everyoneshouldbea pen tester - scale · you have never had a pen tester come in and try to break...

7
Please view my linked-in page (under See more) to get a copy of this presenta<on. I can’t post the names companies I work do consul<ng for much of the <me; because they are trying to shore up their systems before bad things happen. If you have any ques<ons, please contact me via email. Thanks, Ty 1 SCALE 15x (c) 2017 Ty Shipman Everybody should be a PEN tester

Upload: others

Post on 25-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EveryoneShouldBeA PEN Tester - SCALE · You have never had a PEN tester come in and try to break into your systems. Like most IT/Network/DevOps people you have to learn new skills

Pleaseviewmylinked-inpage(underSeemore)togetacopyofthispresenta<on.Ican’tpostthenamescompaniesIworkdoconsul<ngformuchofthe<me;becausetheyaretryingtoshoreuptheirsystemsbeforebadthingshappen.Ifyouhaveanyques<ons,pleasecontactmeviaemail.Thanks,Ty

1SCALE15x(c)2017TyShipman

EverybodyshouldbeaPENtester

Page 2: EveryoneShouldBeA PEN Tester - SCALE · You have never had a PEN tester come in and try to break into your systems. Like most IT/Network/DevOps people you have to learn new skills

Pleaseholdques<onstotheend.ThisaLIGHTINGtalkwithlotsofinfo.Slideswillbepostedbytheconferenceteam,orlookonmylinked-inprofile(under“Seemore…”)foralinktodownload.Doyouknowhowwellyouareprotec<ngyoursystems,canyouproveit? Canyouthinklikeahacker?ThistalkisaresultofalessonIlearnedaXertakingaPENtesttrainingclassoneweekend.MoretrainingandworkaXerthatwasrequiredtobecomeamoderatelysuccessfulPENtester.Idon’tdoPENtes<ngforalivingyet;IjustusemyinadequateskillstoscaremyclientsintohiringgreatPENtestersandadop<ngsomeofthesolu<onsIsuggestaXerIauditthem.1)  IcontendthatifyoudonoknowthebasicsofPENtes<ng(a[ack),youcannot

adequatelyprotect(defend)yourenvironment.Nordoyouunderstandwhyyouaredoingsomeofthetasksyouaredoingtodaytotrytoprotectyourenvironment.

2)  MostpeopleinthisroomorreadingtheseslideseitherITorDevOpsprofessionals.Youarewearingmanyhats;youroverworked,andmaybeevenbeunderpaid.ButifyoucannotPENtestyourhostsandapplica<onsatabasiclevel;thusaler<ngyourteamoryourselftothevulnerabili<esthatascriptkiddymayfindyouarenotdoinganadequatejob.

3)  Mypresenta<onwilllayoutanargumentthatIhopewillcauseyoutogoandseekaweekendsworth(ormore)ofPENtesteduca<on.Why,youareaprofessionalandneedtokeepyouskillscurrent,soaddanewbolttoyourquiverandmaybeevengetaraise.WhoknowsyoumightevenjumptoPENtes<ngasyournextcareer.

2SCALE15x(c)2017TyShipman

EverybodyshouldbeaPENtester

Page 3: EveryoneShouldBeA PEN Tester - SCALE · You have never had a PEN tester come in and try to break into your systems. Like most IT/Network/DevOps people you have to learn new skills

TheplanbothhackersandPENtestersisroughlythesame.Bothwanttogetinandreachtheirdesiredgoal.ThePENtester’sgoalistoprovetheywereonyoursystem(screendumpofroot/Adminlogin);hackerswant…–youmaketheguess.Iwillsaythis--ifadedicatedhackerteam(organizedcrime,na<onstate)wantsin,theywillfindaway.Youwanttomakeithardersoyoudon’tendupavic<mofasmashandgrabhack;e.g.addbartothewindowsanddoors,outsidelights,aroamingsecurityguard,dogs,aminefield,….•Reconnaissanceoftarget

nmap,studyAPI,applica<ons,VULScanOldOS/soXware,vulnerableconfigura<ononswitchesandsoXware--findweakness

•Exploita<onofvulnerability

Applyoneoftheknownexploits(Metasploitmodule),ordevelopanewone•Escalate

Gettoroot/adminaccountsotheyownmachine•MoveLaterally(expandaccess)

Godeeperintoenvironment•Repeatun<l…Desiredgoalreach

3SCALE15x(c)2017TyShipman

EverybodyshouldbeaPENtester

Page 4: EveryoneShouldBeA PEN Tester - SCALE · You have never had a PEN tester come in and try to break into your systems. Like most IT/Network/DevOps people you have to learn new skills

Iamgoingtomakealotofassump<onshere,notallofthemwillbecorrect,butsomewillbe.Ifanyoneoftheseistrue,thenyoulikelyhavevulnerabili<esinyourenvironmentthatcanbeexploited.Youdon’tworkfora250+personcompanyandlikelydon’thaveadedicatedsecurityperson/teamtohelpyouprotectyourenvironment.YouhaveneverhadaPENtestercomeinandtrytobreakintoyoursystems.LikemostIT/Network/DevOpspeopleyouhavetolearnnewskillsallthe<meandmostsolu<onsaretakingsnippetsofcode/configura<on/knowledgefromGoogleresultsandapplyingthem–soyoumightnothaveafullpictureoftheissuesathandwhenitcomestosecurity.Youdon’tconfigureyoursystems,applica<onstacksusinganystandards.Didyouknowtherearegoodsecurity/hardeningstandardsforWindowsServers,Apache,andLinux/Unixavailable?LookupCIShardeningstandards.Youoryourmanagementthinkyourfirewallwillkeepthebadguysout.YouneedtoaddIDS,AVSsystembasedonbehavior,FIMandlogmanagement,monitoringandaler<ngsystems.YouoryourmanagementthinkyourIDSwillhelpyoustophackers–itonlyalertyoumostofthe<me.Youdon’taggressivelypatchyoursystemsandapplica<onstacks.

Whenwasthelast+meyourestartedallyourLinux2.xor3.xkernelsystems?AreyouonLinuxKernel4.0orhavealivepatchinginstalled?

4SCALE15x(c)2017TyShipman

EverybodyshouldbeaPENtester

Page 5: EveryoneShouldBeA PEN Tester - SCALE · You have never had a PEN tester come in and try to break into your systems. Like most IT/Network/DevOps people you have to learn new skills

1).Oldsystemscanbeownedbybadactorsinminutes,youlearnhowtoownahostintheAMpartofabasicPENtes<ngclass.Anyonehaveanoldcardkeymanagementsystemaround?Howaboutthefrontdesksecurityguardsta<onhost?2).Failuretoinstallcri<calsecuritypatchesislikeleavingawindowopenwhenyouhavebarsonthefrontdoor.Onceavulnerabilityisannounced,thereisusuallyanexploitavailablewithin2-3weeksontheDarkWeb.Theearlyversionscostseveralhundreddollars,latertheygodowntothe10s.Ihaveheardsta<csthatsayyoucanrentaBotnetsfor$1000-2000thatyoucanscantheInternetinlessthan24hoursforasinglevulnerability.3).BruteforcingpasswordsonhostsandVPNarenowanorm.DoyoulockoutaXer6a[empts?4).NMAPALLyourexternalIPaddress,findoutwhatisopen.RunningonAWS,GoogleorAsure–reviewsecurityrules.5/6).SCALE15XsitereceivedanA,mymedicalhistorysitereceivedaCbeforeIreportedissue,nowA-.7/8)..DTP–DynamicTruckingProtocol–abadactorcanskiparoundyourVLANSifnotlockeddown.Seeh[ps://digi.ninja/blog/abusing_dtp.phpformoreinfo.

Lastly,ifyoucandoit,setswitchestoacceptonly1MACaddress(Lookup‘S+ckyMAC’or‘port-securitymac-address’)–becarefulhere.

5SCALE15x(c)2017TyShipman

EverybodyshouldbeaPENtester

Page 6: EveryoneShouldBeA PEN Tester - SCALE · You have never had a PEN tester come in and try to break into your systems. Like most IT/Network/DevOps people you have to learn new skills

BothKaliandMetasploithavecommunityversionsthatarefreetouse,theyaremaintainedbysecuritycompaniesthatspecializeinoffensivePENtes<ng.ncènetcatMetasploitisagreatpackage.Ithassomanyofthebasicexploits(exploitsarehowtoabuseavulnerability,theyinclude0-day,remotea[acks,shellcodehacks).YouneedtodoPENtes<ngthatitisusedbymanyscriptkiddiestobreakintosystemallovertheplace.Learningthebasicstakesafewhours,toreallygetagoodgrasponthesystemyouneedabout30hours.

Vendor VUL

MicrosoX 4700+Oracle 4100+Apple 3600+PHP 550+Google 2300+

6SCALE15x(c)2017TyShipman

EverybodyshouldbeaPENtester

Page 7: EveryoneShouldBeA PEN Tester - SCALE · You have never had a PEN tester come in and try to break into your systems. Like most IT/Network/DevOps people you have to learn new skills

NowthatIhavescared,letmetellyouwhereyoucangetsomeskillstobecomeaPENtestertohelpyouplugtheleaksinyourenvironment.IfyouarenotintheSouthernCaliforniaarea,IsuggestyoulookonlinefortrainingbylocalOWASP,IEEE,ISSAandACMchapters.BeyondthelinkslistedaboveyoushouldsubscribetotheNVDlistthatsendoutweeklyandzerodayalerts:h[ps://nvd.nist.gov/

7SCALE15x(c)2017TyShipman

EverybodyshouldbeaPENtester