gone in 60 minutes

33
Gone in 60 minutes A Practical Approach to Hacking an Enterprise with YASUO Saurabh Harit {@0xsauby} Stephen Hall {@_stephen_h}

Upload: alden-gallagher

Post on 01-Jan-2016

31 views

Category:

Documents


2 download

DESCRIPTION

Gone in 60 minutes. A Practical Approach to Hacking an Enterprise with YASUO. Saurabh Harit {@0xsauby} Stephen Hall {@_ stephen_h }. root@msf : ~$> getuid. Saurabh Harit (@0xsauby) Director of Security Research @Security Compass Pentester i.e. Domain Admin at many companies - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Gone in 60 minutes

Gone in 60 minutes

A Practical Approach to Hacking an Enterprise with

YASUO

Saurabh Harit {@0xsauby}Stephen Hall {@_stephen_h}

Page 2: Gone in 60 minutes

root@msf:~$>getuid

Saurabh Harit (@0xsauby)Director of Security Research @Security Compass

Pentester i.e. Domain Admin at many companies

Have a secret crush on reverse engineering

Gym freak / Proud father of two beautiful dogs

Stephen Hall (@_stephen_h)Security Consultant @Security Compass

Owner of a Christmas hat

Page 3: Gone in 60 minutes

What this talk is not about

No 0-days

No Shells

Page 4: Gone in 60 minutes

ScenarioYou’re on a red-team engagement

You’ve bypassed physical security

You’ve bypassed NAC

What next? How would you pwn the network?

Vulnerability scanner?

Page 5: Gone in 60 minutes

The ProblemCan’t use network vulnerability scanner

Have to be Stealth & Quick

Can’t use Google dorks (internal network)site, link, inurl

Page 6: Gone in 60 minutes

Where do $hells come from?

It’s not about what, it’s about

WHERE

Page 7: Gone in 60 minutes

Popular Vulnerable Apps

Apache Tomcat

Page 8: Gone in 60 minutes

Popular Vulnerable Apps

JBoss jmx-console

Page 9: Gone in 60 minutes

Popular Vulnerable Apps

Hudson Jenkins

Page 10: Gone in 60 minutes

$hells

Page 11: Gone in 60 minutes

Not So Popular Vulnerable Apps

ADManager Plus

Page 12: Gone in 60 minutes

Not So Popular Vulnerable Apps

ADManager Plus

Page 13: Gone in 60 minutes

Not So Popular Vulnerable Apps

Cyberoam UTM

Page 14: Gone in 60 minutes

Not So Popular Vulnerable Apps

Cyberoam UTM

Page 15: Gone in 60 minutes

YASUO what???

Written in ruby

Did not write it on our flight here

Scans the network for vulnerable applications

Currently supports around 100+ vulnerable applications

All currently supported apps are Metasploit-able

Page 16: Gone in 60 minutes

Why YasuoBecause there are tons of vulnerable applications and its not easy to find them

Page 17: Gone in 60 minutes

World Without Automation Run nmap scan & manually poke each & every web port

This CANNOT be fun

Page 18: Gone in 60 minutes

What’s currently out there

Nikto by Chris Sullohttps://www.cirt.net/Nikto2

Nmap script – http-enum.nse by Ron Bowes, Andrew Orr, Rob Nicholls

http://nmap.org/nsedoc/scripts/http-enum.html

Nmap script – http-default-accounts.nse by Paulino Calderon

https://www.nmap.org/nmap-exp/calderon/scripts/http-default-accounts.nse

Page 19: Gone in 60 minutes

Exploring Yasuo

Page 20: Gone in 60 minutes

Exploring Yasuo

Page 21: Gone in 60 minutes

What’s in the Box

yasuo.rb

resp200.rb

default-path.csv

users.txt

pass.txt

GPL

Page 22: Gone in 60 minutes

What’s in the Box

Page 23: Gone in 60 minutes

Behind the ScenesDetects false-positives

Automatically extracts login form

Automatically extracts login parameters

Page 24: Gone in 60 minutes

What’s New

Page 25: Gone in 60 minutes

RaNdOmIzAtIoN!!!

More robust check to detect false positives

Properly formatted output table

More application signatures

Signatures for IP Cameras / Encoder / Decoders

Modular & Cleaned-up Code – if there is any such thing

Page 26: Gone in 60 minutes

Demo Time

Page 27: Gone in 60 minutes

ChallengesExploit-db – great resource but inconsistent format

Page 28: Gone in 60 minutes

ChallengesDynamic detection of login page and parameters is regex based.

Page 29: Gone in 60 minutes

Future Development

Smarter version detection

Support masscan output format (because y’all love to scan the Interwebs)

Add support for more vulnerable applications, Ofcourse

Add secondary signature

Make current crappy code modular

Add multi-threading

Add support for vFeed???

Change format of default path file – CSV to YAML? or JSON?

Page 30: Gone in 60 minutes

CFH (cry for help)

Signatures Signatures Signatures & Signatures

Please submit application signatures:Post a comment on Github

Update default path file on Github

Drop us an Email

Send a Pigeon.

Page 31: Gone in 60 minutes

Questions??? or not

Page 32: Gone in 60 minutes

Thank You!

_stephen_h [email protected]

0xsauby [email protected]

https://github.com/0xsauby/yasuo

Page 33: Gone in 60 minutes

Credit

Nmap ruby library - https://github.com/sophsec/ruby-nmap

The Exploit Database (EDB) - http://www.exploit-db.com/

@funkaoshi

Google Image Cache