36
CYBER AGGRESSORS A CONCEPT OF OPERATIONS

Cyber Aggressors

  • Upload
    diella

  • View
    69

  • Download
    0

Embed Size (px)

DESCRIPTION

Cyber Aggressors. A Concept of Operations. Quick Introduction. Raphael Mudge, Strategic Cyber LLC [email protected] I develop Cobalt Strike http:// www.advancedpentest.com / Would you like to try Cobalt Strike? I have DVDs with a complete hacking lab on them - PowerPoint PPT Presentation

Citation preview

Page 1: Cyber Aggressors

CYBER AGGRESSORSA CONCEPT OF OPERATIONS

Page 2: Cyber Aggressors

Quick Introduction

• Raphael Mudge, Strategic Cyber LLC– [email protected]

• I develop Cobalt Strike– http://www.advancedpentest.com/

• Would you like to try Cobalt Strike?– I have DVDs with a complete hacking lab on them– Ask for one. They’re fun.

Page 3: Cyber Aggressors

Overview

• My Back Story• Pen Testing vs. Red Team vs. Aggressor• What is an Aggressor?• From Red Team to Aggressor

Page 4: Cyber Aggressors

Rochester, NY (March 2008)

Page 5: Cyber Aggressors

Personal Detour

Page 6: Cyber Aggressors

Armitage

Page 7: Cyber Aggressors

Red Team Collaboration

Page 8: Cyber Aggressors

And… Automation

Page 9: Cyber Aggressors

Red Team Support to DoD Agency

Page 10: Cyber Aggressors

How To Get a Foothold

1. Map client-side attack surface2. Create Virtual Machine for testing purposes3. Use Virtual Machine to select best attack4. Configure and disguise the attack5. Email attack package to victim

Page 11: Cyber Aggressors

How To Get a Foothold

1. Map client-side attack surface2. Create Virtual Machine for testing purposes3. Use Virtual Machine to select best attack4. Configure and disguise the attack5. Email attack package to victim

Page 12: Cyber Aggressors

Metasploit’s Tactical Gaps

• Attacks are caught by anti-virus• Limited options to egress a network– HTTP, HTTPS, TCP, TCP – All Ports

• Meterpreter – Communicates with one C&C endpoint– Requires active channel or session dies– Non-obfuscated staging process (fixed April 2013)

Page 13: Cyber Aggressors

Metasploit’s Tactical Gaps

Page 14: Cyber Aggressors

Cobalt Strike

Page 15: Cyber Aggressors

Augment the Metasploit Framework

• Artifacts that get past anti-virus • Social Engineering Workflow• Beacon Payload – C&C over DNS, HTTP, and SMB Named Pipes– Uses redirectors, calls home to multiple systems– Low and Slow “asynchronous” C&C

• Post-Exploitation Emphasis– e.g., browser pivoting to get past 2FA

Page 16: Cyber Aggressors

Static Defenses

Page 17: Cyber Aggressors

Static Defenses

Page 18: Cyber Aggressors

Roles

• Penetration Tester• Red Team• Aggressor

Page 19: Cyber Aggressors

Roles (What)

• Penetration Tester– Exploit Security Holes

• Red Team– Simulate an Attack

• Aggressor– Replicate an Imminent Threat

Page 20: Cyber Aggressors

Roles (Why)

• Penetration Tester– Find and verify vulnerabilities

• Red Team– Exercise Security Controls

• Aggressor– Exercise Intelligence Support to CND

Page 21: Cyber Aggressors
Page 22: Cyber Aggressors

Vietnam War

2.2:1

Page 23: Cyber Aggressors

Continued…

• Project Red Baron II– Pilot’s chance of survival increases after 10

missions– Led to USAF’s Red Flag Exercise in 1975 *

• Red Flag Exercise– Fly 10 combat missions against…– dissimilar aircraft (flown by Aggressors)

* US NAVY founded TOPGUN in 1969 to address training gap after heavy losses during Operation Rolling Thunder.

Page 24: Cyber Aggressors

Aggressors

• Selected from top pilots• Trained to use enemies TTPs• Flew American aircraft!

Page 25: Cyber Aggressors

Aggressor Platform

• American aircraft with similar profile• Painted with adversary’s colors

Page 26: Cyber Aggressors

What is a Cyber Aggressor?

• Selected from top red operators• Trained to use enemies TTPs• Uses platform with enemy’s capabilities

Page 27: Cyber Aggressors

Cyber Aggressor Platform

• Standard Platform• Gets past static defenses• Extensible for mission needs• Customizable Indicators

Page 28: Cyber Aggressors

Customizable Indicators

• On Disk– Add static strings to EXE and DLL artifacts– Drop persistence to same location, use same

registry key

Page 29: Cyber Aggressors

Customizable Indicators

• On Network– Limit C&C Protocols to what adversary uses– Customize C&C with indicators to look like actor

Page 30: Cyber Aggressors

Beacon as a Communication Layer

Page 31: Cyber Aggressors

Communication Profiles

• Start a Cobalt Strike team server with a profile• Profile is compiled and hot-patched into

Beacon agent and server• Communication through Beacon follows

profile

Page 32: Cyber Aggressors

Communication Profiles

• To replicate Comment Crew:– Restrict Beacon to its HTTP channel– Load profile that:• Base64 encodes data• <html>Pads data with dummy HTML</html>• <!-- Wraps data in an HTML comment -->

– Tunnel Tools through Beacon

Page 33: Cyber Aggressors

Red Team: Security Controls

• What did you see?• What did the adversary take?• Which systems is the adversary on?• Which accounts are compromised?• Where is the adversary’s C&C?

Page 34: Cyber Aggressors

Aggressor: Intelligence and CND

• Who is attacking us?• What do they want?• What will they go after next?• Which indicators match known profile?• Which indicators are new?• What other indicators may we look at?

Page 35: Cyber Aggressors

Summary

• My Back Story• Pen Testing vs. Red Team vs. Aggressor• What is an Aggressor?• From Red Team to Aggressor

Page 36: Cyber Aggressors

Questions

• Email: [email protected]• Twitter: @armitagehacker• WWW: http://www.advancedpentest.com/