Hacking tools and the case for layered security

  • Published on
    15-May-2015

  • View
    65

  • Download
    1

DESCRIPTION

To demonstrate the need for a holistic security approach by utilizing publicly available tools and social engineering techniques to gain unauthorized access to systems, data, and network resources. I'll create different scenarios in which various tools will be used for hacking purposes, after the target computer is successfully compromise I'll go over different security measures that could have been implemented to stop or mitigate the likelihood of a security breach. Some tools and scenarios will be more technical than others but as security professional our job is not to defeat tools but to protect the resources even from unsophisticated events such as someone stealing the physical computer. As a side note, some of the Scenarios are real cases in the business world. Sophisticated or not they could have been avoided with the right security security measures. Any identifiable information has been modified to protect the privacy of those affected. An unmanaged network is an insecure network, when the network is just a few people the office environment might be able to get away with a lot of the most stringiest controls but once the office has matured in its business practices the need for centralized administration and management is paramount. Let me clear, centralized administration, such as Windows Active Directory, Centralized AV, IPS-IDS, are not a silver bullet against attacks like this but it provides the necessary tools for someone with the technical knowledge to apply the appropriate controls to avoid situations like the ones described.

Transcript

  • 1. HACKING TOOLS AND THE CASE FOR LAYERED SECURITY APPROACH. TO DEMONSTRATE HOW USERS WITH LITTLE TECHNICAL KNOWLEDGE USING PUBLICLY AVAILABLE TOOLS CAN ACCESS UNAUTHORIZED RESOURCES . JDTECHSOLUTIONS | PRECISE TECHNOLOGIES | TRAVERSE NETWORKS IT SUPPORT AND INFORMATION SECURITY SERVICES IN NYC & NORTHERN NJ

2. GAINING SYSTEM ACCESS Demonstrate the need for a holistic security approach by utilizing publicly available tools and social engineering techniques to gain unauthorized access to systems, data, and network resources. As a side note, some of the Scenarios are real cases in the business world. Sophisticated or not they could have been avoided with the right security security measures. Any identifiable information has been modified to protect the privacy of those affected. 3. TOOL 1. TRINITY RESCUE KIT (TRK) I came across TRK a couple of years ago and I must confess, its a solid, simple to use, and intuitive tool that comes handy for the everyday tech support but i noticed that almost anyone with a little bit of imagination and basic technical skills can induce some damage to an organizations. You can go to www.trinityhome.org to learn more about project, if you think its useful and end up taking advantage of it consider making a donation, they do a pretty good job keeping it relevant. One more thing, TRK is based on linux OS, even though it support a huge hardware variety you might encounter that some hardware is not compatible with it. 4. SCENARIO 1. RESETTING A PASSWORD. BOB WANTS ADMINISTRATIVE ACCESS TO ALICE'S PC Difficulty 1-10: 3 Technical skills needed: 3 The following must be met: Physical access to the target PC Boot up from an external source such a USB, CD, or network. Windows Desktop Environment XP-7 Workgroup Environment 5. Step 1. Bob gains access to Alices' physical computer. How did he do it? it doesn't take much to seat at someone else's desk, specially if it's in office space divided by cubicles. He boots up the PC from the TRK USB device. 6. Step 2. Select Windows Password Resetting 7. Step 3. Select your preferred option, I usually select Interactive winpass because it gives me the option to list user accounts, see their group membership, and status. 8. Step 4. So if you select the interactive option, the file systems will be mounted and the registry loaded. Unless you have a multi boot system hit enter, otherwise select the right installation to mount 9. Step 5. Select option 1 Edit user data and passwords - user account status, from there you have the option to enter the user account which youd like to modify, enter either the RID or the user account exactly as you see is displayed. 10. Step 6. Select the user account to modify, either by typing 0x (the RDI for the user name, listed on the first column) or the user name exactly as its displayed. 11. Step 7. In the user's property windows select the option to Clear or Edit the password. Reset or Edit password as you wish. 12. Step 8. Quit Menu, reboot pc and log in as Alice 13. Bob logged in as Alice, took the data he was looking for and soon he'll be out of the office. Yes, this is a very loud way of accessing someone else's computer, specially when the password is reset but in a regular office environment users forget their passwords all the time, it's not uncommon for a user to take fault for when their passwords don't work, even in situations when it had been reset by someone else. One of the main aspects of cyber security is Social Engineering! Dont think that all attacks need to be highly sophisticated to be effective. 14. SCENARIO 2. CREATE AN OPEN SHARE WITH TRK. GAIN ACCESS TO SOMEONE ELSE'S DATA OVER THE NETWORK Background: You need to have physical access to the "victim" PC You should be able to boot up from an external source such a USB, CD, or network. You have TRK ready Workgroup network configuration DHCP network 15. Step1. Connects TRK USB to Anna's pc, turns the computer on and Selects the boot option to boot from USB 16. Step 2. PC boot up into TRK 17. Step 3. Selects Run a windows fileserver option 18. Step 4. Selects Run an unsecure fileserver in guest mode option TRK mounts the local partitions, loads the SMB and shares them in the network. The fileserver is published using the Anna's IP address. (quick note: if you are in a DHCP environment TRK will request an IP address from the DHCP server. IP settings can also be manually configured by suing the setip eth0 command from the TRK shell) 19. Step 5. Uses Windows UNC to connect to Anna's new Shared drives over the network (Bob's is happy man now) 20. Step 6. He gets the price: access to Anna's files. He just browses using explorer to copy what he wants. 21. Step 7. After copying the data, Bob stops the file server and exists TRK. No visible traces, no drama, didn't take him long, ready to leave his company with a lot of data he wasn't supposed to get access to. As you could see in the examples, Bob gained access to Alices PC without much trouble or configuration. He used his social engineering techniques to access Alices pc and carry out his plan. Now lets look at what controls could have been implemented to stop this type of attack. Continue to the next slide 22. SECURITY CONTROLS 1. Physical Control: Prevent physical access (though not possible in every situation it's something to consider) 2. Physical Control: Surveillance system, it serves as a deterrent . 3. Technical Control: Password protect system BIOS settings, this will prevent users from accessing-changing boot settings. 4. Technical Control: Enable Boot Security settings. Available in many BIOSes to prevent computers from booting to "unauthorized" OS. 5. Technical Control: Disable external devices such as CD, USB, and other ports. 6. Cryptography: Encrypting either data or full disk would rendered data unreadable. 7. Technical Control: Centralized administration, workgroup networks don't offer centralized management, log tracking, 23. Now that Bob has conquered Alice and Anna's documents he wants to go for the ultimate price before he walks out on them. He wants to have access to the HR manager's PC. That's right..., he's done it twice and he can do it again without getting caught and he's going after the big fish now. This time he doesn't want access to some files or docs, he wants the whole computer. He knows that with TRK there's a much better option than stealing the HR manager's PC, he can make an exact copy over the network in less than it'd take for the manager to come back from lunch, he wants a clone.. Now lets look at a more pervasive type of attack using TRK. Lets keep on using our friends Bob and Alice to illustrate. 24. SCENARIO 3. CLONING A PC OVER THE NETWORK WITH TRK. You need to have physical access to the "victim" PC You should be able to boot up from an external source such a USB, CD, or network. Two TRK boot devices Workgroup network configuration DHCP network A computer similar computer as the HR manager's PC. A laptop loaded with Virtual Box 25. In this case Bob is going getting a little bit more techie, after all he doesn't want to carry a tower computer to the office to commit his mischievous act. Instead of finding a computer with similar hardware to the HR Manger's one he has decided to clone to a virtual machine instead, that way he can bring his laptop loaded with Virtual Box and image to it, all thing still using TRK. To accomplish his objective Bob does the following: 26. 1. Install Virtual Box and create a new Virtual Machine 27. The name and the OS type settings are irrelevant for this purpose 28. Add the amount of memory allocated for the virtual machine, 1024 MB would suffice for the intended purpose. 29. Create Virtual Disk 30. Select VDI type 31. Select fixed size for the storage details, this is very important! for our purpose TRK needs to see a "full disk" to image to otherwise the cloning will fail during transfer. 32. Leave the default location and enter the amount of hard disk space ( from the laptop hd) that will be allocated for the VM, the space must be the same or more than the physical computer being cloned. - Yes, our friend Bob has a 1 TR drive on his laptop so he should be fine-. 33. Create the VDI drive, the system will take the allocated space and create the drive, the process might take some time depending on the size and type of drive. In Bob's case he took care of the preliminary Virtual Box configuration before he came to the office. 34. NOW THAT THE "RECIPIENT" VIRTUAL COMPUTER HAS BEEN SUCCESSFULLY SETUP IS TIME TO MOVE ON TO THE ACTUAL ACT, BOB IS READY TO CLONE THE HR MANAGER'S PC TO A VIRTUAL MACHINE RUNNING ON HIS LAPTOP. 35. Boot up the Manager's PC and his VM with TRK, the boot up process is the same, what's going to change is the menu selection. Select Mclone: computer replication over the network. 36. On the Manager's PC Bob selects Mclone in server mode (sender) 37. Notice that TRK enables Mclone to broadcast to client computers within the same network segment, it can broadcast to one or multiple computers at time. At this time the system is waiting for a client connection. 38. On his VM Bob selects Mclone in client mode (receiver) option. 39. Notice that system is ready to receive data from the sender, press any key to continue and watch magic happen... 40. Press any key an let the data transfer begin. The process is fairly fast over a 100 mpbs network and even faster is all hardware involved support the 1gbps. After pc has been imaged, Bob can quit TRK, restart computers and life goes back to normal. He might have one more task to do though, even though he cloned the Manager's PC he still need to brake the password to get to be able to log in. It's not a big deal because he already did with Alice's computer. 41. Now, let's look at it from the administrative point of view. Besides the control I mentioned before the most troubling lack of control i've seen in situations like this is the lack of administration, or centralized administration. An unmanaged network is an insecure network, when the network is just a few people the office environment might be able to get away with a lot of the most stringiest controls but once the office has matured in its business practices the need for centralized administration and management is paramount. Let me clear, centralized administration, such as Windows Active Directory, Centralized AV, IPS-IDS, are not a silver bullet against attacks like this but they provides the necessary tools for someone with the technical knowledge to apply the appropriate 42. I usually refer to the NIST and NSA documents framework, I also use PCI and HIPAA standard whether the business requires to comply or not with such standards. The point is to be proactive when it comes to network security and adapt the frameworks and best practices to each business need. Precise Technologies and JDTechSolutions offer desktop, network, and information security services in NY and Northern NJ. Our goal is to Our goal is clear: to provide fortune 100 IT technical support to small and medium size businesses in Hudson County and surrounding areas by developing, implementing, and aligning technology with business' goals and requirements. Our strategic technical vision and expertise allow us to implement solutions and services that increase business productivity, provides technical resiliency, and reduce technical costs, thus improving your bottom line. We offer various types of technical support that adapt to each businesses culture and needs. Whether it's a one time engagement, project based, or managed services we will provide you the most reliable, efficient, and cost effective solution for your technical needs. Contact us to learn more about our services and solutions. 43. Contact us at 646-500-0032 | 888-580-4450 www.precisetek.com | www.jdtechsolutions.net

Recommended

View more >