deel ch04
							parent
							
								
									a6b2734b12
								
							
						
					
					
						commit
						bfcfd4f8d7
					
				|  | @ -0,0 +1,72 @@ | |||
| # Exploitation | ||||
| 
 | ||||
| * **exploit**: code or technique that a threat uses to take advantage of a | ||||
|   vulnerability | ||||
| * why exploitation? | ||||
|     1. validating vulnerabilities | ||||
|     2. assess impact | ||||
|     3. prioritise fixes to vulnerabilities that can exploited | ||||
|     4. test incident response | ||||
|     5. exploited machine can work as pivot point | ||||
| * risks | ||||
|     * system downtime | ||||
|     * system disruption | ||||
|     * data loss | ||||
|     * general bad things | ||||
| * always verify exploit is allowed by Rules of Engagement | ||||
| * most frequent initial access vectors | ||||
|     1. valid account usage, e.g. obtaining valid credentials | ||||
|     2. phishing | ||||
|     3. exploiting remote vulnerabilities | ||||
|     4. external remote services (e.g. managed filetransfer services) | ||||
| 
 | ||||
| ## Categories | ||||
| 
 | ||||
| * **remote exploit**: attack a service listening on the network | ||||
| * **client-side exploit**: attack a client application that fetches content | ||||
|   from a server | ||||
| * **local privilege escalation exploit**: attack to gain higher privileges on | ||||
|   machine attacker is already on | ||||
|     * often not patched quickly as they're not considere critical | ||||
|     * various types | ||||
|         * race conditions | ||||
|         * kernel exploits | ||||
|         * local exploit of high-privileged program or service | ||||
| * hardware and firmware exploits | ||||
| * cryptographic exploits | ||||
| 
 | ||||
| ### Client-side exploit | ||||
| 
 | ||||
| * wait for target user to access infected file on attacker-controller server | ||||
| * target machine opens connection with attacker | ||||
|     * doesn't get blocked by firewall | ||||
|     * requires user interaction to run client program | ||||
|     * usually requires privilege escalation | ||||
| * companies often wait too long to update software -> effective strategy | ||||
| * exploit kits | ||||
|     * sophisticated delivery method for malware | ||||
|     * can be rented as a SaaS | ||||
|     * automatically inspects host for vulnerabilities | ||||
|     * gate servers to only forward vulnerable hosts to infected page | ||||
| 
 | ||||
| #### Pentesting | ||||
| 
 | ||||
| * email campaign | ||||
|     * send phishing mails to employees and exploit those that click | ||||
|         * risk of going out of scope (e.g. forwarding the email) | ||||
|     * better: spear-phishing emails with links or attachments | ||||
|         * only register how many clicks happened | ||||
|         * use controller company user that clicks link on purpose to see if | ||||
|           exploit works | ||||
|         * combined this is a safer method that provides useful statistics | ||||
| * identify software used by company | ||||
|     1. ask target personnel | ||||
|     2. analyse metadata from documents | ||||
|     3. analyse cached DNS records | ||||
|     4. have target personnel surf to testing systems ([www.gotya.org]) | ||||
|     5. assume very popular software is used (Adobe Reader, Microsoft Office...) | ||||
|     6. let personnel run software inventory tool | ||||
| * important to use representative machine | ||||
|     * don't use newly patched laptop | ||||
| 
 | ||||
| ## Metasploit | ||||
		Loading…
	
		Reference in New Issue