SlideShare a Scribd company logo
Thijs Bosschert
27 oktober 2015, Den Haag
info@radicallyopensecurity.com
thijs@radicallyopensecurity.com
Wat hebben we geleerd van de
Hacking Team hack?
May 12, 2014
Radically Open Security
Non-Profit Computer Security Consultancy
We're an idealistic bunch of security researchers,
networking/forensics geeks, and Capture The
Flag winners that are passionate about making
the world more secure. We believe in
transparency and openness. And our goal is to
secure the society that allows us to run a
company in the first place.
https://radicallyopensecurity.com/
May 12, 2014
Thijs Bosschert
Freelance Security Professional
• Incident Response
• Forensics
• Penetration tester
• Security researcher
• Trainer
• CTF player (Eindbazen, Hack.ERS)
May 12, 2014
Worldwide IR
May 12, 2014
HackingTeam
Source: http://www.hackingteam.it/
May 12, 2014
HackingTeam
Remote Control System
Take control of your targets and monitor them
regardless of encryption and mobility. It doesn’t
matter if you are after an Android phone or a
Windows computer: you can monitor all the
devices. Remote Control System is invisible to
the user, evades antivirus and firewalls…
Source: http://www.hackingteam.it/images/stories/galileo.pdf
May 12, 2014
HackingTeam
Remote Control System
Hack into your targets with the most advanced
infection vectors available. Enter his wireless
network and tackle tactical operations with ad-hoc
equipment designed to operate while on the
move. Keep an eye on all your targets and
manage them remotely, all from a single screen.
Be alerted on incoming relevant data and have
meaningful events automatically highlighted.
Source: http://www.hackingteam.it/images/stories/galileo.pdf
May 12, 2014
You will be hacked
Source:
https://twitter.com/hackingteam/status/563356441885835264
May 12, 2014
Imagine this
Source: https://wikileaks.org/hackingteam/emails/
May 12, 2014
You have been hacked
Source: https://twitter.com/hackingteam/status/563356441885835264
May 12, 2014
How was it done?
Source: https://twitter.com/GammaGroupPR
May 12, 2014
How was it done?
Source: http://0x27.me/HackBack/0x00.txt
May 12, 2014
0x00.txt
● Mapping out the target
● Scanning & Exploiting
● Escalating
● Pivoting
● Have Fun
Source: http://0x27.me/HackBack/0x00.txt
May 12, 2014
Denial
Source: Twitter
May 12, 2014
Bad response
Source: Twitter
May 12, 2014
Bad press reactions
Source: http://www.hackingteam.it/index.php/about-us
May 12, 2014
~400 GB
May 12, 2014
WikiLeaks Email DB
Source: https://wikileaks.org/hackingteam/emails/
May 12, 2014
0 days & exploits
● CVE-2015-0349 – Adobe Flash Player
● CVE-2015-2425 – IE 11
● CVE-2015-2426 – OpenType Font Driver
● CVE-2015-5119 - Adobe Flash Player
● CVE-2015-5122 - Adobe Flash Player
● CVE-2015-5123 - Adobe Flash player
May 12, 2014
Weak passwords
● P4ssword
● Passw0rd
● wolverine
● universo
● HTPassw0rd
● Passw0rd!81
+ Password reusage
Source: http://pastebin.com/bxYXHFMu
May 12, 2014
Code like everyone is watching
def content(*args)
hash = [args].flatten.first || {}
process = hash[:process] || ["Explorer.exe0",
"Firefox.exe0", "Chrome.exe0"].sample
process.encode!("US-ASCII")
path = hash[:path] || ["C:Utentipippopedoporno.mpg",
"C:UtentiplutoDocumentichildporn.avi",
"C:secretsbomb_blueprints.pdf"].sample
path = path.to_utf16le_binary_null
Source: https://github.com/hackedteam/rcs-
common/blob/master/lib/rcs-common/evidence/file.rb
May 12, 2014
CIS Critical Security Controls
Source: SANS 20 Critical Controls Poster
May 12, 2014
CIS Critical Security Controls
Source: SANS 20 Critical Controls Poster
May 12, 2014
~400 GB
May 12, 2014
What went wrong?
● Weak passwords usage and re-usage
● No network Segmenting and protection
● No data encryption
● No secure email
● No data classification
● No monitoring
● Incorrect incident response procedures
● Usage of illegal software
May 12, 2014
Security level
Source: http://lockheedmartin.com
May 12, 2014
Protection level
Source: http://www.slideshare.net/jaredcarst/cyber-threats-cybersecurity-are-you-ready
May 12, 2014
Wat hebben we geleerd?
Als security bedrijf ben je een
gewild target voor aanvallers, dan
kan je maar beter zorgen dat je
daar dan ook op voorbereid bent.
May 12, 2014
Questions?
https://radicallyopensecurity.com/
http://www.thice.nl
thijs@radicallyopensecurity.com
@ThiceNL
http://nl.linkedin.com/in/bosschert
Thijs Bosschert

More Related Content

PDF
WordPress Security 101 – WordCamp Finland 2016 presentation by Otto Kekäläine...
PPT
If i wake evil 360
PDF
Penetration Testing Execution Standard
PPTX
Everything You Always Wanted to Know About Drupal Security* (*But Were Afraid...
PPTX
Defend your organisation from Cyber Attacks
PDF
Ethical hacking for fun and profit
PDF
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
PPT
About Deploy360 (Presented at ARIN 31)
WordPress Security 101 – WordCamp Finland 2016 presentation by Otto Kekäläine...
If i wake evil 360
Penetration Testing Execution Standard
Everything You Always Wanted to Know About Drupal Security* (*But Were Afraid...
Defend your organisation from Cyber Attacks
Ethical hacking for fun and profit
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
About Deploy360 (Presented at ARIN 31)

Similar to HSB15 - Thijs Bosschert - Radically Open Security (20)

PDF
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
PDF
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
PPTX
Newsbytes_NULLHYD_Dec
PPTX
Cybereason - behind the HackingTeam infection server
PDF
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
PPTX
News Bytes - December 2015
PPTX
CONFidence 2015: The Top 10 Web Hacks of 2014 - Matt Johansen, Johnathan Kuskos
PPTX
News2 bytes
PDF
Refugees on Rails Berlin - #2 Tech Talk on Security
PPTX
Bh 2014
PDF
AtlSecCon 2016
PDF
How private is your privacy?
PDF
Active Https Cookie Stealing
PDF
All aboard the Cyber Security Rollercoaster!
PDF
Red Team: Emulating Advanced Adversaries in Cyberspace
PDF
Breaching The Perimeter - Our Most Impactful Bug Bounty Findings.pdf
PPTX
How an Attacker "Audits" Your Software Systems
PPTX
Security News Bytes Null Dec Meet Bangalore
PDF
News bytes-July 2013
PPTX
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Newsbytes_NULLHYD_Dec
Cybereason - behind the HackingTeam infection server
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
News Bytes - December 2015
CONFidence 2015: The Top 10 Web Hacks of 2014 - Matt Johansen, Johnathan Kuskos
News2 bytes
Refugees on Rails Berlin - #2 Tech Talk on Security
Bh 2014
AtlSecCon 2016
How private is your privacy?
Active Https Cookie Stealing
All aboard the Cyber Security Rollercoaster!
Red Team: Emulating Advanced Adversaries in Cyberspace
Breaching The Perimeter - Our Most Impactful Bug Bounty Findings.pdf
How an Attacker "Audits" Your Software Systems
Security News Bytes Null Dec Meet Bangalore
News bytes-July 2013
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Ad

More from Splend (20)

PDF
Fiber Vakdag 2019 - Gerben Roseboom - MapXact
PDF
Fiber Vakdag 2019 - Lex Wils - FCA
PDF
Martin Pels - NLNog ring
PDF
Wido den Hollander - IPv6
PDF
Pim van Stam - BGP
PDF
Bart Lageweg - Ansible/Cobbler
PDF
6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties
PDF
HSB15 - Dr. Michel van Eeten - TU Delft
PDF
HSB15 - Xander Jansen - SURFnet
PDF
HSB15 - 0xDUDE
PDF
HSB15 - Pavel Minarik - INVEATECH
PDF
HSB15 - Aiko Pras - TU Twente
PDF
HSB15 - Lennert den Teuling - ISPConnect
PPTX
HSB15 - Richard Bosboom - HackerOne
PDF
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?
PDF
DHPA Techday 2015 - Patrick Savalle - Disruptive Technology
ODP
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into Puppet
PDF
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
PDF
DHPA Techday 2015 - Johan Benning - HP Mobility
PDF
DHPA Techday 2015 - Arjen Zonneveld - Jelte Jansen - DNSSEC College
Fiber Vakdag 2019 - Gerben Roseboom - MapXact
Fiber Vakdag 2019 - Lex Wils - FCA
Martin Pels - NLNog ring
Wido den Hollander - IPv6
Pim van Stam - BGP
Bart Lageweg - Ansible/Cobbler
6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties
HSB15 - Dr. Michel van Eeten - TU Delft
HSB15 - Xander Jansen - SURFnet
HSB15 - 0xDUDE
HSB15 - Pavel Minarik - INVEATECH
HSB15 - Aiko Pras - TU Twente
HSB15 - Lennert den Teuling - ISPConnect
HSB15 - Richard Bosboom - HackerOne
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?
DHPA Techday 2015 - Patrick Savalle - Disruptive Technology
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into Puppet
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
DHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Arjen Zonneveld - Jelte Jansen - DNSSEC College
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Hybrid model detection and classification of lung cancer
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
project resource management chapter-09.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
A Presentation on Touch Screen Technology
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
A Presentation on Artificial Intelligence
PDF
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25-Week II
Hybrid model detection and classification of lung cancer
OMC Textile Division Presentation 2021.pptx
Zenith AI: Advanced Artificial Intelligence
TLE Review Electricity (Electricity).pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
project resource management chapter-09.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Enhancing emotion recognition model for a student engagement use case through...
A novel scalable deep ensemble learning framework for big data classification...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Getting Started with Data Integration: FME Form 101
Group 1 Presentation -Planning and Decision Making .pptx
A Presentation on Touch Screen Technology
SOPHOS-XG Firewall Administrator PPT.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
A Presentation on Artificial Intelligence
Approach and Philosophy of On baking technology

HSB15 - Thijs Bosschert - Radically Open Security

  • 1. Thijs Bosschert 27 oktober 2015, Den Haag info@radicallyopensecurity.com thijs@radicallyopensecurity.com Wat hebben we geleerd van de Hacking Team hack?
  • 2. May 12, 2014 Radically Open Security Non-Profit Computer Security Consultancy We're an idealistic bunch of security researchers, networking/forensics geeks, and Capture The Flag winners that are passionate about making the world more secure. We believe in transparency and openness. And our goal is to secure the society that allows us to run a company in the first place. https://radicallyopensecurity.com/
  • 3. May 12, 2014 Thijs Bosschert Freelance Security Professional • Incident Response • Forensics • Penetration tester • Security researcher • Trainer • CTF player (Eindbazen, Hack.ERS)
  • 5. May 12, 2014 HackingTeam Source: http://www.hackingteam.it/
  • 6. May 12, 2014 HackingTeam Remote Control System Take control of your targets and monitor them regardless of encryption and mobility. It doesn’t matter if you are after an Android phone or a Windows computer: you can monitor all the devices. Remote Control System is invisible to the user, evades antivirus and firewalls… Source: http://www.hackingteam.it/images/stories/galileo.pdf
  • 7. May 12, 2014 HackingTeam Remote Control System Hack into your targets with the most advanced infection vectors available. Enter his wireless network and tackle tactical operations with ad-hoc equipment designed to operate while on the move. Keep an eye on all your targets and manage them remotely, all from a single screen. Be alerted on incoming relevant data and have meaningful events automatically highlighted. Source: http://www.hackingteam.it/images/stories/galileo.pdf
  • 8. May 12, 2014 You will be hacked Source: https://twitter.com/hackingteam/status/563356441885835264
  • 9. May 12, 2014 Imagine this Source: https://wikileaks.org/hackingteam/emails/
  • 10. May 12, 2014 You have been hacked Source: https://twitter.com/hackingteam/status/563356441885835264
  • 11. May 12, 2014 How was it done? Source: https://twitter.com/GammaGroupPR
  • 12. May 12, 2014 How was it done? Source: http://0x27.me/HackBack/0x00.txt
  • 13. May 12, 2014 0x00.txt ● Mapping out the target ● Scanning & Exploiting ● Escalating ● Pivoting ● Have Fun Source: http://0x27.me/HackBack/0x00.txt
  • 15. May 12, 2014 Bad response Source: Twitter
  • 16. May 12, 2014 Bad press reactions Source: http://www.hackingteam.it/index.php/about-us
  • 18. May 12, 2014 WikiLeaks Email DB Source: https://wikileaks.org/hackingteam/emails/
  • 19. May 12, 2014 0 days & exploits ● CVE-2015-0349 – Adobe Flash Player ● CVE-2015-2425 – IE 11 ● CVE-2015-2426 – OpenType Font Driver ● CVE-2015-5119 - Adobe Flash Player ● CVE-2015-5122 - Adobe Flash Player ● CVE-2015-5123 - Adobe Flash player
  • 20. May 12, 2014 Weak passwords ● P4ssword ● Passw0rd ● wolverine ● universo ● HTPassw0rd ● Passw0rd!81 + Password reusage Source: http://pastebin.com/bxYXHFMu
  • 21. May 12, 2014 Code like everyone is watching def content(*args) hash = [args].flatten.first || {} process = hash[:process] || ["Explorer.exe0", "Firefox.exe0", "Chrome.exe0"].sample process.encode!("US-ASCII") path = hash[:path] || ["C:Utentipippopedoporno.mpg", "C:UtentiplutoDocumentichildporn.avi", "C:secretsbomb_blueprints.pdf"].sample path = path.to_utf16le_binary_null Source: https://github.com/hackedteam/rcs- common/blob/master/lib/rcs-common/evidence/file.rb
  • 22. May 12, 2014 CIS Critical Security Controls Source: SANS 20 Critical Controls Poster
  • 23. May 12, 2014 CIS Critical Security Controls Source: SANS 20 Critical Controls Poster
  • 25. May 12, 2014 What went wrong? ● Weak passwords usage and re-usage ● No network Segmenting and protection ● No data encryption ● No secure email ● No data classification ● No monitoring ● Incorrect incident response procedures ● Usage of illegal software
  • 26. May 12, 2014 Security level Source: http://lockheedmartin.com
  • 27. May 12, 2014 Protection level Source: http://www.slideshare.net/jaredcarst/cyber-threats-cybersecurity-are-you-ready
  • 28. May 12, 2014 Wat hebben we geleerd? Als security bedrijf ben je een gewild target voor aanvallers, dan kan je maar beter zorgen dat je daar dan ook op voorbereid bent.