Netwitness RT - Don’t scratch that patch.pptx

1 ©2021 RSA Security LLC or its affiliates. All rights reserved.
2 ©2021 RSA Security LLC or its affiliates. All rights reserved.
3 ©2021 RSA Security LLC or its affiliates. All rights reserved.
4 ©2021 RSA Security LLC or its affiliates. All rights reserved.
5 ©2021 RSA Security LLC or its affiliates. All rights reserved.
6 ©2021 RSA Security LLC or its affiliates. All rights reserved.
MITRE ATT&ck
We use MITRE framework to definethe techniques to adopt.
In addition,MITRE ATT&ck Frameworksupportthe Customerreadingour final report.
7 ©2021 RSA Security LLC or its affiliates. All rights reserved.
Mapping Tactics & Techniques
 By mappingthe real used techniques, the Team can build the scenario and can decide what tool
to adopt to emulate the outcome of the attacker tools.
8 ©2021 RSA Security LLC or its affiliates. All rights reserved.
9 ©2021 RSA Security LLC or its affiliates. All rights reserved.
10 ©2021 RSA Security LLC or its affiliates. All rights reserved.
11 ©2021 RSA Security LLC or its affiliates. All rights reserved.
12 ©2021 RSA Security LLC or its affiliates. All rights reserved.
13 ©2021 RSA Security LLC or its affiliates. All rights reserved.
 Our tools for the trade are:
 IDA Pro
 BinDiff
 Diaphora
How to find exploits…
 Diaphora is a plugin to IDA and it exports all necessary metadata into a sqlite-database.
To work with Diaphora you should proceed with the following steps:
 BinDiff is a comparison tool for binary files that helps to quickly find differences and similarities in
disassembled code. It is used by security researchers and engineers across the globe to identify and isolate
fixes for vulnerabilities in vendor-supplied patches and to analyze multiple versions of the same binary.
Another common use case is to transfer analysis results from one binary to another, helping to prevent
duplicate analyses of, for example, malware binaries.
 First, we export the databases (the binaries) that we want to compare.
 Then, we diff both generated databases to find matches between them.
 Optionally, we can import matches from one binary to another.
14 ©2021 RSA Security LLC or its affiliates. All rights reserved.
How to find exploits…
 With BinDiff you can identify and
isolate fixes for vulnerabilitiesin
vendor-suppliedpatches, port
symbolsand comments between
disassemblies of multiple versions
of the same binary.
In a typical comparison,as the results are presented, we get a number of tabs with statistics.
The Primary Unmatched tab shows functions that exist in the currently opened IDB that were not found in
the other file, while the Secondary Unmatched and Matched Functions tabs should be self-explanatory.
15 ©2021 RSA Security LLC or its affiliates. All rights reserved.
 We first open a file in IDA and export all the necessary metadata into a sqlite-database before
then opening the second file and comparing the sqlite files:
Diaphora
 The UI after the comparison
finishes is pretty much the
same as BinDiff.
 However when comparing
functions side-by-side it’s all
done in IDA with the option to
get an assembly,a pseudo-
code and a patch-style
comparison.
16 ©2021 RSA Security LLC or its affiliates. All rights reserved.
 The Microsoft patch, solved a privilege escalation vulnerabilitywithin win32k.
Search for an exploit: CVE-2023-29336
 v15 code implementation focused solely on
locking the window object called in the routine,
but it missed to lock the menu object nested
within the window object.
 It means that menu within the object can be left
behind, paving the way for the privilege
escalation.
 In fact, xxxEnableMenuItem function, connected
with v15 object is not properly locked when
exiting is main flow:
This object (v15) is locked properly… but, why in v17 is different?
 Let’s “BinDiff” between win32kunpatched and win32kpatched:
 This results in an exploitable condition to work
with, allowing us to develop a PoC and to go
forward with testing.
17 ©2021 RSA Security LLC or its affiliates. All rights reserved.
 If you found the instructions that are addressedby the patch, it’s time to move forward…
 If you unearthed an API that could be invoked:
− Craft the API call’s arguments carefully in order to trigger the vulnerable condition
− If no callable API is found:
• Look up the chain of calls, looking for hints
− as to how to reach the vulnerable condition
• Make a proof of concept file, network packet, API call, etc.
 Find samples online
− Run through all the samples to see which ones (if any) come near or actually hit the vulnerable function
− Modify the successful samples to focus in on and trigger the vulnerable code.
− Have fun…
Practical exploit creation
18 ©2021 RSA Security LLC or its affiliates. All rights reserved.
Demo: Example of weaponization
of a Patch Tuesday
19 ©2021 RSA Security LLC or its affiliates. All rights reserved.
20 ©2021 RSA Security LLC or its affiliates. All rights reserved.
21 ©2021 RSA Security LLC or its affiliates. All rights reserved.
 Video 1#
• We start with a local access with a standard user (“test”) in an unpatched Windows 11 system
• we launch the exploit code
• Thanks to the exploit we can add an administrative user or execute arbitrary command with
SYSTEM level. In our case we created the “admin” user.
 Video 2#
• This video demonstrate how the exploit can be used by a Red Teamer or a real attacker
• Using Runas from the C2 the attacker started a new implant with a middle integrity
privilege level (administrator)
 Video 3#
• From the new implant created with admin user the attacker use aBypassUAC technique
(fodhelper.exe) to gain high integrity level.
• At this point we can execute almost any program or command on the target machine.
Demo explained
22 ©2021 RSA Security LLC or its affiliates. All rights reserved.
23 ©2021 RSA Security LLC or its affiliates. All rights reserved.
Netwitness RT - Don’t scratch that patch.pptx
1 de 24

Recomendados

IRJET- Development of Uncrackable Software por
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
17 visualizações9 slides
[Haechi Audit] Pancake Bunny Smart Contract Audit Report por
[Haechi Audit] Pancake Bunny Smart Contract Audit Report[Haechi Audit] Pancake Bunny Smart Contract Audit Report
[Haechi Audit] Pancake Bunny Smart Contract Audit ReportLeighJay1
1.9K visualizações11 slides
IRJET- A Study on Penetration Testing using Metasploit Framework por
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET Journal
16 visualizações8 slides
Penetration testing using metasploit framework por
Penetration testing using metasploit frameworkPenetration testing using metasploit framework
Penetration testing using metasploit frameworkPawanKesharwani
89 visualizações8 slides
Making Security Agile por
Making Security AgileMaking Security Agile
Making Security AgileOleg Gryb
1.4K visualizações48 slides
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo... por
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...Felipe Prado
92 visualizações84 slides

Mais conteúdo relacionado

Similar a Netwitness RT - Don’t scratch that patch.pptx

nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code por
nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable codenullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code
nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable coden|u - The Open Security Community
2.1K visualizações14 slides
Double agent zero-day code injection and persistence technique por
Double agent  zero-day code injection and persistence techniqueDouble agent  zero-day code injection and persistence technique
Double agent zero-day code injection and persistence techniqueKarlFrank99
324 visualizações23 slides
Mergebase dont-let-vulns-run-wild por
Mergebase dont-let-vulns-run-wildMergebase dont-let-vulns-run-wild
Mergebase dont-let-vulns-run-wildJaredHarris18
43 visualizações43 slides
July Patch Tuesday 2019 por
July Patch Tuesday 2019July Patch Tuesday 2019
July Patch Tuesday 2019Ivanti
1.9K visualizações59 slides
How Virtual Compilation Transforms Static Code Analysis por
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisCheckmarx
647 visualizações7 slides
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way por
OWASP Bay Area Meetup - DevSecOps the Kubernetes WayOWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes WayJimmy Mesta
201 visualizações239 slides

Similar a Netwitness RT - Don’t scratch that patch.pptx(20)

Double agent zero-day code injection and persistence technique por KarlFrank99
Double agent  zero-day code injection and persistence techniqueDouble agent  zero-day code injection and persistence technique
Double agent zero-day code injection and persistence technique
KarlFrank99324 visualizações
Mergebase dont-let-vulns-run-wild por JaredHarris18
Mergebase dont-let-vulns-run-wildMergebase dont-let-vulns-run-wild
Mergebase dont-let-vulns-run-wild
JaredHarris1843 visualizações
July Patch Tuesday 2019 por Ivanti
July Patch Tuesday 2019July Patch Tuesday 2019
July Patch Tuesday 2019
Ivanti1.9K visualizações
How Virtual Compilation Transforms Static Code Analysis por Checkmarx
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code Analysis
Checkmarx647 visualizações
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way por Jimmy Mesta
OWASP Bay Area Meetup - DevSecOps the Kubernetes WayOWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
Jimmy Mesta201 visualizações
Vulnerability Advisor Deep Dive (Dec 2016) por Canturk Isci
Vulnerability Advisor Deep Dive (Dec 2016)Vulnerability Advisor Deep Dive (Dec 2016)
Vulnerability Advisor Deep Dive (Dec 2016)
Canturk Isci587 visualizações
Vs code extensions required for blockchain development por Blockchain Council
Vs code extensions required for blockchain developmentVs code extensions required for blockchain development
Vs code extensions required for blockchain development
Blockchain Council39 visualizações
Vulnerabilities are bugs, Let's test for them! por ichikaway
Vulnerabilities are bugs, Let's test for them!Vulnerabilities are bugs, Let's test for them!
Vulnerabilities are bugs, Let's test for them!
ichikaway957 visualizações
(Isc)² secure johannesburg por Tunde Ogunkoya
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg
Tunde Ogunkoya64 visualizações
Vulnerabilities are bugs, Let's Test For Them! por VAddy
Vulnerabilities are bugs, Let's Test For Them!Vulnerabilities are bugs, Let's Test For Them!
Vulnerabilities are bugs, Let's Test For Them!
VAddy 8.6K visualizações
SPI Dynamics web application security 101 por Wade Malone
SPI Dynamics web application security 101 SPI Dynamics web application security 101
SPI Dynamics web application security 101
Wade Malone518 visualizações
.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019 por Alexandre Borges
.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019
.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019
Alexandre Borges87 visualizações
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US... por Mobodexter
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter719 visualizações
Gimme shelter: Tips on protecting proprietary and open source code por Rogue Wave Software
Gimme shelter: Tips on protecting proprietary and open source codeGimme shelter: Tips on protecting proprietary and open source code
Gimme shelter: Tips on protecting proprietary and open source code
Rogue Wave Software 588 visualizações
Open Source Power Tools - Opensouthcode 2018-06-02 por Jorge Hidalgo
Open Source Power Tools - Opensouthcode 2018-06-02Open Source Power Tools - Opensouthcode 2018-06-02
Open Source Power Tools - Opensouthcode 2018-06-02
Jorge Hidalgo803 visualizações
Leveraging Standard Buildpacks to Migrate Not-So-Standard Apps por VMware Tanzu
Leveraging Standard Buildpacks to Migrate Not-So-Standard AppsLeveraging Standard Buildpacks to Migrate Not-So-Standard Apps
Leveraging Standard Buildpacks to Migrate Not-So-Standard Apps
VMware Tanzu225 visualizações
DevSecOps por Spv Reddy
DevSecOpsDevSecOps
DevSecOps
Spv Reddy1.1K visualizações
White Paper - Are antivirus solutions enough to protect industrial plants? por TI Safe
White Paper - Are antivirus solutions enough to protect industrial plants?White Paper - Are antivirus solutions enough to protect industrial plants?
White Paper - Are antivirus solutions enough to protect industrial plants?
TI Safe2.2K visualizações

Mais de Stefano Maccaglia

Insert coin to continue - Ransomware in the gaming industry.pdf por
Insert coin to continue - Ransomware in the gaming industry.pdfInsert coin to continue - Ransomware in the gaming industry.pdf
Insert coin to continue - Ransomware in the gaming industry.pdfStefano Maccaglia
294 visualizações41 slides
From velvet to silk there is still a lot of sweat por
From velvet to silk  there is still a lot of sweatFrom velvet to silk  there is still a lot of sweat
From velvet to silk there is still a lot of sweatStefano Maccaglia
90 visualizações39 slides
Light, Dark and... a Sunburst... dissection of a very sophisticated attack. por
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.Stefano Maccaglia
321 visualizações62 slides
Oh... that's ransomware and... look behind you a three-headed Monkey por
Oh... that's ransomware and... look behind you a three-headed MonkeyOh... that's ransomware and... look behind you a three-headed Monkey
Oh... that's ransomware and... look behind you a three-headed MonkeyStefano Maccaglia
124 visualizações43 slides
UN Presentation - 10-17-2018 - Maccaglia por
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaStefano Maccaglia
268 visualizações56 slides
Chasing the Adder. A tale from the APT world... por
Chasing the Adder. A tale from the APT world...Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...Stefano Maccaglia
219 visualizações36 slides

Mais de Stefano Maccaglia(9)

Insert coin to continue - Ransomware in the gaming industry.pdf por Stefano Maccaglia
Insert coin to continue - Ransomware in the gaming industry.pdfInsert coin to continue - Ransomware in the gaming industry.pdf
Insert coin to continue - Ransomware in the gaming industry.pdf
Stefano Maccaglia294 visualizações
From velvet to silk there is still a lot of sweat por Stefano Maccaglia
From velvet to silk  there is still a lot of sweatFrom velvet to silk  there is still a lot of sweat
From velvet to silk there is still a lot of sweat
Stefano Maccaglia90 visualizações
Light, Dark and... a Sunburst... dissection of a very sophisticated attack. por Stefano Maccaglia
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Stefano Maccaglia321 visualizações
Oh... that's ransomware and... look behind you a three-headed Monkey por Stefano Maccaglia
Oh... that's ransomware and... look behind you a three-headed MonkeyOh... that's ransomware and... look behind you a three-headed Monkey
Oh... that's ransomware and... look behind you a three-headed Monkey
Stefano Maccaglia124 visualizações
UN Presentation - 10-17-2018 - Maccaglia por Stefano Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - Maccaglia
Stefano Maccaglia268 visualizações
Chasing the Adder. A tale from the APT world... por Stefano Maccaglia
Chasing the Adder. A tale from the APT world...Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...
Stefano Maccaglia219 visualizações
BSides IR in Heterogeneous Environment por Stefano Maccaglia
BSides IR in Heterogeneous EnvironmentBSides IR in Heterogeneous Environment
BSides IR in Heterogeneous Environment
Stefano Maccaglia661 visualizações
DCC 2016 New strategies, old actors - APT and the evolution of Cybercrimina... por Stefano Maccaglia
DCC 2016   New strategies, old actors - APT and the evolution of Cybercrimina...DCC 2016   New strategies, old actors - APT and the evolution of Cybercrimina...
DCC 2016 New strategies, old actors - APT and the evolution of Cybercrimina...
Stefano Maccaglia169 visualizações
Maccaglia - Cybercrime un approccio tecnologico e sociologico por Stefano Maccaglia
Maccaglia - Cybercrime un approccio tecnologico e sociologicoMaccaglia - Cybercrime un approccio tecnologico e sociologico
Maccaglia - Cybercrime un approccio tecnologico e sociologico
Stefano Maccaglia378 visualizações

Último

"Surviving highload with Node.js", Andrii Shumada por
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
40 visualizações29 slides
MVP and prioritization.pdf por
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
38 visualizações8 slides
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
65 visualizações28 slides
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... por
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
74 visualizações18 slides
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... por
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...ShapeBlue
63 visualizações13 slides
Network Source of Truth and Infrastructure as Code revisited por
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
42 visualizações45 slides

Último(20)

"Surviving highload with Node.js", Andrii Shumada por Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays40 visualizações
MVP and prioritization.pdf por rahuldharwal141
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdf
rahuldharwal14138 visualizações
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue65 visualizações
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... por ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue74 visualizações
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... por ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue63 visualizações
Network Source of Truth and Infrastructure as Code revisited por Network Automation Forum
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisited
Network Automation Forum42 visualizações
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... por ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue83 visualizações
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi141 visualizações
Uni Systems for Power Platform.pptx por Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.58 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum46 visualizações
Kyo - Functional Scala 2023.pdf por Flavio W. Brasil
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil434 visualizações
Microsoft Power Platform.pptx por Uni Systems S.M.S.A.
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptx
Uni Systems S.M.S.A.67 visualizações
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... por ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue54 visualizações
Scaling Knowledge Graph Architectures with AI por Enterprise Knowledge
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AI
Enterprise Knowledge53 visualizações
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... por ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue48 visualizações
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue por ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue96 visualizações
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue46 visualizações
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue111 visualizações
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining80 visualizações

Netwitness RT - Don’t scratch that patch.pptx

  • 1. 1 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 2. 2 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 3. 3 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 4. 4 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 5. 5 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 6. 6 ©2021 RSA Security LLC or its affiliates. All rights reserved. MITRE ATT&ck We use MITRE framework to definethe techniques to adopt. In addition,MITRE ATT&ck Frameworksupportthe Customerreadingour final report.
  • 7. 7 ©2021 RSA Security LLC or its affiliates. All rights reserved. Mapping Tactics & Techniques  By mappingthe real used techniques, the Team can build the scenario and can decide what tool to adopt to emulate the outcome of the attacker tools.
  • 8. 8 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 9. 9 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 10. 10 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 11. 11 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 12. 12 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 13. 13 ©2021 RSA Security LLC or its affiliates. All rights reserved.  Our tools for the trade are:  IDA Pro  BinDiff  Diaphora How to find exploits…  Diaphora is a plugin to IDA and it exports all necessary metadata into a sqlite-database. To work with Diaphora you should proceed with the following steps:  BinDiff is a comparison tool for binary files that helps to quickly find differences and similarities in disassembled code. It is used by security researchers and engineers across the globe to identify and isolate fixes for vulnerabilities in vendor-supplied patches and to analyze multiple versions of the same binary. Another common use case is to transfer analysis results from one binary to another, helping to prevent duplicate analyses of, for example, malware binaries.  First, we export the databases (the binaries) that we want to compare.  Then, we diff both generated databases to find matches between them.  Optionally, we can import matches from one binary to another.
  • 14. 14 ©2021 RSA Security LLC or its affiliates. All rights reserved. How to find exploits…  With BinDiff you can identify and isolate fixes for vulnerabilitiesin vendor-suppliedpatches, port symbolsand comments between disassemblies of multiple versions of the same binary. In a typical comparison,as the results are presented, we get a number of tabs with statistics. The Primary Unmatched tab shows functions that exist in the currently opened IDB that were not found in the other file, while the Secondary Unmatched and Matched Functions tabs should be self-explanatory.
  • 15. 15 ©2021 RSA Security LLC or its affiliates. All rights reserved.  We first open a file in IDA and export all the necessary metadata into a sqlite-database before then opening the second file and comparing the sqlite files: Diaphora  The UI after the comparison finishes is pretty much the same as BinDiff.  However when comparing functions side-by-side it’s all done in IDA with the option to get an assembly,a pseudo- code and a patch-style comparison.
  • 16. 16 ©2021 RSA Security LLC or its affiliates. All rights reserved.  The Microsoft patch, solved a privilege escalation vulnerabilitywithin win32k. Search for an exploit: CVE-2023-29336  v15 code implementation focused solely on locking the window object called in the routine, but it missed to lock the menu object nested within the window object.  It means that menu within the object can be left behind, paving the way for the privilege escalation.  In fact, xxxEnableMenuItem function, connected with v15 object is not properly locked when exiting is main flow: This object (v15) is locked properly… but, why in v17 is different?  Let’s “BinDiff” between win32kunpatched and win32kpatched:  This results in an exploitable condition to work with, allowing us to develop a PoC and to go forward with testing.
  • 17. 17 ©2021 RSA Security LLC or its affiliates. All rights reserved.  If you found the instructions that are addressedby the patch, it’s time to move forward…  If you unearthed an API that could be invoked: − Craft the API call’s arguments carefully in order to trigger the vulnerable condition − If no callable API is found: • Look up the chain of calls, looking for hints − as to how to reach the vulnerable condition • Make a proof of concept file, network packet, API call, etc.  Find samples online − Run through all the samples to see which ones (if any) come near or actually hit the vulnerable function − Modify the successful samples to focus in on and trigger the vulnerable code. − Have fun… Practical exploit creation
  • 18. 18 ©2021 RSA Security LLC or its affiliates. All rights reserved. Demo: Example of weaponization of a Patch Tuesday
  • 19. 19 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 20. 20 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 21. 21 ©2021 RSA Security LLC or its affiliates. All rights reserved.  Video 1# • We start with a local access with a standard user (“test”) in an unpatched Windows 11 system • we launch the exploit code • Thanks to the exploit we can add an administrative user or execute arbitrary command with SYSTEM level. In our case we created the “admin” user.  Video 2# • This video demonstrate how the exploit can be used by a Red Teamer or a real attacker • Using Runas from the C2 the attacker started a new implant with a middle integrity privilege level (administrator)  Video 3# • From the new implant created with admin user the attacker use aBypassUAC technique (fodhelper.exe) to gain high integrity level. • At this point we can execute almost any program or command on the target machine. Demo explained
  • 22. 22 ©2021 RSA Security LLC or its affiliates. All rights reserved.
  • 23. 23 ©2021 RSA Security LLC or its affiliates. All rights reserved.

Notas do Editor

  1. Threat Modeling: Red Teams analyze an organization's systems and networks to identify potential threats, vulnerabilities, and risks. They help organizations prioritize their security efforts by assessing the likelihood and impact of various attack scenarios. Security Architecture Review: Red Teams evaluate an organization's security architecture, including network designs, access controls, and segmentation. They assess the effectiveness of the existing architecture in mitigating risks and provide recommendations for improvements. Zero-day Exploit Testing: Red Teams assess an organization's resilience to zero-day exploits, which are vulnerabilities unknown to software vendors. They test if the organization's systems can withstand unknown attacks, helping identify areas for patch management and incident response improvements. Adversarial Simulation: Red Teams simulate the tactics, techniques, and procedures (TTPs) of real-world threat actors, such as advanced persistent threats (APTs). This involves replicating the attack methodologies and TTPs to assess an organization's ability to detect, respond, and recover from such attacks.
  2. Initial Compromise: The red team will employ spear-phishing or other social engineering techniques to gain an initial foothold in the organization's network, mimicking APT28's attack vectors. This may involve crafting convincing phishing emails or exploiting vulnerabilities in publicly accessible systems. Lateral Movement and Privilege Escalation: Once inside the network, the red team will simulate APT28's tactics for lateral movement and privilege escalation. They will attempt to move laterally within the organization's systems, escalate privileges, and access critical assets or sensitive information. Techniques such as pass-the-hash, credential theft, or exploiting misconfigurations may be employed. Persistence and Evasion: The red team will strive to maintain persistence within the network and evade detection by security controls. They will employ APT28's techniques for hiding their activities, such as leveraging rootkits, backdoors, or anti-forensic tools to evade detection by antivirus or intrusion detection systems. Data Exfiltration: The red team will attempt to exfiltrate sensitive data or intellectual property from the organization's network, mimicking APT28's exfiltration methods. This may involve using covert channels, encryption, or disguising the data within seemingly innocuous network traffic.
  3. Adversarial Emulation requires study, time and tons of patience… Typically our IR Team and our Threat Intel teams are engaged to collect and share tools and details about techniques that could be connected with a specific actor. That is extremely helpful because could ensure we are aligned with the real actors and more importantly we can review their arsenal looking for malcode that we could reliably adopt without much reversing. However, when we discuss about initial exploitation or privilege escalations, these activity need a dedicated resources, and more importantly a ton of tests. Lots of different types of vulnerability research (the following is just a start):
  4. Patch Tuesday, also known as Update Tuesday, is a Microsoft-coined term that refers to the second Tuesday of every month when Microsoft releases security patches and updates for its software products, including Windows operating systems and various Microsoft applications. ‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. In fact, while the primary purpose of Patch Tuesday is to enhance the security of these software products by addressing known vulnerabilities, it can inadvertently provide opportunities for Red Team operations. In this presentation we will elucidate how Patch Tuesday can be exploited by Red Teams to acquire additional exploits and compromise techniques for their security assessments.
  5. Research and Preparation: a. Tracking Patch Tuesday: Red Teamers should actively monitor Patch Tuesday announcements from Microsoft. They can subscribe to Microsoft's security bulletin or use other sources like security blogs and forums to stay informed about the latest updates. b. CVE Identification: As patches are released, Red Teamers must identify the Common Vulnerabilities and Exposures (CVE) associated with the fixed vulnerabilities. Microsoft typically provides detailed information about the vulnerabilities in their security advisories. CVE Analysis: a. CVE Details Examination: Red Teamers should carefully examine the details of each CVE, including the affected software, the nature of the vulnerability, and the potential impact. b. Ranking: Determine the potential severity and exploitability of the identified vulnerabilities. Some CVEs may have a high likelihood of being exploited, while others may be more challenging. Exploit Development: a. Vulnerability Exploitation: If a Red Team identifies a CVE with a high exploitability potential, they can initiate exploit development. This involves creating proof-of-concept (PoC) exploits or leveraging existing ones, especially if the vulnerability is in a widely used software component. b. Payload Crafting: Red Teamers should create malicious payloads that can be delivered to target systems once the vulnerability is successfully exploited. These payloads can be used for various purposes, including gaining remote access or escalating privileges. Testing and Validation: a. Internal Testing: Before using the developed exploits in real-world scenarios, Red Teamers should extensively test them in controlled environments to ensure they work as intended and do not raise suspicions. b. Scenario Simulation: Simulate various attack scenarios to understand the potential impact of the exploits and ensure they align with Red Team objectives. Compromise Techniques: a. Leveraging Exploits: Once exploits are ready, Red Teamers can incorporate them into their attack methodologies. These exploits can be used as initial access points into target systems. b. Post-Exploitation: Red Teams can employ various post-exploitation techniques to maintain access, move laterally, and escalate privileges within the compromised systems. Techniques like privilege escalation, credential theft, and lateral movement can be employed. Reporting and Documentation: a. Comprehensive Reporting: Document all findings, including the CVEs targeted, the exploits developed or used, and the compromise techniques employed during the Red Team engagement. b. Recommendations: Provide recommendations to the organization on how to mitigate the vulnerabilities and improve their security posture.
  6. What options do you think? (Q) Doing a byte by byte analysis of the code? Byte-by-byte comparison is not useful as a generic approach. On the x86 architecture (and others), there are variable-length instructions • X86: 1 instruction can be up to 14 bytes • Swapping sequential, semantically separate instructions can cause up to 28 bytes of change (Q) Disassemble all the code from the before/after files and do a source code comparison of the disassembled code? Possible, but not always practical • Generates lots of noise, due to structural changes • This becomes a search for a needle in a haystack. In fact, noise is usually introduced in a patch.
  7. Release the COM interfaces and clean up the resources: pIWerReport->Release() pIWerStore->Release() pIWerStoreFactory->Release() pIErcLuaSupport->Release() Uninitialize COM by calling CoUninitialize().