• Aucun résultat trouvé

Let’s play the game.

N/A
N/A
Protected

Academic year: 2022

Partager "Let’s play the game."

Copied!
21
0
0

Texte intégral

(1)

Let’s play the game.

Yet another way to perform penetra/on test.

Russian “red team exercise” experience from QIWI.

Kirill ‘isox’ Ermakov

(2)

#:whoami?

•  Known as ‘isox’

•  Web penetra/on tester

•  QIWI CTO/CISO

•  Member of “hall-of-fames” (Yandex, Mail.ru, Apple, and so on)

•  JBFC par/cipant ^___^

(3)

Captain obvious

•  Penetra/on tes/ng

•  Just a way to check your security controls

•  “Fast and dirty assessment”

•  Performed by qualified specialists

•  Part of PCI DSS cer/fica/on as example

•  Independent security review

•  Need2do for security-aware companies

(4)

Tradi=onal approach

•  Single team (2-5 members)

•  External, Internal and social-technology

•  Restricted vectors and scenario

•  A]ackers whitelist

•  No private informa/on about a target

•  Social a]acks are o^en prohibited

•  Limited a]acks day/me

(5)

Pentester point of view

•  Target-independent work scenario

•  1/3 /me for well known vectors

•  1/3 /me for new research

•  1/3 /me for automated scanners

•  No physical security bypass

•  Limited social a]acks

•  Same story every /me

(6)

Red team exercise

•  They call it “Red-team”:

•  Security team is not no/fied

•  Trying to simulate “real” a]ack

•  S/ll a lot of restric/ons and limits

•  One team

•  No informa/on about the internals

(7)

Anyway cover is not enough

•  Blind zones

•  Time limits

•  Does not use all available vectors

•  Too much accurate and ethic

•  Does not really looks like real hackers a]ack

•  Pentest team insufficient resources

(8)

Hack me plz!

•  Lets make a big (dream?) team

•  Let them work on their own!

•  No more “secret pentest technique”

•  Forget “don’t a]ack that” and “don’t bruteforce us a^er 6PM”

•  Scope = everything

•  Not kidding. Really everything.

•  No prepara/ons from security team

(9)

No restric=ons

•  Social a]acks

•  Malware

•  Account bruteforce

•  0days

•  Night/weekend a]acks

•  Physical penetra/on

•  DOS

•  Drop-devices

•  Personal devices hijack

•  Employee bribe

(10)

Let’s there be insider

•  Sharing private informa/on

•  Network map

•  Cri/cal assets

•  Security specialist as insider

•  Hints and advises

(11)

Deep penetra=on

•  Physical security bypass

•  Drop-devices:

•  Wi-Fi and LAN back connects

•  Cable manipula/ons

•  USB Flash with malware

•  Live social engineering

•  Stealing laptops/pads/phones

(12)

Security reac=ons

•  Security team awareness check

•  Real incident inves/ga/on

•  Bans and account lockouts

•  Live system tuning

•  Coopera/on with physical security

•  Logs, cameras, events and a lot of fun!

(13)

Challenge and goals

•  For penetra/on team:

•  Applica/on or SYS account for DB

•  AD enterprise administrator account

•  *nix root / admin account

•  Access to any cri/cal system

•  For security team:

•  Defend your home

And there is only one rule: no rules

(14)

QIWI Red Team Exercise

•  A]ackers: #ONSEC & #DSEC

•  Defenders: #QIWI security team

•  Insider: CISO (me)

•  Timeline: 2.5 month

•  A]ack Goal:

•  SYSDBA, root, Enterprise Administrator

•  Security team goal:

•  No/ce at least 90% a]acks and intrusions

•  Defend

(15)

Weeks of pain

•  7 social a]acks in 2 weeks

•  Few /mes of “emergency”

•  System crashes

•  Ordinary users bu]hurt:

•  Locked accounts

•  Spam/phishing emails

•  Viruses

•  Malware inves/ga/ons

(16)

Really cool vectors

•  Successful office building intrusion

•  Wi-Fi’ed and LAN’ed laptops gateways

•  Mac OS X domain issues

•  Smart House hacking

•  Power Supply takeover

•  Compiling dsniff for DVR

… even more in @d0znpp presenta/ons

(17)

Some memos

(18)

And we lost this game

•  System accounts were compromised

•  Social engineering as a best a]ack vector

•  SSH access to security team member’s Macbook

•  Downloaded dumps of network devices with password hashes

•  Tons of successful brutes

(19)

Successful vector

•  Gained creden/als using social engineering

•  Loss of isola/on in guest Wi-Fi network

•  Laptops, connected both to cable networks and Wi-Fi

•  Bad MacOS ac/ve directory configura/on, allowing any AD account to connect using SSH

•  Keeping sensi/ve data plaintext in ~/

•  Insufficient monitoring of the office traffic

(20)

Results

•  Be]er than one-team classics

•  Simulate near real hacker a]acks

•  Excellent scope fulfill

•  Tes/ng security as it is, not as it wants to be

•  You will be disappointed in your security toys

•  ‘Li]le’ bit expensive

•  Systems will crash some/mes

(21)

See ya!

•  Thanks to @videns for a good trip to the Troopers

•  Thanks to #DSEC and #ONSEC for a great job

•  Excuses to my security team for this two and a half months of hell

•  Any ques/ons?

•  Contact: isox@qiwi.com

Références

Documents relatifs

Let R be an integral ring, let K be its field

Repeat the exer- cise in homology, for cor G×K H×K and tr G×K H×K (in homology, the hypothesis that G be finite can be supressed, but of course we need [G : H ] < ∞ for the

Suppose that G is a finitely generated semi- group such that every action by Lipschitz transformations (resp.. First it must be checked that the action is well-defined. The first one

Need the analog of Bernoulli periodic polynomials: some locally polynomial functions on alcoves that satisfy some equations. I will call them W not to mix them with the

Let us denote by RG perm p the category of all p {permutation RG {modules. The following proposition generalizes to p {permutation modules a result which is well known for

Newton-Okounkov body is an efficient tool to study the volume function on the group of Cartier divisors over a projective variety. We remind briefly its construction. Let d be the

Chen, Wang and Zhang generalise and improve the results of Yu [16], by con- sidering the problem of uniqueness of f and (f n ) (k) , when they share a small function and proved

The static game constraints encoded in preconditions of actions in domain model and initial states of problem models are the allowed sequential arrangement of cards in the free