PENTEST PREPPERS
WHOAMI
• Beau Bullock
• Pentester at Black Hills
Information Security
• OSCP, OSWP, GPEN,
GCIH, GCFA, and GSEC
• Previously an enterprise
defender
• Blogger
• Guitarist/Audio Engineer
• Homebrewer
BACKGROUND
• Privilege escalation has
been too easy
• No detection
• Unprivileged user to DA in <
60 seconds = Pentest
Apocalypse
• Fix the common issues and
low hanging fruit first
• Who needs a zero-day?
WHAT ARE YOU BUYING?
• Penetration test vs.
vulnerability
assessment
• If your scanner
results look like this
you don’t need a
pentest.
VULNERABILITY ASSESSMENT
• Help identify low-hanging fruit
• Typically broader in scope
• Locate and identify assets
• Opportunity to tune detection
devices
• Helps an organization
improve overall security
posture
PENETRATION TEST
• Goal driven
• Targeted escalation tactics
• Typically try to avoid
detection
• Can your security posture
withstand an advanced
attacker?
LET’S TALK ABOUT SOME COMMON
ISSUES
10 COMMON ISSUES
• 1. Missing Patches
• 2. Group Policy Preference Passwords
• 3. Widespread Local Administrator Accounts
• 4. Weak Password Policy
• 5. Overprivileged Users (admin of local host)
• 6. Overprivileged Users (admin of other hosts)
• 7. Sensitive Files on Shares
• 8. Information Disclosure on Intranet Sites
• 9. NetBIOS and LLMNR Poisoning
• 10. Local Workstation Privilege Escalation
PATCHES
• MS08-067
• MS14-068
• PsExec Patch
• ColdFusion Patches
• ShellShock
• Heartbleed
PATCHES WON’T FIX EVERYTHING
GROUP POLICY PREFERENCES (GPP)
• Extensions of Active Directory
• Configurable settings for use
with Group Policy Objects
• Advanced settings for folders,
mapped drives, and printers.
• Deploy applications
• Create a local administrator
account
http://www.dannyeckes.com/create-local-admin-group-policy-gpo/
GPP (CONTINUED)
• May 13, 2014 – MS14-025
• Passwords of accounts set by
GPP are trivially decrypted!
• …by ANY authenticated user
on the domain
• Located in groups.xml file on
SYSVOL
https://msdn.microsoft.com/en-us/library/2c15cbf0-f086-4c74-8b70-1f2fa45dd4be.aspx
http://blogs.technet.com/b/srd/archive/2014/05/13/ms14-025-an-update-for-group-policy-preferences.aspx
https://dirteam.com/sander/2014/05/23/security-thoughts-passwords-in-group-policy-preferences-cve-2014-1812/
GPP (WHAT DOES THE PATCH DO?)
• MS14-025 removes the ability
to create local accounts with
GPP
• Doesn’t remove previous
entries!
• You need to manually delete
these accounts
GPP (SUMMARY)
• First thing I check for on an
internal assessment
• Almost always find an admin
password here
• Find it with:
• PowerSploit - Get-GPPPassword
• Metasploit GPP Module
• Or…
C:>findstr /S cpassword %logonserver%sysvol*.xml
https://github.com/mattifestation/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1
http://www.rapid7.com/db/modules/post/windows/gather/credentials/gpp
WIDESPREAD LOCAL ADMINISTRATOR ACCOUNT
• Makes it easy to pivot from workstation to workstation
• Using creds found via GPP:
• SMB_Login Metasploit Module
http://www.rapid7.com/db/modules/auxiliary/scanner/smb/smb_login
WIDESPREAD LOCAL ADMIN (CONTINUED)
• What’s next?
• Hunt for Domain Admins –
JoeWare NetSess, Veil-PowerView
UserHunter
• PsExec_psh Metasploit Module
• RDP?
• If we don’t have cleartext
creds:
• Pass-the-hash
http://www.joeware.net/freetools/tools/netsess/index.htm
https://www.veil-framework.com/hunting-users-veil-framework/
http://www.rapid7.com/db/modules/exploit/windows/smb/psexec_psh
PASSWORDS
• Default Passwords
• admin:admin
• tomcat:tomcat
• Pwnedlist
• Credentials from previous data
breaches
• Default 8 character password
policy?
• Password spraying
http://splashdata.com/press/worst-passwords-of-2014.htm
PASSWORD SPRAYING
• Domain locks out accounts after
a certain number of failed logins
• Can’t brute force a single users
password
• Solution:
• Try a number of passwords
less than the domain lockout
policy against EVERY
account in the domain
PASSWORD SPRAYING (CONTINUED)
• Lockout Policy = Threshold of
five
• Let’s try three or four passwords
• What passwords do we try?
• Password123
• Companyname123
• Etc.
@FOR /F %n in (users.txt) DO @FOR /F %p in (pass.txt) DO @net use
DOMAINCONTROLLERIPC$ /user:DOMAIN%n %p 1>NUL 2>&1 && @echo [*]
%n:%p && @net use /delete DOMAINCONTROLLERIPC$ > NUL
http://www.lanmaster53.com/
https://github.com/lukebaggett/powerspray
PASSWORD SPRAYING (CONTINUED)
PASSWORDS (CONTINUED)
• Increase password length
• Don’t make ridiculous policies
• Remember…
correcthorsebatterystaple
• Check PwnedList
• Password spray
http://xkcd.com/936/
OVERPRIVILEGED USERS
• Are your standard users
already local admins?
• This takes out a major
step of privilege escalation
• Only grant admin access
where necessary, not
globally
OVERPRIVILEGED USERS (OTHER HOSTS)
• Scenario:
• Unprivileged user wants to run
some software on their system
• User calls helpdesk
• Helpdesk attempts to get it
working for the user
• Fails
• Decides adding “Domain Users”
group to the local administrators
group is a good idea
OVERPRIVILEGED USERS (OTHER HOSTS)
• This means EVERY domain user is now is an administrator of
that system
• Veil-PowerView Invoke-FindLocalAdminAccess
• Veil-PowerView Invoke-ShareFinder
http://www.harmj0y.net/blog/penetesting/finding-local-admin-with-the-veil-framework/
WHAT INFORMATION CAN YOU LEARN FROM
USERS ON THE NETWORK?
FILES ON SHARES
• Sensitive files on shares?
• Find them with more PowerView
awesomeness…
• Use list generated by
ShareFinder with FileFinder
• FileFinder will find files with the
following strings in their title:
• ‘*pass*’, ‘*sensitive*’, ‘*admin*’,
‘*secret*’, ‘*login*’,
‘*unattend*.xml’, ‘*.vmdk’,
‘*creds*’, or ‘*credential*’
https://www.veil-framework.com/hunting-sensitive-data-veil-framework/
INFORMATION DISCLOSURE ON INTRANET
• Knowledge Bases are helpful
to employees… and attackers
• Helpdesk tickets
• How-to articles
• Emails
• Search functionality is our
best friend
• Search for <insert critical
infrastructure name, sensitive data
type, or ‘password’>
NETBIOS AND LLMNR POISONING
• LLMNR = Link-Local Multicast Name Resolution
• NBT-NS = NetBIOS over TCP/IP Name Service
• Both help hosts identify each other when DNS fails
http://www.sternsecurity.com/blog/local-network-attacks-llmnr-and-nbt-ns-poisoning
NETBIOS AND LLMNR (CONTINUED)
• SpiderLabs Responder
• Poisons NBT-NS and LLMNR
• The result is we obtain NTLM challenge/response hashes
• Crack hashes
https://github.com/Spiderlabs/Responder
https://www.trustwave.com/Resources/SpiderLabs-Blog/Introducing-Responder-1-0/
LOCAL WORKSTATION PRIVILEGE ESCALATION
• PowerUp!
• Another awesome Veil tool
• Invoke-AllChecks looks for potential privilege escalation vectors
http://www.verisgroup.com/2014/06/17/powerup-usage/
SUMMARY (10 COMMON ISSUES)
• 1. Missing Patches
• 2. Group Policy Preference Passwords
• 3. Widespread Local Administrator Accounts
• 4. Weak Password Policy
• 5. Overprivileged Users (admin of local host)
• 6. Overprivileged Users (admin of other hosts)
• 7. Sensitive Files on Shares
• 8. Information Disclosure on Intranet Sites
• 9. NetBIOS and LLMNR Poisoning
• 10. Local Workstation Privilege Escalation
NOW TO PREP YOUR PENTEST BUG OUT BAG
TUNE DETECTION DEVICES
• Test your network security
devices prior to a pentest for
common pentester activities
• Meterpreter shells
• Portscans
• Password spraying
PERFORM EGRESS FILTERING
• Block outbound access
except where needed
• Implement an authenticated
web proxy and force all web
traffic through it
THINGS THAT MAKE OUR JOB HARD
• Application Whitelisting
• Disabling PowerShell
• Network Access Control
• Network segmentation
• Fixing the items mentioned
earlier
THINGS NOT TO DO DURING A PENTEST
• Inform your teams that the
test is happening
• Monitor, but don’t interfere during
a pentest
• Enforce different policies on
the pentester than “normal”
users
• Alert users to an upcoming
phishing test
PENTEST PREPARATION GUIDE
PENTEST PREP GUIDE
• May help organizations
prepare for an upcoming
penetration test
• Details of the 10 issues I
talked about today
• How to identify
• How to remediate
CHECKLIST!
DOWNLOAD HERE
http://bit.ly/1FF33nH
QUESTIONS?
• Contact me
• Personal - beau@dafthack.com
• Work – beau@blackhillsinfosec.com
• Twitter - @dafthack
• Blog – www.dafthack.com

More Related Content

PDF
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
PPTX
Pentest Apocalypse - SANSFIRE 2016 Edition
PPTX
Pwning the Enterprise With PowerShell
PPTX
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
PPTX
A Google Event You Won't Forget
PPTX
Red Team Apocalypse
PPTX
How to Build Your Own Physical Pentesting Go-bag
PPTX
OK Google, How Do I Red Team GSuite?
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Pentest Apocalypse - SANSFIRE 2016 Edition
Pwning the Enterprise With PowerShell
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
A Google Event You Won't Forget
Red Team Apocalypse
How to Build Your Own Physical Pentesting Go-bag
OK Google, How Do I Red Team GSuite?

What's hot (20)

PPTX
Red Team Apocalypse (RVAsec Edition)
PPTX
Getting Started in Pentesting the Cloud: Azure
PPTX
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
PDF
Security vulnerabilities decomposition
PDF
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
PPTX
Offensive Python for Pentesting
PDF
Shopify’s $25k Bug Report, and the Cluster Takeover That Didn’t Happen
PDF
Red Team Tactics for Cracking the GSuite Perimeter
PDF
Attacker's Perspective of Active Directory
PDF
Fade from Whitehat... to Black
PDF
Lares from LOW to PWNED
PPTX
BSIDES-PR Keynote Hunting for Bad Guys
PDF
OAuth 2.0 Security Reinforced
PPTX
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
PPTX
External to DA, the OS X Way
PDF
Top Security Challenges Facing Credit Unions Today
PPTX
Automating Attacks Against Office365 - BsidesPDX 2016
PDF
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
PDF
All You Need is One - A ClickOnce Love Story - Secure360 2015
PDF
Attack All the Layers - What's Working in Penetration Testing
Red Team Apocalypse (RVAsec Edition)
Getting Started in Pentesting the Cloud: Azure
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
Security vulnerabilities decomposition
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
Offensive Python for Pentesting
Shopify’s $25k Bug Report, and the Cluster Takeover That Didn’t Happen
Red Team Tactics for Cracking the GSuite Perimeter
Attacker's Perspective of Active Directory
Fade from Whitehat... to Black
Lares from LOW to PWNED
BSIDES-PR Keynote Hunting for Bad Guys
OAuth 2.0 Security Reinforced
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
External to DA, the OS X Way
Top Security Challenges Facing Credit Unions Today
Automating Attacks Against Office365 - BsidesPDX 2016
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
All You Need is One - A ClickOnce Love Story - Secure360 2015
Attack All the Layers - What's Working in Penetration Testing
Ad

Similar to Pentest Apocalypse (20)

PPTX
Заполучили права администратора домена? Игра еще не окончена
PDF
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PPTX
System hardening - OS and Application
PPT
Blog World 2010 - How to Keep Your Blog from Being Hacked
PDF
Metasploitation part-1 (murtuja)
PDF
Defcon 25 Packet Hacking Village - Finding Your Way to Domain Access
PPTX
Facing enterprise specific challenges – utility programming in hadoop
PDF
SQL Server Clustering for Dummies
PPTX
Securing Windows with Group Policy
PDF
WordPress Server Security
PPTX
Elite Bug Squashing
PDF
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
PDF
Releasing To Production Every Week India
PPTX
Breadcrumbs to Loaves: BSides Austin '17
PDF
Smart Platform Infrastructure with AWS
PPTX
PowerShell - Be A Cool Blue Kid
PDF
20111110 how puppet-fits_into_your_existing_infrastructure_and_change_managem...
PPTX
Why internal pen tests are still fun
PDF
Harnessing the Power of AI in AWS Pentesting.pdf
PPTX
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
Заполучили права администратора домена? Игра еще не окончена
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
System hardening - OS and Application
Blog World 2010 - How to Keep Your Blog from Being Hacked
Metasploitation part-1 (murtuja)
Defcon 25 Packet Hacking Village - Finding Your Way to Domain Access
Facing enterprise specific challenges – utility programming in hadoop
SQL Server Clustering for Dummies
Securing Windows with Group Policy
WordPress Server Security
Elite Bug Squashing
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Releasing To Production Every Week India
Breadcrumbs to Loaves: BSides Austin '17
Smart Platform Infrastructure with AWS
PowerShell - Be A Cool Blue Kid
20111110 how puppet-fits_into_your_existing_infrastructure_and_change_managem...
Why internal pen tests are still fun
Harnessing the Power of AI in AWS Pentesting.pdf
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
Ad

Recently uploaded (20)

PDF
Five Habits of High-Impact Board Members
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Architecture types and enterprise applications.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
The various Industrial Revolutions .pptx
Five Habits of High-Impact Board Members
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Comparative analysis of machine learning models for fake news detection in so...
A review of recent deep learning applications in wood surface defect identifi...
OpenACC and Open Hackathons Monthly Highlights July 2025
Final SEM Unit 1 for mit wpu at pune .pptx
Getting started with AI Agents and Multi-Agent Systems
Taming the Chaos: How to Turn Unstructured Data into Decisions
Basics of Cloud Computing - Cloud Ecosystem
Architecture types and enterprise applications.pdf
Build Your First AI Agent with UiPath.pptx
Convolutional neural network based encoder-decoder for efficient real-time ob...
sustainability-14-14877-v2.pddhzftheheeeee
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
UiPath Agentic Automation session 1: RPA to Agents
Improvisation in detection of pomegranate leaf disease using transfer learni...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Consumable AI The What, Why & How for Small Teams.pdf
The various Industrial Revolutions .pptx

Pentest Apocalypse

  • 2. WHOAMI • Beau Bullock • Pentester at Black Hills Information Security • OSCP, OSWP, GPEN, GCIH, GCFA, and GSEC • Previously an enterprise defender • Blogger • Guitarist/Audio Engineer • Homebrewer
  • 3. BACKGROUND • Privilege escalation has been too easy • No detection • Unprivileged user to DA in < 60 seconds = Pentest Apocalypse • Fix the common issues and low hanging fruit first • Who needs a zero-day?
  • 4. WHAT ARE YOU BUYING? • Penetration test vs. vulnerability assessment • If your scanner results look like this you don’t need a pentest.
  • 5. VULNERABILITY ASSESSMENT • Help identify low-hanging fruit • Typically broader in scope • Locate and identify assets • Opportunity to tune detection devices • Helps an organization improve overall security posture
  • 6. PENETRATION TEST • Goal driven • Targeted escalation tactics • Typically try to avoid detection • Can your security posture withstand an advanced attacker?
  • 7. LET’S TALK ABOUT SOME COMMON ISSUES
  • 8. 10 COMMON ISSUES • 1. Missing Patches • 2. Group Policy Preference Passwords • 3. Widespread Local Administrator Accounts • 4. Weak Password Policy • 5. Overprivileged Users (admin of local host) • 6. Overprivileged Users (admin of other hosts) • 7. Sensitive Files on Shares • 8. Information Disclosure on Intranet Sites • 9. NetBIOS and LLMNR Poisoning • 10. Local Workstation Privilege Escalation
  • 9. PATCHES • MS08-067 • MS14-068 • PsExec Patch • ColdFusion Patches • ShellShock • Heartbleed
  • 10. PATCHES WON’T FIX EVERYTHING
  • 11. GROUP POLICY PREFERENCES (GPP) • Extensions of Active Directory • Configurable settings for use with Group Policy Objects • Advanced settings for folders, mapped drives, and printers. • Deploy applications • Create a local administrator account http://www.dannyeckes.com/create-local-admin-group-policy-gpo/
  • 12. GPP (CONTINUED) • May 13, 2014 – MS14-025 • Passwords of accounts set by GPP are trivially decrypted! • …by ANY authenticated user on the domain • Located in groups.xml file on SYSVOL https://msdn.microsoft.com/en-us/library/2c15cbf0-f086-4c74-8b70-1f2fa45dd4be.aspx http://blogs.technet.com/b/srd/archive/2014/05/13/ms14-025-an-update-for-group-policy-preferences.aspx https://dirteam.com/sander/2014/05/23/security-thoughts-passwords-in-group-policy-preferences-cve-2014-1812/
  • 13. GPP (WHAT DOES THE PATCH DO?) • MS14-025 removes the ability to create local accounts with GPP • Doesn’t remove previous entries! • You need to manually delete these accounts
  • 14. GPP (SUMMARY) • First thing I check for on an internal assessment • Almost always find an admin password here • Find it with: • PowerSploit - Get-GPPPassword • Metasploit GPP Module • Or… C:>findstr /S cpassword %logonserver%sysvol*.xml https://github.com/mattifestation/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1 http://www.rapid7.com/db/modules/post/windows/gather/credentials/gpp
  • 15. WIDESPREAD LOCAL ADMINISTRATOR ACCOUNT • Makes it easy to pivot from workstation to workstation • Using creds found via GPP: • SMB_Login Metasploit Module http://www.rapid7.com/db/modules/auxiliary/scanner/smb/smb_login
  • 16. WIDESPREAD LOCAL ADMIN (CONTINUED) • What’s next? • Hunt for Domain Admins – JoeWare NetSess, Veil-PowerView UserHunter • PsExec_psh Metasploit Module • RDP? • If we don’t have cleartext creds: • Pass-the-hash http://www.joeware.net/freetools/tools/netsess/index.htm https://www.veil-framework.com/hunting-users-veil-framework/ http://www.rapid7.com/db/modules/exploit/windows/smb/psexec_psh
  • 17. PASSWORDS • Default Passwords • admin:admin • tomcat:tomcat • Pwnedlist • Credentials from previous data breaches • Default 8 character password policy? • Password spraying http://splashdata.com/press/worst-passwords-of-2014.htm
  • 18. PASSWORD SPRAYING • Domain locks out accounts after a certain number of failed logins • Can’t brute force a single users password • Solution: • Try a number of passwords less than the domain lockout policy against EVERY account in the domain
  • 19. PASSWORD SPRAYING (CONTINUED) • Lockout Policy = Threshold of five • Let’s try three or four passwords • What passwords do we try? • Password123 • Companyname123 • Etc. @FOR /F %n in (users.txt) DO @FOR /F %p in (pass.txt) DO @net use DOMAINCONTROLLERIPC$ /user:DOMAIN%n %p 1>NUL 2>&1 && @echo [*] %n:%p && @net use /delete DOMAINCONTROLLERIPC$ > NUL http://www.lanmaster53.com/ https://github.com/lukebaggett/powerspray
  • 21. PASSWORDS (CONTINUED) • Increase password length • Don’t make ridiculous policies • Remember… correcthorsebatterystaple • Check PwnedList • Password spray http://xkcd.com/936/
  • 22. OVERPRIVILEGED USERS • Are your standard users already local admins? • This takes out a major step of privilege escalation • Only grant admin access where necessary, not globally
  • 23. OVERPRIVILEGED USERS (OTHER HOSTS) • Scenario: • Unprivileged user wants to run some software on their system • User calls helpdesk • Helpdesk attempts to get it working for the user • Fails • Decides adding “Domain Users” group to the local administrators group is a good idea
  • 24. OVERPRIVILEGED USERS (OTHER HOSTS) • This means EVERY domain user is now is an administrator of that system • Veil-PowerView Invoke-FindLocalAdminAccess • Veil-PowerView Invoke-ShareFinder http://www.harmj0y.net/blog/penetesting/finding-local-admin-with-the-veil-framework/
  • 25. WHAT INFORMATION CAN YOU LEARN FROM USERS ON THE NETWORK?
  • 26. FILES ON SHARES • Sensitive files on shares? • Find them with more PowerView awesomeness… • Use list generated by ShareFinder with FileFinder • FileFinder will find files with the following strings in their title: • ‘*pass*’, ‘*sensitive*’, ‘*admin*’, ‘*secret*’, ‘*login*’, ‘*unattend*.xml’, ‘*.vmdk’, ‘*creds*’, or ‘*credential*’ https://www.veil-framework.com/hunting-sensitive-data-veil-framework/
  • 27. INFORMATION DISCLOSURE ON INTRANET • Knowledge Bases are helpful to employees… and attackers • Helpdesk tickets • How-to articles • Emails • Search functionality is our best friend • Search for <insert critical infrastructure name, sensitive data type, or ‘password’>
  • 28. NETBIOS AND LLMNR POISONING • LLMNR = Link-Local Multicast Name Resolution • NBT-NS = NetBIOS over TCP/IP Name Service • Both help hosts identify each other when DNS fails http://www.sternsecurity.com/blog/local-network-attacks-llmnr-and-nbt-ns-poisoning
  • 29. NETBIOS AND LLMNR (CONTINUED) • SpiderLabs Responder • Poisons NBT-NS and LLMNR • The result is we obtain NTLM challenge/response hashes • Crack hashes https://github.com/Spiderlabs/Responder https://www.trustwave.com/Resources/SpiderLabs-Blog/Introducing-Responder-1-0/
  • 30. LOCAL WORKSTATION PRIVILEGE ESCALATION • PowerUp! • Another awesome Veil tool • Invoke-AllChecks looks for potential privilege escalation vectors http://www.verisgroup.com/2014/06/17/powerup-usage/
  • 31. SUMMARY (10 COMMON ISSUES) • 1. Missing Patches • 2. Group Policy Preference Passwords • 3. Widespread Local Administrator Accounts • 4. Weak Password Policy • 5. Overprivileged Users (admin of local host) • 6. Overprivileged Users (admin of other hosts) • 7. Sensitive Files on Shares • 8. Information Disclosure on Intranet Sites • 9. NetBIOS and LLMNR Poisoning • 10. Local Workstation Privilege Escalation
  • 32. NOW TO PREP YOUR PENTEST BUG OUT BAG
  • 33. TUNE DETECTION DEVICES • Test your network security devices prior to a pentest for common pentester activities • Meterpreter shells • Portscans • Password spraying
  • 34. PERFORM EGRESS FILTERING • Block outbound access except where needed • Implement an authenticated web proxy and force all web traffic through it
  • 35. THINGS THAT MAKE OUR JOB HARD • Application Whitelisting • Disabling PowerShell • Network Access Control • Network segmentation • Fixing the items mentioned earlier
  • 36. THINGS NOT TO DO DURING A PENTEST • Inform your teams that the test is happening • Monitor, but don’t interfere during a pentest • Enforce different policies on the pentester than “normal” users • Alert users to an upcoming phishing test
  • 38. PENTEST PREP GUIDE • May help organizations prepare for an upcoming penetration test • Details of the 10 issues I talked about today • How to identify • How to remediate
  • 41. QUESTIONS? • Contact me • Personal - [email protected] • Work – [email protected] • Twitter - @dafthack • Blog – www.dafthack.com