SANS 504.2: Attack Trends
SANS 504.2: Attack Trends
SANS 504.2: Attack Trends
2
To Create an effective defense, we must understand the
offensive tools attackers use, That’s what this book is all about
Attack Trends
Most of the new IoT devices lack security, As there is price competition between
vendors and short-to-market development cycles.
Crowd Strike report indicates the nation-state attackers are getting faster, reducing
breakout time:
Russia: 20 min, North Korea: 140 min, China: 240 min, Iran: 309 min
This means you have about 3.5 hours to respond to an initial compromise of
your network.
The bottom line here is that we live in the Golden Age of hacking,
But it’s also the golden age of information security. The two go hand
in hand
Reconnaissance
SANS 504.2 1
The internet is a teasure trove of information for a curious
attacker
Before your first packet to a target you should collect OSINT data
OSINT used both Offensively and Defensively, as we’ll see in this module.
, history information about the target, but you gotta give them 1$ per
😟
12whois
one lookup
Reverse whois
DNS Interrrogation
SANS 504.2 2
The attacker’s goal is to discover as many IP addresses
associated with the target domain as possible.
the nslookup command can be used to interact with the DNS server to get this
data.
To mitigate this type of attack, don’t allow zone transfer from just any system,
Use split DNS, Make sure your DNS servers are hardened.
SANS 504.2 3
Website Searches
You should check Press realeases, white papers, design documents, contacts,
etc…
Pushpin, it’s a social media geolocation using Flicker and google photo
metadata
Search Engines
The easist way to get information is to ask for it, Who ?
Waybackurls
Many files (.doc, .xls, .pdf, .jpeg) have metadata that can be useful for attackers
like:
If you are trying to extract the metadata manually it’s like a pain in the ass
process, Luckily for us we got FOCA, which automates this process for us.
SANS 504.2 4
Recon-ng by Tim Tomes, is another powerful recon tool
Numerous webistes offer the capability to research or even attack other sites
Shodan
tools.dnsstuff.com
www.network-tools.com
www.securityspace.com
Scanning
War Dialing
SANS 504.2 5
War Dialing, it’s an old technique, but still amazingly successful
War Driving
inSSIDer
from Metageek uses active and passive scanning with a standard WI-FI
card on Windows. Identifies SSID, channel information, Integrates with a
GPS for location mapping.
WiFi Analyzer
SANS 504.2 6
gather similar data but for android devices
Kismet
PSK-based WiFi auth is simple and inexpensive to deploy, but it’s susceptible to
offline password guessing
SANS 504.2 7
Possible to impersonate open APs without special hardware, ILMN is Linux
virtual machine to impersonate AP
Insecure protocol
Bluetooth
PSK it is not appropriate for enterprise networks, you should deploy WPA2 with
a plan to deploy WPA3
For Identifying wireless intruders, you could look for the appearance of renegade
access points or strange messages sent by intuding wireless clients.
SANS 504.2 8
Also. For detecting renegade access points, Cisco offer built-in capabilities in
existing access points to detect unregistered access points that appear in your
environment.
This tools it’s widely used by law enforcement to identify criminals using WiFi
access points
Once Nmap finishes conducting a network sweep and its tracerouting activities,
The Zenmap GUI can provide an interactive graphical portrayal of the network
SANS 504.2 9
To mitigate get scanned, he recommended diabling ICMP Echo request
messages, But your users couldn’t ping you.
Or if you notice a particularly frequent ping sweep, you could temporarily block
source address.
SANS 504.2 10
SYN scan it the stealthiest one as it doesn’t complete the connection, and
most systems don’t log uncompleted connection.
ACK Scans are useful for mapping, but not for port scanning, Useful for finding
sensitive internal systems post-exploitation.
Masscan, separating SYN send from ACK receive, which is way faster than
Nmap.
SANS 504.2 11
Evading IPS, IDS
Many IDS/IPS systems do not validate the TCP checksum
An attacker can insert a TCP Reset with an invalid checksum to clear the
IDS/IPS buffer.
Many attackers today abuse services and protocols your environment uses
every day.
Attackers will use an exploit /payload combination on the intitial attack, but will
switch to stolen user credentials as soon as possible.
Vulnerability Scanners
SANS 504.2 12
Many commercial Scanners:
Rapid7
SAINT
beyondTrust
Nessus
OpenVAS
Talked about NESSUS, the most popluar one “Check the room on try hack
me”
SMB sessions
SMB is an application-layer protocol that implements file and printer sharing,
domain auth, remote admin, and other features.
SANS 504.2 13
BloodHound
A tool that graphs the quickest way to get domain administrator privileges.
For example:
SANS 504.2 14