13
Bypassing Cisco’s Sourcefire AMP endpoint solution – Full demo & comparison with RSA NWE This article will demonstrate one of the key differences between NG AV endpoint protection and EDR solutions such as RSA NetWitness for Endpoints. In this article, we will demonstrate how Cisco’s endpoint protection solutions Sourcefire AMP is easily bypassed by performing a buffer overflow and in-memory post exploitation activities. This test was performed on a fully patched Windows 10 machine with an active MS Defender, MS Firewall, Cisco AMP & RSA NWE agent installed. The setup used for this test was the following: Windows 10 client protection verification

Bypassing cisco’s sourcefire amp endpoint solution – full demo

Embed Size (px)

Citation preview

Page 1: Bypassing cisco’s sourcefire amp endpoint solution – full demo

Bypassing Cisco’s Sourcefire AMP endpoint solution – Full demo & comparison with RSA NWE

This article will demonstrate one of the key differences between NG AV endpoint protection and EDR solutions such as RSA NetWitness for Endpoints. In this article, we will demonstrate how Cisco’s endpoint protection solutions Sourcefire AMP is easily bypassed by performing a buffer overflow and in-memory post exploitation activities. This test was performed on a fully patched Windows 10 machine with an active MS Defender, MS Firewall, Cisco AMP & RSA NWE agent installed.The setup used for this test was the following:

Windows 10 client protection verification

Page 2: Bypassing cisco’s sourcefire amp endpoint solution – full demo

Vulnerable application is installed and running

Cisco SourceFire AMP does not find any issues on the clean machine

Page 3: Bypassing cisco’s sourcefire amp endpoint solution – full demo

AMP tracking information does not highlight any suspicious activities

RSA NWE does not find any suspicious activities on the clean machine

Page 4: Bypassing cisco’s sourcefire amp endpoint solution – full demo

Attacker – KALI setting up exploit & payload module

Page 5: Bypassing cisco’s sourcefire amp endpoint solution – full demo

Running remote buffer overflow exploit

No alerting from either Cisco AMP or MS Defender…

Page 6: Bypassing cisco’s sourcefire amp endpoint solution – full demo

Attacker runs additional post exploitation activities such as a keylogger

Attacker searches and downloads password.txt & creates a screenshot

Page 7: Bypassing cisco’s sourcefire amp endpoint solution – full demo

Attacker performs a ARP network scan

Attacker start an interactive SHELL and runs WHOAMI & IPCONFIG commands

Page 8: Bypassing cisco’s sourcefire amp endpoint solution – full demo

Still no alerting from either Cisco AMP or MS Defender…

Cisco AMP does not detect or notifies on exploit and post exploit activities….

Page 9: Bypassing cisco’s sourcefire amp endpoint solution – full demo

Now let’s look at RSA NWE

Page 10: Bypassing cisco’s sourcefire amp endpoint solution – full demo
Page 11: Bypassing cisco’s sourcefire amp endpoint solution – full demo
Page 12: Bypassing cisco’s sourcefire amp endpoint solution – full demo
Page 13: Bypassing cisco’s sourcefire amp endpoint solution – full demo