deel ch04
parent
a6b2734b12
commit
bfcfd4f8d7
|
@ -0,0 +1,72 @@
|
|||
# Exploitation
|
||||
|
||||
* **exploit**: code or technique that a threat uses to take advantage of a
|
||||
vulnerability
|
||||
* why exploitation?
|
||||
1. validating vulnerabilities
|
||||
2. assess impact
|
||||
3. prioritise fixes to vulnerabilities that can exploited
|
||||
4. test incident response
|
||||
5. exploited machine can work as pivot point
|
||||
* risks
|
||||
* system downtime
|
||||
* system disruption
|
||||
* data loss
|
||||
* general bad things
|
||||
* always verify exploit is allowed by Rules of Engagement
|
||||
* most frequent initial access vectors
|
||||
1. valid account usage, e.g. obtaining valid credentials
|
||||
2. phishing
|
||||
3. exploiting remote vulnerabilities
|
||||
4. external remote services (e.g. managed filetransfer services)
|
||||
|
||||
## Categories
|
||||
|
||||
* **remote exploit**: attack a service listening on the network
|
||||
* **client-side exploit**: attack a client application that fetches content
|
||||
from a server
|
||||
* **local privilege escalation exploit**: attack to gain higher privileges on
|
||||
machine attacker is already on
|
||||
* often not patched quickly as they're not considere critical
|
||||
* various types
|
||||
* race conditions
|
||||
* kernel exploits
|
||||
* local exploit of high-privileged program or service
|
||||
* hardware and firmware exploits
|
||||
* cryptographic exploits
|
||||
|
||||
### Client-side exploit
|
||||
|
||||
* wait for target user to access infected file on attacker-controller server
|
||||
* target machine opens connection with attacker
|
||||
* doesn't get blocked by firewall
|
||||
* requires user interaction to run client program
|
||||
* usually requires privilege escalation
|
||||
* companies often wait too long to update software -> effective strategy
|
||||
* exploit kits
|
||||
* sophisticated delivery method for malware
|
||||
* can be rented as a SaaS
|
||||
* automatically inspects host for vulnerabilities
|
||||
* gate servers to only forward vulnerable hosts to infected page
|
||||
|
||||
#### Pentesting
|
||||
|
||||
* email campaign
|
||||
* send phishing mails to employees and exploit those that click
|
||||
* risk of going out of scope (e.g. forwarding the email)
|
||||
* better: spear-phishing emails with links or attachments
|
||||
* only register how many clicks happened
|
||||
* use controller company user that clicks link on purpose to see if
|
||||
exploit works
|
||||
* combined this is a safer method that provides useful statistics
|
||||
* identify software used by company
|
||||
1. ask target personnel
|
||||
2. analyse metadata from documents
|
||||
3. analyse cached DNS records
|
||||
4. have target personnel surf to testing systems ([www.gotya.org])
|
||||
5. assume very popular software is used (Adobe Reader, Microsoft Office...)
|
||||
6. let personnel run software inventory tool
|
||||
* important to use representative machine
|
||||
* don't use newly patched laptop
|
||||
|
||||
## Metasploit
|
Loading…
Reference in New Issue