Got Citrix? Hack IT!Got Citrix? Hack IT!

16
Got Citrix? Hack IT! Got Citrix? Hack IT! Shanit Gupta August 7th, 2008

Transcript of Got Citrix? Hack IT!Got Citrix? Hack IT!

Page 1: Got Citrix? Hack IT!Got Citrix? Hack IT!

Got Citrix? Hack IT!Got Citrix? Hack IT!

Shanit GuptaAugust 7th, 2008

Page 2: Got Citrix? Hack IT!Got Citrix? Hack IT!

Who Am I?

► Principal Consultant – Foundstone Professional Services► Code Review / Threat Modeling / Application Security► Masters from Carnegie Mellon

Page 3: Got Citrix? Hack IT!Got Citrix? Hack IT!

Agenda

► Background► Background► Demo 1: Kiosk Mode► Demo 2: Unauthenticated Access► Demo 2: Unauthenticated Access ► Demo 3: (Un)Hidden Hotkeys► Demo 4: Restricted Desktop Access► Demo 4: Restricted Desktop Access► Demo 5: Attack Microsoft Office► Remediation Measures► Remediation Measures

Page 4: Got Citrix? Hack IT!Got Citrix? Hack IT!

False Sense of Security

Page 5: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo1: Kiosk Mode

Page 6: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo1: Kiosk Mode (Attack Vectors)

► Ctrl + h – View History► Ctrl h View History► Ctrl + n – New Browser► Shift + Left Click – New Browser► Shift + Left Click New Browser ► Ctrl + o – Internet Address (browse feature)► Ctrl + p Print (to file)► Ctrl + p – Print (to file) ► Right Click (Shift + F10)

Save Image AsSave Image AsView Source

► F1 – Jump to URL► F1 Jump to URL…► Browse to http://download.insecure.org/nmap/dist/nmap-

4.53-setup.exe

Page 7: Got Citrix? Hack IT!Got Citrix? Hack IT!

I Hope You Are Patching ☺

*Source: http://secunia.com

Page 8: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo 2: Unauthenticated Access

► 9 publicly accessible exploits 2007 – 08► 9 publicly accessible exploits 2007 08 ► Particularly interesting

Citrix Presentation Server IMA Service BufferCitrix Presentation Server IMA Service Buffer Overflow VulnerabilitySocial Engineering: Malicious ICA files

Page 9: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo 2: Unauthenticated Access

► Good Old Brute Force► Good Old Brute ForceOne account is all you need I am sure you are using 2 factor authentication ;-)y g )

Page 10: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo3: (Un)Hidden Hotkeys

► SHIFT+F1: Local Task List► SHIFT+F2: Toggle Title Bar ► SHIFT+F3: Close Remote Application► CTRL+F1: Displays Windows Security Desktop –

Ctrl+Alt+Del► CTRL+F2: Remote Task List► CTRL+F2: Remote Task List ► CTRL+F3: Remote Task Manager – Ctrl+Shift+ESC► ALT+F2: Cycle through programs► ALT+F2: Cycle through programs ► ALT+PLUS: Alt+TAB► ALT+MINUS: ALT+SHIFT+TAB

Page 11: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo4: Restricted Desktop

Page 12: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo4: Restricted Desktop

►Shortcut to C:\►Shortcut to C:\►Create Batch File

CMD.exeCMD.exe►Host Scripting File (filename.vbs)

■ Set objApp = CreateObject("WScript.Shell")j pp j ( p )■ objApp.Run “CMD C:\“

Page 13: Got Citrix? Hack IT!Got Citrix? Hack IT!

Demo5: Attack Microsoft Office

►File->Save As►File Save As Browse Files and Launch CMD.exe

►Press F1►Press F1 Search Microsoft Click Suites Home Page

► Macros Remote ShellPrivilege Escalation

Page 14: Got Citrix? Hack IT!Got Citrix? Hack IT!

Remediation Strategies

► 1300 different registry settings► It is HARD!

Page 15: Got Citrix? Hack IT!Got Citrix? Hack IT!

Remediation Strategies

► Lock Down Tools► Lock Down ToolsCommercial Freewarehttp://updates.zdnet.com/tags/lockdown.html

Page 16: Got Citrix? Hack IT!Got Citrix? Hack IT!

Questions or Concerns?