tactical-deception-driven defense.key

76
Deception Driven Defense

Upload: lecong

Post on 01-Jan-2017

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: tactical-deception-driven defense.key

Deception Driven Defense

Page 2: tactical-deception-driven defense.key

Greg Foss

Head of Security Operations

OSCP, GAWN, GPEN, GWAPT, GCIH, CEH, CYBER APT

# whoami

Page 3: tactical-deception-driven defense.key

Diversion & Deception in Warfare

Draw Attention Away From True Attack Point

Mislead With False Appearance

Gain Advantage Over Enemy

“All war is based on deception” -Sun Tzu

Page 4: tactical-deception-driven defense.key

Operation Mincemeat - 1943

Operation Zeppelin - 1944

Battle of Megiddo - 1918

Operation Bodyguard - 1942

Operation Anadyr - 1962

..and many more

Diversion & Deception in Warfare

Page 5: tactical-deception-driven defense.key

Operation Mincemeat - 1943

Germans find British corpse from sunken enemy warship

1.

Page 6: tactical-deception-driven defense.key

Operation Mincemeat - 1943

Corpse holds Plans to upcoming attack in Greece

2.

Page 7: tactical-deception-driven defense.key

Operation Mincemeat - 1943

Germans move defenses from Sicily to Greece

3.

Page 8: tactical-deception-driven defense.key

Operation Mincemeat - 1943

Allied Nations invade Sicily

4.

Page 9: tactical-deception-driven defense.key

9

Page 10: tactical-deception-driven defense.key

Apply this to InfoSec?

Page 11: tactical-deception-driven defense.key

In Practice

Network

Data HumanDefense

Page 12: tactical-deception-driven defense.key

First things first…Baseline security controls!

Warning banners are critical and assist in the event prosecution is necessary / desired.

Page 13: tactical-deception-driven defense.key
Page 14: tactical-deception-driven defense.key

HoneypotsEasy to configure, deploy, and maintain

Fly traps for anomalous activity

You will learn a ton about your adversaries. Information that will help in the future…

Page 15: tactical-deception-driven defense.key

Subtle Traps

Catch Internal Attackers

Observe Attack Trends

Decoy From Real Data

Waste Attackers Time

Honeypot Use Cases

Page 16: tactical-deception-driven defense.key

Fake Web Applications

github.com/gfoss/phpmyadmin_honeypot

Page 17: tactical-deception-driven defense.key

$any-web-app

Custom + Believable, with a Hidden Motive

Page 18: tactical-deception-driven defense.key
Page 19: tactical-deception-driven defense.key

Passive Honeypots

19https://chloe.re/2015/06/20/a-month-with-badonions/

Page 20: tactical-deception-driven defense.key

Passive Honeypots

20https://chloe.re/2015/06/20/a-month-with-badonions/

Page 21: tactical-deception-driven defense.key

Passive Honeypots

21https://chloe.re/2015/06/20/a-month-with-badonions/

Page 22: tactical-deception-driven defense.key
Page 23: tactical-deception-driven defense.key

Honey Tokens and Web Bugs

Page 24: tactical-deception-driven defense.key

Issues with Document Tracking

Page 25: tactical-deception-driven defense.key

Issues with Document Tracking

Page 26: tactical-deception-driven defense.key

Issues with Document Tracking

Page 27: tactical-deception-driven defense.key

Zip BombsAdobeFlash.zip

42 bytes 4.5 petabytes

www.unforgettable.dk

Page 28: tactical-deception-driven defense.key
Page 29: tactical-deception-driven defense.key

Keys to Success

Real World Awareness Training

Use a Blended Approach to Exercises

Gather Metrics for Program Improvements

Note: Never Punish or Embarrass Users!

Page 30: tactical-deception-driven defense.key

Scope Social Habits

Public Information

Username Correlation

Application Usage

“Private” Information

Examine Network Usage

Page 31: tactical-deception-driven defense.key

“Free” Coupons!QR Destination as training or

phishing site

Print > Place on Cars in Lot

Rate of Connections

Rate Reported to Security

Track via internal IP address

Page 32: tactical-deception-driven defense.key

Targeted Spear Phishing

Open Attachment Rate

Open Message Rate

Martin Bos & Eric Milam SkyDogCon 2012 - Advanced Phishing Tactics

Beyond User Awareness

Defense Success / Failures

Response / Exploitation Rate

Page 33: tactical-deception-driven defense.key

Rogue Wi-Fi

Setup Wi-Fi Access Provide Fake Landing Page Get Credentials!

Connection Rate Credential Submission Rate Report to Security Rate

www.slideshare.net/heinzarelli/wifi-hotspot-attacks

https://youtu.be/v36gYY2Pt70

Page 34: tactical-deception-driven defense.key

USB Drop Case Study

Page 35: tactical-deception-driven defense.key

Building a Believable CampaignUSB Human Interface Device (HID) attacks are too obvious. A dead giveaway that the target just compromised their system.

http://hakshop.myshopify.com/products/usb-rubber-ducky-deluxe?variant=353378649

Page 36: tactical-deception-driven defense.key

Building a Believable Campaign

Use Realistic Files with somewhat realistic data

Staged approach to track file access and exploitation

Page 37: tactical-deception-driven defense.key
Page 38: tactical-deception-driven defense.key
Page 39: tactical-deception-driven defense.key

Webbug file opened from within your company network?

Correlate using Network Security Tools to find out who it was

Tracking File Access

Page 40: tactical-deception-driven defense.key

Who Opened the File?

Page 41: tactical-deception-driven defense.key
Page 42: tactical-deception-driven defense.key
Page 43: tactical-deception-driven defense.key
Page 44: tactical-deception-driven defense.key

Compress the PowerShell Script

Page 45: tactical-deception-driven defense.key
Page 46: tactical-deception-driven defense.key
Page 47: tactical-deception-driven defense.key
Page 48: tactical-deception-driven defense.key
Page 49: tactical-deception-driven defense.key

You may want to use a bogus email address, unlike I did here…

I know, I know, Bad OpSec…

Send email when macro is run

Page 50: tactical-deception-driven defense.key
Page 51: tactical-deception-driven defense.key
Page 52: tactical-deception-driven defense.key

“Nobody’s going to run an executable from some random USB” - Greg

Page 53: tactical-deception-driven defense.key

At least they didn’t run it as an Admin

But… We now have our foothold…

Page 54: tactical-deception-driven defense.key

Macro Attack Detection

Page 55: tactical-deception-driven defense.key

Malware Beaconing Detection

Page 56: tactical-deception-driven defense.key
Page 57: tactical-deception-driven defense.key

Red Teaming

Not Penetration Testing!

No Scope Restrictions

Page 58: tactical-deception-driven defense.key
Page 59: tactical-deception-driven defense.key

Offensive Honeypots

All of these tools have something in common…

● Configuration Management Systems

● Vulnerability Scanners

● System Health Checks

They tend to log in to remote hosts!

Page 60: tactical-deception-driven defense.key

Simulate SSH service

Stand this up during internal penetration test

Catch Credentials...

Page 61: tactical-deception-driven defense.key

#!/bin/bash

attempts=$(cat /opt/kippo/log/kippo.log | grep 'login attempt' | wc -l);

echo ""

echo $attempts" => login attempts"

echo "--------------------"

cat /opt/kippo/log/kippo.log | \

grep 'login attempt' | \

cut -d "," -f 3,4,5 | \

awk '{print "["$1" "$4}'

echo "--------------------"

echo ""

Page 62: tactical-deception-driven defense.key

Social Engineering

Page 63: tactical-deception-driven defense.key

Social Engineering

WYSINWYC

http://thejh.net/misc/website-terminal-copy-paste

Page 64: tactical-deception-driven defense.key

DEMO

Page 65: tactical-deception-driven defense.key

Post-Exploitation Tricks

Use Deception to:

Elevate Privileges

Access Protected Resources

Pivot and Move Laterally

Etc.

Page 66: tactical-deception-driven defense.key

OS X - AppleScript

fuzzynop.blogspot.com/2014/10/osascript-for-local-phishing.html

Page 67: tactical-deception-driven defense.key

DEMO

Page 68: tactical-deception-driven defense.key

Windows - PowerShell

github.com/gfoss/misc/blob/master/PowerShell/popuppwn.ps1

Page 69: tactical-deception-driven defense.key

DEMO

Page 70: tactical-deception-driven defense.key

Attack Security Tools

● Generate False and/or Malformed Logs

● Spoof Port Scanning Origins

$ sudo nmap -sS -P0 -D sucker target(s)

● Block UDP Port 514 or disable logging service

● Capture Service Account Credentials

● Wear AV like a hat and backdoor legitimate programs on the shares…

Page 71: tactical-deception-driven defense.key

https://www.shellterproject.com/

Page 72: tactical-deception-driven defense.key
Page 73: tactical-deception-driven defense.key

Target IT Staff…

It’s broken. :-(

I don’t know what

happened…

Can you fix it?

github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz

Page 74: tactical-deception-driven defense.key

In Conclusion

Network

Data HumanDefense

Page 75: tactical-deception-driven defense.key

Recommended ResourcesRed Team: How to Succeed By Thinking Like the Enemy Micah Zenko

Offensive Countermeasures: The Art of Active Defense Paul Asadoorian and John Strand

Reverse Deception: Organized Cyber Threat Counter-exploitation. Sean Bodmer

Second World War Deception: Lessons Learned from Today’s Joint Planner Major Donald J. Bacon, USAF

Page 76: tactical-deception-driven defense.key

Thank You!

Questions?

Greg Fossgreg.foss [at] LogRhythm.com

@heinzarelli