SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
HOW TO CATCH YOUR “HACKER”
            OR
    MAKESHIFT SECURITY

         Sergey Soldatov
            Igor Gots
AGENDA
• Water
• Fishing
• Fishbite
• Hookset




ZERONIGHTS 2012 GOTS/SOLDATOV   2
W?




ZERONIGHTS 2012 GOTS/SOLDATOV   3
W?




ZERONIGHTS 2012 GOTS/SOLDATOV   4
INFOSECURITY DEPT. HAS TO

• Write corporate regulations
• Make assessments (compliance &/| pentest)
• Monitor logs!




ZERONIGHTS 2012 GOTS/SOLDATOV                 5
INFOSECURITY DEPT. HAS TO

• Write corporate regulations
• Make assessments (compliance &/| pentest)

• Monitor logs!




ZERONIGHTS 2012 GOTS/SOLDATOV                 6
ATTACK STAGES

• Information gathering
• Passive learning
• Active learning
• Obtaining access
• Maintaining access
• Erasing evidence


ZERONIGHTS 2012 GOTS/SOLDATOV   7
FISHING
• Firewall/UTM/… :-)
• IDS/IPS
      • Commercial
      • Opensource/free
• Log analysis
      • Commercial
      • Opensource/free


ZERONIGHTS 2012 GOTS/SOLDATOV   8
WHAT’S HAPPENING WHEN ONE’S BREAKING

• Use or modification of privileged accounts
• Configuration modification
• Unusual activity
• New services or applications




ZERONIGHTS 2012 GOTS/SOLDATOV                  9
TOOL DEPLOYMENT




ZERONIGHTS 2012 GOTS/SOLDATOV   10
RECOMMENDED LIST OF EVENTS
                                • Pros:
                                  • Microsoft recommends
                                • Cons:
                                  • Huge amount of data
                                • Fun:




ZERONIGHTS 2012 GOTS/SOLDATOV                              11
“IMPROVEMENTS” FOR MICROSOFT GUIDE

• Admin logon from unusual place      • Pros:
• Admin logon at unusual time           • More AI
• From one IP by different accounts   • Cons:
• Lock >1 accounts from one IP          • Need time
• Password/Hash dump
• Run system commands
…


    ZERONIGHTS 2012 GOTS/SOLDATOV                     12
UNIVERSAL METHODS
                                • Pros:
      • Start a service
        (windows)                 • Much more AI
      • Events (almost) never   • Cons:
        seen before               • 100% we’ve
                                    forgotten smth.




ZERONIGHTS 2012 GOTS/SOLDATOV                         13
CONDITIONS
                                • Tested tools:
      • OS default
        configuration             • fgdump
      • Up2date AV is up          • pwdump
        and running               • pwdumpx
      • OS (almost) up2date       • metasploit
                                  • wce
                                  • mimikatz


ZERONIGHTS 2012 GOTS/SOLDATOV                     14
NEVER SEEN BEFORE EVENTS
      • Approaches
            • Timeout for statistic collection (up to 24 hours)
            • Complex filtering (by criteria)
      • Risks
            • Server restart in case of intrusion
            • Intrusion during statistic gathering
            • Complex configuration
            • Details of event happening




ZERONIGHTS 2012 GOTS/SOLDATOV                                     15
NEVER SEEN BEFORE EVENTS
(RULE FOR SEC.PL)




 ZERONIGHTS 2012 GOTS/SOLDATOV   16
FGDUMP
(REMOTE)




 ZERONIGHTS 2012 GOTS/SOLDATOV   17
PWDUMP6
(REMOTE)




  ZERONIGHTS 2012 GOTS/SOLDATOV   18
PWDUMPX
(REMOTE)




   ZERONIGHTS 2012 GOTS/SOLDATOV   19
METASPLOIT




  ZERONIGHTS 2012 GOTS/SOLDATOV   20
WCE (LOCAL)




 ZERONIGHTS 2012 GOTS/SOLDATOV   21
BUT




ZERONIGHTS 2012 GOTS/SOLDATOV   22
MIMIKATZ (LOCAL)




                                … and NO LOGS!


ZERONIGHTS 2012 GOTS/SOLDATOV                    23
DETECTION




ZERONIGHTS 2012 GOTS/SOLDATOV   24
HOPE, READY TO ANSWER YOUR QUESTIONS….


        Thanks for Your attention!
                                   Igor Gots
                                Sergey Soldatov
      reply-to-all.blogspot.com


ZERONIGHTS 2012 GOTS/SOLDATOV                     25

Contenu connexe

Similaire à Soldatov, gotz how to catch your “hacker” or makeshift security

Un backend, on peut s'en BaaS-ser
Un backend, on peut s'en BaaS-serUn backend, on peut s'en BaaS-ser
Un backend, on peut s'en BaaS-serrfelden
 
Real User Measurement Expert Panel by SOASTA
Real User Measurement Expert Panel by SOASTAReal User Measurement Expert Panel by SOASTA
Real User Measurement Expert Panel by SOASTASOASTA
 
SolarWinds Freeware Philosophy Blogger Event
SolarWinds Freeware Philosophy Blogger EventSolarWinds Freeware Philosophy Blogger Event
SolarWinds Freeware Philosophy Blogger EventSolarWinds
 
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)SOASTA
 
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)SOASTA
 
STPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSTPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSOASTA
 
Web Help Desk Training - Level 2
Web Help Desk Training - Level 2Web Help Desk Training - Level 2
Web Help Desk Training - Level 2SolarWinds
 
Tales from the Platform Trade
Tales from the Platform TradeTales from the Platform Trade
Tales from the Platform TradeWilliam Grosso
 
Troubleshooting Node.js
Troubleshooting Node.jsTroubleshooting Node.js
Troubleshooting Node.jsIgor Soarez
 
Nagios Conference 2012 - Nathan Vonnahme - Monitoring the User Experience
Nagios Conference 2012 - Nathan Vonnahme - Monitoring the User ExperienceNagios Conference 2012 - Nathan Vonnahme - Monitoring the User Experience
Nagios Conference 2012 - Nathan Vonnahme - Monitoring the User ExperienceNagios
 
Who Pulls the Strings?
Who Pulls the Strings?Who Pulls the Strings?
Who Pulls the Strings?Ronny Trommer
 
Introducing Immutant
Introducing Immutant Introducing Immutant
Introducing Immutant Jim Crossley
 
Minidates otv-agile2012-final hr
Minidates otv-agile2012-final hrMinidates otv-agile2012-final hr
Minidates otv-agile2012-final hrdrewz lin
 
Modernisation of legacy PHP applications using Symfony2 - PHP Northeast Confe...
Modernisation of legacy PHP applications using Symfony2 - PHP Northeast Confe...Modernisation of legacy PHP applications using Symfony2 - PHP Northeast Confe...
Modernisation of legacy PHP applications using Symfony2 - PHP Northeast Confe...Fabrice Bernhard
 
Top 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, TodayTop 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, TodaySolarWinds
 
O'Reilly webcast: Joshua Bixby on Mobile Performance Trends and Predictions
O'Reilly webcast: Joshua Bixby on Mobile Performance Trends and PredictionsO'Reilly webcast: Joshua Bixby on Mobile Performance Trends and Predictions
O'Reilly webcast: Joshua Bixby on Mobile Performance Trends and PredictionsStrangeloop
 
For the "Good of the Company"
For the "Good of the Company"For the "Good of the Company"
For the "Good of the Company"Hardball
 
OpenNTF Webinar, May 19, 2020
OpenNTF Webinar, May 19, 2020OpenNTF Webinar, May 19, 2020
OpenNTF Webinar, May 19, 2020Howard Greenberg
 

Similaire à Soldatov, gotz how to catch your “hacker” or makeshift security (18)

Un backend, on peut s'en BaaS-ser
Un backend, on peut s'en BaaS-serUn backend, on peut s'en BaaS-ser
Un backend, on peut s'en BaaS-ser
 
Real User Measurement Expert Panel by SOASTA
Real User Measurement Expert Panel by SOASTAReal User Measurement Expert Panel by SOASTA
Real User Measurement Expert Panel by SOASTA
 
SolarWinds Freeware Philosophy Blogger Event
SolarWinds Freeware Philosophy Blogger EventSolarWinds Freeware Philosophy Blogger Event
SolarWinds Freeware Philosophy Blogger Event
 
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)
 
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)
SOASTA mPulse: Delivering the Real in Real User Measurement (RUM)
 
STPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSTPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has Arrived
 
Web Help Desk Training - Level 2
Web Help Desk Training - Level 2Web Help Desk Training - Level 2
Web Help Desk Training - Level 2
 
Tales from the Platform Trade
Tales from the Platform TradeTales from the Platform Trade
Tales from the Platform Trade
 
Troubleshooting Node.js
Troubleshooting Node.jsTroubleshooting Node.js
Troubleshooting Node.js
 
Nagios Conference 2012 - Nathan Vonnahme - Monitoring the User Experience
Nagios Conference 2012 - Nathan Vonnahme - Monitoring the User ExperienceNagios Conference 2012 - Nathan Vonnahme - Monitoring the User Experience
Nagios Conference 2012 - Nathan Vonnahme - Monitoring the User Experience
 
Who Pulls the Strings?
Who Pulls the Strings?Who Pulls the Strings?
Who Pulls the Strings?
 
Introducing Immutant
Introducing Immutant Introducing Immutant
Introducing Immutant
 
Minidates otv-agile2012-final hr
Minidates otv-agile2012-final hrMinidates otv-agile2012-final hr
Minidates otv-agile2012-final hr
 
Modernisation of legacy PHP applications using Symfony2 - PHP Northeast Confe...
Modernisation of legacy PHP applications using Symfony2 - PHP Northeast Confe...Modernisation of legacy PHP applications using Symfony2 - PHP Northeast Confe...
Modernisation of legacy PHP applications using Symfony2 - PHP Northeast Confe...
 
Top 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, TodayTop 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, Today
 
O'Reilly webcast: Joshua Bixby on Mobile Performance Trends and Predictions
O'Reilly webcast: Joshua Bixby on Mobile Performance Trends and PredictionsO'Reilly webcast: Joshua Bixby on Mobile Performance Trends and Predictions
O'Reilly webcast: Joshua Bixby on Mobile Performance Trends and Predictions
 
For the "Good of the Company"
For the "Good of the Company"For the "Good of the Company"
For the "Good of the Company"
 
OpenNTF Webinar, May 19, 2020
OpenNTF Webinar, May 19, 2020OpenNTF Webinar, May 19, 2020
OpenNTF Webinar, May 19, 2020
 

Plus de DefconRussia

[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...DefconRussia
 
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...DefconRussia
 
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobindingDefconRussia
 
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/LinuxDefconRussia
 
Георгий Зайцев - Reversing golang
Георгий Зайцев - Reversing golangГеоргий Зайцев - Reversing golang
Георгий Зайцев - Reversing golangDefconRussia
 
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...DefconRussia
 
HTTP HOST header attacks
HTTP HOST header attacksHTTP HOST header attacks
HTTP HOST header attacksDefconRussia
 
Attacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей ТюринAttacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей ТюринDefconRussia
 
Weakpass - defcon russia 23
Weakpass - defcon russia 23Weakpass - defcon russia 23
Weakpass - defcon russia 23DefconRussia
 
nosymbols - defcon russia 20
nosymbols - defcon russia 20nosymbols - defcon russia 20
nosymbols - defcon russia 20DefconRussia
 
static - defcon russia 20
static  - defcon russia 20static  - defcon russia 20
static - defcon russia 20DefconRussia
 
Zn task - defcon russia 20
Zn task  - defcon russia 20Zn task  - defcon russia 20
Zn task - defcon russia 20DefconRussia
 
Vm ware fuzzing - defcon russia 20
Vm ware fuzzing  - defcon russia 20Vm ware fuzzing  - defcon russia 20
Vm ware fuzzing - defcon russia 20DefconRussia
 
Nedospasov defcon russia 23
Nedospasov defcon russia 23Nedospasov defcon russia 23
Nedospasov defcon russia 23DefconRussia
 
Miasm defcon russia 23
Miasm defcon russia 23Miasm defcon russia 23
Miasm defcon russia 23DefconRussia
 
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...DefconRussia
 
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхSergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхDefconRussia
 
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...DefconRussia
 
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...DefconRussia
 
Alexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implementAlexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implementDefconRussia
 

Plus de DefconRussia (20)

[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
 
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
 
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
 
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
 
Георгий Зайцев - Reversing golang
Георгий Зайцев - Reversing golangГеоргий Зайцев - Reversing golang
Георгий Зайцев - Reversing golang
 
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
 
HTTP HOST header attacks
HTTP HOST header attacksHTTP HOST header attacks
HTTP HOST header attacks
 
Attacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей ТюринAttacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей Тюрин
 
Weakpass - defcon russia 23
Weakpass - defcon russia 23Weakpass - defcon russia 23
Weakpass - defcon russia 23
 
nosymbols - defcon russia 20
nosymbols - defcon russia 20nosymbols - defcon russia 20
nosymbols - defcon russia 20
 
static - defcon russia 20
static  - defcon russia 20static  - defcon russia 20
static - defcon russia 20
 
Zn task - defcon russia 20
Zn task  - defcon russia 20Zn task  - defcon russia 20
Zn task - defcon russia 20
 
Vm ware fuzzing - defcon russia 20
Vm ware fuzzing  - defcon russia 20Vm ware fuzzing  - defcon russia 20
Vm ware fuzzing - defcon russia 20
 
Nedospasov defcon russia 23
Nedospasov defcon russia 23Nedospasov defcon russia 23
Nedospasov defcon russia 23
 
Miasm defcon russia 23
Miasm defcon russia 23Miasm defcon russia 23
Miasm defcon russia 23
 
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
 
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхSergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
 
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...
 
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...
 
Alexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implementAlexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implement
 

Soldatov, gotz how to catch your “hacker” or makeshift security