16
Got Citrix? Hack IT! Got Citrix? Hack IT! Shanit Gupta August 7th, 2008

Got Citrix? Hack IT!Got Citrix? Hack IT!

  • Upload
    others

  • View
    26

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Got Citrix? Hack IT!Got Citrix? Hack IT!

Got Citrix? Hack IT!Got Citrix? Hack IT!

Shanit GuptaAugust 7th, 2008

Page 2: Got Citrix? Hack IT!Got Citrix? Hack IT!

Who Am I?

► Principal Consultant – Foundstone Professional Services► Code Review / Threat Modeling / Application Security► Masters from Carnegie Mellon

Page 3: Got Citrix? Hack IT!Got Citrix? Hack IT!

Agenda

► Background► Background► Demo 1: Kiosk Mode► Demo 2: Unauthenticated Access► Demo 2: Unauthenticated Access ► Demo 3: (Un)Hidden Hotkeys► Demo 4: Restricted Desktop Access► Demo 4: Restricted Desktop Access► Demo 5: Attack Microsoft Office► Remediation Measures► Remediation Measures

Page 4: Got Citrix? Hack IT!Got Citrix? Hack IT!

False Sense of Security

Page 5: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo1: Kiosk Mode

Page 6: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo1: Kiosk Mode (Attack Vectors)

► Ctrl + h – View History► Ctrl h View History► Ctrl + n – New Browser► Shift + Left Click – New Browser► Shift + Left Click New Browser ► Ctrl + o – Internet Address (browse feature)► Ctrl + p Print (to file)► Ctrl + p – Print (to file) ► Right Click (Shift + F10)

Save Image AsSave Image AsView Source

► F1 – Jump to URL► F1 Jump to URL…► Browse to http://download.insecure.org/nmap/dist/nmap-

4.53-setup.exe

Page 7: Got Citrix? Hack IT!Got Citrix? Hack IT!

I Hope You Are Patching ☺

*Source: http://secunia.com

Page 8: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo 2: Unauthenticated Access

► 9 publicly accessible exploits 2007 – 08► 9 publicly accessible exploits 2007 08 ► Particularly interesting

Citrix Presentation Server IMA Service BufferCitrix Presentation Server IMA Service Buffer Overflow VulnerabilitySocial Engineering: Malicious ICA files

Page 9: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo 2: Unauthenticated Access

► Good Old Brute Force► Good Old Brute ForceOne account is all you need I am sure you are using 2 factor authentication ;-)y g )

Page 10: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo3: (Un)Hidden Hotkeys

► SHIFT+F1: Local Task List► SHIFT+F2: Toggle Title Bar ► SHIFT+F3: Close Remote Application► CTRL+F1: Displays Windows Security Desktop –

Ctrl+Alt+Del► CTRL+F2: Remote Task List► CTRL+F2: Remote Task List ► CTRL+F3: Remote Task Manager – Ctrl+Shift+ESC► ALT+F2: Cycle through programs► ALT+F2: Cycle through programs ► ALT+PLUS: Alt+TAB► ALT+MINUS: ALT+SHIFT+TAB

Page 11: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo4: Restricted Desktop

Page 12: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo4: Restricted Desktop

►Shortcut to C:\►Shortcut to C:\►Create Batch File

CMD.exeCMD.exe►Host Scripting File (filename.vbs)

■ Set objApp = CreateObject("WScript.Shell")j pp j ( p )■ objApp.Run “CMD C:\“

Page 13: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo5: Attack Microsoft Office

►File->Save As►File Save As Browse Files and Launch CMD.exe

►Press F1►Press F1 Search Microsoft Click Suites Home Page

► Macros Remote ShellPrivilege Escalation

Page 14: Got Citrix? Hack IT!Got Citrix? Hack IT!

Remediation Strategies

► 1300 different registry settings► It is HARD!

Page 15: Got Citrix? Hack IT!Got Citrix? Hack IT!

Remediation Strategies

► Lock Down Tools► Lock Down ToolsCommercial Freewarehttp://updates.zdnet.com/tags/lockdown.html

Page 16: Got Citrix? Hack IT!Got Citrix? Hack IT!

Questions or Concerns?