23
Gray Hat Hacking Grand Computers Club New Technologies SIG January 20, 2016

Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Gray Hat Hacking

Grand Computers Club New Technologies SIG

January 20, 2016

Page 2: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Topics

• January Newsletter

• Overview

• Intrusion attack steps

• Future targets

• Open discussion

• Questions

1/20/2016 www.grandcomputers.org 2

Page 3: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Overview

Definitions

• Black-hat hackers, or simply “black hats,” are the type of hacker the popular media seems to focus on. Black-hat hackers violate computer security for personal gain or for pure maliciousness.

howtogeek.com

1/20/2016 www.grandcomputers.org 3

Page 4: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Overview

Definitions

• White-hat hackers are the opposite of the black-hat hackers. They’re the “ethical hackers”, experts in compromising computer security systems who use their abilities for good, ethical, and legal purposes rather than bad, unethical, and

criminal purposes. howtogeek.com

1/20/2016 www.grandcomputers.org 4

Page 5: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Overview

Definitions

• A gray-hat hacker falls somewhere between a black hat and a white hat. A gray hat doesn’t work for their own personal gain or to cause carnage, but they may technically commit crimes and do arguably unethical things.

howtogeek.com

1/20/2016 www.grandcomputers.org 5

Page 6: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Overview

Attack objectives

C.H.E.W.

• Criminal – for financial gain

• Hacktivism – for political leverage

• Espionage – for information gathering

• Warfare – disrupt, destroy, damage

1/20/2016 www.grandcomputers.org 6

Page 7: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Stages of a intrusive attack

• Reconnaissance

• Incursion

• Discovery

• Capture

• Exfiltration

1/20/2016 www.grandcomputers.org 7

Page 8: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Reconnaissance – most time consuming & very important; non-intrusive

• Broad

• Targeted

• Direct

• Much easier with Internet & social media

• Goal is to find cracks in the armor

1/20/2016 www.grandcomputers.org 8

Page 9: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Scenario - Reconnaissance –

• Target – government contractor

• Sells equipment to government agencies

• Has public/private web sites with org charts, leadership profiles & bios

• Officers have pictures, & LinkedIn pages

• Company has BYOD policy

• Parking lot open to visitors

• IT support by external contractors

1/20/2016 www.grandcomputers.org 9

Page 10: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Incursion

• Gain access to network/computer resources

• Preliminary capture of stuff (also next stage)

• Initial incursion (foothold) on network resources

• Use exploit to attack vulnerability on target system & determine landing point

• May use software payload as exploit

1/20/2016 www.grandcomputers.org 10

Page 11: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Incursion

• Hire on as IT contractor, cleaning staff

• “Drop” USB drive in parking lot

• Install malware via email

• Lure to compomised web page

1/20/2016 www.grandcomputers.org 11

Page 12: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Discovery

• Obtain information from inside the target

• Create backdoor for quick & easy access

• Network & vulnerability scans from inside

• Access directories; steal credentials

1/20/2016 www.grandcomputers.org 12

Page 13: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Discovery

• Find software used and release/maintenance levels

• Check for default passwords

• Discover logging and audit habits

• Note maintenance and upgrade windows

• Find ACL (access control lists)

1/20/2016 www.grandcomputers.org 13

Page 14: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Capture

• Prepare info for “move” in next stage

• Use credentials from discovery to access files and databases

• Try to find encryption keys for sensitive info (may not be on main computers)

1/20/2016 www.grandcomputers.org 14

Page 15: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Capture & control

• Obtain passwords, credentials, encryption keys

• Access desired files, email

• Add additional malware, backdoor access, place tools and data on other servers & workstations; hide and encrypt all of this

• Decide what to do about detection & surveillance

1/20/2016 www.grandcomputers.org 15

Page 16: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Exfiltration – last & most important stage

• Remove info from target & copy/send to other network

• Bundle data to use existing channels such as web pages and external resources

• Be patient; objective is to not get caught

• Beware of data loss protection methods

• Use of drop sites to store and share

1/20/2016 www.grandcomputers.org 16

Page 17: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Exfiltration – last & most important stage

• Bundle desired data & move to external sites or media using existing resources

• Complete above actions without disrupting data loss protection methods

• Use other compromised sites to store and share your booty

1/20/2016 www.grandcomputers.org 17

Page 18: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Tools & Concepts

• View web pages for HTML source code

• Note URLs and addresses on web page by moving cursor around page

• Build a good collection of recent tools and methods

• Become familiar with what versions of software have unpatched flaws

• Take lots of time to prevent detection

1/20/2016 www.grandcomputers.org 18

Page 19: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack

Internet defense components

• Network firewall

• Network intrusion protection & network detection protection

• Client firewall

• Client intrusion protection & client detection protection (AV, antimalware)

1/20/2016 www.grandcomputers.org 19

Page 20: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Intrusive Attack Targets

• Banks not customers

• Infrastructure – power, water, food, roads, rail, air

• Manufacturing, supply chains

• Medical records, hospitals,

• Police, fire, military, national guard

• Cyber devices – disks, computers, routers, firewalls

1/20/2016 www.grandcomputers.org 20

Page 22: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Next Meeting

Windows 10 Troubleshooting

Wednesday, February 17, 2016

4:00-5:30pm

Havasupai/Maricopa Rooms

Chaparral Center

1/20/2016 22 www.grandcomputers.org

Page 23: Gray Hat Hacking - Grand Computers€¦ · Gray Hat Hacking Grand Computers Club ... Definitions •Black-hat hackers, or simply “black hats,” are the type of hacker the popular

Discussion

1/20/2016 23 www.grandcomputers.org