Not Your Daddy s Winexe. THOTCON 0x9 May 4, 2018

Size: px
Start display at page:

Download "Not Your Daddy s Winexe. THOTCON 0x9 May 4, 2018"

Transcription

1 Not Your Daddy s Winexe ways to legitimately access a system THOTCON 0x9 May 4, 2018 ELEVATED SECURITY FOR MODERN ADVERSARIES.

2 WHO THE HELL ARE YOU? John Mocuta Principal Security Advisor Purveyor of fine cybers Josh Skorich Founder Dolos Group President - John Mocuta Fan Club

3 WHATCHA TALKIN BOUT? Administrators and attackers need to access systems remotely. We re going to discuss 15 technologies for Linux, OS X and Windows that can be leveraged to access systems. How/why they work Network port requirements Privileges Indicator of Compromise / signatures Public PoCs/Tools

4 REMOTE ACCESS TECHNOLOGIES GRAPHICAL Remote Desktop Protocol (RDP) Virtual Network Computing (VNC) Apple Remote Desktop (ARD) Xorg SCCM Remote Control CONSOLE / CODE-EX Telnet Rlogin/Rsh Secure Shell (SSH) Server Message Block (SMB) Windows Remote Management (WinRM) Windows Management Instrumentation (WMI) Scheduled Tasks MMC20 Class ShellBrowserWindow Class ShellWindows Class

5 REMOTE DESKTOP (RDP) Info TL;DR PORTS TCP 3389 AUTH TOOLS SIGNATURES Built-in Windows remote desktop solution Local Admin / Remote Desktop Users Group SeRemoteInteractiveLogonRight Microsoft Remote Desktop, rdesktop, xfreerdp Windows Auth Security Event ID: 528, LogonType: 10 (older versions of Windows) Security - Event ID: 4624, LogonType: 10 Successful Logon Security Event ID: 4624, LogonType: 7 (w/ remote IpAddress) Security - Event ID: 4625, LogonType: 10 Failed Logon Security Event ID: 4778 Session Reconnect TerminalServices-RemoteConnectionManager Log TerminalServices-LocalSessionManager Log EX. COMMAND rdesktop u JimmieBob

6 REMOTE DESKTOP (RDP) Netflow INITIATOR RDP connect / negotiate RDP auth RDP session RDP: 3389/TCP TPKT: 3389/TCP RECEIVER RDP options response RDP auth response Session

7 REMOTE DESKTOP (RDP) Examples Microsoft Remote Desktop Client:

8 REMOTE DESKTOP (RDP) Examples Linux: xfreerdp

9 VNC Info TL;DR Yet Another RDP PORTS TCP 5900+n AUTH TOOLS SIGNATURES None, Only Password, or LDAP vncconnect (xvnc), vncviewer Service specific RealVNC: Mac/Nix syslog Windows Application Specific EventLog EX. COMMAND vncviewer

10 VNC Netflow INITIATOR VNC Connect Security type enum Auth Client events VNC: 5900/TCP RECEIVER VNC protocol negotiation Security options sent Auth response Server response

11 VNC Examples

12 APPLE REMOTE DESKTOP Info TL;DR Rebranded VNC PORTS UDP 3283, TCP 5900 AUTH TOOLS SIGNATURES EX. COMMAND vncviewer Only specified authorized users, or everyone (if selected) Apple Screen Sharing, any VNC tool (if VNC Password enabled) /var/logs/secure.log

13 APPLE REMOTE DESKTOP Netflow INITIATOR ARD Connect Security type enum Auth Client events ARD: 5900/TCP RECEIVER ARD protocol negotiation Security options sent Auth response Server response

14 APPLE REMOTE DESKTOP Examples vncviewer

15 Xorg Info TL;DR The OG RDP PORTS TCP 22 (SSH X11Forwarding), TCP 6000+n AUTH TOOLS SIGNATURES EX. COMMAND Host/IP based auth xspy, xwatchwin, xwd, xvkbd, ssh, MSF, xrdp.py Kinda none? SSH - /var/log/auth /var/log/syslog ssh Y user@ xwatchwin u :0 root

16 Xorg Netflow INITIATOR Xorg Client Connect Xorg Features Client events Xorg: 6000/TCP RECEIVER MIT Magic Cookie Xorg Foundation Banner Server response

17 Xorg Examples

18 SCCM REMOTE CONTROL Info TL;DR PORTS TCP 2701 AUTH TOOLS SIGNATURES EX. COMMAND Microsoft System Center Configuration Manager (SCCM) includes the option to deploy a remote control service on managed clients. Only specified authorized users CmRcViewer.exe, SCCM Console Only Event ID 4672 Special Login, CmRcService.exe accepting remote connections N/A

19 SCCM REMOTE CONTROL Netflow INITIATOR SCCM connect Auth Remote Graphical Control SCCM: 2701/TCP RECEIVER Session setup Auth success/fail Remote Viewer

20 SCCM REMOTE CONTROL Examples

21 TELNET Info TL;DR PORTS TCP 23 AUTH TOOLS SIGNATURES Remote Command Prompt Only specified authorized users Telnet.exe, nc, ncat /var/log/auth EX. COMMAND telnet

22 TELNET Netflow INITIATOR Telnet connect Telnet: 23/TCP RECEIVER Session setup / connect

23 TELNET Examples

24 RLOGIN / RSH Info TL;DR PORT AUTH TOOLS SIGNATURES Slightly different Telnet TCP 512 (rexec), 513 (rlogin), 514 (rsh, rcp) Only specified authorized users,.rhost files rlogin, rsh, remsh, rexec, rcp (if enabled) log files in /var/log EX. COMMAND rlogin l root

25 RLOGIN / RSH Netflow INITIATOR Rlogin connect Rlogin: 513/TCP RECEIVER Session setup / connect

26 RLOGIN / RSH Examples

27 SECURE SHELL (SSH) Info TL;DR PORTS TCP 22 AUTH TOOLS SIGNATURES EX. COMMAND Encrypted Telnet Any user on the system by default, modified by sshd_config ssh, putty.exe /var/log/auth (distro dependent) ssh

28 SECURE SHELL (SSH) Netflow INITIATOR SSH connect SSH algorithm negotiation Key exchange Auth Interactive shell (read/write) SSH: 22/TCP RECEIVER Session setup Algorithm supported response Secure session established Auth success/fail Shell

29 SECURE SHELL (SSH) Examples

30 SMB/Psexec Info TL;DR PORT AUTH TOOLS Remote cmd.exe TCP 445 (SMB), 135 (RPC) Local Administrator Access winexe, psexec, smbexec, etc SIGNATURES Service binaries left behind, Windows Event #5145 EX. COMMAND Win> PsExec.exe \\ u josh p Password1 cmd.exe Nix> winexe --system --uninstall U testlab/josh%password1 // cmd.exe

31 TEAR- DOWN SHELL SETUP SMB/Psexec PsExec Netflow INITIATOR RECEIVER SMB Tree connect: ADMIN$ SMB: 445/TCP Session setup / connect Create Request File: PSEXESVC.exe RPC Bind SVCCTL StartServiceW SMB Create Named Pipes: FSCTL_PIPE_TRANSCEIVE: PSEXESVC RPC: 135/TCP RPC/SVCCTL: <high_port>/tcp SMB: 445/TCP Write: %SystemRoot%\PSEXESVC.exe EndPoint Mapper (SVCCTL Port) PSEXESVC Start PSEXESVC-stdin PSEXESVC-stdout Write Request: IPC$\PSEXESVC-stdin Read Request: IPC$\PSEXESVC-stdout Write Request Read Response SVCCTL ControlService SVCCTL DeleteService RPC/SVCCTL: <high_port>/tcp PSEXESVC Stop PSEXESVC Service Removed

32 SMB/Psexec Examples

33 SMB/Psexec Examples

34 WINRM Info TL;DR PORT AUTH TOOLS SIGNATURES EX. COMMAND SOAP based WMI-like protocol TCP 5985, 5986 (SSL) Only specified authorized users winrm, winrs, PowerShell Invoke-Command, Enter-PSSession, auxiliary/scanner/winrm/winrm_cmd Listed under Windows Remote Management Application Log in Event Viewer winrm get wmicimv2/win32_service r: winrs /r:win-dehib5froc2 /u:josh /p:password1 ipconfig PS> Invoke-Command {Get-Service *} msfconsole -x 'use auxiliary/scanner/winrm/winrm_cmd; set rhosts ; set DOMAIN CORP; set username Administrator; set password Password1; set cmd ipconfig; run'

35 WINRM Netflow INITIATOR WinRM connect POST /wsman HTTP/1.1 WS-Man: 5985/TCP RECEIVER Session setup / connect HTTP/1.1 Response Code

36 WINRM Examples

37 WINRM Examples

38 WINRM Examples

39 WMI Info TL;DR PORT AUTH TOOLS SIGNATURES EX. COMMAND Remote info/management protocol for Windows TCP 135 (RPCPortmapper) + Random high number port (DCOM) Only specified authorized users wmic.exe, wmis.exe, wmic, PowerShell, native.net calls Enable WMI tracing in event viewer to see WMI-Activity wmic.exe /USER:"testlab\josh" /PASSWORD:"Password1" /NODE: service get "startname,pathname PS> Get-WMIObject -ComputerName query "Select * from Win32_Service"

40 SHELL SETUP WMI Netflow INITIATOR RECEIVER RPC Bind RPC: 135/TCP Session setup / connect Authentication Authorization DCOM Request RemoteCreateInstance(DCOM) WMI Query RPC/DCOM: <random_high>/tcp Execution/Response

41 WMI Examples

42 WMI Examples

43 WMI Examples

44 SCHEDULED TASKS Info TL;DR PORT AUTH TOOLS SIGNATURES EX. COMMAND Schedule jobs to run on Windows, but remotely TCP 135 (RPCPortmapper) + TCP (typically) Only specified authorized users Schtasks.exe, at.exe, Scheduleme MSF Post Module Windows Security Event ID 4698 (task creation), MEOW schtasks.exe /Create /S /U testlab\josh /P Password1 /TR "C:\Windows\System32\win32calc.exe" /TN "pwnd" /SC ONCE /ST 20:05

45 SHELL SETUP SCHEDULED TASKS Netflow INITIATOR RECEIVER RPC Bind RPC: 135/TCP Session setup / connect Authentication Authorization DCOM Request Endpoint Mapper(DCOM) Schedule Task RPC/DCOM: <random_high>/tcp Execution/Response

46 SCHEDULED TASKS Examples Client: Server:

47 MMC20 CLASS Info TL;DR PORT AUTH TOOLS SIGNATURES.NET API call on another machine to execute commands TCP 135 (RPCPortmapper) + Random high number port (DCOM) Local Administrators / privileged accounts PowerShell / direct.net calls mmc.exe spawning child process, MEOW EX. COMMAND PS> $com = [activator]::createinstance([type]::gettypefromprogid("mmc20.application"," ")) PS> $com.document.activeview.executeshellcommand("c:\windows\system32\calc. exe",$null,$null,"7")

48 SHELL SETUP MMC20 CLASS Netflow INITIATOR RECEIVER RPC Bind RPC: 135/TCP Session setup / connect Authentication Authorization Remote Class Object Request RemoteGetClassObject(MMC20) RPC/DCOM Bind RPC/DCOM: <random_high>/tcp DCOM Session setup Authentication Authorization DCOM context shift (MMC) Alter_context ExecuteShellCommand Code Execution

49 MMC20 CLASS Examples

50 MMC20 CLASS Examples

51 SHELLBROWSERWINDOW Info TL;DR PORT AUTH TOOLS SIGNATURES EX. COMMAND Yet another.net command execution TCP 135 (RPCPortmapper) + Random high number port (DCOM) Authenticated users PowerShell, direct.net calls MEOW PS> $com = [Type]::GetTypeFromCLSID('C08AFD90-F2A1-11D A0C91F3880'," ") PS> $obj = [System.Activator]::CreateInstance($com) PS> $obj.document.application.shellexecute("cmd.exe","/c calc.exe","c:\windows\system32",$null,0)

52 SHELL SETUP SHELLBROWSERWINDOW Netflow INITIATOR RECEIVER RPC Bind RPC: 135/TCP Session setup / connect Authentication Authorization Remote Class Object Request RemoteGetClassObject RPC/DCOM Bind RPC/DCOM: <random_high>/tcp DCOM Session setup ShellExecute Code Execution

53 SHELLBROWSERWINDOW Examples

54 SHELLBROWSERWINDOW Examples

55 SHELLWINDOWS Info TL;DR PORT AUTH TOOLS SIGNATURES EX. COMMAND Yet another.net command execution TCP 135 (RPCPortmapper) + Random high number port (DCOM) Only specified authorized users PowerShell, direct.net calls MEOW PS> $com = [Type]::GetTypeFromCLSID('9BA05972-F6A8-11CF-A442-00A0C90A8F39'," ") PS> $obj = [System.Activator]::CreateInstance($com) PS> $item = $obj.item() PS> $item.document.application.shellexecute("cmd.exe","/c calc.exe","c:\windows\system32",$null,0)

56 SHELL SETUP SHELLWINDOWS Netflow INITIATOR RECEIVER RPC Bind RPC: 135/TCP Session setup / connect Authentication Authorization Remote Class Object Request RemoteGetClassObject RPC/DCOM Bind RPC/DCOM: <random_high>/tcp DCOM Session setup ShellExecute Code Execution

57 SHELLWINDOWS Examples

58 SHELLWINDOWS Examples

59 MEOW Signature

60 INBOUND PORT: / (U) / HIGH RDP X ARD X X VNC X X-Server Forwarding X SCCM Remote Control X Telnet X SSH X Rlogin/Rsh X SMB X X - WMI X X WinRM X Schtasks X X MMC20 X X ShellBrowserWindow X X ShellWindows X X

Event Log 101. What is Event Log? Windows version of syslog.

Event Log 101. What is Event Log? Windows version of syslog. Event Log Analysis Event Log 101 What is Event Log? Windows version of syslog. Where are these artifacts located in? %SystemRoot%\System32\winevt\Logs %SystemRoot% is C:\Windows typically. 2 Event Log

More information

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

Hunting Lateral Movement with Windows Events Logs. SANS Threat Hunting Summit 2018 Mauricio

Hunting Lateral Movement with Windows Events Logs. SANS Threat Hunting Summit 2018 Mauricio Hunting Lateral Movement with Windows Events Logs SANS Threat Hunting Summit 2018 Mauricio Velazco @mvelazco $whoami Peruvian Recovering pentester, threat management lead @mvelazco Derbycon, Bsides, Defcon

More information

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

Cisco Passguide Exam Questions & Answers

Cisco Passguide Exam Questions & Answers Cisco Passguide 642-648 Exam Questions & Answers Number: 642-648 Passing Score: 800 Time Limit: 120 min File Version: 61.8 http://www.gratisexam.com/ Cisco 642-648 Exam Questions & Answers Exam Name: Deploying

More information

Enable Remote Registry Service Via Command Line

Enable Remote Registry Service Via Command Line Enable Remote Registry Service Via Command Line You can perform a remote shutdown from the command prompt using the shutdown command and You'll also read on other sites to start the Remote Registry service

More information

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions Passwordstate Remote Session Launcher Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

APT Log Analysis - Tracking Attack Tools by Audit Policy and Sysmon - Shusei Tomonaga JPCERT Coordination Center

APT Log Analysis - Tracking Attack Tools by Audit Policy and Sysmon - Shusei Tomonaga JPCERT Coordination Center APT Log Analysis - Tracking Attack Tools by Audit Policy and Sysmon - Shusei Tomonaga JPCERT Coordination Center Self-introduction Shusei Tomonaga Analysis Center at JPCERT/CC Malware analysis, Forensics

More information

Computer Password Remote

Computer Password Remote How To Change Ip Manually Windows 7 Computer Password Remote Normally, a changing IP address does not cause any problem until you try to connect Connect to your computer via Remote Desktop Connection and

More information

VISIT US: goverlan.com

VISIT US: goverlan.com VISIT US: goverlan.com CALL US: +1.888.330.4188 (US) +1.305.442.4788 (INT) Goverlan enables you to seamlessly support all your users, no matter where they are, and without the need for a VPN. Features

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Project 4: Penetration Test

Project 4: Penetration Test Project description Project 4: Penetration Test April 28, 2014 Bing Hao The learning objective of this project is to gain hands on experiences with the usage and functionality of Nmap, Neussus and Metsploit.

More information

Parallels Mac Management for Microsoft SCCM

Parallels Mac Management for Microsoft SCCM Parallels Mac Management for Microsoft SCCM Administrator's Guide v4.5 Copyright 1999-2016 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59

More information

SecureFactors. Copyright SecureFactors Corp ver 1.0a

SecureFactors. Copyright SecureFactors Corp ver 1.0a SecureFactors Copyright SecureFactors Corp. 2018 ver 1.0a Table of Contents Introduction... How to Use... Run SF Connector to access systems... SF Console... 1 2 3 10 11 SecureFactors(SF) is a new generation

More information

Reduce the Breach Detection Gap to Minutes. What is Forensic State Analysis (FSA)?

Reduce the Breach Detection Gap to Minutes. What is Forensic State Analysis (FSA)? Reduce the Breach Detection Gap to Minutes Whether cloud-hosted or situated on premise, Cyber Threat Hunting as a Service is an essential and complimentary addition to any organization serious about security.

More information

Incident Scale

Incident Scale SESSION ID: SOP-T07 Incident Response @ Scale Salah Altokhais Incident Response Consultant National Cyber Security Center (NCSC),KSA @salah.altokhais Khalid Alsuwaiyel Incident Response Specialist National

More information

Port Utilization in Unified CVP

Port Utilization in Unified CVP Utilization in Unified CVP Utilization Table Columns, page 1 Unified CVP Utilization, page 2 Utilization Table Columns The columns in the port utilization tables in this document describe the following:

More information

Python scripting for Dell Command Monitor to Manage Windows & Linux Platforms

Python scripting for Dell Command Monitor to Manage Windows & Linux Platforms Python scripting for Dell Command Monitor to Manage Windows & Linux Platforms Dell Engineering July 2017 A Dell Technical White Paper Revisions Date June 2017 Description Initial release The information

More information

Systems Programming/ C and UNIX

Systems Programming/ C and UNIX Systems Programming/ C and UNIX Alice E. Fischer Lecture 6: Processes October 9, 2017 Alice E. FischerLecture 6: Processes Lecture 5: Processes... 1/26 October 9, 2017 1 / 26 Outline 1 Processes 2 Process

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX 1 INTRODUCTION The MITRE Corporation Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK ) Matrix provides a model

More information

Remote Desktop Security for the SMB

Remote Desktop Security for the SMB A BWW Media Group Brand Petri Webinar Brief October 5th, 2018 Remote Desktop Security for the SMB Presenter: Michael Otey Moderator: Brad Sams, Petri IT Knowledgebase, Executive Editor at Petri.com There

More information

Monitoring Windows Systems with WMI

Monitoring Windows Systems with WMI Monitoring Windows Systems with WMI ScienceLogic version 8.8.1 Table of Contents Introduction 4 Monitoring Windows Devices in the ScienceLogic Platform 5 What is SNMP? 5 What is WMI? 5 PowerPacks 5 Configuring

More information

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below.

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below. CONTENTS 1 OUTLINE... 1 2 OVERALL FLOW... 1 3 NETWORK CONNECTION... 1 4 SETTING EXAMPLE... 1 5 SET SERVER PC... 2 5.1 Windows 7... 2 5.1.1 Install IIS... 2 5.1.2 Set IIS... 4 5.1.3 Set firewall... 9 5.1.4

More information

Ftp Command Line Commands Linux Example Windows Putty

Ftp Command Line Commands Linux Example Windows Putty Ftp Command Line Commands Linux Example Windows Putty Installing a FTP server, 11. Switch to Console mode from Graphical User Interface For example, the following creates an entry to start Eclipse with

More information

Ftp Command Line Manual Windows Example Port 22

Ftp Command Line Manual Windows Example Port 22 Ftp Command Line Manual Windows Example Port 22 Session, Logging, Console/scripting mode, Operations, Configuration enables passive ( =on ) or active ( =off ) transfer mode (FTP protocol only). winscp.exe

More information

Security Policy Document Version 3.3. Tropos Networks

Security Policy Document Version 3.3. Tropos Networks Tropos Control Element Management System Security Policy Document Version 3.3 Tropos Networks October 1 st, 2009 Copyright 2009 Tropos Networks. This document may be freely reproduced whole and intact

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Tanium Discover User Guide. Version 2.5.1

Tanium Discover User Guide. Version 2.5.1 Tanium Discover User Guide Version 2.5.1 May 07, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is believed

More information

PxM Proof of Concept Configuration. June 2018 Version 3.1

PxM Proof of Concept Configuration. June 2018 Version 3.1 PxM Proof of Concept Configuration June 2018 Version 3.1 Table of Contents PxM Architecture, Installation & Configuration... 3 PxM Proof of Concept (POC) Guide... 4 Introduction... 4 Prerequisites... 4

More information

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February Practical Magic with SSH By David F. Skoll Roaring Penguin Software Inc. 1 February 2001 http://www.roaringpenguin.com dfs@roaringpenguin.com Overview of Presentation Why SSH? Problems with Telnet & Friends

More information

Detecting Lateral Movement through Tracking Event Logs (Version 2)

Detecting Lateral Movement through Tracking Event Logs (Version 2) Detecting Lateral Movement through Tracking Event Logs (Version 2) JPCERT/CC December 05, 2017 Table of Contents Detecting Lateral Movement through Tracking Event Logs (Version 2) 1. Introduction... 2

More information

Remote Desktop Services. Deployment Guide

Remote Desktop Services. Deployment Guide Deployment Guide UPDATED: 20 June 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP

More information

Security Manager Policy Table Lookup from a MARS Event

Security Manager Policy Table Lookup from a MARS Event CHAPTER 17 Security Manager Policy Table Lookup from a MARS Event This chapter describes how to configure and use Security Manager and MARS so as to enable bi-directional lookup between events recieved

More information

Server Tailgating A Chosen- Plaintext Attack on RDP. - Eyal Karni - Yaron Zinar - Roman Blachman

Server Tailgating A Chosen- Plaintext Attack on RDP. - Eyal Karni - Yaron Zinar - Roman Blachman Server Tailgating A Chosen- Plaintext Attack on RDP - Eyal Karni - Yaron Zinar - Roman Blachman Speaker Info Eyal Karni Security Researcher @ Preempt Yaron Zinar Lead Security Researcher @ Preempt Roman

More information

Hunting Attacker Activities - Methods for Discovering and Detecting Lateral Movements -

Hunting Attacker Activities - Methods for Discovering and Detecting Lateral Movements - Hunting Attacker Activities - Methods for Discovering and Detecting Lateral Movements - Shusei Tomonaga (JPCERT/CC) Keisuke Muda (Internet Initiative Japan Inc.) Self-introduction Shusei Tomonaga Analysis

More information

Step-by-Step Guide to Ansur Executive 3.0 With or without Electronic Signatures

Step-by-Step Guide to Ansur Executive 3.0 With or without Electronic Signatures Step-by-Step Guide to Ansur Executive 3.0 With or without Electronic Signatures Table of Contents Background...3 Set up Central PC:...4 Configuring SQL Server 2005:... 11 Ansur Executive Server Installation:...

More information

Lateral Movement Defcon 26. Walter Mauricio

Lateral Movement Defcon 26. Walter Mauricio Lateral Movement 101 @ Defcon 26 Walter Cuestas @wcu35745 Mauricio Velazco @mvelazco About Workshop goals Lab Environment Hands-on exercises & CTF #Whoarewe Walter Cuestas (@wcu35745) Mauricio Velazco

More information

Secret Server Demo Outline

Secret Server Demo Outline Secret Server is a feature rich product that can be introduced to your prospects in many different ways. Below is a generic outline of several of the most important features that should be covered during

More information

Remote Access and Management

Remote Access and Management Remote Access and Management Ideas, Thoughts, Do and Don ts Don Murdoch, CISSP MCSE, MCSD Presented on behalf of Compass Technology Management (c) 2003 Don Murdoch 1 Agenda Discuss Remote Admin / Management

More information

NetIQ Privileged Account Manager 3.5 includes new features, improves usability and resolves several previous issues.

NetIQ Privileged Account Manager 3.5 includes new features, improves usability and resolves several previous issues. Privileged Account Manager 3.5 Release Notes July 2018 NetIQ Privileged Account Manager 3.5 includes new features, improves usability and resolves several previous issues. Many of these improvements were

More information

Bypass Windows Defender Attack Surface Reduction

Bypass Windows Defender Attack Surface Reduction 2019 Bypass Windows Defender Attack Surface Reduction emeric.nasi[at]sevagas.com https://twitter.com/emericnasi http://blog.sevagas.com - https://github.com/sevagas License: This work is licensed under

More information

Remote Process Explorer

Remote Process Explorer Remote Process Explorer Frequently Asked Questions LizardSystems Table of Contents Introduction 3 What is Remote Process Explorer? 3 Before Installing 3 How can I download Remote Process Explorer? 3 Will

More information

Lab 3: Introduction to Metasploit

Lab 3: Introduction to Metasploit Lab 3: Introduction to Metasploit Aim: The airm of this lab is to develop and execute exploits against a remote machine and test its vulnerabilities using Metasploit. Quick tool introduction: Metasploit

More information

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+ Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

ETHICAL HACKING LAB SERIES. Lab 13: Exploitation with IPv6

ETHICAL HACKING LAB SERIES. Lab 13: Exploitation with IPv6 ETHICAL HACKING LAB SERIES Lab 13: Exploitation with IPv6 Certified Ethical Hacking Domains: System Hacking, Penetration Testing Document Version: 2015-08-14 otherwise noted, is licensed under the Creative

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

10 Defense Mechanisms

10 Defense Mechanisms SE 4C03 Winter 2006 10 Defense Mechanisms Instructor: W. M. Farmer Revised: 23 March 2006 1 Defensive Services Authentication (subject, source) Access control (network, host, file) Data protection (privacy

More information

Nessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT

Nessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT Nessus Scan Report Mon, 15 May 2017 15:27:44 EDT Table Of Contents Hosts Summary (Executive) 192.168.168.134 Hosts Summary (Executive) [-] Collapse All [+] Expand All 192.168.168.134 Summary Critical High

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Parallels Mac Management for Microsoft SCCM

Parallels Mac Management for Microsoft SCCM Parallels Mac Management for Microsoft SCCM Administrator's Guide v6.1 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright 1999-2017

More information

Advanced Service Design. vrealize Automation 6.2

Advanced Service Design. vrealize Automation 6.2 vrealize Automation 6.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to

More information

Remote Desktop Services Deployment Guide

Remote Desktop Services Deployment Guide Deployment Guide VERSION: 10.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

CS108 Software Systems: UNIX. Fall 2011

CS108 Software Systems: UNIX. Fall 2011 CS108 Software Systems: UNIX Fall 2011 CS108 Fall 2011 2 Course Info cs.utexas.edu/ edwardsj/teaching/2011fall/cs108 CS108 Fall 2011 3 Why Linux? Multi-user, multi-process operating system Open-source

More information

Man In The Middle Project completed by: John Ouimet and Kyle Newman

Man In The Middle Project completed by: John Ouimet and Kyle Newman Man In The Middle Project completed by: John Ouimet and Kyle Newman What is MITM? Man in the middle attacks are a form of eves dropping where the attacker relays messages that are sent between victims

More information

Configuring Kerberos

Configuring Kerberos Configuring Kerberos Last Updated: January 26, 2012 Finding Feature Information, page 1 Information About Kerberos, page 1 How to Configure Kerberos, page 5 Kerberos Configuration Examples, page 13 Additional

More information

Last mile authentication problem

Last mile authentication problem Last mile authentication problem Exploiting the missing link in end-to-end secure communication DEF CON 26 Our team Sid Rao Doctoral Candidate Aalto University Finland Thanh Bui Doctoral Candidate Aalto

More information

Install and Configure the TS Agent

Install and Configure the TS Agent Install or Upgrade the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install or Upgrade the TS Agent Before You Begin

More information

Linux OS Fundamentals for the SQL Admin. Anthony E. Nocentino

Linux OS Fundamentals for the SQL Admin. Anthony E. Nocentino Linux OS Fundamentals for the SQL Admin Anthony E. Nocentino aen@centinosystems.com Anthony E. Nocentino Consultant and Trainer Founder and President of Centino Systems Specialize in system architecture

More information

Tanium Discover User Guide. Version 2.x.x

Tanium Discover User Guide. Version 2.x.x Tanium Discover User Guide Version 2.x.x June 27, 2017 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is

More information

Using the SSM Administration Console

Using the SSM Administration Console CHAPTER 6 Your user role controls whether you can access the SSM Administration Console. The following information is included in this section: SSM Administration Console Overview, page 6-1 Launching the

More information

PAN 802.1x Connector Application Installation Guide

PAN 802.1x Connector Application Installation Guide PAN 802.1x Connector Application Installation Guide Version 1.2 "Copyright CodeCentrix. All rights reserved 2015. Version 1.2 Contact Information CodeCentrix www.codecentrix.co.za/contact Email: info@codecentrix.co.za

More information

Securing Mainframe File Transfers and TN3270

Securing Mainframe File Transfers and TN3270 Securing Mainframe File Transfers and TN3270 with SSH Tectia Server for IBM z/os White Paper October 2007 SSH Tectia provides a versatile, enterprise-class Secure Shell protocol (SSH2) implementation for

More information

RAP as a Service Active Directory Security: Prerequisites

RAP as a Service Active Directory Security: Prerequisites RAP as a Service Active Directory Security: Prerequisites This document explains the required steps to configure the RAP as a Service for Active Directory Security. There are two scenarios available to

More information

Platform Settings for Classic Devices

Platform Settings for Classic Devices The following topics explain Firepower platform settings and how to configure them on Classic devices: Introduction to Firepower Platform Settings, page 1 Configuring Firepower Platform Settings, page

More information

Cyber Essentials Questionnaire Guidance

Cyber Essentials Questionnaire Guidance Cyber Essentials Questionnaire Guidance Introduction This document has been produced to help companies write a response to each of the questions and therefore provide a good commentary for the controls

More information

InterWorx Server Administrator SSH Guide. by InterWorx LLC

InterWorx Server Administrator SSH Guide. by InterWorx LLC InterWorx Server Administrator SSH Guide by InterWorx LLC Contents 1 SSH guide 2 1.1 History.................................................. 2 1.2 Shell Users graph.............................................

More information

RSA Via L&G Collector Data Sheet for Office365

RSA Via L&G Collector Data Sheet for Office365 RSA Via L&G Collector Data Sheet for Office365 Table of Contents Purpose 3 Supported Software 3 Account Data Collector 4 Prerequisites 4 Configuration 5 Configuration Information 5 Limitations/ Requirements

More information

Application Launcher & Session Recording

Application Launcher & Session Recording Installation and Configuration Guide Application Launcher & Session Recording 5.5.3.0 Copyright 2003 2017 Lieberman Software Corporation. All rights reserved. The software contains proprietary information

More information

NetIQ Privileged Account Manager 3.2 Patch Update 2 Release Notes

NetIQ Privileged Account Manager 3.2 Patch Update 2 Release Notes NetIQ Privileged Account Manager 3.2 Patch Update 2 Release Notes January 2018 NetIQ Privileged Account Manager 3.2 P2 includes few enhancements and resolves some of the previous issues. Many of these

More information

SecurEnvoy Microsoft Server Agent Installation and Admin Guide v9.3

SecurEnvoy Microsoft Server Agent Installation and Admin Guide v9.3 SecurEnvoy Microsoft Server Agent Installation and Admin Guide v9.3 SecurEnvoy Microsoft Server Agent Guide Contents 1.1 PREREQUISITES... 3 OVERVIEW OF INSTALLATION FILES... 3 IIS PRE-REQUISITES... 3 OTHER

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

TELE 301 Lecture 8: Post

TELE 301 Lecture 8: Post Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the

More information

ENTRUST CONNECTOR Installation and Configuration Guide Version April 21, 2017

ENTRUST CONNECTOR Installation and Configuration Guide Version April 21, 2017 ENTRUST CONNECTOR Installation and Configuration Guide Version 0.5.1 April 21, 2017 2017 CygnaCom Solutions, Inc. All rights reserved. Contents What is Entrust Connector... 4 Installation... 5 Prerequisites...

More information

Windows Service Manually Command Line Start Remote Machine

Windows Service Manually Command Line Start Remote Machine Windows Service Manually Command Line Start Remote Machine Instructions on manually installing or removing the DameWare Mini Remote Control EXE) or DameWare NT Utilities Client Agent Service (DNTUS26.

More information

Barracuda Networks NG Firewall 7.0.0

Barracuda Networks NG Firewall 7.0.0 RSA SECURID ACCESS Standard Agent Implementation Guide Barracuda Networks.0 fal, RSA Partner Engineering Last Modified: 10/13/16 Solution Summary The Barracuda NG Firewall

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 6 Cisco

More information

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12 Chapter12 Internet Platform Management The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it

More information

Configuring Kerberos

Configuring Kerberos Kerberos is a secret-key network authentication protocol, developed at the Massachusetts Institute of Technology (MIT), that uses the Data Encryption Standard (DES) cryptographic algorithm for encryption

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 24a December 2, 2013 CPSC 467, Lecture 24a 1/20 Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management and Trusted

More information

Tactics, Techniques, and Procedures

Tactics, Techniques, and Procedures Dec 8, 2017 This report maps Cobalt Strike's actions to MITRE's Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix. Command-Line Interface Command-line interfaces provide a way of interacting

More information

Securely manage data center and network equipment from anywhere in the world.

Securely manage data center and network equipment from anywhere in the world. SDT Connector SDT Connector Quick Start Guide Securely manage data center and network equipment from anywhere in the world. To download SDT connector software and documentation from the Web site: 1. Go

More information

RedHat Certified Engineer

RedHat Certified Engineer RedHat Certified Engineer Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an

More information

Bomgar Vault Server Installation Guide

Bomgar Vault Server Installation Guide Bomgar Vault 17.2.1 Server Installation Guide 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

NetIQ Privileged Account Manager 3.2 Patch Update 4 Release Notes

NetIQ Privileged Account Manager 3.2 Patch Update 4 Release Notes NetIQ Privileged Account Manager 3.2 Patch Update 4 Release Notes April 2018 NetIQ Privileged Account Manager 3.2 P4 resolves some of the previous issues. Many of these improvements were made in direct

More information

CounterACT HPS Inspection Engine

CounterACT HPS Inspection Engine CounterACT HPS Inspection Engine Version 10.7.1 and above Table of Contents About the HPS Inspection Engine... 4 Requirements... 4 Supported Windows Operating Systems... 5 Accessing and Managing Windows

More information

Remote Connection to the Zoo

Remote Connection to the Zoo YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 427: Object-Oriented Programming Handout #3 Professor M. J. Fischer February 2, 2016 1 Introduction Remote Connection to the Zoo The Zoo computers can

More information

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN Create and Apply Clientless SSL VPN Policies for Accessing Resources, page 1 Connection Profile Attributes for Clientless SSL VPN, page 1 Group Policy and User Attributes for Clientless SSL VPN, page 3

More information

Parallels Mac Management for Microsoft SCCM

Parallels Mac Management for Microsoft SCCM Parallels Mac Management for Microsoft SCCM Administrator's Guide v5.0 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright 1999-2016

More information

Privileged Identity Deployment and Sizing Guide

Privileged Identity Deployment and Sizing Guide Privileged Identity Deployment and Sizing Guide 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Configuring Secure Shell

Configuring Secure Shell Configuring Secure Shell Last Updated: October 24, 2011 The Secure Shell (SSH) feature is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures

More information

FUJITSU Cloud Service S5 Connecting to a Virtual Machine (VM)

FUJITSU Cloud Service S5 Connecting to a Virtual Machine (VM) FUJITSU Cloud Service S5 Connecting to a Virtual Machine (VM) This guide describes the process for connecting to a FUJITSU Cloud Service S5 Virtual Machine Each Virtual System provides the ability to establish

More information

Ftp Command Line Manual Windows Username Password Linux

Ftp Command Line Manual Windows Username Password Linux Ftp Command Line Manual Windows Username Password Linux Midnight Commander is a console based full-screen text mode File Manager that allows you to copy, MC has many features which are useful for a user

More information

Russian Cyber Attack Warning and Impact on AccessEnforcer UTM Firewall

Russian Cyber Attack Warning and Impact on AccessEnforcer UTM Firewall Russian Cyber Attack Warning and Impact on AccessEnforcer UTM Firewall 1 U.S. and U.K. authorities last week alerted the public to an on-going effort to exploit network infrastructure devices including

More information

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Exam4Tests.   Latest exam questions & answers help you to pass IT exam test easily Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : 642-647 Title : Deploying Cisco ASA VPN Solutions (VPN v1.0) Vendors : Cisco Version : DEMO

More information

One-Click to OWA Track 3. William Martin

One-Click to OWA Track 3. William Martin One-Click to OWA Track 3 William Martin (@QuickBreach) > whoami William Martin OSCP Penetration Tester Supervisor at RSM US LLP in Charlotte, NC First time presenting at DEFCON Twitter: @QuickBreach >

More information

SecurEnvoy Microsoft Server Agent

SecurEnvoy Microsoft Server Agent SecurEnvoy Microsoft Server Agent SecurEnvoy Global HQ Merlin House, Brunel Road, Theale, Reading. RG7 4TY Tel: 0845 2600010 Fax: 0845 260014 www.securenvoy.com SecurEnvoy Microsoft Server Agent Installation

More information

Change Service Startup Type Command Line Windows 7

Change Service Startup Type Command Line Windows 7 Change Service Startup Type Command Line Windows 7 Steps on how to prevent Windows programs from automatically loading every time your computer starts. Locate the service you want to disable and double-click

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Update 2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 452330 Revision Date 11 November 2014 Introduction WatchGuard is pleased to announce the release of

More information