SlideShare uma empresa Scribd logo
1 de 66
Baixar para ler offline
Security Testing for
Blue Teamers…
Ben Finke
June 2015
BigDatainInfoSec-BenFinke-@benfinke
Thanks for coming!
• Ben Finke
• Security Guy at Enterprise Integration
BigDatainInfoSec-BenFinke-@benfinke
Network Defender
BigDatainInfoSec-BenFinke-@benfinke
Red Team
BigDatainInfoSec-BenFinke-@benfinke
Disclaimer
Make absolutely CERTAIN you have written permission
from the system owner/service provider before undertaking
ANY testing activities.
Laws vary from state to state and country to country.
When in doubt I consult my attorney, I suggest you do the
same.
In short: Don’t call me to bail you out! J
BigDatainInfoSec-BenFinke-@benfinke
Security Testing for Blue Teamers
BigDatainInfoSec-BenFinke-@benfinke
What this presentation is…
• A guide on effective testing that makes your defenses better
• A security program that gives you information to make decisions
• A how-to on ensuring your defenses are doing what you think they are
BigDatainInfoSec-BenFinke-@benfinke
What this is not…
• How to hack your boss’s facebook account
• Step-by-step on building a botnet
• A one-size fits all process
• A shortcut
BigDatainInfoSec-BenFinke-@benfinke
Why bother?
Do you know what is on your network?
Any idea what you have facing the Internet?
Does that fancy firewall thing actually block bad stuff?
Can you tell if someone is attacking you?
BigDatainInfoSec-BenFinke-@benfinke
Why bother? This. We can do better.
BigDatainInfoSec-BenFinke-@benfinke
VerizonDataBreachInvestigationreport–2015-
http://www.verizonenterprise.com/DBIR/2015/
Yeah But…
Testing is so expensive!
We don’t have the budget
We don’t have the training
We don’t have the tools
BigDatainInfoSec-BenFinke-@benfinke
Nonsense.
It does take some time and some
learning, but you can do most of the
testing you’ll need, and be amazed what
you discover along the way.
You don’t need to spend a fortune either.
You got this.
BigDatainInfoSec-BenFinke-@benfinke
First Problem – Learn the Terrain
• Let’s map out EVERYTHING on your network
• Let’s find out what is connected and what services it’s running
• We need something that scales well, gives you some flexibility, and doesn’t
cost a fortune….
BigDatainInfoSec-BenFinke-@benfinke
Nmap
BigDatainInfoSec-BenFinke-@benfinke
nmap – Network Mapper
• Get it directly* from the nmap site: https://nmap.org/
• Open source
• Cross Platform
• Does way more than you think…..
• And we know its fantastic because…..
BigDatainInfoSec-BenFinke-@benfinke
*What happened to you SourceForge?? L
…Hackers use it in movies
https://nmap.org/movies/
BigDatainInfoSec-BenFinke-@benfinke
Digging into nmap
• Command line
• GUI – Zenmap
• Multiple output formats
• Can be easily incorporated into scripts and called from other applications
• GREAT documentation and community support
• Examples:
• nmap –A 172.20.10.0/24 –oA
• Demo Time!!
BigDatainInfoSec-BenFinke-@benfinke
BigDatainInfoSec-BenFinke-@benfinke
Scanning Protips…
• If you scan something on the other side of the firewall, its going to be, well, wrong.
BigDatainInfoSec-BenFinke-@benfinke
Scanning Protips…
Know how the common scan options work…
• -sT – Make a TCP connection (SYN – SYN/ACK – ACK)
• -sU – Try to make a UDP service respond (I’d tell you a UDP joke, but you might
not get it).
• -sS – TCP SYN scan –(SYN – SYN/ACK) – sometimes called a “stealth” scan
• -sV – TCP scan and try to get the version
• -Pn – treat all hosts as online, skip discovery
• -O – enable OS detection
• Host discovery – ICMP Ping, Reverse DNS, TCP 80 and TCP 443
BigDatainInfoSec-BenFinke-@benfinke
Scanning Protips…
Choose a good scanning location
• Home and SMB routers often have a small state table, you may overrun that with
connections and produce false results in the scan
• Wireless connections can also cause timing and other congestion errors that effect
your scan
• If scanning over a VPN…. Try not to scan over a VPN
• If you have a sensitive host in a range, use –exclude
BigDatainInfoSec-BenFinke-@benfinke
Zenmap!
BigDatainInfoSec-BenFinke-@benfinke
Plenty of good
open source
projects to help
your custom
implementation.
BigDatainInfoSec-BenFinke-@benfinke
Use your existing tools to visualize!
BigDatainInfoSec-BenFinke-@benfinke
But wait, there’s more!
• ndiff – compare two nmap scans and show the
differences.
• Easily store output in code repository for easily historical
reference and change tracking
• NSE – Nmap Scripting Engine
BigDatainInfoSec-BenFinke-@benfinke
Let’s Get to Work
Do some scans of your network and view the results. Tune the scan options to
meet the need.
Found a lot of stuff you had no idea about, right? Good!
Automate that process through whatever means are comfortable – you want
the information, not more to do.
Run daily and review changes. Discuss with responsible parties when things
change unexpectedly.
Some people might complain that you are hassling them, but I say…
BigDatainInfoSec-BenFinke-@benfinke
Deal with it….
BigDatainInfoSec-BenFinke-@benfinke
Your Arsenal
1. Nmap - free
BigDatainInfoSec-BenFinke-@benfinke
Total Cost - $0
Security Testing Checklist
üNetwork Inventory
üNew Host/Change Detection
BigDatainInfoSec-BenFinke-@benfinke
Vulnerability Management
Vulnerability – a well known software flaw or misconfiguration that enables
an unauthorized person to change the state of an information system.
Put like a regular person – a missing patch or (likely default) setting that
means an attacker can ruin your day.
Vulnerability Management is NOT just a vulnerability scanner. While that
can help, vulnerability management is about knowing where you have what
so that when a vulnerability is announced you can gauge the risk and plan
accordingly.
BigDatainInfoSec-BenFinke-@benfinke
Vulnerability Scanners
A number of good ones exist. You might even own some of these today.
The Biggest mistake I see is that people don’t:
1. Tune the scanning policies
2. Cover the ENTIRE network
3. Do anything useful with the output
BigDatainInfoSec-BenFinke-@benfinke
Getting your VM on….
• Consult your vuln scanner vendor for how to on this.
• You likely have the ability to run “credentialed” scanning. Do this!
• Build a process to manage these vulns you’re going to be digging up
• Protip: Assign an “Application Owner” to every piece of inventory on the
network, and send out reports broken down by the responsible “owner” in
the infamous and oft-imitated stoplight chart
• Also known as “Weaponized Excel”
BigDatainInfoSec-BenFinke-@benfinke
How does a Vuln Scanner work?
1. Non-Credentialed Scanning
Following the selected scanning policy, performs discovery of available
services across the range of configured targets, begins service detection.
BigDatainInfoSec-BenFinke-@benfinke
Vuln Scanner Web Server
Hey, is TCP Port 80 Open? (SYN)
It sure is! (SYN/ACK)
Great! (ACK)
So, is this HTTP? (GET / HTTP/1.1)
For sure! (HTTP 200 OK – Server: IIS/7.5)
Check vuln DB for “IIS/7.5” vulnsVuln
DB
Service Detection
That HTTP header will drive a huge amount of the related findings that most vulnerability
scanners will report.
Either no test exists for over-the-network testing, or the test is potentially dangerous.
Other tests like TLS* cipher testing are actively tested for and observed directly.
When False Positives occur, service detection is often why. Credentialed scanning can
remove lots of these false positives.
BigDatainInfoSec-BenFinke-@benfinke
* All your SSL stuff is turned off, right? Right. Good.
Automate this too!
• Schedule a scan in your vuln scanner and put the scan file someplace.
• This Powershell code let’s you slice and dice the results. Thanks to Carlos
Perez (@darkoperator):
[xml]$report = Get-Content –Raw .scan.nessus
$report_hosts = $report.NessusClientData_v2.Report.ReportHost
$report_hosts | foreach {$_.ReportItem} | where {$_.severity -ne 0} |
ConvertTo-HTML > nessus-report.html
You can even set conditions on which item goes in the report, so you can run a
couple of these and email them to whoever needs them….
BigDatainInfoSec-BenFinke-@benfinke
Your Arsenal
1. Nmap – free
2. Vuln Scanner - $2K/year
BigDatainInfoSec-BenFinke-@benfinke
Total Cost - $2000
Security Testing Checklist
üNetwork Inventory
üNew Host/Change Detection
üVulnerability Management
BigDatainInfoSec-BenFinke-@benfinke
What would an attacker know?
One of the most common goals of a 3rd party security assessment is “Find out
what an attacker out on the Internet would find.”
I have some great news for you….. You can do this yourself, probably a lot
easier than you think!
BigDatainInfoSec-BenFinke-@benfinke
A small sampling of free and inexpensive tools at your disposal!
Advanced Google Hacking Searching
BigDatainInfoSec-BenFinke-@benfinke
http://www.businessinsider.my/how-to-be-a-google-power-searcher-2014-7/
Shodan HQ
• Google search for what’s on the Internet…
BigDatainInfoSec-BenFinke-@benfinke
Maltego – Building a Case…
BigDatainInfoSec-BenFinke-@benfinke
Your Arsenal
1. Nmap – free
2. Vuln Scanner - $2K/year
3. Open Source Intel - Free
BigDatainInfoSec-BenFinke-@benfinke
Total Cost - $2000
Security Testing Checklist
üNetwork Inventory
üNew Host/Change Detection
üVulnerability Management
üKnow Your Attack Surface
BigDatainInfoSec-BenFinke-@benfinke
Test your Defenses
You recently invested in the industry leading Ultra Premium Anti-APT Cyber
Sentinel v1000 system. Hooray!
Does it actually work? I mean, the way its supposed to? Are you sure?
BigDatainInfoSec-BenFinke-@benfinke
If it detects intrusions, you should intrude!
BigDatainInfoSec-BenFinke-@benfinke
You should send actual attack traffic through the device to see if
1. It blocks, slows, or at least marginally disrupts it.
2. It tells you about it.
3. You can reconstruct what happened from the Blue team side.
Fortunately, you don’t need to write your own exploit code, we’ll just use Metasploit!
Mac
Attack!
Metasploit – An Intro
Metasploit is a framework that makes security testing easier.
It covers:
• Mapping and Recon
• Exploitation
• Post Exploitation
• Exfiltration
But even if you just want to see if an IPS actually P’s something, it works
great for that too!
Lots and lots of great community support and tutorials available online.
BigDatainInfoSec-BenFinke-@benfinke
Your Arsenal
1. Nmap – free
2. Vuln Scanner - $2K/year
3. Open Source Intel – Free
4. Metasploit- Free
BigDatainInfoSec-BenFinke-@benfinke
Total Cost - $2000
Security Testing Checklist
üNetwork Inventory
üNew Host/Change Detection
üVulnerability Management
üKnow Your Attack Surface
üHack Thyself
BigDatainInfoSec-BenFinke-@benfinke
“Sure” you’re saying…
“Now I get to spend hours and hours installing this stuff on my system and
trying to keep it all running. How much time am I going to waste just getting
this stuff in place?”.
Almost none at all. In fact, it’s a really good practice to keep your testing kit
separate from the system you surf the web and check your email on.
We need a way to get to all of this tools quickly. It would be a nice benefit if
our testing system was easily portable, ran on whatever we had lying around
to use, and was easy to keep up to date.
Which leads us right to….
BigDatainInfoSec-BenFinke-@benfinke
Kali Linux
BigDatainInfoSec-BenFinke-@benfinke
Kali Linux
• Purpose built Linux distribution for security testing
• Hundreds of tools built in and working
• Available as (https://www.kali.org/)
– ISO Image
– Virtual Machine image
– Docker Image(!)
– Raspberry Pi Image(!!)
BigDatainInfoSec-BenFinke-@benfinke
Raspberry Pi – Just like Mom used to make
BigDatainInfoSec-BenFinke-@benfinke
VirtualBox
• Cross Platform (Windows, Mac, *NIX)
• FREE (as in beer)
• Run guest VMs on your laptop!
• Boot2Docker
I know what you are thinking….
BigDatainInfoSec-BenFinke-@benfinke
Isn’t Oracle the Evil Empire?
BigDatainInfoSec-BenFinke-@benfinke
Maybe, but absolutely not for
this. Thanks Oracle (and
Sun) for VirtualBox!
Your Arsenal – Kali Edition
1. Nmap
2. Vuln Scanner
3. Open Source Intel
4. Metasploit
BigDatainInfoSec-BenFinke-@benfinke
Ready to Go!
Your Arsenal
1. Nmap – free
2. Vuln Scanner - $2K/year
3. Open Source Intel – Free
4. Metasploit- Free
5. Flexible Testing Platform - Free
BigDatainInfoSec-BenFinke-@benfinke
Total Cost - $2000
Security Testing Checklist
üNetwork Inventory
üNew Host/Change Detection
üVulnerability Management
üKnow Your Attack Surface
üHack Thyself
üFlexible Testing Platform
BigDatainInfoSec-BenFinke-@benfinke
Blue Team Nirvana
• A complete and accurate network inventory
• Know your exposure to vulnerabilities
• Know what the Internet knows about your network
• Verify your defenses and alarms work as designed.
BigDatainInfoSec-BenFinke-@benfinke
Bonus Round! Fresh Phish!
• Phishing Frenzy – open source project
• http://www.phishingfrenzy.com/
BigDatainInfoSec-BenFinke-@benfinke
Complete Phishing Platform
1. Develop the scams templates
BigDatainInfoSec-BenFinke-@benfinke
Complete Phishing Platform
1. Develop the scams templates
BigDatainInfoSec-BenFinke-@benfinke
Complete Phishing Platform
2. Send out the phishes!
BigDatainInfoSec-BenFinke-@benfinke
Complete Phishing Platform
3. Track the results
BigDatainInfoSec-BenFinke-@benfinke
Happy Hunting!
Any questions?
BigDatainInfoSec-BenFinke-@benfinke
Ben Finke
@benfinke
ben@benfinke.com
bfinke@entint.com
https://www.linkedin.com/pub/ben-finke/3/95a/8a1
blog.eiblackops.com
blog.benfinke.com
BenFinke-SecuringtheCause-@benfinke
Great Resources
• The nmap book - http://nmap.org/book/
• Metasploit Unleashed - https://www.offensive-security.com/metasploit-unleashed/
• How To Videos on SecurityTube - http://www.securitytube.net/
• Community Discussion - http://www.reddit.com/r/AskNetsec
• Netsec Students - http://www.reddit.com/r/netsecstudents
BigDatainInfoSec-BenFinke-@benfinke

Mais conteúdo relacionado

Semelhante a Security Testing Guide for Blue Teams

Magento Security Best Practises - MM17PL
Magento Security Best Practises - MM17PLMagento Security Best Practises - MM17PL
Magento Security Best Practises - MM17PLAnna Völkl
 
The Network Knows—Avi Freedman, CEO & Co-Founder of Kentik
The Network Knows—Avi Freedman, CEO & Co-Founder of Kentik The Network Knows—Avi Freedman, CEO & Co-Founder of Kentik
The Network Knows—Avi Freedman, CEO & Co-Founder of Kentik Outlyer
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityCambridge Intelligence
 
Adversary Pattern Analysis - A Journey with APNIC Honeypot
Adversary Pattern Analysis - A Journey with APNIC HoneypotAdversary Pattern Analysis - A Journey with APNIC Honeypot
Adversary Pattern Analysis - A Journey with APNIC HoneypotA. S. M. Shamim Reza
 
Web design and_development
Web design and_developmentWeb design and_development
Web design and_developmentchaxubzxreid
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014grecsl
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamMohammed Adam
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryPriyanka Aash
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_EndgameInc
 
6 ways DevOps helped PrepSportswear move from monolith to microservices
6 ways DevOps helped PrepSportswear move from monolith to microservices6 ways DevOps helped PrepSportswear move from monolith to microservices
6 ways DevOps helped PrepSportswear move from monolith to microservicesDynatrace
 
HP WebInspect
HP WebInspectHP WebInspect
HP WebInspectrohit_ta
 
Using Apache Kafka to Analyze Session Windows
Using Apache Kafka to Analyze Session WindowsUsing Apache Kafka to Analyze Session Windows
Using Apache Kafka to Analyze Session Windowsconfluent
 
user Behavior Analysis with Session Windows and Apache Kafka's Streams API
user Behavior Analysis with Session Windows and Apache Kafka's Streams APIuser Behavior Analysis with Session Windows and Apache Kafka's Streams API
user Behavior Analysis with Session Windows and Apache Kafka's Streams APIconfluent
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Toolscentralohioissa
 
SplunkLive! New York Dec 2012 - SNAP Interactive
SplunkLive! New York Dec 2012 - SNAP InteractiveSplunkLive! New York Dec 2012 - SNAP Interactive
SplunkLive! New York Dec 2012 - SNAP InteractiveSplunk
 
DefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp
 
Data Onboarding
Data Onboarding Data Onboarding
Data Onboarding Splunk
 
Data Onboarding
Data Onboarding Data Onboarding
Data Onboarding Splunk
 
Malware Analysis For The Enterprise
Malware Analysis For The EnterpriseMalware Analysis For The Enterprise
Malware Analysis For The EnterpriseJason Ross
 

Semelhante a Security Testing Guide for Blue Teams (20)

Magento Security Best Practises - MM17PL
Magento Security Best Practises - MM17PLMagento Security Best Practises - MM17PL
Magento Security Best Practises - MM17PL
 
The Network Knows—Avi Freedman, CEO & Co-Founder of Kentik
The Network Knows—Avi Freedman, CEO & Co-Founder of Kentik The Network Knows—Avi Freedman, CEO & Co-Founder of Kentik
The Network Knows—Avi Freedman, CEO & Co-Founder of Kentik
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
 
Adversary Pattern Analysis - A Journey with APNIC Honeypot
Adversary Pattern Analysis - A Journey with APNIC HoneypotAdversary Pattern Analysis - A Journey with APNIC Honeypot
Adversary Pattern Analysis - A Journey with APNIC Honeypot
 
Web design and_development
Web design and_developmentWeb design and_development
Web design and_development
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_
 
6 ways DevOps helped PrepSportswear move from monolith to microservices
6 ways DevOps helped PrepSportswear move from monolith to microservices6 ways DevOps helped PrepSportswear move from monolith to microservices
6 ways DevOps helped PrepSportswear move from monolith to microservices
 
HP WebInspect
HP WebInspectHP WebInspect
HP WebInspect
 
Using Apache Kafka to Analyze Session Windows
Using Apache Kafka to Analyze Session WindowsUsing Apache Kafka to Analyze Session Windows
Using Apache Kafka to Analyze Session Windows
 
user Behavior Analysis with Session Windows and Apache Kafka's Streams API
user Behavior Analysis with Session Windows and Apache Kafka's Streams APIuser Behavior Analysis with Session Windows and Apache Kafka's Streams API
user Behavior Analysis with Session Windows and Apache Kafka's Streams API
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Tools
 
SplunkLive! New York Dec 2012 - SNAP Interactive
SplunkLive! New York Dec 2012 - SNAP InteractiveSplunkLive! New York Dec 2012 - SNAP Interactive
SplunkLive! New York Dec 2012 - SNAP Interactive
 
DefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm Hole
 
Data Onboarding
Data Onboarding Data Onboarding
Data Onboarding
 
Data Onboarding
Data Onboarding Data Onboarding
Data Onboarding
 
Malware Analysis For The Enterprise
Malware Analysis For The EnterpriseMalware Analysis For The Enterprise
Malware Analysis For The Enterprise
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Security Testing Guide for Blue Teams

  • 1. Security Testing for Blue Teamers… Ben Finke June 2015 BigDatainInfoSec-BenFinke-@benfinke
  • 2. Thanks for coming! • Ben Finke • Security Guy at Enterprise Integration BigDatainInfoSec-BenFinke-@benfinke
  • 5. Disclaimer Make absolutely CERTAIN you have written permission from the system owner/service provider before undertaking ANY testing activities. Laws vary from state to state and country to country. When in doubt I consult my attorney, I suggest you do the same. In short: Don’t call me to bail you out! J BigDatainInfoSec-BenFinke-@benfinke
  • 6. Security Testing for Blue Teamers BigDatainInfoSec-BenFinke-@benfinke
  • 7. What this presentation is… • A guide on effective testing that makes your defenses better • A security program that gives you information to make decisions • A how-to on ensuring your defenses are doing what you think they are BigDatainInfoSec-BenFinke-@benfinke
  • 8. What this is not… • How to hack your boss’s facebook account • Step-by-step on building a botnet • A one-size fits all process • A shortcut BigDatainInfoSec-BenFinke-@benfinke
  • 9. Why bother? Do you know what is on your network? Any idea what you have facing the Internet? Does that fancy firewall thing actually block bad stuff? Can you tell if someone is attacking you? BigDatainInfoSec-BenFinke-@benfinke
  • 10. Why bother? This. We can do better. BigDatainInfoSec-BenFinke-@benfinke VerizonDataBreachInvestigationreport–2015- http://www.verizonenterprise.com/DBIR/2015/
  • 11. Yeah But… Testing is so expensive! We don’t have the budget We don’t have the training We don’t have the tools BigDatainInfoSec-BenFinke-@benfinke
  • 12. Nonsense. It does take some time and some learning, but you can do most of the testing you’ll need, and be amazed what you discover along the way. You don’t need to spend a fortune either. You got this. BigDatainInfoSec-BenFinke-@benfinke
  • 13. First Problem – Learn the Terrain • Let’s map out EVERYTHING on your network • Let’s find out what is connected and what services it’s running • We need something that scales well, gives you some flexibility, and doesn’t cost a fortune…. BigDatainInfoSec-BenFinke-@benfinke
  • 15. nmap – Network Mapper • Get it directly* from the nmap site: https://nmap.org/ • Open source • Cross Platform • Does way more than you think….. • And we know its fantastic because….. BigDatainInfoSec-BenFinke-@benfinke *What happened to you SourceForge?? L
  • 16. …Hackers use it in movies https://nmap.org/movies/ BigDatainInfoSec-BenFinke-@benfinke
  • 17. Digging into nmap • Command line • GUI – Zenmap • Multiple output formats • Can be easily incorporated into scripts and called from other applications • GREAT documentation and community support • Examples: • nmap –A 172.20.10.0/24 –oA • Demo Time!! BigDatainInfoSec-BenFinke-@benfinke
  • 19. Scanning Protips… • If you scan something on the other side of the firewall, its going to be, well, wrong. BigDatainInfoSec-BenFinke-@benfinke
  • 20. Scanning Protips… Know how the common scan options work… • -sT – Make a TCP connection (SYN – SYN/ACK – ACK) • -sU – Try to make a UDP service respond (I’d tell you a UDP joke, but you might not get it). • -sS – TCP SYN scan –(SYN – SYN/ACK) – sometimes called a “stealth” scan • -sV – TCP scan and try to get the version • -Pn – treat all hosts as online, skip discovery • -O – enable OS detection • Host discovery – ICMP Ping, Reverse DNS, TCP 80 and TCP 443 BigDatainInfoSec-BenFinke-@benfinke
  • 21. Scanning Protips… Choose a good scanning location • Home and SMB routers often have a small state table, you may overrun that with connections and produce false results in the scan • Wireless connections can also cause timing and other congestion errors that effect your scan • If scanning over a VPN…. Try not to scan over a VPN • If you have a sensitive host in a range, use –exclude BigDatainInfoSec-BenFinke-@benfinke
  • 23. Plenty of good open source projects to help your custom implementation. BigDatainInfoSec-BenFinke-@benfinke
  • 24. Use your existing tools to visualize! BigDatainInfoSec-BenFinke-@benfinke
  • 25. But wait, there’s more! • ndiff – compare two nmap scans and show the differences. • Easily store output in code repository for easily historical reference and change tracking • NSE – Nmap Scripting Engine BigDatainInfoSec-BenFinke-@benfinke
  • 26. Let’s Get to Work Do some scans of your network and view the results. Tune the scan options to meet the need. Found a lot of stuff you had no idea about, right? Good! Automate that process through whatever means are comfortable – you want the information, not more to do. Run daily and review changes. Discuss with responsible parties when things change unexpectedly. Some people might complain that you are hassling them, but I say… BigDatainInfoSec-BenFinke-@benfinke
  • 28. Your Arsenal 1. Nmap - free BigDatainInfoSec-BenFinke-@benfinke Total Cost - $0
  • 29. Security Testing Checklist üNetwork Inventory üNew Host/Change Detection BigDatainInfoSec-BenFinke-@benfinke
  • 30. Vulnerability Management Vulnerability – a well known software flaw or misconfiguration that enables an unauthorized person to change the state of an information system. Put like a regular person – a missing patch or (likely default) setting that means an attacker can ruin your day. Vulnerability Management is NOT just a vulnerability scanner. While that can help, vulnerability management is about knowing where you have what so that when a vulnerability is announced you can gauge the risk and plan accordingly. BigDatainInfoSec-BenFinke-@benfinke
  • 31. Vulnerability Scanners A number of good ones exist. You might even own some of these today. The Biggest mistake I see is that people don’t: 1. Tune the scanning policies 2. Cover the ENTIRE network 3. Do anything useful with the output BigDatainInfoSec-BenFinke-@benfinke
  • 32. Getting your VM on…. • Consult your vuln scanner vendor for how to on this. • You likely have the ability to run “credentialed” scanning. Do this! • Build a process to manage these vulns you’re going to be digging up • Protip: Assign an “Application Owner” to every piece of inventory on the network, and send out reports broken down by the responsible “owner” in the infamous and oft-imitated stoplight chart • Also known as “Weaponized Excel” BigDatainInfoSec-BenFinke-@benfinke
  • 33. How does a Vuln Scanner work? 1. Non-Credentialed Scanning Following the selected scanning policy, performs discovery of available services across the range of configured targets, begins service detection. BigDatainInfoSec-BenFinke-@benfinke Vuln Scanner Web Server Hey, is TCP Port 80 Open? (SYN) It sure is! (SYN/ACK) Great! (ACK) So, is this HTTP? (GET / HTTP/1.1) For sure! (HTTP 200 OK – Server: IIS/7.5) Check vuln DB for “IIS/7.5” vulnsVuln DB
  • 34. Service Detection That HTTP header will drive a huge amount of the related findings that most vulnerability scanners will report. Either no test exists for over-the-network testing, or the test is potentially dangerous. Other tests like TLS* cipher testing are actively tested for and observed directly. When False Positives occur, service detection is often why. Credentialed scanning can remove lots of these false positives. BigDatainInfoSec-BenFinke-@benfinke * All your SSL stuff is turned off, right? Right. Good.
  • 35. Automate this too! • Schedule a scan in your vuln scanner and put the scan file someplace. • This Powershell code let’s you slice and dice the results. Thanks to Carlos Perez (@darkoperator): [xml]$report = Get-Content –Raw .scan.nessus $report_hosts = $report.NessusClientData_v2.Report.ReportHost $report_hosts | foreach {$_.ReportItem} | where {$_.severity -ne 0} | ConvertTo-HTML > nessus-report.html You can even set conditions on which item goes in the report, so you can run a couple of these and email them to whoever needs them…. BigDatainInfoSec-BenFinke-@benfinke
  • 36. Your Arsenal 1. Nmap – free 2. Vuln Scanner - $2K/year BigDatainInfoSec-BenFinke-@benfinke Total Cost - $2000
  • 37. Security Testing Checklist üNetwork Inventory üNew Host/Change Detection üVulnerability Management BigDatainInfoSec-BenFinke-@benfinke
  • 38. What would an attacker know? One of the most common goals of a 3rd party security assessment is “Find out what an attacker out on the Internet would find.” I have some great news for you….. You can do this yourself, probably a lot easier than you think! BigDatainInfoSec-BenFinke-@benfinke A small sampling of free and inexpensive tools at your disposal!
  • 39. Advanced Google Hacking Searching BigDatainInfoSec-BenFinke-@benfinke http://www.businessinsider.my/how-to-be-a-google-power-searcher-2014-7/
  • 40. Shodan HQ • Google search for what’s on the Internet… BigDatainInfoSec-BenFinke-@benfinke
  • 41. Maltego – Building a Case… BigDatainInfoSec-BenFinke-@benfinke
  • 42. Your Arsenal 1. Nmap – free 2. Vuln Scanner - $2K/year 3. Open Source Intel - Free BigDatainInfoSec-BenFinke-@benfinke Total Cost - $2000
  • 43. Security Testing Checklist üNetwork Inventory üNew Host/Change Detection üVulnerability Management üKnow Your Attack Surface BigDatainInfoSec-BenFinke-@benfinke
  • 44. Test your Defenses You recently invested in the industry leading Ultra Premium Anti-APT Cyber Sentinel v1000 system. Hooray! Does it actually work? I mean, the way its supposed to? Are you sure? BigDatainInfoSec-BenFinke-@benfinke
  • 45. If it detects intrusions, you should intrude! BigDatainInfoSec-BenFinke-@benfinke You should send actual attack traffic through the device to see if 1. It blocks, slows, or at least marginally disrupts it. 2. It tells you about it. 3. You can reconstruct what happened from the Blue team side. Fortunately, you don’t need to write your own exploit code, we’ll just use Metasploit! Mac Attack!
  • 46. Metasploit – An Intro Metasploit is a framework that makes security testing easier. It covers: • Mapping and Recon • Exploitation • Post Exploitation • Exfiltration But even if you just want to see if an IPS actually P’s something, it works great for that too! Lots and lots of great community support and tutorials available online. BigDatainInfoSec-BenFinke-@benfinke
  • 47. Your Arsenal 1. Nmap – free 2. Vuln Scanner - $2K/year 3. Open Source Intel – Free 4. Metasploit- Free BigDatainInfoSec-BenFinke-@benfinke Total Cost - $2000
  • 48. Security Testing Checklist üNetwork Inventory üNew Host/Change Detection üVulnerability Management üKnow Your Attack Surface üHack Thyself BigDatainInfoSec-BenFinke-@benfinke
  • 49. “Sure” you’re saying… “Now I get to spend hours and hours installing this stuff on my system and trying to keep it all running. How much time am I going to waste just getting this stuff in place?”. Almost none at all. In fact, it’s a really good practice to keep your testing kit separate from the system you surf the web and check your email on. We need a way to get to all of this tools quickly. It would be a nice benefit if our testing system was easily portable, ran on whatever we had lying around to use, and was easy to keep up to date. Which leads us right to…. BigDatainInfoSec-BenFinke-@benfinke
  • 51. Kali Linux • Purpose built Linux distribution for security testing • Hundreds of tools built in and working • Available as (https://www.kali.org/) – ISO Image – Virtual Machine image – Docker Image(!) – Raspberry Pi Image(!!) BigDatainInfoSec-BenFinke-@benfinke
  • 52. Raspberry Pi – Just like Mom used to make BigDatainInfoSec-BenFinke-@benfinke
  • 53. VirtualBox • Cross Platform (Windows, Mac, *NIX) • FREE (as in beer) • Run guest VMs on your laptop! • Boot2Docker I know what you are thinking…. BigDatainInfoSec-BenFinke-@benfinke
  • 54. Isn’t Oracle the Evil Empire? BigDatainInfoSec-BenFinke-@benfinke Maybe, but absolutely not for this. Thanks Oracle (and Sun) for VirtualBox!
  • 55. Your Arsenal – Kali Edition 1. Nmap 2. Vuln Scanner 3. Open Source Intel 4. Metasploit BigDatainInfoSec-BenFinke-@benfinke Ready to Go!
  • 56. Your Arsenal 1. Nmap – free 2. Vuln Scanner - $2K/year 3. Open Source Intel – Free 4. Metasploit- Free 5. Flexible Testing Platform - Free BigDatainInfoSec-BenFinke-@benfinke Total Cost - $2000
  • 57. Security Testing Checklist üNetwork Inventory üNew Host/Change Detection üVulnerability Management üKnow Your Attack Surface üHack Thyself üFlexible Testing Platform BigDatainInfoSec-BenFinke-@benfinke
  • 58. Blue Team Nirvana • A complete and accurate network inventory • Know your exposure to vulnerabilities • Know what the Internet knows about your network • Verify your defenses and alarms work as designed. BigDatainInfoSec-BenFinke-@benfinke
  • 59. Bonus Round! Fresh Phish! • Phishing Frenzy – open source project • http://www.phishingfrenzy.com/ BigDatainInfoSec-BenFinke-@benfinke
  • 60. Complete Phishing Platform 1. Develop the scams templates BigDatainInfoSec-BenFinke-@benfinke
  • 61. Complete Phishing Platform 1. Develop the scams templates BigDatainInfoSec-BenFinke-@benfinke
  • 62. Complete Phishing Platform 2. Send out the phishes! BigDatainInfoSec-BenFinke-@benfinke
  • 63. Complete Phishing Platform 3. Track the results BigDatainInfoSec-BenFinke-@benfinke
  • 66. Great Resources • The nmap book - http://nmap.org/book/ • Metasploit Unleashed - https://www.offensive-security.com/metasploit-unleashed/ • How To Videos on SecurityTube - http://www.securitytube.net/ • Community Discussion - http://www.reddit.com/r/AskNetsec • Netsec Students - http://www.reddit.com/r/netsecstudents BigDatainInfoSec-BenFinke-@benfinke