SlideShare a Scribd company logo
Paula Januszkiewicz
CQURE: CEO, Penetration Tester / Security Expert
CQURE Academy: Trainer
MVP: Enterprise Security, MCT
Contact: paula@cqure.us | http://cqure.us
@paulacqure
@CQUREAcademy
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Technical systems are:
Reviewed
Scanned
Penetration Tested
So?
Key learning points:
 Windows Firewall is often misconfigured
 Firewall is a great segmentation tool
 You can allow only certain processes to communicate
with the Internet or locally
 No need to know processes to block them, you can
operate on the services list
In Windows Firewall there are couple of things missing:
x Filtering by the group of computers
x Detailed logging for network traffic
x Expandability – there are not many options
x No correlation in between process and network traffic –
whose role is this?
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Key learning points:
 Almost always there are passwords reused
 Almost always (ekhm… always) there is some variant of
company name and some number (year, month etc.)
 It makes sense to check for obvious passwords and
continuously deliver security awareness campaigns
Typical password locations
NTDS.dit, SAM
Configuration files
Registry
Memory dumps, Hiberfil.sys
Databases (DPAPI ?)
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Key learning points:





x
x
x
No-brainer or unseen network security threat?
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Key learning points:
 Set SPNs for services to avoid NTLM:
SetSPN –L <your service account for AGPM/SQL/Exch/Custom>
SetSPN –A Servicename/FQDN of hostname/FQDN of domain
domainserviceaccount
 Reconsider using Kerberos authentication all over
https://technet.microsoft.com/en-us/library/jj865668.aspx
 Require SPN target name validation
Microsoft network server: Server SPN target name validation level
 Reconsider turning on SMB Signing
 Reconsider port filtering
 Reconsider code execution prevention but do not forget that
this attack leverages administrative accounts
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Key learning points:
Common file formats containing malware are:
 .exe (Executables, GUI, CUI, and all variants like PIF, SCR, CPL,
BAT, COM, CMD etc)
 .dll (Dynamic Link Libraries)
 .vbs (Script files like JS, JSE, VBS, VBE, PS1, PS2, CHM etc)
 .docm, .xlsm etc. (Office Macro files)
 .other (LNK, PDF etc.)
If SafeDllSearchMode is enabled, the search order is as follows:
1. The directory from which the application loaded
2. The system directory
3. The 16-bit system directory
4. The Windows directory
5. The current directory
6. The directories that are listed in the PATH environment
variable
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Key learning points:




x


Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Key learning points:
 The best operators won't use a component until they
know how it breaks.
 Almost each solution has some ‘backdoor weakness’
 Some antivirus solutions can be stopped by SDDL
modification for their services
 Configuration can be monitored by Desired State
Configuration (DSC)
 DSC if not configured properly will not be able to spot
internal service configuration changes
Example: how to I get to the password management
portal?
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Key learning points:
 gMSA can also be used for the attack
 Service accounts’ passwords are in the registry, available online
and offline
 A privileged user is someone who has administrative access to
critical systems
 Privileged users have sometimes more access than we think (see:
SeBackupRead privilege or SeDebugPrivilege)
 Privileged users have possibility to read SYSTEM and SECURITY
hives from the registry
Warning! Enabling Credential Guard blocks:
x Kerberos DES encryption support
x Kerberos unconstrained delegation
x Extracting the Kerberos TGT
x NTLMv1
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Key learning points:
 Worldwide spending on information security is expected to reach
$90 billion in 2017, an increase of 7.6 percent over 2016, and to top
$113 billion by 2020, according to advisory firm Gartner
 With increasing budget the risk of possessing hipster tools increases
too – do we know where these tools come from and what are their
security practices?
 Lots of solutions where not created according to the good security
practices (backup software running as Domain Admin etc.)
 Each app running in the user’s context has access to secrets of other
apps – Data Protection API
 Case of CCleaner
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Infrastructure can be a silent
killer
Vulnerability Management
Put on the Hacker’s Shoes
External + Internal + Web Penetration tests
Configuration reviews
Prevention
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking

More Related Content

PDF
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
PDF
Gartner Security & Risk Management Summit 2018
PPTX
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
PDF
Dear Hacker: Infrastructure Security Reality Check
PPTX
RSA Conference 2017 session: What System Stores on the Disk Without Telling You
PDF
rsa-usa-2019-keynote-paula-januszkiewicz
PPTX
RSA Conference 2017 session: Hacker’s Perspective on Your Windows Infrastruct...
PDF
Top 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth Taking
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
Gartner Security & Risk Management Summit 2018
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
Dear Hacker: Infrastructure Security Reality Check
RSA Conference 2017 session: What System Stores on the Disk Without Telling You
rsa-usa-2019-keynote-paula-januszkiewicz
RSA Conference 2017 session: Hacker’s Perspective on Your Windows Infrastruct...
Top 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth Taking

What's hot (20)

PPTX
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics ...
PPTX
12 Crucial Windows Security Skills for 2018
PPTX
Microsoft Ignite session: Explore adventures in the underland: forensic techn...
PPTX
12 Crucial Windows Security Skills for 2017
PPTX
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
PDF
30 Cybersecurity Skills You Need To Become a Windows Security Pro
PPTX
Fatal signs: 10 symptoms when you think you’ve been hacked
PPT
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
PPTX
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
PDF
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
PDF
BlueHat v18 || May i see your credentials, please
PDF
13. Neville Varnham - PeopleSoft Cyber Security
PDF
BlueHat v18 || Malicious user profiling using a deep neural net
PDF
ReCertifying Active Directory
ODP
Hardening Database Server
PDF
Hunting for Credentials Dumping in Windows Environment
PPTX
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
PPT
Design for security in operating system
PDF
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
PPT
Windows network
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics ...
12 Crucial Windows Security Skills for 2018
Microsoft Ignite session: Explore adventures in the underland: forensic techn...
12 Crucial Windows Security Skills for 2017
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
30 Cybersecurity Skills You Need To Become a Windows Security Pro
Fatal signs: 10 symptoms when you think you’ve been hacked
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
BlueHat v18 || May i see your credentials, please
13. Neville Varnham - PeopleSoft Cyber Security
BlueHat v18 || Malicious user profiling using a deep neural net
ReCertifying Active Directory
Hardening Database Server
Hunting for Credentials Dumping in Windows Environment
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Design for security in operating system
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
Windows network

Similar to Top 10 ways to make hackers excited: All about the shortcuts not worth taking (20)

PDF
Securing DevOps through Privileged Access Management
PPT
Ch11 system administration
PDF
Remote security with Red Hat Enterprise Linux
PPTX
First Responders Course - Session 6 - Detection Systems [2004]
PDF
Tips to Remediate your Vulnerability Management Program
ODP
CISSP Week 14
PPT
Ch19 OS
 
PPT
PPTX
Windows Defense101
PDF
Bsides Tampa Blue Team’s tool dump.
PPTX
Security & protection in operating system
PDF
Virtualizacion y sistemas operativos por microsoft. Contempla seguridad
PDF
Object Oriented Programming
PDF
Building your macOS Baseline Requirements MacadUK 2018
PPT
0828 Windows Server 2008 新安全功能探討
PDF
Module 5 (system hacking)
PPT
3.Secure Design Principles And Process
PDF
Incident handling is a clearly defined set of procedures to manage and respon...
Securing DevOps through Privileged Access Management
Ch11 system administration
Remote security with Red Hat Enterprise Linux
First Responders Course - Session 6 - Detection Systems [2004]
Tips to Remediate your Vulnerability Management Program
CISSP Week 14
Ch19 OS
 
Windows Defense101
Bsides Tampa Blue Team’s tool dump.
Security & protection in operating system
Virtualizacion y sistemas operativos por microsoft. Contempla seguridad
Object Oriented Programming
Building your macOS Baseline Requirements MacadUK 2018
0828 Windows Server 2008 新安全功能探討
Module 5 (system hacking)
3.Secure Design Principles And Process
Incident handling is a clearly defined set of procedures to manage and respon...

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Big Data Technologies - Introduction.pptx
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
cuic standard and advanced reporting.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Modernizing your data center with Dell and AMD
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
Big Data Technologies - Introduction.pptx
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Empathic Computing: Creating Shared Understanding
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Network Security Unit 5.pdf for BCA BBA.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

Top 10 ways to make hackers excited: All about the shortcuts not worth taking

  • 1. Paula Januszkiewicz CQURE: CEO, Penetration Tester / Security Expert CQURE Academy: Trainer MVP: Enterprise Security, MCT Contact: paula@cqure.us | http://cqure.us @paulacqure @CQUREAcademy
  • 4. Key learning points:  Windows Firewall is often misconfigured  Firewall is a great segmentation tool  You can allow only certain processes to communicate with the Internet or locally  No need to know processes to block them, you can operate on the services list In Windows Firewall there are couple of things missing: x Filtering by the group of computers x Detailed logging for network traffic x Expandability – there are not many options x No correlation in between process and network traffic – whose role is this?
  • 6. Key learning points:  Almost always there are passwords reused  Almost always (ekhm… always) there is some variant of company name and some number (year, month etc.)  It makes sense to check for obvious passwords and continuously deliver security awareness campaigns Typical password locations NTDS.dit, SAM Configuration files Registry Memory dumps, Hiberfil.sys Databases (DPAPI ?)
  • 10. Key learning points:  Set SPNs for services to avoid NTLM: SetSPN –L <your service account for AGPM/SQL/Exch/Custom> SetSPN –A Servicename/FQDN of hostname/FQDN of domain domainserviceaccount  Reconsider using Kerberos authentication all over https://technet.microsoft.com/en-us/library/jj865668.aspx  Require SPN target name validation Microsoft network server: Server SPN target name validation level  Reconsider turning on SMB Signing  Reconsider port filtering  Reconsider code execution prevention but do not forget that this attack leverages administrative accounts
  • 12. Key learning points: Common file formats containing malware are:  .exe (Executables, GUI, CUI, and all variants like PIF, SCR, CPL, BAT, COM, CMD etc)  .dll (Dynamic Link Libraries)  .vbs (Script files like JS, JSE, VBS, VBE, PS1, PS2, CHM etc)  .docm, .xlsm etc. (Office Macro files)  .other (LNK, PDF etc.) If SafeDllSearchMode is enabled, the search order is as follows: 1. The directory from which the application loaded 2. The system directory 3. The 16-bit system directory 4. The Windows directory 5. The current directory 6. The directories that are listed in the PATH environment variable
  • 18. Key learning points:  The best operators won't use a component until they know how it breaks.  Almost each solution has some ‘backdoor weakness’  Some antivirus solutions can be stopped by SDDL modification for their services  Configuration can be monitored by Desired State Configuration (DSC)  DSC if not configured properly will not be able to spot internal service configuration changes Example: how to I get to the password management portal?
  • 20. Key learning points:  gMSA can also be used for the attack  Service accounts’ passwords are in the registry, available online and offline  A privileged user is someone who has administrative access to critical systems  Privileged users have sometimes more access than we think (see: SeBackupRead privilege or SeDebugPrivilege)  Privileged users have possibility to read SYSTEM and SECURITY hives from the registry Warning! Enabling Credential Guard blocks: x Kerberos DES encryption support x Kerberos unconstrained delegation x Extracting the Kerberos TGT x NTLMv1
  • 22. Key learning points:  Worldwide spending on information security is expected to reach $90 billion in 2017, an increase of 7.6 percent over 2016, and to top $113 billion by 2020, according to advisory firm Gartner  With increasing budget the risk of possessing hipster tools increases too – do we know where these tools come from and what are their security practices?  Lots of solutions where not created according to the good security practices (backup software running as Domain Admin etc.)  Each app running in the user’s context has access to secrets of other apps – Data Protection API  Case of CCleaner
  • 24. Infrastructure can be a silent killer Vulnerability Management Put on the Hacker’s Shoes External + Internal + Web Penetration tests Configuration reviews Prevention

Editor's Notes

  • #6: Story of dissapointment
  • #9: [60] Normalnie takie rzczy sa po patchowaniu. Skrypt – informacja – RDP Operational Prefetch – mimikatz.
  • #10: [50]How can we use MSDCC2 within the attack? Is it really useless for bad guys?
  • #11: [60] Broadcast Domain The set of all devices that will receive broadcast frames originating from any device within the set. Broadcast domains can be bounded by VLANs in a stand-alone environment. In an interworking environment, they are typically bounded by routers because routers do not forward broadcast frames.
  • #12: [50]How can we use MSDCC2 within the attack? Is it really useless for bad guys?
  • #14: [50]How can we use MSDCC2 within the attack? Is it really useless for bad guys?
  • #15: [CC] wallpapers-and-backgrounds.net Note that this does not include the per-application path specified by the App Paths registry key. The App Paths key is not used when computing the DLL search path.
  • #17: https://twitter.com/thedudolf
  • #18: Exclude all Microsoft-signed image loads: <ImageLoad onmatch="exclude"> <Signature condition="contains">Microsoft</Signature> <Signature condition="contains">Windows</Signature> </ImageLoad>
  • #19: http://www.ebay.com/itm/11114-E-Novelty-Pipe-Raccoon-Life-Size-Taxidermy-Mount-Coon-Possum-/161031671900 Over the years vulnerabilities have been and continue to be discovered in the deprecated SSL protocols (e.g. POODLE, DROWN). Most modern browsers will show a degraded user experience (e.g. line through the padlock or https in the URL bar, security warnings) when they encounter a web server using the old protocols. For these reasons, you should disable SSL 2.0 and 3.0 in your server configuration, leaving only TLS protocols enabled. Some of things that v1.3 is going to provide: Complete removal of things that are known to be cryptographically weak such as MD5, RC4, and weak elliptic curves Dropping support for seldom-used features like compression and “change cipher” ciphers; and adding new elliptic curves  It will be much faster and resilient to attack that break older versions of the TLS protocol
  • #20: [50]How can we use MSDCC2 within the attack? Is it really useless for bad guys?
  • #22: [50]How can we use MSDCC2 within the attack? Is it really useless for bad guys?
  • #23: [60] Normalnie takie rzczy sa po patchowaniu. Skrypt – informacja – RDP Operational Prefetch – mimikatz. gMSA powinny byc tak samo monitorowane
  • #24: [50]How can we use MSDCC2 within the attack? Is it really useless for bad guys?
  • #26: [50]How can we use MSDCC2 within the attack? Is it really useless for bad guys?
  • #27: Licence: Common Infrastructure can be a silent killer. One day you’re running a company to deliver something special and new to customers — completely unrelated to the underlying technology making it possible — and the next, you’re stymied by bills or bugs. Not to mention, plagued by performance problems. How disappointing to get taken down by something so foundational when your company is taking off! Yet it happens all the time.