Painting a Company Red and Blue

54
Painting a Company Red and Blue Ian Amit Director of Services

description

"Say red team one more time. I dare you. I double dare you. The term red team has been recently more abused than cyber. And it's making us all hurt in ways we need dolls to point where the bad man touched us. Time to get back to business: In this talk we'll get down and dirty on how a company can actually see a benefit from red teaming. Beyond the red team having fun and bragging rights. Actual ROI. Dirty business speak... We'll explore some recent examples of implementing red team engagements along with good ol'e blue work, cutting the fat in the security practice of companies, and getting actionable work done. "

Transcript of Painting a Company Red and Blue

Page 1: Painting a Company Red and Blue

Painting a Company Red and Blue

Ian Amit Director of Services

Page 2: Painting a Company Red and Blue

Hi

Page 3: Painting a Company Red and Blue

What is a Red Team?

Page 4: Painting a Company Red and Blue

What is a Red Team?

Page 5: Painting a Company Red and Blue

electronic

socialphysical

Red Team

Page 6: Painting a Company Red and Blue

electronic

socialphysical

Red Team

Page 7: Painting a Company Red and Blue

Why?

Page 8: Painting a Company Red and Blue

Why?

Page 9: Painting a Company Red and Blue

Red TeamPentestVuln Scan

Page 10: Painting a Company Red and Blue

Red TeamPentestVuln Scan

Page 11: Painting a Company Red and Blue

Compliant you are. Matter it does not.

Page 12: Painting a Company Red and Blue

There is security

outside of IT

Page 13: Painting a Company Red and Blue

What to look for in a team?

Page 14: Painting a Company Red and Blue

Skills Matrix

Electronic Physical Social

Bob 5 9 1

Joe 3 8 9

Jenny 9 4 7

*Neither Bob, Joe nor Jenny were hurt in making this slide

Page 15: Painting a Company Red and Blue
Page 16: Painting a Company Red and Blue
Page 17: Painting a Company Red and Blue
Page 18: Painting a Company Red and Blue

First rule

Go for the jugular !

• What can take the business down?

• Who is involved???

Page 19: Painting a Company Red and Blue

vs.

Page 20: Painting a Company Red and Blue

Second Rule

Give it all you’ve got

Page 21: Painting a Company Red and Blue

Second Rule

Give it all you’ve got

“You start as fast as you can go, and then slowly speed up” Krembo

Page 22: Painting a Company Red and Blue

Let’s paint!

Page 23: Painting a Company Red and Blue
Page 24: Painting a Company Red and Blue
Page 25: Painting a Company Red and Blue

Red Team Blue Team• Simulate real

intelligence gathering

• Create key personnel profiles

• Identify social weak points

!

• Identify and control public information

• Train key personnel on personal safety

• Work with HR on social issues

Page 26: Painting a Company Red and Blue

Wireless Network Penetration Testing Services

Confidential. Proprietary. [18]

Detailed Findings Tables

#RAPCON–1 Unauthenticated RAP Console Leaks IPSec Configuration

Device(s) RAP Console

Category Information Disclosure

Testing Method Black Box (Hardware)

Tools Used Firefox

Likelihood Medium (3)

Impact High (4)

Total Risk Rating High (12)

Effort to Fix Medium

Threat and Impact

The RAP Console is unauthenticated and displays information about the access point. Figure 1 shows a screenshot of the RAP Console home page.

Figure 1: Unauthenticated RAP Console

On the Diagnostics tab it is possible to view the conn_log, sapd_debug, dmseg, and rapper debug logs. The rapper debug log will log the PAP Username:

IKE_EXAMPLE: Starting up IKE server

Page 27: Painting a Company Red and Blue

Wireless Network Penetration Testing Services

Confidential. Proprietary. [18]

Detailed Findings Tables

#RAPCON–1 Unauthenticated RAP Console Leaks IPSec Configuration

Device(s) RAP Console

Category Information Disclosure

Testing Method Black Box (Hardware)

Tools Used Firefox

Likelihood Medium (3)

Impact High (4)

Total Risk Rating High (12)

Effort to Fix Medium

Threat and Impact

The RAP Console is unauthenticated and displays information about the access point. Figure 1 shows a screenshot of the RAP Console home page.

Figure 1: Unauthenticated RAP Console

On the Diagnostics tab it is possible to view the conn_log, sapd_debug, dmseg, and rapper debug logs. The rapper debug log will log the PAP Username:

IKE_EXAMPLE: Starting up IKE server

Wireless Network Penetration Testing Services

Confidential. Proprietary. [19]

setup_tunnel Initialized Timers IKE_init: completed after (0.0) (pid:16341) time:1999-12-31 16:37:53 seconds. Before getting PSK PSK:****** User:xiaobo1 Pass:******

A more serious information disclosure is the “Generate & save support file” option available on the home page of the RAP Console. The support.tgz file contained 73 files, including the ikepsk, pappasswd, and papuser files, as shown in Figure 2.

Figure 2: Contents of support.tgz

These files contain the encrypted IPSec pre-shared key, and the unique username and the encrypted password for this access point.

An attacker who has gained physical access to the access point or access to the RAP Console for the access point would be able to recover the credentials used by the access point to establish a VPN back to the controller. The credentials are encrypted with a static key, which can be easily decrypted.

Recommendations

The RAP Console has no security model. Disable it if possible.

Page 28: Painting a Company Red and Blue

Red Team Blue Team• Supply chain

compromise

• Piercing the perimeter paradigm

• Access internal resources without controls

!

• IT is solid - go beyond the technology

• Expand monitoring towards the “unknown”

• Role based access controls on top of location/asset based.

Page 29: Painting a Company Red and Blue
Page 30: Painting a Company Red and Blue
Page 31: Painting a Company Red and Blue
Page 32: Painting a Company Red and Blue
Page 33: Painting a Company Red and Blue
Page 34: Painting a Company Red and Blue

Red Team Blue Team• Uncover new/

undocumented assets

• Leverage technical issues in devices that control environment

• Combine environment control with social engineering

• Expand control base into additional aspects of business

• Recruit stakeholders

• Train and educate personnel from other business units, learn the details of their business

Page 35: Painting a Company Red and Blue
Page 36: Painting a Company Red and Blue
Page 37: Painting a Company Red and Blue
Page 38: Painting a Company Red and Blue

Red Team Blue Team• Access critical assets

out of their element

• Avoid triggering alarms on heavily guarded areas

!

!

• Scope secondary/tertiary locations for assets

• Correlate alerts for same asset category

Page 39: Painting a Company Red and Blue
Page 40: Painting a Company Red and Blue
Page 41: Painting a Company Red and Blue

Red Team Blue Team• Access non-production

equipment.

• Implant backdoors for later use

!

!

• Involvement in security should be started in early phases of design and testing

• Test-to-production should be scrutinized and no test setup should be relied on (same for default manufacturer settings)

Page 42: Painting a Company Red and Blue
Page 43: Painting a Company Red and Blue

Red Team Blue Team• Virtualized

environments and out of band management for servers compromises

• Completely bypass host security. Full access to bios level configuration, full KVM access remotely.

!

• Datacenter security - both physical, as well as internal and vendor support

• Logging and auditing of all access to assets - including correlation of local and remote access with additional footprints (doors, VPNs)

Page 44: Painting a Company Red and Blue

Blue Team Work

Page 45: Painting a Company Red and Blue
Page 46: Painting a Company Red and Blue

Quick response: assess, involve, minimize damage, control

environment, apply learning to process/people/technology

Page 47: Painting a Company Red and Blue

Trigger Warning:Business Speak!

Page 48: Painting a Company Red and Blue

• ROI

• Buy-In

• Identify Risks and Gaps

• Processes

• People

• Technology

• Reapply to Organization

Q1-1

20

40

60

80

Blue Red

Page 49: Painting a Company Red and Blue

• ROI

• Buy-In

• Identify Risks and Gaps

• Processes

• People

• Technology

• Reapply to Organization

Q3-2

20

40

60

80

Blue Red

Page 50: Painting a Company Red and Blue

Retest / VerifyYou can’t just click “go” again…

!

!

Retest/verify means reasserting core issue is

addressed - to create new scenario that includes it!

Page 51: Painting a Company Red and Blue

Deliver

Page 52: Painting a Company Red and Blue

Deliver

Page 53: Painting a Company Red and Blue

Deliver

Don’t sell

Page 54: Painting a Company Red and Blue

Questions?

Ian Amit @iiamit