22
HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan ([email protected]), Gökhan ALKAN ([email protected]) http s :// g ithub.com/ heybe https://github.com/galkan/sees https:// github.com/galkan/depdep https:// github.com/galkan/sees https:// github.com/galkan/kacak https:// github.com/galkan/fener https:// github.com/galkan/crowbar 2014

HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan ([email protected]), Gökhan ALKAN ([email protected])

Embed Size (px)

Citation preview

Page 2: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

2

Agenda

BlackHat Arsenal USA – 2014

Pentesting Overview

Heybe

Fener

Levye

SeeS

Kacak

DepDep

Page 3: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

3

Penetration Test Phases

BlackHat Arsenal USA – 2014

Page 4: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

4

Pentest Types

BlackHat Arsenal USA – 2014

Internal Pentest External Pentest Web Application Tests Database Test Social Engineering DDoS Tests Active Directory Wifi Tests …

Page 5: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

5

Some Problems During Pentests

BlackHat Arsenal USA – 2014

Very large networks Limited time Forgetting to save results

Scan reports Screenshots

Non standard Nmap parameters Bruteforce unusual applications

Page 6: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

6

HEYBE

BlackHat Arsenal USA – 2014

Page 7: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

7

HEYBE

BlackHat Arsenal USA – 2014

Open source toolkit for pentest automation Code available on Github https://github.com/heybe https://github.com/galkan/sees https://github.com/galkan/depdep https://github.com/galkan/sees https://github.com/galkan/kacak https://github.com/galkan/levye https://github.com/galkan/fener Published at Blackhat USA 2014

Page 8: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

8

WHY?

BlackHat Arsenal USA – 2014

Automate and speed up boring/standard steps

More time for fun like SE Standardize test results Save results for reporting

Page 9: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

9

HOW?

BlackHat Arsenal USA – 2014

Page 10: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

10

WHAT?

BlackHat Arsenal USA – 2014

Page 11: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

11

Penetration Test Phases – Heybe

BlackHat Arsenal USA – 2014

Page 12: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

12

Fener

BlackHat Arsenal USA – 2014

Information Gathering & Recon Tool https://github.com/heybe/fener 3 Different Recon Methods

Active Scan Passive Scan Screenshot Scan

DB Support

Page 13: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

13

Fener – Active Scan

BlackHat Arsenal USA – 2014

Leverages Nmap for active port scanning Custom config file for scan parameters

Ports NSE Scripts

Save scan results with standard report name

Multiple Nmap scans Ping Scan Service & OS Scan Script Scan

Page 14: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

14

Fener – Passive Scan

BlackHat Arsenal USA – 2014

Stealth network recon Passive traffic capture Arpspoof MitM support Traffic saved in pcap file Valuable information extracted from traffic

Hosts Ports Windows hostnames Top 10 HTTP hosts Top 10 DNS domains

Page 15: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

15

Fener – Passive Scan

BlackHat Arsenal USA – 2014

Man In The Middle Network traffic capture

Page 16: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

16

Fener – Screenshot Scan

BlackHat Arsenal USA – 2014

PhantomJS headless webkit Web page discovery Screnshots from commandline Standard screenshot filenames Offline examination Pentest report

Page 17: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

17

Crowbar

BlackHat Arsenal USA – 2014

Brute Force Tool https://github.com/galkan/levye Supported protocols

OpenVPN Remote Desktop Protocol (with NLA support) SSH Private Key VNC Passwd

Reporting Debug Logging

Page 18: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

18

SeeS

BlackHat Arsenal USA – 2014

Social Engineering Tool https://github.com/heybe/sees Send targeted SE mails in bulk HTML mail body Multiple attachment Local/Remote SMTP server

Page 19: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

19

DepDep

BlackHat Arsenal USA – 2014

Post-Exploitation Tool https://github.com/heybe/depdep Discover sensitive files in network shares Works with Windows SMB shares Can search sensitive information within

file name and file contents

Page 20: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

20

Kacak

BlackHat Arsenal USA – 2014

Active Directory Attack Tool https://github.com/heybe/kacak Leverages Metasploit & Mimikatz Hunt for domain admins in Windows AD

Domain Metasploit automation with MSFRPCD

Page 21: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

21

Summary

BlackHat Arsenal USA – 2014

Page 22: HEYBE – PENETRATION TESTING TOOLKIT BlackHat Arsenal 2014 - USA Bahtiyar Bircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com)

22

HEYBE

BlackHat Arsenal USA – 2014

Bahtiyar Bircan ([email protected]), Gökhan ALKAN ([email protected])

https://github.com/heybe https://github.com/galkan/sees https://github.com/galkan/depdep https://github.com/galkan/sees https://github.com/galkan/kacak https://github.com/galkan/fener https://github.com/galkan/crowbar