How Microsoft Will
MiTM Your Network
And how to use tools
without a toolkit!
601 AOC / 101 ACOMS
Tyndall AFB, FL
Active Defense - July 2017
(FY18 Pathfinders)
(FY19 Pathfinders)
Brandon DeVault
GCIA, GCED, Sec+
Aaron Rosenmund - @Arosenmund
aaron.rosenmund@gmail.com
https://github.com/arosenmund
https://www.pluralsight.com/profile/author/aaron-rosenmund
Overview
Event Scenario & Discovery
Microsoft Wake-Up Proxy Service
Tools that aren't tools?
Key Takeaways
Scenario Details
- Upgrading Windows XP to 7!
- 3 or more Windows 7 Machines
- Offending MACs matched peer Win 7 devices
- Reoccurred in unpredictable patterns
- Occurred after the post install script
- Related to the SCCM agent?
Layer 2 Switch
00:00:0A 00:00:0B 00:00:0C
Netstat - Scenario
“netstat –ano”
UDP [IP]:25536 *:* 3480
How Microsoft will MiTM your network
Tasklist - Scenario
“tasklist /svc /fi “PID eq 3480”
svchost.exe 3480 ConfigMgr Wake-up Proxy
Using PowerShell and WMI - Scenario
• “get –wmiobject -class win32_service |
?($_.name -like “ConfigMgr Wake-up Proxy”)” |
select *”
PathName : “C:windowsCCMSleepAgentService.exe”
Log Files
• <![LOG[Not becoming a guardian because we are the only machine in
the subnet running WakeUp Proxy Service]LOG]!><time=“x:x:x.xxx”
component=“SleepAgent” … >
• <![LOG[Sending a port-grabbing frame for x.x.x.x / xxMACxx from
xxMACxx]LOG]!><time=“x:x:x.xxx” component=“SleepAgent” … >
Microsoft Wake-Up Proxy Service
• SCCM 2012 SP1
• “Configuration Manager supports traditional wake-up packets to wake up
computers in sleep mode when you want to install required software, such as
software updates and applications.”
• “…on a network that uses 802.1X network access control, wake-up proxy will not
work and can disrupt the network service.”
https://docs.microsoft.com/en-us/sccm/core/clients/deploy/plan/plan-wake-up-clients
SCCM Settings
Layer 2 Switch
00:00:0A 00:00:0B 00:00:0C
Wake-up
Proxy Service
00:00:0A
00:00:0B
00:00:0C
00:00:0A
00:00:0B
00:00:0C
Layer 2
Switch
Layer 3
Router
SCCM
Server
00:00:0A
00:00:0B
00:00:0C
Layer 2
Switch
Layer 3
Router
Hello,
Guardian
Hello,
Guardian
Hello,
Guardian
.255 Broadcast
DCERPC
00:00:0A
00:00:0B
00:00:0C
Layer 2
Switch
Layer 3
Router
B & C are
awake
A & C are
awake
A & B are
awake
ECHO
00:00:0A
00:00:0B
00:00:0C
Layer 2
Switch
Layer 3
Router
Nothing
from C?
Nothing
from C?
ECHO
00:00:0A
00:00:0B
00:00:0C
Layer 2
Switch
Layer 3
Router
Who has
C’s MAC?
x5
00:00:0A
00:00:0B
00:00:0C
Layer 2
Switch
Layer 3
Router
I got you
bro!
A’s MAC = A’s IP
C’s MAC = A’s IP
00:00:0A
00:00:0B
00:00:0C
Layer 2
Switch
Layer 3
Router
00:00:0A
00:00:0B
00:00:0C
Layer 2
Switch
Layer 3
Router
New Guardian
Nomination
00:00:0A
00:00:0B
00:00:0C
Layer 2
Switch
Existing User OR
Malicious System
Microsoft
Wake-Up
Proxy Service
Monitor and parse traffic from
attached VLAN
Undetected scanning of peer
computer listening ports
Craft custom packets for service
exploits
Ability to wake-up sleeping or
powered off computersCompromised
Box Anywhere in
Domain
Tools that aren't tools?
netstat
•Displays all active TCP connections and the TCP/UDP ports on which the
computer is listening“-a”
•Displays active TCP connections, however, addresses and port numbers
are expressed numerically and no attempt is made to determine names“-n”
•Displays active TCP connections and includes the PID for each connection
“-o”
•(admin) Displays the binary program’s name involved in creating each
connection or listening port“-b”
tasklist
• Specifies the name or IP address of a
remote computer“/s <Computer>”
• Lists all the service information for each
process without truncation“/svc ”
• Specifies the types of processes to include
in or exclude from the query“/fi <Filter>”
tcpdump
•“tcpdump –nn –c 1000 | awk ‘{print $3}’ | cut –d. –f1-4 | sort –n | uniq
–c | sort –nr”
Top talkers after
1,000 packets:
•“tcpdump –n –A –s0 port http or port ftp or port smtp or port imap or
port pop3 | egrep –I
‘pass=|pwd=|log=|login=|user=|username=|pw=|passw=
|passwd=|password=|pass:|user:|username:|password:|login:|pass
|user ‘ –color=auto --line-buffered –B20”
Clear text
protocol
passwords:
WMI
objects &
PowerShell
• Searches through sysvol on your domain for passwords,
files, usernames and anything else that may be
erroneously stored in a publicly readable space.
Domain_File_Search.ps1
• Domain Active directory queries from PowerShell using
native .net libraries only for LDAP connections.Native AD-SCAN
• Scan common ports of every endpoint of a give subnet. In
progress to build out enumeration of adjacent networks
by hop for additional enumeration and scanning.
Power-SCAN
What is a
toolkit anyway?
Key Takeaways!
• Understand the ports and protocols on your network!
• Server + Network Administration knowledge is a must!
• Expensive Tools
Questions?
• 601AOC.MDT.OMB@us.af.mil
• Office: (850) 283-5280
• https://github.com/1dentified/
• Brandon DeVault - @SolderSwag
• brandondevault@gmail.com
• brandon.devault@us.af.mil

More Related Content

PPTX
UPC router reverse engineering - case study
PDF
St Louis Linux Users Group Wireguard (for Fun and Networking)
PPTX
PDF
Listen to your_data!
PDF
Visio-VSCHO001_Design
PDF
Mastering JUNOS Syslog
PPT
How hackers attack networks
PDF
Hack The Box Nest 10.10.10.178
UPC router reverse engineering - case study
St Louis Linux Users Group Wireguard (for Fun and Networking)
Listen to your_data!
Visio-VSCHO001_Design
Mastering JUNOS Syslog
How hackers attack networks
Hack The Box Nest 10.10.10.178

What's hot (20)

PPT
Dynamic Port Scanning
PPTX
Networking 101 AWS - VPCs, Subnets, NAT Gateways, etc
PPTX
マスタリングJUNOS Syslog
PPTX
Firewall
PDF
Wireless Hacking Fast Track
PPT
شبكات+الحاسوب+وفوائدها+4
PPT
By Nithin & group
PDF
Layer 8 and Why People are the Most Important Security Tool
PPTX
Cisco Malware: A new risk to consider in perimeter security designs
PPT
Cisco Router Security
PDF
amrapali builders @@ hacking challenges.pdf
PPT
My work
PPTX
Recon with Nmap
PDF
BlueHat v18 || The matrix has you - protecting linux using deception
PDF
Accomplishments_Brief_20150330
PPT
Remote Login- Noesis
ODP
Wireless security beyond password cracking by Mohit Ranjan
PDF
Linux firewall
PPTX
SDN OpenFlow Load Balancer 시나리오
PDF
Central Iowa Linux Users Group May 2020 Meeting: WireGuard
Dynamic Port Scanning
Networking 101 AWS - VPCs, Subnets, NAT Gateways, etc
マスタリングJUNOS Syslog
Firewall
Wireless Hacking Fast Track
شبكات+الحاسوب+وفوائدها+4
By Nithin & group
Layer 8 and Why People are the Most Important Security Tool
Cisco Malware: A new risk to consider in perimeter security designs
Cisco Router Security
amrapali builders @@ hacking challenges.pdf
My work
Recon with Nmap
BlueHat v18 || The matrix has you - protecting linux using deception
Accomplishments_Brief_20150330
Remote Login- Noesis
Wireless security beyond password cracking by Mohit Ranjan
Linux firewall
SDN OpenFlow Load Balancer 시나리오
Central Iowa Linux Users Group May 2020 Meeting: WireGuard
Ad

Similar to How Microsoft will MiTM your network (20)

PDF
The Art of Grey-Box Attack
PDF
Up is Down, Black is White: Using SCCM for Wrong and Right
PPT
01204427-scanner.ppt
PDF
InSecure Remote Operations - NullCon 2023 by Yossi Sassi
PDF
O PODER DO NMAP ATRAVÉS DE SEUS COMANDOS.pdf
PPTX
Network scanning
PPTX
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
PPTX
Null Delhi chapter - Feb 2019
PDF
CNIT 152: 10 Enterprise Services
PDF
Introduction to Windows Dictionary Attacks
PPTX
lecture5.pptx
PPT
Hacking Fundamentals - Jen Johnson , Miria Grunick
PDF
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
PDF
CNIT 121: 10 Enterprise Services
PPTX
Hunting for APT in network logs workshop presentation
PPT
NMAP1.ppt
PDF
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
PDF
CNIT 152 10 Enterprise Service
PDF
PHDays 2018 Threat Hunting Hands-On Lab
The Art of Grey-Box Attack
Up is Down, Black is White: Using SCCM for Wrong and Right
01204427-scanner.ppt
InSecure Remote Operations - NullCon 2023 by Yossi Sassi
O PODER DO NMAP ATRAVÉS DE SEUS COMANDOS.pdf
Network scanning
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Null Delhi chapter - Feb 2019
CNIT 152: 10 Enterprise Services
Introduction to Windows Dictionary Attacks
lecture5.pptx
Hacking Fundamentals - Jen Johnson , Miria Grunick
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
CNIT 121: 10 Enterprise Services
Hunting for APT in network logs workshop presentation
NMAP1.ppt
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
CNIT 152 10 Enterprise Service
PHDays 2018 Threat Hunting Hands-On Lab
Ad

More from Brandon DeVault (14)

PPTX
The Azure Necronomicon: Unraveling Identity's Cosmic Horror
PDF
grrcon-2023-scheduled-tasks.pdf
PDF
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...
PDF
Les Miserable Persistence - Hunting Through Scheduled Tasks - ShmooCon 2023.pdf
PDF
Tracing Transactions - BSides Orlando.pdf
PDF
Log4Shell Case Study - Suricon2022.pdf
PDF
Tracing Transactions - Threat Hunting for Financially Motivated APTs.pdf
PDF
Level up your SOC - Guide for a Resilient Education Program.pdf
PDF
Log4j vulnerability - CCC - Workshop.pdf
PDF
Log4j vulnerability - CCC - Talk.pdf
PDF
Handling Open-Source Code - ISF 2022.pdf
PDF
CircleCityCon - Threat Hunting with the Elastic Stack
PDF
Alamo ACE - Threat Hunting with CVAH
PDF
BSides JAX 2019 - Threat Hunting with the Elastic Stack
The Azure Necronomicon: Unraveling Identity's Cosmic Horror
grrcon-2023-scheduled-tasks.pdf
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...
Les Miserable Persistence - Hunting Through Scheduled Tasks - ShmooCon 2023.pdf
Tracing Transactions - BSides Orlando.pdf
Log4Shell Case Study - Suricon2022.pdf
Tracing Transactions - Threat Hunting for Financially Motivated APTs.pdf
Level up your SOC - Guide for a Resilient Education Program.pdf
Log4j vulnerability - CCC - Workshop.pdf
Log4j vulnerability - CCC - Talk.pdf
Handling Open-Source Code - ISF 2022.pdf
CircleCityCon - Threat Hunting with the Elastic Stack
Alamo ACE - Threat Hunting with CVAH
BSides JAX 2019 - Threat Hunting with the Elastic Stack

Recently uploaded (20)

PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
STKI Israel Market Study 2025 version august
2018-HIPAA-Renewal-Training for executives
Microsoft Excel 365/2024 Beginner's training
Zenith AI: Advanced Artificial Intelligence
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Enhancing emotion recognition model for a student engagement use case through...
Final SEM Unit 1 for mit wpu at pune .pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Developing a website for English-speaking practice to English as a foreign la...
Flame analysis and combustion estimation using large language and vision assi...
Custom Battery Pack Design Considerations for Performance and Safety
A review of recent deep learning applications in wood surface defect identifi...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Module 1.ppt Iot fundamentals and Architecture
Consumable AI The What, Why & How for Small Teams.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Abstractive summarization using multilingual text-to-text transfer transforme...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
STKI Israel Market Study 2025 version august

How Microsoft will MiTM your network