Feasibility and Deployment of Bad USB Stella Vouteva, System and - - PowerPoint PPT Presentation

feasibility and deployment of bad usb
SMART_READER_LITE
LIVE PREVIEW

Feasibility and Deployment of Bad USB Stella Vouteva, System and - - PowerPoint PPT Presentation

Feasibility and Deployment of Bad USB Stella Vouteva, System and Network Engineering Master research project University of Amsterdam Introduction Main elements of security Social Engineering Bad USB Goals Run attack(s) in less


slide-1
SLIDE 1

Feasibility and Deployment

  • f Bad USB

Stella Vouteva, System and Network Engineering Master research project University of Amsterdam

slide-2
SLIDE 2

Introduction

 Main elements of security  Social Engineering  Bad USB

slide-3
SLIDE 3

Goals

 Run attack(s) in less than 10 seconds  Attacks should work on user without admin rights  Download an executable that can bypass Windows UAC and AV programs and run it  Obtain access to the compromised device from a Kali Linux machine  Installation of a root certificate on the Windows machine  Add a backdoor

slide-4
SLIDE 4

Tools

 Arduino  Victim #1: Lenovo Z50-70 laptop with Windows 8.1  Victim #2: Windows 7 Ultimate VM  Kali Linux machine

slide-5
SLIDE 5

Endpoint security circumvention

 Time benefits  Confidentiality  Integrity  Availability

slide-6
SLIDE 6

Feasibility requirements

 'Typed' without human or mouse intervention  Timing  Assumptions  Security threat considerations

slide-7
SLIDE 7

Logon bypass on locked computers

 Kon Boot  Recovery disk/ Advanced options  Booting from another OS  Feasibility

slide-8
SLIDE 8

Unlocked computers exploitation

 File Download

 FTP, HTTP, SFTP?

 Bypass UAC and AV

 Veil-Evasion

 Remote access

 MSFVenom  Payloads

 Privilege escalation  MITM

 mitmproxy

 Keyloggers  Persistent backdoor  Feasibility

slide-9
SLIDE 9

Scenario

 Preparation

 Create an .exe file using Veil-Evasion

 AES encryption  MSFVenom  Reverse TCP

 Allow SSH to the Kali machine

 Execution on the victim computer

 Plug the Arduino

 Kali Linux machine attacks

 Persistent backdoor  Bypass UAC  Keylogger  Migrate process

slide-10
SLIDE 10
slide-11
SLIDE 11

Conclusion

 Feasible for unlocked computers (with limitations)  Unfeasible for bypassing login screen

slide-12
SLIDE 12

Questions