SlideShare une entreprise Scribd logo
1  sur  22
Austin Scott (GICSP, CISSP, OSCP)
Dragos ICS Penetration Testing Principal
ICSJWG June 2020 Virtual Meeting
How to IncreaseICSCybersecurityReturn on
Investment (ROI)
v
C:>whoami
2
Austin Scott
Principal Industrial Penetration Tester
Dragos Professional Services
@Austin_m_Scott
https://www.linkedin.com/in/synergist/
2019 DRAGOS YEAR IN REVIEW
3
71
have poor
security
perimeters
66
adversaries
directly
accessing the
ICS76
organizations
could not
detect Dragos’
Red Team
activities
routable
network
connections into
their operational
environments
100
54
lacked
separate IT
and OT user
management
systems
81
Limited or no
visibility into
ICS/OT
network
90
incidents
involved
shared
credentials
for lateral
movement
v
ICS CYBERSECURITY RAPID SELF-CHECK
4
Take ownership of understanding Cyber Risk
in your environment.
v
5
OPERATIONALIZED RAPID SELF-CHECK
WHAT WE SEE: CYBER RISK IMPACT
Reduce interactive protocol traversal points.
6
OPERATIONAL RISK
Medium – Verify firewall rule changes with ICS
Vendors.
TOOLS REQUIRED
Solar Winds FREE Firewall Browser
ICSFIREWALLRULES
WHAT WE SEE
WHAT TO DO
• ICS Access from Corporate network
• Temporary rules
• Vendor solution dictated rules
• Vendor access rules
• Use Firewall Browser and Identify:
SSH, Telnet, Remote Desktop, VNC,
WMI, PowerShell RM, RPC,
SMB ( PSEXEC )
v
FIREWALL BROWSER DEMO
7
WHAT WE SEE: CYBER RISK IMPACT
Increase difficulties in gaining access to Domain
Administrator accounts.
8
OPERATIONAL RISK
Very Low
TOOLS REQUIRED
Bloodhound, Active Directory Enum Script
ACCESSMANAGEMENT
WHAT WE SEE
WHAT TO DO
• Domain Admins Galore
• Overprivileged Service Accounts
• Numerous Paths to Domain Admin
• Download and Run BloodHound
• Review Paths to Admins
• Review Overprivileged Accounts
v
BLOODHOUND DEMO
9
WHAT WE SEE: CYBER RISK IMPACT
Increase the level of effort required to obtain
credentials.
10
OPERATIONAL RISK
Very low
TOOLS REQUIRED
Session Gopher, LSASS Dump and Mimikatz,
Mimikittenz, Nirsoft.net Password Utils
ACCESS MANAGEMENT #2
WHAT WE SEE
WHAT TO DO
• We almost always find Credentials
• We often find default Credentials
• We often find Credentials that are
stored and not properly encrypted.
• Understand where and how
Credentials are stored.
• Implement Access Management.
v
MIMIKATZ CREDENTIAL HUNT DEMO
11
v
MIMIKATZ CREDENTIAL HUNT DEMO
12
v
SESSION GOPHER CREDENTIAL HUNT DEMO
13
WHAT WE SEE: CYBER RISK IMPACT
Greatly increase the difficulty for adversaries to
escalate privileges and move laterally.
14
OPERATIONAL RISK
Medium – Verify system hardening changes with
ICS vendor.
TOOLS REQUIRED
• Configuration Hardening Assessment PowerShell Script
(CHAPS)
• Microsoft Security Compliance Toolkit
• CIS tools
• STIG tools
HARDENING
WHAT WE SEE
WHAT TO DO
• Common system hardening issues
allow for hash reflecting, passing
and clear-text password recovery.
• Windows - Run CHAPS
• Linux - Run Linux Bash script
v
CHAPS HARDENING DEMO
15
v
CHAPS HARDENING DEMO
16
[*] Testing if WDigest is disabled.
[-] WDigest UseLogonCredential key does not exist.
[*] Testing if LLMNR is disabled.
[-] DNSClient.EnableMulticast is enabled:
[*] Testing if Computer Browser service is disabled.
[-] Computer Browser service is: Running
[*] Testing Lanman Authentication for NoLmHash.
[-] NoLmHash registry key is configured: 0
[*] Testing if PowerShell Version 2 is permitted
[-] PowerShell Version 2 is permitted.
[+] = TEST PASS
[-] = TEST FAIL
CYBER RISK IMPACT
Improve Threat Detection Capability
Improve Incident Response Capability
17
OPERATIONAL RISK
Low – Centralized logging can increase network
traffic within ICS environment
TOOLS REQUIRED
Configuration Hardening Assessment PowerShell
Script (CHAPS)
LOGGING
WHAT WE SEE
WHAT TO DO
• Not Logging the Right Stuff
• Lack of Centralized Logging
• Run CHAPS
• Implement Centralized Logging
• Validate Event Logging
v
CHAPS WINDOWS EVENTLOG CONFIG DEMO
18
[*] Testing if PowerShell Moduling is Enabled
[-] EnableModuleLogging Is Not Set
[*] Testing if PowerShell EnableScriptBlockLogging is Enabled
[-] EnableScriptBlockLogging Is Not Set
[*] Testing if PowerShell EnableScriptBlockInvocationLogging is Enabled
[-] EnableScriptBlockInvocationLogging Is Not Set
[*] Testing if PowerShell EnableTranscripting is Enabled
[-] EnableTranscripting Is Not Set
[*] Testing if PowerShell EnableInvocationHeader is Enabled
[-] EnableInvocationHeader Is Not Set
[*] Testing if PowerShell ProtectedEventLogging is Enabled
[-] EnableProtectedEventLogging Is Not Set
[*] Event logs settings defaults are too small. Test that max sizes have been increased.
[x] Testing Microsoft-Windows-SMBServer/Audit log size failed.
[x] Testing Security log size failed.
[-] Microsoft-Windows-PowerShell/Operational max log size is smaller than System.Collections.Hashtable[Microsoft-Windows-Pow
[-] Microsoft-Windows-TaskScheduler/Operational max log size is smaller than System.Collections.Hashtable[Microsoft-Windows-
[-] Microsoft-Windows-WinRM/Operational max log size is smaller than System.Collections.Hashtable[Microsoft-Windows-WinRM/Op
[-] Microsoft-Windows-Security-Netlogon/Operational max log size is smaller than System.Collections.Hashtable[Microsoft-Wind
[-] Microsoft-Windows-WMI-Activity/Operational max log size is smaller than System.Collections.Hashtable[Microsoft-Windows-W
[-] Windows PowerShell max log size is smaller than System.Collections.Hashtable[Windows PowerShell] GB: 0.015 GB
[-] System max log size is smaller than System.Collections.Hashtable[System] GB: 0.02 GB
[-] Application max log size is smaller than System.Collections.Hashtable[Application] GB: 0.02 GB
[-] Microsoft-Windows-TerminalServices-LocalSessionManager/Operational max log size is smaller than System.Collections.Hasht
CYBER RISK IMPACT
Improve Threat Detection Capability
Improve Threat Hunting Capability
Improve Incident Response Capability
1
9
OPERATIONAL RISK
Low – Connecting to SPAN ports is nonroutable –
BUT CPU usage of switches should be monitored.
TOOLS REQUIRED
Dragos Community Tools
Network Miner - $$
NETWORK VISIBILITY
WHAT WE SEE
WHAT TO DO
• Operate in ICS networks undetected
• Maintain perpetual access
• Do not know what is on networks
• Identify SPAN ports for monitoring
• Create procedure for collecting
network packet captures
• Use a free tool to view them
v
Two Free (FOREVER) Community ICS Network Visibility Products from Dragos
20
v
The Dragos Platform
21
THANK YOU

Contenu connexe

Tendances

QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 

Tendances (20)

Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
 
Securing Electric Utility Infrastructure
Securing Electric Utility InfrastructureSecuring Electric Utility Infrastructure
Securing Electric Utility Infrastructure
 
How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions  How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions
 
Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos year in review (yir) 2018
Dragos year in review (yir) 2018
 
PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019
 
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Improve Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USMImprove Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USM
 
The Current ICS Threat Landscape
The Current ICS Threat LandscapeThe Current ICS Threat Landscape
The Current ICS Threat Landscape
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDS
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
How to Simplify Audit Compliance with Unified Security Management
How to Simplify Audit Compliance with Unified Security ManagementHow to Simplify Audit Compliance with Unified Security Management
How to Simplify Audit Compliance with Unified Security Management
 

Similaire à How to Increase ICS Cybersecurity Return on Investment (ROI)

Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Kai Wähner
 
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web InterfacesThey Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
michelemanzotti
 

Similaire à How to Increase ICS Cybersecurity Return on Investment (ROI) (20)

Monitor everything
Monitor everythingMonitor everything
Monitor everything
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of them
 
Tips for Developing and Testing IBM HATS Applications
Tips for Developing and Testing IBM HATS ApplicationsTips for Developing and Testing IBM HATS Applications
Tips for Developing and Testing IBM HATS Applications
 
05 security automationwithansible
05 security automationwithansible05 security automationwithansible
05 security automationwithansible
 
Security threat analysis points for enterprise with oss
Security threat analysis points for enterprise with ossSecurity threat analysis points for enterprise with oss
Security threat analysis points for enterprise with oss
 
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...Bp307 Practical Solutions for Connections Administrators, tips and scrips for...
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...
 
Chris Rutter: Avoiding The Security Brick
Chris Rutter: Avoiding The Security BrickChris Rutter: Avoiding The Security Brick
Chris Rutter: Avoiding The Security Brick
 
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web InterfacesThey Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheet
 
Super-NetOps Source of Truth
Super-NetOps Source of TruthSuper-NetOps Source of Truth
Super-NetOps Source of Truth
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
 
Don't Fumble the Data! Integrate Database Automation into your DevOps Toolchain
Don't Fumble the Data! Integrate Database Automation into your DevOps ToolchainDon't Fumble the Data! Integrate Database Automation into your DevOps Toolchain
Don't Fumble the Data! Integrate Database Automation into your DevOps Toolchain
 
Securing Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 PresentationSecuring Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 Presentation
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016
 
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdftheVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
 
手把手教你如何串接 Log 到各種網路服務
手把手教你如何串接 Log 到各種網路服務手把手教你如何串接 Log 到各種網路服務
手把手教你如何串接 Log 到各種網路服務
 
Logicalis Security Conference
Logicalis Security ConferenceLogicalis Security Conference
Logicalis Security Conference
 
Security automation simplified: an intro to DIY security automation
Security automation simplified: an intro to DIY security automationSecurity automation simplified: an intro to DIY security automation
Security automation simplified: an intro to DIY security automation
 
1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Software
 

Plus de Dragos, Inc.

Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Dragos, Inc.
 
Trisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersTrisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS Defenders
Dragos, Inc.
 

Plus de Dragos, Inc. (16)

Dragos 2019 ICS Year in Review
Dragos 2019 ICS Year in ReviewDragos 2019 ICS Year in Review
Dragos 2019 ICS Year in Review
 
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack FrameworkDragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
 
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber AttackReassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
 
Purple Teaming ICS Networks
Purple Teaming ICS NetworksPurple Teaming ICS Networks
Purple Teaming ICS Networks
 
Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response
 
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction
 
2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups
 
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
 
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread BlackoutsDebunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread Blackouts
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
 
Threat Activity Groups - Dragos
Threat Activity Groups - Dragos Threat Activity Groups - Dragos
Threat Activity Groups - Dragos
 
The Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial SecurityThe Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial Security
 
Behavior-Based Defense in ICS
Behavior-Based Defense in ICSBehavior-Based Defense in ICS
Behavior-Based Defense in ICS
 
Trisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersTrisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS Defenders
 
TTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil RefineriesTTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil Refineries
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

How to Increase ICS Cybersecurity Return on Investment (ROI)

  • 1. Austin Scott (GICSP, CISSP, OSCP) Dragos ICS Penetration Testing Principal ICSJWG June 2020 Virtual Meeting How to IncreaseICSCybersecurityReturn on Investment (ROI)
  • 2. v C:>whoami 2 Austin Scott Principal Industrial Penetration Tester Dragos Professional Services @Austin_m_Scott https://www.linkedin.com/in/synergist/
  • 3. 2019 DRAGOS YEAR IN REVIEW 3 71 have poor security perimeters 66 adversaries directly accessing the ICS76 organizations could not detect Dragos’ Red Team activities routable network connections into their operational environments 100 54 lacked separate IT and OT user management systems 81 Limited or no visibility into ICS/OT network 90 incidents involved shared credentials for lateral movement
  • 4. v ICS CYBERSECURITY RAPID SELF-CHECK 4 Take ownership of understanding Cyber Risk in your environment.
  • 6. WHAT WE SEE: CYBER RISK IMPACT Reduce interactive protocol traversal points. 6 OPERATIONAL RISK Medium – Verify firewall rule changes with ICS Vendors. TOOLS REQUIRED Solar Winds FREE Firewall Browser ICSFIREWALLRULES WHAT WE SEE WHAT TO DO • ICS Access from Corporate network • Temporary rules • Vendor solution dictated rules • Vendor access rules • Use Firewall Browser and Identify: SSH, Telnet, Remote Desktop, VNC, WMI, PowerShell RM, RPC, SMB ( PSEXEC )
  • 8. WHAT WE SEE: CYBER RISK IMPACT Increase difficulties in gaining access to Domain Administrator accounts. 8 OPERATIONAL RISK Very Low TOOLS REQUIRED Bloodhound, Active Directory Enum Script ACCESSMANAGEMENT WHAT WE SEE WHAT TO DO • Domain Admins Galore • Overprivileged Service Accounts • Numerous Paths to Domain Admin • Download and Run BloodHound • Review Paths to Admins • Review Overprivileged Accounts
  • 10. WHAT WE SEE: CYBER RISK IMPACT Increase the level of effort required to obtain credentials. 10 OPERATIONAL RISK Very low TOOLS REQUIRED Session Gopher, LSASS Dump and Mimikatz, Mimikittenz, Nirsoft.net Password Utils ACCESS MANAGEMENT #2 WHAT WE SEE WHAT TO DO • We almost always find Credentials • We often find default Credentials • We often find Credentials that are stored and not properly encrypted. • Understand where and how Credentials are stored. • Implement Access Management.
  • 14. WHAT WE SEE: CYBER RISK IMPACT Greatly increase the difficulty for adversaries to escalate privileges and move laterally. 14 OPERATIONAL RISK Medium – Verify system hardening changes with ICS vendor. TOOLS REQUIRED • Configuration Hardening Assessment PowerShell Script (CHAPS) • Microsoft Security Compliance Toolkit • CIS tools • STIG tools HARDENING WHAT WE SEE WHAT TO DO • Common system hardening issues allow for hash reflecting, passing and clear-text password recovery. • Windows - Run CHAPS • Linux - Run Linux Bash script
  • 16. v CHAPS HARDENING DEMO 16 [*] Testing if WDigest is disabled. [-] WDigest UseLogonCredential key does not exist. [*] Testing if LLMNR is disabled. [-] DNSClient.EnableMulticast is enabled: [*] Testing if Computer Browser service is disabled. [-] Computer Browser service is: Running [*] Testing Lanman Authentication for NoLmHash. [-] NoLmHash registry key is configured: 0 [*] Testing if PowerShell Version 2 is permitted [-] PowerShell Version 2 is permitted. [+] = TEST PASS [-] = TEST FAIL
  • 17. CYBER RISK IMPACT Improve Threat Detection Capability Improve Incident Response Capability 17 OPERATIONAL RISK Low – Centralized logging can increase network traffic within ICS environment TOOLS REQUIRED Configuration Hardening Assessment PowerShell Script (CHAPS) LOGGING WHAT WE SEE WHAT TO DO • Not Logging the Right Stuff • Lack of Centralized Logging • Run CHAPS • Implement Centralized Logging • Validate Event Logging
  • 18. v CHAPS WINDOWS EVENTLOG CONFIG DEMO 18 [*] Testing if PowerShell Moduling is Enabled [-] EnableModuleLogging Is Not Set [*] Testing if PowerShell EnableScriptBlockLogging is Enabled [-] EnableScriptBlockLogging Is Not Set [*] Testing if PowerShell EnableScriptBlockInvocationLogging is Enabled [-] EnableScriptBlockInvocationLogging Is Not Set [*] Testing if PowerShell EnableTranscripting is Enabled [-] EnableTranscripting Is Not Set [*] Testing if PowerShell EnableInvocationHeader is Enabled [-] EnableInvocationHeader Is Not Set [*] Testing if PowerShell ProtectedEventLogging is Enabled [-] EnableProtectedEventLogging Is Not Set [*] Event logs settings defaults are too small. Test that max sizes have been increased. [x] Testing Microsoft-Windows-SMBServer/Audit log size failed. [x] Testing Security log size failed. [-] Microsoft-Windows-PowerShell/Operational max log size is smaller than System.Collections.Hashtable[Microsoft-Windows-Pow [-] Microsoft-Windows-TaskScheduler/Operational max log size is smaller than System.Collections.Hashtable[Microsoft-Windows- [-] Microsoft-Windows-WinRM/Operational max log size is smaller than System.Collections.Hashtable[Microsoft-Windows-WinRM/Op [-] Microsoft-Windows-Security-Netlogon/Operational max log size is smaller than System.Collections.Hashtable[Microsoft-Wind [-] Microsoft-Windows-WMI-Activity/Operational max log size is smaller than System.Collections.Hashtable[Microsoft-Windows-W [-] Windows PowerShell max log size is smaller than System.Collections.Hashtable[Windows PowerShell] GB: 0.015 GB [-] System max log size is smaller than System.Collections.Hashtable[System] GB: 0.02 GB [-] Application max log size is smaller than System.Collections.Hashtable[Application] GB: 0.02 GB [-] Microsoft-Windows-TerminalServices-LocalSessionManager/Operational max log size is smaller than System.Collections.Hasht
  • 19. CYBER RISK IMPACT Improve Threat Detection Capability Improve Threat Hunting Capability Improve Incident Response Capability 1 9 OPERATIONAL RISK Low – Connecting to SPAN ports is nonroutable – BUT CPU usage of switches should be monitored. TOOLS REQUIRED Dragos Community Tools Network Miner - $$ NETWORK VISIBILITY WHAT WE SEE WHAT TO DO • Operate in ICS networks undetected • Maintain perpetual access • Do not know what is on networks • Identify SPAN ports for monitoring • Create procedure for collecting network packet captures • Use a free tool to view them
  • 20. v Two Free (FOREVER) Community ICS Network Visibility Products from Dragos 20

Notes de l'éditeur

  1. 3:30pm - 4:10pm - Simple Wins During Slow Downs, Austin Scott, Principal Industrial Penetration Tester, Dragos Inc. Recent events have added some additional constraints to our ability as an industry to move ICS cyber security programs forward. How do we continue to identify and reduce cyber risk in our ICS environments when we cannot hire consultants or meet with vendors? As ICS operations team are actively working to minimize contact with the outside world, how do we add implement new technology or improve the security posture of our environments? In my presentation, I will detail several ways that ICS cybersecurity teams can work with existing technologies and infrastructure to identify and reduce cyber risk. Many of these recommendations can be done remotely and have a very low chance of inadvertently causing any operational issues.
  2. Really this presentation is based on the recommendations we have for some of the most common findings we see in the field. Today thanks to the Covid-19 Pandemic, Dragos and other vendors are unable to do assessments. However, I am going to review some simple checks you can easily do internally to continue to drive your ICS cybersecurity program forward… even during Quarintine. We find these issues in the vast majority of assessments we do. So as a thought exercise, during this presentation you COULD pretend that I am providing an executive outbriefing after doing an assessment on your ICS network. I would love to hear that some of you in the audience have stood up a project or initiative internally to identify and address these findings after this presentation.
  3. Okay – So what I propose is creating a small project internally to give yourself a bit of a self checkup. I am going to share some of the techniques that we use during our assessments that are: 1. Low cost 2. Easy to use 3. And can quickly identify Cyber Risk in your environment Take ownership. I am going to show you some of the same tools or similar tools that we would run in your environment to identify cyberrisk, privilege escalation and lateral movement. These are ALSO the same tools or similar to the ones that activity groups are using against their targets today.
  4. Identify Interactive Service Rules that traverse security levels SSH, Telnet, Remote Desktop, VNC, TeamViewer, DameWare, WMI, PowerShell, RPC, SMB ( PSEXEC ) Firewall Browser Free Firewall Browser helps test and verify firewall rules Key Features Import and search unlimited Cisco, Check Point, and NetScreen configs Search rules and objects based on IP address, object name, service, or port Verify if a change request is already handled by the security rules https://www.solarwinds.com/free-tools/firewall-browser
  5. Many Domain admins in ICS networks Service accounts that are also Domain admins or have Admin like privs. Many service accounts are kerberoastable Many paths to domain admin Understand how an Adversary views your domain can be very helpful.
  6. Search for password files in network shares Look for applications that are capable to storing Credentials.
  7. Allow us to collect Hashes, Allows us to Reflect Hashes, Allows us to collect Clear-text passwords, allows us to pull sensitive data from memory. We have a tool we have developed internally to handle this which collects way more data and allows us to hunt for things, do vulnerability analysis, threat hunting and forensic analysis in one. But this open source tool that was recently released will go a long way to hardening your Windows Based ICS endpoints. Linux Systems you can use this github tool.
  8. https://github.com/cutaway-security/chaps Configuration Hardening Assessment PowerShell Script (CHAPS) Windows Event Forwarder
  9. As industrial penetration testers, we frequently are able to operate within ICS networks undetected and unhindered as these networks often lack the capabilities of detecting us. Quite often, Windows Host logs are being collected, but not in a centralized manner where they can be easily reviewed. In other cases, we encounter ICS networks that have a Centralized collection capability, but they are not logging data that is of value. Sometimes we encounter cases where IT-based solutions have been deployed into ICS environments for monitoring the network traffic. These IT technologies are effective at stopping IT attacks but are not capable of detecting ICS specific tradecraft.