16
Practical Exploitation Timey Wimey WebAppy Style by Mubix

Practical Exploitation - Webappy Style

Embed Size (px)

DESCRIPTION

Given at OWASP NoVA - March 2013

Citation preview

Page 1: Practical Exploitation - Webappy Style

Practical Exploitation

Timey Wimey WebAppy Styleby Mubix

Page 2: Practical Exploitation - Webappy Style

Are we (the business) in the Wall Street Journal?

No? Then we aren't under attack.

Page 3: Practical Exploitation - Webappy Style

Agenda

● What you do● What I do● What is "practical" exploitation?● Demos

Page 4: Practical Exploitation - Webappy Style

We aren't going to talk about

● Stuff I assume you know○ SQLI○ Running your Database as root○ RFI/LFI○ etc○ etc○ OWASP TOP 10

● Stuff you should know○ Your {SECURITY BLINKY

LIGHTS} won't save you....

Page 5: Practical Exploitation - Webappy Style

What you do?

● This is where I ask you awkward questions about what you do for a living

Page 6: Practical Exploitation - Webappy Style

What I do?● Senior Red Teamer● Big Co● Break into mainframes, bank accounts,

SCADA systems, Windows, Linux, wireless, physical, web apps, UPSs, etc..

● Part of a team of highly skilled peeps

Primarily I'm a sorter of useful info

Page 7: Practical Exploitation - Webappy Style

What is practical exploitation?

● The application of techniques, tactics, and procedures to accomplish objectives and sub-objectives within a targeted engagement

Also known as:"if it doesn't get me more, it's stupid"

Page 8: Practical Exploitation - Webappy Style

What falls in the "Stupid" category

● SSLv2 Enabled● Traceroute Enabled● DNS Cache Poisoning● MD5 "collisions"

Oh ya, and every single public IE, Firefox, Chrome or Windows exploit. Why? Because their patch cycles are too fast for attackers.

Page 10: Practical Exploitation - Webappy Style

Demo 1 - Linux Pivot to Windows

Tomcat -> MS08_067

Wellllllll..... I was going to patch those DMZ hosts, then........

Page 11: Practical Exploitation - Webappy Style

How do I fix that!?

● Patch yo %#@$%@ $#%

Page 12: Practical Exploitation - Webappy Style

Demo 2 - Windows

Rails vulnerability -> Cred Steal - Mimikatz

You use a web framework that protects you and you have really long passwords?

Page 13: Practical Exploitation - Webappy Style

How do I fix that?

● Monitor the security community events, disable YAML or XML parsing.

● Microsoft has left you out to dry for Mimikatz. They believe if you have Administrator access then it's game over.

● Don't run your web server as SYSTEM or Administrator, keep UAC enabled on your DMZ hosts

Page 14: Practical Exploitation - Webappy Style

Demo 3 - Windows Pivot to Linux

WinRM on IIS -> DistCC

What the..........

Page 15: Practical Exploitation - Webappy Style

How do I fix that?

● Don't enable WinRM on DMZ hosts! Stupid.

● Firewall DistCC off to only required hosts.

Page 16: Practical Exploitation - Webappy Style

EOM

Questions?

Mubix "Rob" Fullerhttp://www.room362.com@[email protected]