Blackhat Hacking
Blackhat Hacking
Blackhat Hacking
Brady Bloxham
Silent Break Security
[email protected]
Overview
▪ What is OpSec?
▪ Methodology
▪ TTPs (Tactics, Techniques, and Procedures)
▪ Conclusion
What is OpSec?
What is OpSec?
▪ Proactive paranoia
– It doesn’t work retroactively!
What is OpSec?
▪ Work alone
▪ Avoid being blackmailed
▪ No one is going to jail for you!
Methodology
Methodology
▪ Money trail
– PATRIOT Act
– Various types
▪ Pre-paid credit cards
▪ Pre-paid credit cards + Paypal
▪ Western Union
▪ Bitcoin
– Not truly anonymous!
– Every transaction is publically logged
– So…use bitcoin mixing/eWallet
Methodology
▪ Covert Infrastructure
– VPS
▪ Careful of payment
– TOR
▪ Slow
– VPN
▪ Torguard.net
▪ Btguard.com
▪ Covert Infrastructure
Methodology
▪ Don’t be a hoarder
– Principle of least use
▪ Don’t collect what you don’t need
▪ Don’t hoard data
▪ Delete it when you’re done
– Be smart about it
▪ Dedicated infrastructure
▪ Truecrypt containers
▪ VMs with snapshots
▪ Qube-OS
TTPs (Tactics, Techniques, and Procedures)
TTPs
▪ Spear phishing
– Click rate ~ 25-35%
▪ Countermeasure
– End user training but…it should reflect
current threat environment.
– Configure spam filter!
– Use proxy to block!
TTPs
TTPs
▪ Be strategic!
– Don’t pop…just to pop
– Find high value targets
▪ Tasklist of remote systems
▪ Net use for remote dir of c:\Users
▪ Query AD for logon events
TTPs
▪ Countermeasures
– Monitor, monitor, monitor…especially
privileged accounts
– Create user accounts for domain
admins
TTPs
▪ MRUs
– HKCU\SW\Microsoft\Windows\CurrentVer\Explorer\FindComputerMRU
– HKCU\SW\Microsoft\Windows\CurrentVer\Explorer\PrnPortsMRU
– HKCU\SW\Microsoft\Windows\CurrentVer\Explorer\RunMRU
– HKCU\SW\Microsoft\Windows\CurrentVer\Explorer\StreamMRU
▪ Audit Policy
– HKLM\Security\Policy\PolAdtEv
▪ Clean Logs
– Windows Defender
▪ Binary logs! Check out MPDetection.txt
– McAfee
▪ BufferOverflowProtectionLog.txt
▪ AccessProtectionLog.txt
– Symantec
▪ \Docume~1\AllUse~1\Applic~1\Symantec\Symantec Endpoint Protection\Logs
TTPs
▪ Test, test, test, test, test, test, test, test, test, test, test, test, test
▪ Modifying the target is for n00bs
– Modify your tools instead
– Packers, crypters, modifying the source, etc., etc.
TTPs
TTPs
TTPs
TTPs
▪ Environmental awareness
– Network
▪ SYN vs Connect scan
▪ ping –n 1 <ip>
▪ SSL where possible
– System
▪ Avoid domain accounts
▪ Build a profile
▪ Countermeasures
– Create baselines (SIEM, netflow, etc.)
– Don’t ignore anomalies or alerts
TTPs
▪ Countermeasures
– Block outbound all, lock down proxy, block outbound SYN in DMZ
TTPs
TTPs
TTPs
▪ Techniques
– DLL hijacking
– Service
– AppInit registry
– DLL wrapper
TTPs
▪ Go custom or go home…
TTPs
Conclusion
Conclusion
▪ Egress Filtering
– Like it is going out of style
▪ Proxy or die!
– Proxy all traffic
– Break & Proxy HTTPS traffic
– Look out for base64 encoding
– If you can’t inspect it…
▪ You just made someone’s b-day
Conclusion
▪ Questions?
▪ Contact Information
– Brady Bloxham
– Silent Break Security
– [email protected]
– www.silentbreaksecurity.com
– (801) 855-6599