BSides Conferences are local and almost always free, or super cheap ● Build your own lab ○ VMWare is your best friend ○ VulnHub ● Try free CTFs ● Twitter!
  • 41. ? Chris Truncer ○ @ChrisTruncer ○ CTruncer@christophertruncer.com ○ https://www.christophertruncer.com ○ https://github.com/ChrisTruncer

Editor's Notes

  • #8: http://geeknewscentral.com/wp-content/uploads/2013/05/bigstock-Computer-Hacker-in-suit-and-ti-31750772.jpg
  • #9: http://static2.techinsider.io/image/55ad5e1add0895810d8b45b5-2048-1365/6870002408_fb3bb8a069_k.jpg
  • #11: https://dilanwarnakulasooriya.files.wordpress.com/2012/07/52.png
  • #13: https://dilanwarnakulasooriya.files.wordpress.com/2012/07/52.png
  • #14: https://dilanwarnakulasooriya.files.wordpress.com/2012/07/52.png
  • #16: http://www.gannett-cdn.com/-mm-/0dafc0732cc7dc230df8135e882290d7c4c04efb/c=0-15-1325-1013&r=x404&c=534x401/local/-/media/USATODAY/GenericImages/2013/08/20/1377029409000-AP-Earns-UPS.jpg
  • #17: https://dilanwarnakulasooriya.files.wordpress.com/2012/07/52.png
  • #25: Muggles stolen from @Viss, stolen from Harry Potter :)
  • #27: Muggles stolen from @Viss, stolen from Harry Potter :)
  • #28: Muggles stolen from @Viss, stolen from Harry Potter :)
  • #29: Muggles stolen from @Viss, stolen from Harry Potter :)
  • #32: Muggles stolen from @Viss, stolen from Harry Potter :)