CRYTON BREACH AND ATTACK SIMULATION Thursday 4 th October, 2018 Ivo - - PowerPoint PPT Presentation

cryton
SMART_READER_LITE
LIVE PREVIEW

CRYTON BREACH AND ATTACK SIMULATION Thursday 4 th October, 2018 Ivo - - PowerPoint PPT Presentation

CRYTON BREACH AND ATTACK SIMULATION Thursday 4 th October, 2018 Ivo Nutr Outline Breach & Attack Simulation Cryton Cryton Page 2 / 22 About me Where I work CSIRT-MU KYPO What I Do Cryton B&S Penetration testing CyberEx GT/RT


slide-1
SLIDE 1

CRYTON

BREACH AND ATTACK SIMULATION

Thursday 4th October, 2018

Ivo Nutár

slide-2
SLIDE 2

Outline

Breach & Attack Simulation Cryton

Cryton Page 2 / 22

slide-3
SLIDE 3

About me

Where I work

CSIRT-MU KYPO

What I Do

Cryton B&S Penetration testing CyberEx GT/RT

http://a.openalt.cz/33

Cryton Page 3 / 22

slide-4
SLIDE 4

Terminology

Comparison Vulnerability Scanning

Low hanging fruits False positives Cheap

Penetration Testing

Real attacker tools Depends on tester’s skill Once in a while/once a year/ ... External

Red Teaming

Pentest + social engineering, physical attacks ... Silent, aims to also test detection capabilities May be also internal Skilled personnel

Cryton Page 4 / 22

slide-5
SLIDE 5

Breach & Attack Simulation

Cryton Page 5 / 22

slide-6
SLIDE 6

Breach & Attack Simulation

According to Gartner, "BAS tools simulate a broad range of malicious activities (including attacks that would circumvent their current controls), enabling customers to determine the current state of their security posture." Gartner also granted the first patent for BAS to tool SafeBreach. Automatization of Killchain to: Detect soft spots Test detection systems Train blue teams https://www.esecurityplanet.com/threats/ breach-and-attack-simulation.html

Cryton Page 6 / 22

slide-7
SLIDE 7

Breach & Attack Simulation

Figure: Cyber Kill Chain by Lockheed Martin

Cryton Page 7 / 22

slide-8
SLIDE 8

Turn this ...

Cryton Page 8 / 22

slide-9
SLIDE 9

... into this

Cryton Page 9 / 22

slide-10
SLIDE 10

B&S tools

Open source Metta

Uber Local execution MITRE attack matrix

DumpsterFire

"Security Incidents In A Box!" Local execution Simulate infected hosts

APTSimulator

...

Commercial AttackIQ, Cymulate, Safebreach, ThreatCare ... https://www.esecurityplanet.com/threats/ breach-and-attack-simulation.html

Cryton Page 10 / 22

slide-11
SLIDE 11

Cryton

Cryton Page 11 / 22

slide-12
SLIDE 12

Cryton

Description Cryton is being developed at CSIRT-MU as a part of KYPO project. It’s

  • riginal objective was to automate some of Red Team tasks during

CyberEx. Create JSON/YAML describing attack scenario Feed to Cryton Execute Wait... Read report Original thesis on https://is.muni.cz/th/cry3j/

Cryton Page 12 / 22

slide-13
SLIDE 13

Cryton

Attack scenario Plan - Stage - Step Plan has a start time Stage has a delta (diff from plan start time) Steps are organized into attack trees

Successors based on success or string result Execution of attack module

Sessions management (using msfrpc) Various attributes

Cryton Page 13 / 22

slide-14
SLIDE 14

Cryton

Plan Plan contains a description of whole attack scenario. Name Owner (optional) Start time (optional) Slave List of Stages

Cryton Page 14 / 22

slide-15
SLIDE 15

Cryton

Stage One logical part of attack scenario, typically oriented on one specific target. Name Delta (optional) Target (optional) Slave List of Steps

Cryton Page 15 / 22

slide-16
SLIDE 16

Cryton

Step Step in context of Cryton is an execution of attack module. It might be a nmap scan, vuln scanner run or a metasploit module execution. Name Action (optional) List of Successors (optional) Target (optional) Slave

Cryton Page 16 / 22

slide-17
SLIDE 17

Cryton

Session management Heavily depends on Metasploit framework msfrpcd + pyMetasploit Can create and use sessions

create_session use_session vs use_named_session

Shared throughout the Plan

Cryton Page 17 / 22

slide-18
SLIDE 18

Cryton

Slaves

Figure: Master - Slave

Cryton Page 18 / 22

slide-19
SLIDE 19

Cryton

Attack scenario

Figure: Example topology

Cryton Page 19 / 22

slide-20
SLIDE 20

Cryton

Attack scenario Example

Cryton Page 20 / 22

slide-21
SLIDE 21

Cryton

Execution Example

Cryton Page 21 / 22

slide-22
SLIDE 22

THANK YOU

https://csirt.muni.cz/

Ivo Nutár

@csirtmu nutar@ics.muni.cz