gone in 60 minutes – practical approach to hacking an enterprise with yasuo

33
Gone in 60 minutes A Practical Approach to Hacking an Enterprise with YASUO Saurabh Harit {@0xsauby} Stephen Hall {@_stephen_h}

Upload: saurabhharit

Post on 16-Nov-2014

367 views

Category:

Presentations & Public Speaking


0 download

DESCRIPTION

Research talk presented at Derbycon 4.0 & Toorcon XVI

TRANSCRIPT

Page 1: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Gone in 60 minutes

A Practical Approach to Hacking an Enterprise with

YASUO

Saurabh Harit {@0xsauby}Stephen Hall {@_stephen_h}

Page 2: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

root@msf:~$>getuid

Saurabh Harit (@0xsauby)Director of Security Research @Security Compass

Pentester i.e. Domain Admin at many companies

Have a secret crush on reverse engineering

Gym freak / Proud father of two beautiful dogs

Stephen Hall (@_stephen_h)Security Consultant @Security Compass

Owner of a Christmas hat

Page 3: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

What this talk is not about

No 0-days

No Shells

Page 4: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

ScenarioYou’re on a red-team engagement

You’ve bypassed physical security

You’ve bypassed NAC

What next? How would you pwn the network?

Vulnerability scanner?

Page 5: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

The ProblemCan’t use network vulnerability scanner

Have to be Stealth & Quick

Can’t use Google dorks (internal network)site, link, inurl

Page 6: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Where do $hells come from?

It’s not about what, it’s about

WHERE

Page 7: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Popular Vulnerable Apps

Apache Tomcat

Page 8: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Popular Vulnerable Apps

JBoss jmx-console

Page 9: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Popular Vulnerable Apps

Hudson Jenkins

Page 10: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

$hells

Page 11: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Not So Popular Vulnerable Apps

ADManager Plus

Page 12: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Not So Popular Vulnerable Apps

ADManager Plus

Page 13: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Not So Popular Vulnerable Apps

Cyberoam UTM

Page 14: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Not So Popular Vulnerable Apps

Cyberoam UTM

Page 15: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

YASUO what???

Written in ruby

Did not write it on our flight here

Scans the network for vulnerable applications

Currently supports around 100+ vulnerable applications

All currently supported apps are Metasploit-able

Page 16: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Why YasuoBecause there are tons of vulnerable applications and its not easy to find them

Page 17: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

World Without Automation Run nmap scan & manually poke each & every web port

This CANNOT be fun

Page 18: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

What’s currently out there

Nikto by Chris Sullohttps://www.cirt.net/Nikto2

Nmap script – http-enum.nse by Ron Bowes, Andrew Orr, Rob Nicholls

http://nmap.org/nsedoc/scripts/http-enum.html

Nmap script – http-default-accounts.nse by Paulino Calderon

https://www.nmap.org/nmap-exp/calderon/scripts/http-default-accounts.nse

Page 19: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Exploring Yasuo

Page 20: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Exploring Yasuo

Page 21: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

What’s in the Box

yasuo.rb

resp200.rb

default-path.csv

users.txt

pass.txt

GPL

Page 22: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

What’s in the Box

Page 23: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Behind the ScenesDetects false-positives

Automatically extracts login form

Automatically extracts login parameters

Page 24: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

What’s New

Page 25: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

RaNdOmIzAtIoN!!!

More robust check to detect false positives

Properly formatted output table

More application signatures

Signatures for IP Cameras / Encoder / Decoders

Modular & Cleaned-up Code – if there is any such thing

Page 26: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Demo Time

Page 27: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

ChallengesExploit-db – great resource but inconsistent format

Page 28: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

ChallengesDynamic detection of login page and parameters is regex based.

Page 29: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Future Development

Smarter version detection

Support masscan output format (because y’all love to scan the Interwebs)

Add support for more vulnerable applications, Ofcourse

Add secondary signature

Make current crappy code modular

Add multi-threading

Add support for vFeed???

Change format of default path file – CSV to YAML? or JSON?

Page 30: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

CFH (cry for help)

Signatures Signatures Signatures & Signatures

Please submit application signatures:Post a comment on Github

Update default path file on Github

Drop us an Email

Send a Pigeon.

Page 31: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Questions??? or not

Page 32: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Thank You!

_stephen_h [email protected]

0xsauby [email protected]

https://github.com/0xsauby/yasuo

Page 33: Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

Credit

Nmap ruby library - https://github.com/sophsec/ruby-nmap

The Exploit Database (EDB) - http://www.exploit-db.com/

@funkaoshi

Google Image Cache