07/09/15 © NCC Group 1

Transcription

07/09/15 © NCC Group 1
07/09/15
© NCC Group
1
Who am I? Martin Hansen Senior Security Consultant Background
FortConsult A/S part of NCC Group, Senior Security
Consultant – 2014 - present
Ernst & Young, Manager – 2005 – 2014
Cand.Merc.Aud, Master of Science in Business Economics
and Auditing 2005 - 2009
HA (dat.) Bachelor of Computer Science and Business
Administration 2002 – 2005
Fields of expertise
Specializes in the following areas of information
security:
Advanced Internal and External penetration testing Web applications, Network, Application Security and
Social Engineering.
PCI (Payment Card Industry)
Critical IT Security Controls
IT Security Audit
07/09/15
Certifications
PCI Council – PCI Payment Card Industry PCI QSA Qualified
Security Assessor
SANS GIAC Critical Controls Certification – GCCC since 2014
(ISC)2 Certified Information Systems Security Professional –
CISSP since 2011
SANS GIAC Penetration Tester – GPEN since 2011
ISO 27001 Lead Auditor – EY Certify Point, 2011, Denmark
ISACA - Certified Information Systems Auditor - CISA since
2010
© NCC Group
2
♦  Global IT-­‐Security company, HQ Copenhagen ♦  Delivering security assessment, review, test and incident response ♦  Working with financial, government, tech and top 100 companies worldwide ♦  Owned by NCC Group PLC, 1500 skilled security professionals in 18 location ♦  World largest team of penetration testers 07/09/15
© NCC Group
3
FortConsult udfører sikkerhedstest for virksomheder som er ISO27001 compliant, får en 3402 revisionserklæring, som er PCI Compliant eller som lever op til andre sikkerhedsstandarder. Selvom disse virksomheder på papiret lever op til diverse krav som stilles igennem diverse frameworks finder vi stadig simple sårbarheder som gør at vi kan gennemtrænge deres netværk. Hvilke sårbarheder er det som FortConsult finder igen og igen når vi udfører vores sikkerhedstest og hvordan kan du som virksomhed indføre simple kontroller for at opdage disse sårbarheder inden en Hacker udnytter disse sikkerhedsbrister. 07/09/15
© NCC Group
4
Agenda 1.  Password 2.  Segmentation 3.  Social Engineering 4.  Patching of business critical systems 5.  Default/hardening/Baseline 07/09/15
© FortConsult
5
Password 07/09/15
© FortConsult
6
Password How real users interpret password rules !!!! -­‐ ”#!!#!# ♦  “Passwords must contain at least 1 upper, 1 lower, 1 number, and be at least 7 characters long” ♦  Take a base word of 6, 7 or 8 characters ♦  Chose only one upper ♦  Make first character upper ♦  Add numbers on the end (one, two, or four numbers) ♦  Or, substitute numbers and symbols for letters which look like numbers and symbols (“P@ssw0rd!”) ♦  For password changes, users increment the number: "Manunited1!", "Manunited2!", "Manunited3!"… 07/09/15
© FortConsult
7
Password Problem: User!! Lars&Mikkel
Welcome1
Password1
Vinter2014
Martin12
Fortconsult10
07/09/15
Top 5 most used 1 Password1 2 12345678 3 Welcome1 4 Sommer2014 5 opret123 Sommer2014
Bigger Problem: Not only users; Also Admins and Service Accounts!!!!! © FortConsult
8
07/09/15
© FortConsult
9
Password 1. 
2. 
3. 
4. 
07/09/15
Extract password hashes Crack password hashes Force password change Awareness training for users © FortConsult
10
Password How many in this room has a secure password??? 07/09/15
© FortConsult
11
Segmentation 07/09/15
© FortConsult
12
Segmentation Development
DMZ
Servers
Test
Clients
Secure zone
Different
Geographical
Locations
07/09/15
© FortConsult
13
Segmentation – Firewall Review remark *** Access to router *** permit ip 10.210.220.14 0.0.0.8 host 10.4.200.144 permit udp host 0.0.0.0 host 255.255.255.255 remark *** raste.blob.com *** permit icmp 192.168.168.0 0.0.0.255 host 192.168.168.1 permit ip 10.210.220.14 0.0.0.8 host 10.4.65.11 permit udp 192.168.168.0 0.0.0.255 host 192.168.168.1 eq ntp remark *** mdm.limo.blob.com *** remark *** Access to FRY *** permit ip 10.210.220.14 0.0.0.8 host 10.4.200.148 permit ip 192.168.168.0 0.0.0.255 host 10.210.220.2 remark *** mobile.blob.com *** remark *** KJU access *** permit ip 10.210.220.14 0.0.0.8 host 10.4.200.218 permit ip 192.168.168.0 0.0.0.255 10.210.8.0 0.0.0.255 remark *** melllpo.apple.com *** remark *** XX access *** permit ip 10.210.220.14 0.0.0.8 host 10.4.200.184 permit ip 192.168.168.0 0.0.0.255 10.210.192.0 0.0.15.255 remark *** proxy.kimh.blob.com *** permit ip 192.168.168.0 0.0.0.255 10.210.208.0 0.0.8.255 permit tcp 10.210.220.14 0.0.0.8 host 10.4.200.129 eq www permit ip 192.168.168.0 0.0.0.255 10.99.0.0 0.0.64.255 permit tcp 10.210.220.14 0.0.0.8 host 10.4.200.129 range 8088 8088 remark *** IL access *** remark *** DHCP *** permit ip 192.168.168.0 0.0.0.255 10.210.190.0 0.0.0.41 permit udp any eq bootpc host 255.255.255.255 eq bootps remark *** Access to INT *** permit udp host 10.210.220.98 eq bootps host 255.255.255.255 eq bootpc permit ip 192.168.168.0 0.0.0.255 10.0.0.0 0.4.255.255 remark *** range for future use *** remark *** Support access *** permit ip 10.210.220.14 0.0.0.8 10.4.5.192 0.0.0.64 permit ip 192.168.168.0 0.0.0.255 10.210.20.0 0.0.4.255 deny ip any any log permit icmp 192.168.168.0 0.0.0.255 10.210.0.0 0.1.255.255 ip access-­‐list extended vlan210-­‐in deny ip any any log remark *** Access to router *** ip access-­‐list extended vlan106-­‐in permit udp host 0.0.0.0 host 255.255.255.255 remark *** DNS *** permit icmp 10.210.220.104 0.0.0.8 host 10.210.220.105 permit udp 10.210.220.14 0.0.0.8 host 10.210.8.11 eq domain permit udp 10.210.220.104 0.0.0.8 host 10.210.220.105 eq ntp permit udp 10.210.220.14 0.0.0.8 host 10.210.8.16 eq domain remark *** BP access *** remark *** rasmor.blob.com *** permit ip 10.210.220.104 0.0.0.8 10.210.8.0 0.0.0.255 07/09/15
© FortConsult
14
Segmentation 07/09/15
© FortConsult
15
Social Engineering 07/09/15
© FortConsult
16
Patching of business critical systems ♦  Policy – all servers should patched in 90 days? ♦  Is this ok.? ♦  How is the patch process? 07/09/15
© FortConsult
17
Patching of business critical systems ♦  What we still find… ♦  Critical vulnerabilities -­‐ Exploiting MS14-­‐068, ms08_067 – HeartBleed? ♦  Not all systems are covered ♦  Third party vendors don’t update/patch ♦  Hosting don’t always update/patch all layers 07/09/15
© FortConsult
18
Patching of business critical systems ♦  Microsoft Baseline Security Analyzer 2.3 (MBSA) ♦  http://www.microsoft.com/en-­‐us/download/details.aspx?id=7558 07/09/15
© FortConsult
19
Default/hardening/Baseline ♦  Baseline security policy is in place? ♦  Is the baseline applied to relevant servers/
workstations/network devices? ♦  Check! 07/09/15
© FortConsult
20
Default/hardening/Baseline 1. Connect to \\PrinterFF
Victim
2. Dont know \\ PrinterFF
DNS
3. Who is \\PrinterFF
4. I am \\ PrinterFF
5. Here is my credentials
ADMIN:[NTLMv2-hash]
07/09/15
Attacker
© FortConsult
21
Default/hardening/Baseline 07/09/15
© FortConsult
22
Controls ♦  Password -­‐ Extract password hashes – Crack password hashes (24 hours of cracking) ♦  Segmentation – Test can be done automaticly with script ♦  Social Engineering – NEXT TOPIC!!!!! No spoilers... ♦  Patch – MBSA ♦  Baseline -­‐ Test new exploits/attack scenarios on a periodic basis 07/09/15
© FortConsult
23
07/09/15
© NCC Group
24

Similar documents