SlideShare une entreprise Scribd logo
1  sur  48
MFA: IT’S 2017 AND
YOU’RE STILL
DOING IT WRONG
Who We Are
Dan Astor @illegitimateDA
Position: Senior Consultant
Focus: Offense
Chris Salerno @secrisk
Position: Director
Focus: Defense
Agenda
› MFA Overview
› Email
› Self-Service
› RemoteApps
› Shared MFA
› Social Engineering
› Internal MFA Bypasses
1.
Overview
Overview
› MFA: Multi-Factor Authentication
› “Something” in addition to a password
› Push, Call, Soft Token, Hard Token, SMS,
Email, etc.
› Certs?
› External & Internal Services
Why Are We Having This Talk?
›We’re Past This... (sorta)
1.https://www.youtube.com/watch?v=UduILWi2p6s
Why Are We Having This Talk?
› External > Internal is still a thing
› Your Disaster Recovery VPN is still a VPN
› You have a group of users where MFA
“just won’t work”
› But really…it’s because…
2.
Email
It’s Just Email…
› We see many environments with MFA
on all the “remote access portals” but
not on email.
› O365, OWA, Notes, etc.
› Password Spraying always works.
› Rarely detected
Attacks on OWA
› Usually easy to identify
› autodiscover
› If you cannot identify the “web portal” try
to connect to the Exchange service with a
thick client or other tool
o https://github.com/sensepost/ruler
o https://github.com/dafthack/MailSniper
OWA web portal is 2FA; using a client to connect to the exchange service is only 1FA though.
Use Ruler or other OWA service bruteforce tool to perform password spraying.
Attacks on O365
› Easy to identify, use any O365 login
(portal.office.com)
› Redirects to correct URL or logo appears
› PowerShell modules for MSOL & AzureAD
› Harvest all the info you can (Users,
Groups, etc.)
Using the AzureAD Modules to connect to the environment and pull all users (can also get cloud groups)
https://technet.microsoft.com/en-us/library/dn975125.aspx
https://docs.microsoft.com/en-us/powershell/azure/active-directory/install-adv2
Mailbox Pilfering
› Usually contain interesting files
› Search for: password, RSA, Duo, MFA,
VPN, etc.
› VPN soft-tokens emailed 
› MailSniper
Perform searches for sensitive information and attachments (VPN tokens, etc.)
Outlook Attacks for Shells
› Forms - create a malicious form in the
users inbox
o https://sensepost.com/blog/2017/outlook-forms-and-shells/
› Rules – create a rule that will execute
your code (or trigger your form)
o https://silentbreaksecurity.com/malicious-outlook-rules/
3.
Self-Service
I’ll Just Help Myself…
› Self-Service portals are for users to help
themselves out instead of calling the
service desk.
› External self-service for MFA… What
could be bad about that?
Example RSA self-service portal
Self-Service Attacks
› Register a new device (your device)
› Obtain an emergency access token (EAT)
› Great post from Alex Leary from NetSpi
on EAT’s
o https://blog.netspi.com/targeting-rsa-emergency-access-tokencodes-
fun-profit/
After authenticating we attempt to register a new device. Once approved, we
get the email to import our token.
4.
Microsoft
RemoteApp
Microsoft RemoteApp Servers
› RemoteApp concept is very similar to
something like Citrix XenApp
› Users login to a portal, and can launch
individual applications hosted on the
server. Applications are accessed over
RDP.
Example RemoteApp login
RemoteApp Auth
› RemoteApp supports auth from SSO
(pass-through), but can also do direct
MFA (i.e. Duo plugin) on the login.
› If you can directly connect to the
connection broker, you can bypass the
MFA (TCP 3389)
You can use the built-in RemoteApp client to connect to the service. This will
bypass the SSO as it connects directly to the service (Similar to OWA slide).
5.
Social Engineering
The Scenario
› Do OSINT for employees that fit the role
you want to use.
› Identify the helpdesk #’s (may have to
call other numbers to obtain)
› Attempt to get a password or MFA
token reset
› Don’t forget about web based chat
Helpful Tips for Calls
› Play dumb. Like really dumb…
› They want to get you off the phone
› The more frustrated they get the more
likely they’ll just do what you need.
› Once had a rep tell us, “it’s a thinking
problem”
Using web based chat, we get a password reset and MFA token setup with our device. Helpful
to have the most common MFA solutions on a device with you (RSA, Duo, Symantec, etc.)
Using our device code and the password that was reset, we can now authenticate to the MFA
portal.
6.
Shared MFA
Story Time…
› Password spraying on what appeared to
be a 1FA portal.
› Several successful accounts, but then
2FA stopped us.
› Randomly some accounts just always
allow us in?
Further Inspection...
› The account we found exhibiting this
behavior was confirmed to be
configured with 2FA.
› Account owner had told interns, “If this
phone ever rings, answer and hit 1.”
› Don’t’ crowdsource your MFA… ¯_(ツ)_/¯
7.
Internal MFA
Remote Desktop
› Place MFA on a “jump host” (RSA, Duo,
etc.) for interactive logins
› When using RDP you are forced to enter
a passcode
› Network logins are still 1FA (map share,
execute commands remotely)
When using RDP, you get prompted for your passcode. When doing a network call to the
host, no MFA is required.
Hypervisors
› Highly sensitive zone is completely
segmented from the user network.
› MFA jump boxes are the only way into
the zone and ACLs are properly
configured.
› Look for hypervisors (vCenter, vSphere,
XenCenter, etc.) that may control the
zone from a zone you have access to.
Access to vSphere was 1FA. Once in, the “sensitive” servers are all accessible through the
hypervisor. Also, they had open sessions.
Dual NIC Monitoring Servers
› Highly sensitive zone is completely
segmented from the user network.
› MFA jump boxes are the only way into
the zone and ACLs are properly
configured.
› Look for system monitoring servers (ie.
Nagios)
Identified a Nagios server that was dual NIC’d into the zone. Use a port forward script to
punch a hole through from our VM to the target host (mssql database).
https://securityriskadvisors.com/blog/post/plastic-beach-gaining-access-to-cdes/
5 Things to Remember
1. MFA all the things
2. Test your service desk and self-service
3. Monitor your logs
4. Expire your OTP’s
5. Think like an attacker
THANKS!
Any questions?
You can find us at:
@illegitimateDA · @secrisk
Presentation template by SlidesCarnival

Contenu connexe

Tendances

Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
Streamline CI/CD with Just-in-Time Access
Streamline CI/CD with Just-in-Time AccessStreamline CI/CD with Just-in-Time Access
Streamline CI/CD with Just-in-Time AccessAkeyless
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...Akeyless
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing
 
Malware Analysis Using Free Software
Malware Analysis Using Free SoftwareMalware Analysis Using Free Software
Malware Analysis Using Free SoftwareXavier Mertens
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
Cisco Webex Board - Maticmind
Cisco Webex Board - MaticmindCisco Webex Board - Maticmind
Cisco Webex Board - MaticmindMaticmind
 
Blockchain solutions leading to better security practices
Blockchain solutions leading to better security practicesBlockchain solutions leading to better security practices
Blockchain solutions leading to better security practicesEric Larcheveque
 
The Rise of Secrets Management
The Rise of Secrets ManagementThe Rise of Secrets Management
The Rise of Secrets ManagementAkeyless
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsSlawomir Jasek
 
20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?T.Rob Wyatt
 
How to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ DisobeyHow to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ DisobeyZoltan Balazs
 
Automatic MIME Attachments Triage
Automatic MIME Attachments TriageAutomatic MIME Attachments Triage
Automatic MIME Attachments TriageXavier Mertens
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copyNimrod Levy
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great againEric Larcheveque
 
Swisscom: Smart Homes & Security Risks
Swisscom: Smart Homes & Security RisksSwisscom: Smart Homes & Security Risks
Swisscom: Smart Homes & Security RisksLea-María Louzada
 

Tendances (20)

Secure Web Coding
Secure Web CodingSecure Web Coding
Secure Web Coding
 
$HOME Sweet $HOME
$HOME Sweet $HOME$HOME Sweet $HOME
$HOME Sweet $HOME
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
Streamline CI/CD with Just-in-Time Access
Streamline CI/CD with Just-in-Time AccessStreamline CI/CD with Just-in-Time Access
Streamline CI/CD with Just-in-Time Access
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
 
Malware Analysis Using Free Software
Malware Analysis Using Free SoftwareMalware Analysis Using Free Software
Malware Analysis Using Free Software
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
Cisco Webex Board - Maticmind
Cisco Webex Board - MaticmindCisco Webex Board - Maticmind
Cisco Webex Board - Maticmind
 
Blockchain solutions leading to better security practices
Blockchain solutions leading to better security practicesBlockchain solutions leading to better security practices
Blockchain solutions leading to better security practices
 
The Rise of Secrets Management
The Rise of Secrets ManagementThe Rise of Secrets Management
The Rise of Secrets Management
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
 
20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?
 
How to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ DisobeyHow to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ Disobey
 
Automatic MIME Attachments Triage
Automatic MIME Attachments TriageAutomatic MIME Attachments Triage
Automatic MIME Attachments Triage
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copy
 
Secrets as Code
Secrets as CodeSecrets as Code
Secrets as Code
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great again
 
Swisscom: Smart Homes & Security Risks
Swisscom: Smart Homes & Security RisksSwisscom: Smart Homes & Security Risks
Swisscom: Smart Homes & Security Risks
 

Similaire à Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're Still Doing It Wrong

How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsAll Things Open
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewRobert Herjavec
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
The Infosec Revival
The Infosec RevivalThe Infosec Revival
The Infosec Revivalscriptjunkie
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)jasonlan
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorunNimrod Levy
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure  BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure BlueHat Security Conference
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Understanding Windows Lateral Movements
Understanding Windows Lateral MovementsUnderstanding Windows Lateral Movements
Understanding Windows Lateral MovementsDaniel López Jiménez
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligenceOrder vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligencePriyanka Aash
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Webinar Fondazione CRUI - Microsoft: La Cyber Security nelle Università
Webinar Fondazione CRUI - Microsoft: La Cyber Security nelle Università Webinar Fondazione CRUI - Microsoft: La Cyber Security nelle Università
Webinar Fondazione CRUI - Microsoft: La Cyber Security nelle Università Jürgen Ambrosi
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Paula Januszkiewicz
 
The Infosec Revival
The Infosec RevivalThe Infosec Revival
The Infosec Revivalscriptjunkie
 

Similaire à Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're Still Doing It Wrong (20)

How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
The Infosec Revival
The Infosec RevivalThe Infosec Revival
The Infosec Revival
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorun
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure  BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Understanding Windows Lateral Movements
Understanding Windows Lateral MovementsUnderstanding Windows Lateral Movements
Understanding Windows Lateral Movements
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligenceOrder vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Webinar Fondazione CRUI - Microsoft: La Cyber Security nelle Università
Webinar Fondazione CRUI - Microsoft: La Cyber Security nelle Università Webinar Fondazione CRUI - Microsoft: La Cyber Security nelle Università
Webinar Fondazione CRUI - Microsoft: La Cyber Security nelle Università
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
The Infosec Revival
The Infosec RevivalThe Infosec Revival
The Infosec Revival
 

Dernier

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Dernier (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're Still Doing It Wrong

  • 1. MFA: IT’S 2017 AND YOU’RE STILL DOING IT WRONG
  • 2. Who We Are Dan Astor @illegitimateDA Position: Senior Consultant Focus: Offense Chris Salerno @secrisk Position: Director Focus: Defense
  • 3. Agenda › MFA Overview › Email › Self-Service › RemoteApps › Shared MFA › Social Engineering › Internal MFA Bypasses
  • 5. Overview › MFA: Multi-Factor Authentication › “Something” in addition to a password › Push, Call, Soft Token, Hard Token, SMS, Email, etc. › Certs? › External & Internal Services
  • 6. Why Are We Having This Talk? ›We’re Past This... (sorta) 1.https://www.youtube.com/watch?v=UduILWi2p6s
  • 7. Why Are We Having This Talk? › External > Internal is still a thing › Your Disaster Recovery VPN is still a VPN › You have a group of users where MFA “just won’t work” › But really…it’s because…
  • 9.
  • 10. It’s Just Email… › We see many environments with MFA on all the “remote access portals” but not on email. › O365, OWA, Notes, etc. › Password Spraying always works. › Rarely detected
  • 11. Attacks on OWA › Usually easy to identify › autodiscover › If you cannot identify the “web portal” try to connect to the Exchange service with a thick client or other tool o https://github.com/sensepost/ruler o https://github.com/dafthack/MailSniper
  • 12. OWA web portal is 2FA; using a client to connect to the exchange service is only 1FA though. Use Ruler or other OWA service bruteforce tool to perform password spraying.
  • 13. Attacks on O365 › Easy to identify, use any O365 login (portal.office.com) › Redirects to correct URL or logo appears › PowerShell modules for MSOL & AzureAD › Harvest all the info you can (Users, Groups, etc.)
  • 14. Using the AzureAD Modules to connect to the environment and pull all users (can also get cloud groups) https://technet.microsoft.com/en-us/library/dn975125.aspx https://docs.microsoft.com/en-us/powershell/azure/active-directory/install-adv2
  • 15. Mailbox Pilfering › Usually contain interesting files › Search for: password, RSA, Duo, MFA, VPN, etc. › VPN soft-tokens emailed  › MailSniper
  • 16. Perform searches for sensitive information and attachments (VPN tokens, etc.)
  • 17. Outlook Attacks for Shells › Forms - create a malicious form in the users inbox o https://sensepost.com/blog/2017/outlook-forms-and-shells/ › Rules – create a rule that will execute your code (or trigger your form) o https://silentbreaksecurity.com/malicious-outlook-rules/
  • 19.
  • 20. I’ll Just Help Myself… › Self-Service portals are for users to help themselves out instead of calling the service desk. › External self-service for MFA… What could be bad about that?
  • 22. Self-Service Attacks › Register a new device (your device) › Obtain an emergency access token (EAT) › Great post from Alex Leary from NetSpi on EAT’s o https://blog.netspi.com/targeting-rsa-emergency-access-tokencodes- fun-profit/
  • 23. After authenticating we attempt to register a new device. Once approved, we get the email to import our token.
  • 25. Microsoft RemoteApp Servers › RemoteApp concept is very similar to something like Citrix XenApp › Users login to a portal, and can launch individual applications hosted on the server. Applications are accessed over RDP.
  • 27. RemoteApp Auth › RemoteApp supports auth from SSO (pass-through), but can also do direct MFA (i.e. Duo plugin) on the login. › If you can directly connect to the connection broker, you can bypass the MFA (TCP 3389)
  • 28. You can use the built-in RemoteApp client to connect to the service. This will bypass the SSO as it connects directly to the service (Similar to OWA slide).
  • 30.
  • 31. The Scenario › Do OSINT for employees that fit the role you want to use. › Identify the helpdesk #’s (may have to call other numbers to obtain) › Attempt to get a password or MFA token reset › Don’t forget about web based chat
  • 32. Helpful Tips for Calls › Play dumb. Like really dumb… › They want to get you off the phone › The more frustrated they get the more likely they’ll just do what you need. › Once had a rep tell us, “it’s a thinking problem”
  • 33. Using web based chat, we get a password reset and MFA token setup with our device. Helpful to have the most common MFA solutions on a device with you (RSA, Duo, Symantec, etc.)
  • 34. Using our device code and the password that was reset, we can now authenticate to the MFA portal.
  • 36.
  • 37. Story Time… › Password spraying on what appeared to be a 1FA portal. › Several successful accounts, but then 2FA stopped us. › Randomly some accounts just always allow us in?
  • 38. Further Inspection... › The account we found exhibiting this behavior was confirmed to be configured with 2FA. › Account owner had told interns, “If this phone ever rings, answer and hit 1.” › Don’t’ crowdsource your MFA… ¯_(ツ)_/¯
  • 40.
  • 41. Remote Desktop › Place MFA on a “jump host” (RSA, Duo, etc.) for interactive logins › When using RDP you are forced to enter a passcode › Network logins are still 1FA (map share, execute commands remotely)
  • 42. When using RDP, you get prompted for your passcode. When doing a network call to the host, no MFA is required.
  • 43. Hypervisors › Highly sensitive zone is completely segmented from the user network. › MFA jump boxes are the only way into the zone and ACLs are properly configured. › Look for hypervisors (vCenter, vSphere, XenCenter, etc.) that may control the zone from a zone you have access to.
  • 44. Access to vSphere was 1FA. Once in, the “sensitive” servers are all accessible through the hypervisor. Also, they had open sessions.
  • 45. Dual NIC Monitoring Servers › Highly sensitive zone is completely segmented from the user network. › MFA jump boxes are the only way into the zone and ACLs are properly configured. › Look for system monitoring servers (ie. Nagios)
  • 46. Identified a Nagios server that was dual NIC’d into the zone. Use a port forward script to punch a hole through from our VM to the target host (mssql database). https://securityriskadvisors.com/blog/post/plastic-beach-gaining-access-to-cdes/
  • 47. 5 Things to Remember 1. MFA all the things 2. Test your service desk and self-service 3. Monitor your logs 4. Expire your OTP’s 5. Think like an attacker
  • 48. THANKS! Any questions? You can find us at: @illegitimateDA · @secrisk Presentation template by SlidesCarnival

Notes de l'éditeur

  1. CHRIS
  2. DAN > CHRIS
  3. CHRIS
  4. CHRIS
  5. CHRIS MFA is hard How often do we ask users to reauthenticate? Do we use adaptive authentication? What’s the balance between security and usability?
  6. CHRIS
  7. CHRIS
  8. CHRIS
  9. CHRIS
  10. CHRIS Detection is hard because OWA server auths against DC. Not getting true source IP.
  11. DAN
  12. DAN
  13. DAN
  14. DAN Not an MFA bypass, but we see many starting to migrate to O365 and AzureAD They leave the portal 1FA before any apps are deployed. Even though there is nothing there, you can still pull out all the user info (email, etc.)
  15. DAN
  16. DAN
  17. DAN
  18. CHRIS
  19. CHRIS
  20. CHRIS
  21. CHRIS
  22. DAN
  23. DAN
  24. CHRIS
  25. CHRIS
  26. CHRIS
  27. DAN
  28. DAN
  29. CHRIS
  30. DAN
  31. DAN
  32. DAN
  33. DAN
  34. CHRIS
  35. CHRIS
  36. CHRIS
  37. CHRIS
  38. DAN
  39. DAN
  40. DAN
  41. DAN
  42. DAN
  43. DAN
  44. CHRIS