Upload
rajivarnan-r
View
275
Download
0
Embed Size (px)
Citation preview
Bypassing Cisco’s Sourcefire AMP endpoint solution – Full demo & comparison with RSA NWE
This article will demonstrate one of the key differences between NG AV endpoint protection and EDR solutions such as RSA NetWitness for Endpoints. In this article, we will demonstrate how Cisco’s endpoint protection solutions Sourcefire AMP is easily bypassed by performing a buffer overflow and in-memory post exploitation activities. This test was performed on a fully patched Windows 10 machine with an active MS Defender, MS Firewall, Cisco AMP & RSA NWE agent installed.The setup used for this test was the following:
Windows 10 client protection verification
Vulnerable application is installed and running
Cisco SourceFire AMP does not find any issues on the clean machine
AMP tracking information does not highlight any suspicious activities
RSA NWE does not find any suspicious activities on the clean machine
Attacker – KALI setting up exploit & payload module
Running remote buffer overflow exploit
No alerting from either Cisco AMP or MS Defender…
Attacker runs additional post exploitation activities such as a keylogger
Attacker searches and downloads password.txt & creates a screenshot
Attacker performs a ARP network scan
Attacker start an interactive SHELL and runs WHOAMI & IPCONFIG commands
Still no alerting from either Cisco AMP or MS Defender…
Cisco AMP does not detect or notifies on exploit and post exploit activities….
Now let’s look at RSA NWE