SlideShare una empresa de Scribd logo
1 de 85
Fi f t y ShadesFi f t y Shades
Of REDOf RED
hi. =)
Thanks
Trigger Warnings
• Cursing
• Racism
• Religious Prejudice
• Sex
• Drugs
• Daddy / Abandonment issues
• Socio Economic Hate crimes
• Thin Skin
• Lack of sense of humor
• Sexual orientation
• Sexism
• Violence
• Vomiting
• Abuse
• Truth
• Honesty
• Facts
Anyway...
I’m Chris
AKA
@indi303
cnickerson@laresconsulting.com
https://vimeo.com/laresconsulting
http://www.scribd.com/Lares_
LARES
Custom Services
OSINT
SIGINT
TSCM/ Bug Sweeping
Exploit Development
Tool Creation
Attack Planning
Offensive Consultation
Adversarial Intelligence
Competitive Intelligence
Attack Modeling
Business ChainVuln Assessments
Custom Physical Bypass Tool
Design
Reverse Engineering
Other stuff I can’t write down…
Cost per incident
2006 – $168,000
2007 – $320,424
2008 – $500,000
2009 – $710,000
2010 – ~$1.5M
2011 – ~$3.7M
2012 – ~$4.5M
2013 – ~$5.4M
Web Application Firewalls (That’s so 1991)
Polymorphic Self Defending Worms (since the 80’s or older if
you count xmastree 1971)
Buffer Overflows (1972)
Cloud Computing (aka Centralized computing, aka Mainframe,
aka…. Remember punch cards? 1960 for IBM’ers, 1832 for
informatics)
Wireless (Bell’s Photophone 1880)
Locks (about 4,000 yrs old)
Perimeters (Since the dawn of human existence)
APT (Since the dawn of human existence)
• Financial fraud:  49 percent, over 12 percent last year (avg:
$450,000)
• Malware Infection:  UP 69 percent, over 50 percent last
year;
• Our heads are in “THE CLOUDS” and now under major
fire.
• 80% of directed attacks involved guessing, cracking, or
reusing valid credentials
• 45% of incidents included public releases of passwords
• DBIR: Over 80% of the intrusions were linked to
PHISHING!
““Seventy-nine percent of respondents selected end-users asSeventy-nine percent of respondents selected end-users as
the number one group responsible for thethe number one group responsible for the
security of cloud service providers.” –Ponemon 2012security of cloud service providers.” –Ponemon 2012
POSTULATES vs. PROOF
Common
misconceptions
• No one is just gonna WALK IN
• We have a process (and it works)
• We have a badge system that
ONLY lets in who we approve
• No one has broken in before
• It’s a lock… you NEED a key
How it’s usually done
• Conduct full test of design
• Review Policy and process
• Site inspection
• Check Access control
procedures, lighting, camera
coverage, Ingress/egress
perimeters, CCTV, intrusion
detection, environmental
concerns and barriers
Common misconceptionsCommon misconceptions
• We will get owned, what's the
point
• It will offend our users
• Doesn’t provide enough value
• No one will leak info
How it’s usually doneHow it’s usually done
• Send a 419 scam style email
• Track clicks
• Write a report to show who
clicked
What ARE we doing?
Common misconceptionsCommon misconceptions
• A Penetration Test will find
ALL the holes But… you
don’t have to test
EVERYTHING, just what's in
scope
• Identify potential impact to
the business
• Confirm vulnerabilities
identified
• Gain a “Real World” View of
an attackers ability to “hack”
the environment and resolve
issues identified
How it’s usually doneHow it’s usually done
• Do all the steps in
Vulnerability Assessment
listed previously
• Run metasploit/Core/Canvas
against hosts
• Try a few other automated
tools
• Call it “SECURE” If those
don’t work
• Do not allow the exploitation
• Restrict the hours of testing
• Restrict the length of testing
• Improperly scope / fail to include ALL assets
• Only perform externally
• Only observe
• Patch/fix/train BEFORE the test
• Only allow directed attacks ( no SE/ Phishing)
• Lack of focus on BUSINESS risk and increased focus on technical
issue
What is convergence
“The merging of distinct technologies,
industries, or devices into a unified whole.”
http://www.merriam-webster.com/dictionary/convergence
“The combining of different forms of electronic
technology, such as data processing and word
processing converging into information processing.”
http://www.thefreedictionary.com/convergence
ElectronicPhysical
EP Convergence
•Attacks on physical systems that are
network enabled
But what do I do?
Badge systems?Badge systems?
Don’t over complicate it.Don’t over complicate it.
Pacom (paycom/pacom and viewer/admin) **VideoPacom (paycom/pacom and viewer/admin) **Video
and Badgeand Badge
Pro Watch (auto login from local user by default)Pro Watch (auto login from local user by default)
WINDSX
Auth can be local OR AD creds
default username
admin:(blank)
-------------------
Ports to scan for
10002 for server
3001 and 2101
-------------------
DSX Database
port 5555 AND 5556
DB defaults as SA (blank)
Ports for management:
8888 –for activation
9999- for license
8189 – DB listening port
Url’s for management:
http://<servername>/lnl.og.web/lnl_og_aam.aspx
http://<servername>/lnl.og.web/lnl_og_videoviewer.aspx
http://<servername>/IdvmHost
Or, if they are using manual sign-on
http://<servername>/ldvmhost/?useAutomaticSSO=false
http://<servername>/AdminApp
Accounts:
SA/SA
LENEL/MULTIMEDIA
ADMIN/ADMIN
Remember
• Replace
• Add
• Promote
• Exploit
REPLACE
ADD
Promote
Exploit
SocialPhysical
PS
Convergence
•Tailgating
•Impersonation
Electronic Social
ES Convergence
•Blackmail
•Phishing
•Profiling
•Creating moles
•Being an employee
Finding Boxes
• dsquery computer domainroot -desc *xxx*
• DSQUERY Server -o rdn
• nltest /dsgetdc:<domain> /PDC or /BDC or /KDC
• Windows network search
ldifde -d "dc=corp,dc=COMPANY,dc=com" -r "(&(objectCategory=computer)
(operatingSystem=Windows 2000*))" -f out.lde
dsquery * dc=COMPANY,dc=com -filter "(&(objectCategory=computer)
(operatingSystem=Windows 2000*))"
Tips for finding users
• DSQUERY USER -name *lastname* | DSGET USER
-samid -display
• net share [sharename]
• Use the Domain search service ** look for computers and
users**
• https://github.com/mubix/netview
• Own the DC and turn on auditing fot the accounts you
are looking for
Manage->SharedFolders->sessions
NetShare
Monitor
Electronic
Physical Social
• Network Penetration Testing
• Surveillance & Implants
• Direct attack on facilities
and systems
• In person Social Engineering
• Phone conversations
• Social profiling
• Baiting
RED
TEAM
EP
Convergence
Attacks on physical systems that are network
enabled
ES Convergence
Phishing
Profiling
Creating moles
Blackmail
PS Convergence
Tailgating
Impersonation
I’m Chris
AKA
@indi303
cnickerson@laresconsulting.com
https://vimeo.com/laresconsulting
http://www.scribd.com/Lares_

Más contenido relacionado

La actualidad más candente

Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDC
scriptjunkie
 

La actualidad más candente (20)

IT system security principles practices
IT system security principles practicesIT system security principles practices
IT system security principles practices
 
Lets talk about bug hunting
Lets talk about bug huntingLets talk about bug hunting
Lets talk about bug hunting
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability Scanning
 
Lateral Movement by Default
Lateral Movement by DefaultLateral Movement by Default
Lateral Movement by Default
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...
 
Break IT Down by Josh Smith
Break IT Down by Josh SmithBreak IT Down by Josh Smith
Break IT Down by Josh Smith
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDC
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Securing the “Weakest Link”
Securing the “Weakest Link”Securing the “Weakest Link”
Securing the “Weakest Link”
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known Vulnerabilities
 
How Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for BusinessHow Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for Business
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare Infrastructure
 

Similar a 50 Shades of RED: Stories from the “Playroom” from CONFidence 2014

Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Internet Etiqute
Internet EtiquteInternet Etiqute
Internet Etiqute
Anay Mishra
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
forensicsnation
 

Similar a 50 Shades of RED: Stories from the “Playroom” from CONFidence 2014 (20)

Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Internet Etiqute
Internet EtiquteInternet Etiqute
Internet Etiqute
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
 
Competitive Cyber Security
Competitive Cyber SecurityCompetitive Cyber Security
Competitive Cyber Security
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to Know
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Cyber security & gaming - LevelUp! 2018 - v.3.1
Cyber security & gaming - LevelUp! 2018 - v.3.1Cyber security & gaming - LevelUp! 2018 - v.3.1
Cyber security & gaming - LevelUp! 2018 - v.3.1
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

50 Shades of RED: Stories from the “Playroom” from CONFidence 2014

  • 1. Fi f t y ShadesFi f t y Shades Of REDOf RED
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Trigger Warnings • Cursing • Racism • Religious Prejudice • Sex • Drugs • Daddy / Abandonment issues • Socio Economic Hate crimes • Thin Skin • Lack of sense of humor • Sexual orientation • Sexism • Violence • Vomiting • Abuse • Truth • Honesty • Facts
  • 9.
  • 10.
  • 11.
  • 12.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. LARES
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Custom Services OSINT SIGINT TSCM/ Bug Sweeping Exploit Development Tool Creation Attack Planning Offensive Consultation Adversarial Intelligence Competitive Intelligence Attack Modeling Business ChainVuln Assessments Custom Physical Bypass Tool Design Reverse Engineering Other stuff I can’t write down…
  • 29.
  • 30.
  • 31.
  • 32. Cost per incident 2006 – $168,000 2007 – $320,424 2008 – $500,000 2009 – $710,000 2010 – ~$1.5M 2011 – ~$3.7M 2012 – ~$4.5M 2013 – ~$5.4M
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. Web Application Firewalls (That’s so 1991) Polymorphic Self Defending Worms (since the 80’s or older if you count xmastree 1971) Buffer Overflows (1972) Cloud Computing (aka Centralized computing, aka Mainframe, aka…. Remember punch cards? 1960 for IBM’ers, 1832 for informatics) Wireless (Bell’s Photophone 1880) Locks (about 4,000 yrs old) Perimeters (Since the dawn of human existence) APT (Since the dawn of human existence)
  • 38. • Financial fraud:  49 percent, over 12 percent last year (avg: $450,000) • Malware Infection:  UP 69 percent, over 50 percent last year; • Our heads are in “THE CLOUDS” and now under major fire. • 80% of directed attacks involved guessing, cracking, or reusing valid credentials • 45% of incidents included public releases of passwords • DBIR: Over 80% of the intrusions were linked to PHISHING!
  • 39. ““Seventy-nine percent of respondents selected end-users asSeventy-nine percent of respondents selected end-users as the number one group responsible for thethe number one group responsible for the security of cloud service providers.” –Ponemon 2012security of cloud service providers.” –Ponemon 2012
  • 40.
  • 41.
  • 42.
  • 43.
  • 45.
  • 46.
  • 47. Common misconceptions • No one is just gonna WALK IN • We have a process (and it works) • We have a badge system that ONLY lets in who we approve • No one has broken in before • It’s a lock… you NEED a key How it’s usually done • Conduct full test of design • Review Policy and process • Site inspection • Check Access control procedures, lighting, camera coverage, Ingress/egress perimeters, CCTV, intrusion detection, environmental concerns and barriers
  • 48.
  • 49. Common misconceptionsCommon misconceptions • We will get owned, what's the point • It will offend our users • Doesn’t provide enough value • No one will leak info How it’s usually doneHow it’s usually done • Send a 419 scam style email • Track clicks • Write a report to show who clicked
  • 50. What ARE we doing?
  • 51.
  • 52. Common misconceptionsCommon misconceptions • A Penetration Test will find ALL the holes But… you don’t have to test EVERYTHING, just what's in scope • Identify potential impact to the business • Confirm vulnerabilities identified • Gain a “Real World” View of an attackers ability to “hack” the environment and resolve issues identified How it’s usually doneHow it’s usually done • Do all the steps in Vulnerability Assessment listed previously • Run metasploit/Core/Canvas against hosts • Try a few other automated tools • Call it “SECURE” If those don’t work
  • 53. • Do not allow the exploitation • Restrict the hours of testing • Restrict the length of testing • Improperly scope / fail to include ALL assets • Only perform externally • Only observe • Patch/fix/train BEFORE the test • Only allow directed attacks ( no SE/ Phishing) • Lack of focus on BUSINESS risk and increased focus on technical issue
  • 54.
  • 55.
  • 56. What is convergence “The merging of distinct technologies, industries, or devices into a unified whole.” http://www.merriam-webster.com/dictionary/convergence “The combining of different forms of electronic technology, such as data processing and word processing converging into information processing.” http://www.thefreedictionary.com/convergence
  • 57. ElectronicPhysical EP Convergence •Attacks on physical systems that are network enabled
  • 58.
  • 59. But what do I do? Badge systems?Badge systems? Don’t over complicate it.Don’t over complicate it. Pacom (paycom/pacom and viewer/admin) **VideoPacom (paycom/pacom and viewer/admin) **Video and Badgeand Badge Pro Watch (auto login from local user by default)Pro Watch (auto login from local user by default)
  • 60. WINDSX Auth can be local OR AD creds default username admin:(blank) ------------------- Ports to scan for 10002 for server 3001 and 2101 ------------------- DSX Database port 5555 AND 5556 DB defaults as SA (blank)
  • 61. Ports for management: 8888 –for activation 9999- for license 8189 – DB listening port Url’s for management: http://<servername>/lnl.og.web/lnl_og_aam.aspx http://<servername>/lnl.og.web/lnl_og_videoviewer.aspx http://<servername>/IdvmHost Or, if they are using manual sign-on http://<servername>/ldvmhost/?useAutomaticSSO=false http://<servername>/AdminApp Accounts: SA/SA LENEL/MULTIMEDIA ADMIN/ADMIN
  • 62. Remember • Replace • Add • Promote • Exploit
  • 64.
  • 65. ADD
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 76.
  • 77.
  • 78. Finding Boxes • dsquery computer domainroot -desc *xxx* • DSQUERY Server -o rdn • nltest /dsgetdc:<domain> /PDC or /BDC or /KDC • Windows network search
  • 79. ldifde -d "dc=corp,dc=COMPANY,dc=com" -r "(&(objectCategory=computer) (operatingSystem=Windows 2000*))" -f out.lde dsquery * dc=COMPANY,dc=com -filter "(&(objectCategory=computer) (operatingSystem=Windows 2000*))"
  • 80. Tips for finding users • DSQUERY USER -name *lastname* | DSGET USER -samid -display • net share [sharename] • Use the Domain search service ** look for computers and users** • https://github.com/mubix/netview • Own the DC and turn on auditing fot the accounts you are looking for
  • 82.
  • 83. Electronic Physical Social • Network Penetration Testing • Surveillance & Implants • Direct attack on facilities and systems • In person Social Engineering • Phone conversations • Social profiling • Baiting RED TEAM EP Convergence Attacks on physical systems that are network enabled ES Convergence Phishing Profiling Creating moles Blackmail PS Convergence Tailgating Impersonation
  • 84.

Notas del editor

  1. Sorry ya had to wake up early
  2. And sit there to pay atteention
  3. To my stupid ppt
  4. Got drunk last night
  5. Will try not to puke while I am on stage
  6. Who we are
  7. Code review
  8. Incident response
  9. Risk Assessment
  10. Physical security
  11. PenTesting
  12. Red Teaming
  13. Keep you safe (blanket security)