Assessment automation: - PowerPoint PPT Presentation

1 / 45
About This Presentation
Title:

Assessment automation:

Description:

This presentation/binary/videos/documentation is at: http://www.sensepost.com/research ... People think that, because it's a GUI app, stupid people will use it ... – PowerPoint PPT presentation

Number of Views:107
Avg rating:3.0/5.0
Slides: 46
Provided by: roe2
Category:

less

Transcript and Presenter's Notes

Title: Assessment automation:


1
Assessment automation Deux ex Machina
Rube Goldberg Machine? 2005 RuxCon - SYDNEY
2
  • SensePost Research portal at
  • http//www.sensepost.com/research/
  • This presentation/binary/videos/documentation is
    at
  • http//www.sensepost.com/research/bidiblah/
  • Other SensePost tools presented at HiTB (two
    days ago in KL, thats 7.5h and not 3h from here)
  • http//www.sensepost.com/research/eor/
  • (New web application scanner)
  • http//www.sensepost.com/research/wikto/
  • (You should know this one version 1.61 current)
  • http//www.sensepost.com/research/crowbar/
  • (Generic web application brute forcer)

3
Introduction
  • SensePost has literally done hundreds of external
    assessment
  • Tried and trusted methodology
  • Soin search of an automated assessment tool
  • This talk is about
  • What is this methodology?
  • Can it be automated?
  • Where does automation really work well?
  • Where does it simply suck?
  • Why does it fail? (and can it be corrected?)
  • Implications for penetration testers

4
Principles of automation
To have an automatic process we need to code
it To code it we need to have an algorithm or
flow In order to have an algorithm or flow it we
need to understand the process To understand the
process we need to have done it many times If
you cannot write the process down on paper you
probably dont understand it completely Exception
s on the rule the root of all evil Tradeoffs
if it will work in 99.99 of cases and will
take me 2 months to code support for the 0.01 of
casesis it worth it?
5
Weird perceptions
Unix good.Windows baaaad! (meeaaaaa) Hard
core hackers will tell you that Windows sucks.
GUI apps limit you to do complex things Problem
is not the OS its the implementation of the
GUI People think that, because its a GUI app, it
needs to be dumbed down People think that,
because its a GUI app, it needs to user
friendly People think that, because its a GUI
app, stupid people will use it Unix command line
tools are mostly fire and forget Unix command
line tools are not interactive Unix makes it hard
to write X11 interfaces so ppl stick to text
based interfaces BiDiBLAH uses hot text boxes
you can copy and paste grep and awk and sed all
you wish
6
The demos you are about to see
BiDiBLAH is a tool for doing attacks/assessments I
ts built for large networks we dont have a
large network but our clients do but we dont
want to show their network no...we
dontreally SO Passive IBM,Playboy Active
SensePost/VMWare Theres just too much risk in
doing this live but everything you see is
real (some time lapse in places Ill tell you
where)
7
SensePost external methodology
8
Methodology Footprinting
9
(No Transcript)
10
MethodologyFootprintFind domains
NOT IMPLEMENTED YET
NOT IMPLEMENTED YET
Also see Steves SpiderFoot for this)
11
Methodology Footprinting Find subdomains
12
Video 1 BiDiBLAHs footprinting Sub domains
(5 minutes)
13
Methodology Footprinting Forward DNS entries
14
Video 2 BiDiBLAHs footprinting Forwards
(3min per domain)
15
Methodology Footprint Netblocks
16
Video 3 BiDiBLAH footprinting NetBlocks
17
Methodology Footprint Reverse DNS
18
Video 4 BiDiBLAHs footprinting Reverse DNS
(5min/ClassC)
19
Methodology Footprint Vitality
20
(No Transcript)
21
Coming soon to a conference near you
22
..but on with this showVitality Async scanning
23
Video 5 - BiDiBLAH Vitality (SensePost network)
2min/port/classB
24
(No Transcript)
25
Automation of footprint
  • Pheewwglad thats over!
  • Which steps are difficult to automate why?
  • Domain finding
  • works semi OK, but never complete not
    implemented
  • currently, you can learn a lot from reverse
    entries
  • Sub domain finding easy - DONE
  • Forwards easy - DONE
  • Netblocks difficult
  • AS expansion is not always good for smaller
    (hosted) blocks.
  • Whois info on these blocks are pretty unless.
  • No standard interface to registrars
  • Currently set to manual
  • Reverse scans easy - DONE
  • Vitality easy DONE (tcp only)

26
  • Why should you care about footprinting??
  • Finding one vulnerability on one box
  • vs
  • Finding the one box with one vulnerability

27
SensePost external methodology
So, where are we now?
28
Methodology Fingerprinting
OS detection from the Internet to a firewalled
host is difficultNot just technically, but
conceptually An Apache box protected by a
FireWall-1 running on Win32 and 11NAT will
report itself as a Windows machines on a network
levelbut as a Unix machine on app level..so what
will it be?? BiDiBLAH does not try to do OS
detection, but rather just do banner
grabbing Using Async banner grabbing for
21,22,25,80,110,143 Multithreaded 443 (SSL) Any
banner/version can be grabbed asynchronously but
it gets increasingly tricky..
29
Async banner grabbing the process
30
Video 6 - BiDiBLAH Async banner grabbing (2000
banners / 3 min)
31
SensePost external methodology
So, where are we now?
32
Methodology targeting
  • With a great deal of potential targets, we want
    to be able to select only those that really
    interests us.
  • Targetting system should be able to target using
  • Certain/All open ports (in all netblocks, or
    certain netblocks)
  • e.g. all open on TCP 53
  • Keywords in service banners
  • e.g. wuftp
  • Keywords in DNS names
  • e.g. PRT
  • All hosts in a specific netblock
  • e.g. all in 172.16.43.0/24
  • Particular OSes of version of OS a problem - we
    dont have it
  • - e.g. MS Windows XP SP1
  • Certain keywords within vulnerability
    descriptions (later more)
  • - e.g. RPC

33
Video 7 BiDiBLAH - Targeting
34
SensePost external methodology
So, where are we now?
35
A note to people out there
  • At this point we have
  • All DNS information
  • Network blocks
  • Machines that are alive / interesting ports
  • Banners
  • Enough to get a good feel for the likelihood of
    successful attack if we can base it on banners
  • Thus, please dont write/think that BiDiBLAH is a
    front end for Nessus/Metasploit!

36
Methodology Vulnerability discovery
Why reinvent the wheel? Use a solid, widely used
scanner Nessus Thuswe write a Nessus
client.. Give the user the ability to choose a
set of plugins ..and let him save the
list.. Thus you can choose all plugins (if
you are doing an assessment), or you can choose
one plugin (if you are looking throughout your
whole network for a particular problem) Scans
are executed against what was marked as targets
37
Video 8 - BiDiBLAH Plugin selection
38
Video 9 BiDiBLAH vulnerability discovery
39
SensePost external methodology
So, where are we now?
40
Methodology Vulnerability exploitation
Why reinvent the wheel? Use a solid, widely used
exploitation framework MetaSploit! Thuswe
write a MetaSploit client.. Problem with
MetaSploit its very operating system
specific .and we DONT KNOW the OS Dont
specify target and hope for the best hopefully
it will brute force. Use Nessus to identify the
weakness, MetaSploit to exploit it Thus we need
a NessusID to MetaSploit sploit name list We
built it (thanks GP), and wrote plugins as
needed Hopefully it can be an attribute of the
sploit (looks at HD..) RHOST, SSL, LHOST all
known to us RPORT known via Nessus scanner Let
the user choose the playload and additional
parameters
41
Video 10 BiDiBLAH exploitaion (VMware server)
42
SensePost external methodology
Sowe are done? In a perfect worldyes... In
the real world we have false positives, we have
to moderate Nessus results, and we have to write
!(ing reports!!!
43
Video 11 - advance targeting and reporting
44
The Bottom line
BiDiBLAH does 80 of the work within 20 of time
it takes us The last 20 of the work takes 80 of
the project time Some steps in the methodology
are really hard to automate This is usually where
things are non-standard, or an exception It
would hopefully raise the bar on mediocre pen
testing companies
45
  • The URLs again if you missed it
  • http//www.sensepost.com/research/bidiblah
  • (..as I was saying a.k.a you can wake up now -
    its the end of the presentation)
  • http//www.sensepost.com/research/eor/
  • (New web application scanner)
  • http//www.sensepost.com/research/wikto/
  • (You should know this one version 1.61 current)
  • http//www.sensepost.com/research/crowbar/
  • (Generic web application brute forcer)
  • Join us on the SensePost Research/Tools Google
    Group registration on Research portal
Write a Comment
User Comments (0)
About PowerShow.com