SlideShare a Scribd company logo
1 of 87
BlueTeamonaBudget:
Defendingyournetworkwithfreetools
Agenda
• Who’s this guy?
• Inspiration for this talk (spoiler: it was rage)
• My first breach response (a tale of tears and fears)
• Lets do some blue teaming on a budget!
Who’s this guy?
• Security engineer for 7 Minute Security
• Podcaster (in 7-minute chunks!)
• Neither of these Brian Johnsons
• Super tiny movie star
Why this talk?
• I don’t like when vendors spew FUD (fear/uncertainty/doubt)
• I don’t like when vendors are condescending
My first breach response:
A personal tale of tears and fears
Application log
System log
Security log
Firewall log
To make matters worse…
• Spotty AV deployment
• Cringe-worthy patching
• No centralized logging/alerting
• Weak password policy:
Verdict?
“Burn and rebuild”
How do we NOT suffer the same fate?
Lets defend our network with free stuff!
He’s back!
I GotWorms!
Anatomy of an attack:
Password spraying
1. Try “Winter2017!” for all domain users
2. Wait 30-60 minutes
3. Try another weak password
(“Spring2018!”)
4. Rinse and repeat
Why isWinter2017! a bad password?
It is and it isn’t…
Defending against
password spraying
Up the policy requirements?
• Microsoft recommends minimum password length: 14
Up the policy requirements?
• Microsoft recommends minimum password length: 14
• “Wait…won’t people just use “WinterWinter2017!” - ?
A sweet suite of tools to help you up
boost your network defenses!
My favorite feature?
A better password filter!
CredDefense
Setting your Active Directory password
Lloyd Domain controller
“Hi, I’d like to change my
password to Winter2017!”
“Sure one sec, let me check the password requirements!”
Setting your Active Directory password
Domain controller
“Winter2017! fits the bill! Password changed!”
Lloyd
Setting your Active Directory password
Domain controller
“Hi, I’d like to change my
password to Winter2017!”
“Sure one sec, let me check the password requirements!”
+
Lloyd
Setting your Active Directory password
Domain controller
“Winter2017! fits the bill!
Buuuuuut I need to check one other source, one moment
please…”
+
Lloyd
Setting your Active Directory password
Domain controller
+
“Wait a sec!Your
password contains a
word on my no-no list!”
Lloyd
Setting your Active Directory password
Domain controller
“Sorry Lloyd, please try a better password.”
+
Lloyd
“I wonder who else in my company has picked
bad passwords!”
Auditing Active Directory passwords
Auditing Active Directory passwords
Anatomy of an attack:
“Responder”
“Responder” attacks
(The user meant to type igw-srv01)
“Responder” attacks
Lloyd’s PC
“Hey, do you know a machine called IGW-SRVV01?”
DNS server
“Sorry, I haven’t heard of it.”
“Aaaaaaaaaaaaanybody else?”
Bad guy
“Yes!That’s me! Send credentials!”
“You got it! Here it comes!”
“Responder” attacks
“Responder” attacks
Defending against
“Responder” attacks
Defending against “Responder” attacks
Defending against “Responder” attacks
Defending against “Responder” attacks
Defending against “Responder” attacks
Anatomy of an attack:
Lateral movement via local admin
Lateral movement
Lateral movement
Lateral movement
Lloyd’s PC
Harry’s PC
Mary’s PC
File server
Database server
Email server
P@ssword1
Defending against
local admin lateral movement
Local Administrator Password Solution
• Strengthens and randomizes local
Administrator passwords per machine
• Free (!) from Microsoft
• Creds are stored securely in Active Directory
• A “set it and forget it” solution
Local Administrator Password Solution
Requirements:
• A few GPOs to push LAPS install
• A workstation to manage passwords from
Local Administrator Password Solution
Local Administrator Password Solution
Lateral movement? Nope!
Lloyd’s PC
Nope!
Harry’s PC
Nope!
Mary’s PC
Nope!
File server
Nope!
Database server
Nope!
Email server
Nope!
P@ssword1
WEFFLES are delicious!
(Windows Event Logging Forensic
Logging Enhancement Services)
Not this!
WEFFLES
Lloyd’s PC
Harry’s PC
Mary’s PC
File server
Database server
Email server
WEFFLES
WEFFLES – signs of compromise
Event 1102:
“Somebody cleared
the security log!”
WEFFLES – signs of compromise
Event 4720:
“New user accounts
created”
WEFFLES – signs of compromise
Event 4720:
“New user accounts
created”
Set a trap with a canary
Setting traps with canaries
Setting traps with canaries
Setting traps with canaries
Setting traps with canaries
Setting traps with canaries
Scan all the things!
Vulnerability scanning
Remember Eternal Blue?
• Exploit developed by NSA
• Leaked in April, 2017
• Takes advantage of weaknesses in SMB protocol
• Is still unpatched in many orgs
• Easy to exploit
Vulnerability scanning
Vulnerability scanning
• Not free but relatively cheap (~$2k)
• Identifies missing patches and misconfigurations
• Easily schedule scans w/email alerts on critical items
Vulnerability scanning
Reporting is a little….yawn
Vulnerability scanning
• Cheap! ($65)
• Makes pretty pictures from data
+
Vulnerability scanning
+
Vulnerability scanning
+
Vulnerability scanning
+
Vulnerability scanning
+
Recap
• Use good passwords – on domain and local accounts
• CredDefense and LAPS can help!
• Not collecting event logs? Start for free w/WEFFLES!
• Be aware of “responder” attacks
• Scan and patch all your network things!
Questions?
Thank you!
@7MinSec
brian@7MinSec.com
www.7ms.us
(podcast)

More Related Content

What's hot

What's hot (7)

Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
 
(MBL201) Device Clouds: Best Practices in Building a Connected Device Backend...
(MBL201) Device Clouds: Best Practices in Building a Connected Device Backend...(MBL201) Device Clouds: Best Practices in Building a Connected Device Backend...
(MBL201) Device Clouds: Best Practices in Building a Connected Device Backend...
 
Jenkins User Conference 2013: Literate, multi-branch, mobile and more
Jenkins User Conference 2013: Literate, multi-branch, mobile and moreJenkins User Conference 2013: Literate, multi-branch, mobile and more
Jenkins User Conference 2013: Literate, multi-branch, mobile and more
 
Microservices & JWT
Microservices & JWTMicroservices & JWT
Microservices & JWT
 
How to train your Jenkins?
How to train your Jenkins?How to train your Jenkins?
How to train your Jenkins?
 
Three amigos: Bitbucket + Jenkins + Docker
Three amigos: Bitbucket + Jenkins + DockerThree amigos: Bitbucket + Jenkins + Docker
Three amigos: Bitbucket + Jenkins + Docker
 
Automated test: How to increase his power
Automated test: How to increase his powerAutomated test: How to increase his power
Automated test: How to increase his power
 

Similar to Blue Team on a Budget: Defending Your Network with Free Tools

Database honeypot by design
Database honeypot by designDatabase honeypot by design
Database honeypot by design
qqlan
 
Bsides chicago 2013 honeypots
Bsides chicago 2013   honeypotsBsides chicago 2013   honeypots
Bsides chicago 2013 honeypots
Tazdrumm3r
 
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Positive Hack Days
 

Similar to Blue Team on a Budget: Defending Your Network with Free Tools (20)

Pre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionPre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint Encryption
 
3.3. Database honeypot
3.3. Database honeypot3.3. Database honeypot
3.3. Database honeypot
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
 
Hacklu2011 tricaud
Hacklu2011 tricaudHacklu2011 tricaud
Hacklu2011 tricaud
 
Database honeypot by design
Database honeypot by designDatabase honeypot by design
Database honeypot by design
 
Ask a Malware Archaeologist
Ask a Malware ArchaeologistAsk a Malware Archaeologist
Ask a Malware Archaeologist
 
Dmk bo2 k8_ccc
Dmk bo2 k8_cccDmk bo2 k8_ccc
Dmk bo2 k8_ccc
 
Bsides chicago 2013 honeypots
Bsides chicago 2013   honeypotsBsides chicago 2013   honeypots
Bsides chicago 2013 honeypots
 
Five Cliches of Online Game Development
Five Cliches of Online Game DevelopmentFive Cliches of Online Game Development
Five Cliches of Online Game Development
 
Running MongoDB in the Cloud
Running MongoDB in the CloudRunning MongoDB in the Cloud
Running MongoDB in the Cloud
 
Cloud adoption fails - 5 ways deployments go wrong and 5 solutions
Cloud adoption fails - 5 ways deployments go wrong and 5 solutionsCloud adoption fails - 5 ways deployments go wrong and 5 solutions
Cloud adoption fails - 5 ways deployments go wrong and 5 solutions
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong Way
 
Large Scale Data Management
Large Scale Data ManagementLarge Scale Data Management
Large Scale Data Management
 
Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014
 
Something Died Inside Your Git Repo
Something Died Inside Your Git RepoSomething Died Inside Your Git Repo
Something Died Inside Your Git Repo
 
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure  BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
 
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
 
Phd final
Phd finalPhd final
Phd final
 
Dmk neut toor
Dmk neut toorDmk neut toor
Dmk neut toor
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Blue Team on a Budget: Defending Your Network with Free Tools