text stringlengths 0 1.99k |
|---|
A lot of information about the employees can be found here. The company's |
recruiters are the most likely to accept your connection requests. |
4) Data.com |
Previously known as jigsaw. They have contact information for many |
employees. |
5) File Metadata |
A lot of information about employees and their systems can be found in |
metadata of files the company has published. Useful tools for finding |
files on the company's website and extracting the metadata are metagoofil |
[1] and FOCA [2]. |
[1] https://github.com/laramies/metagoofil |
[2] https://www.elevenpaths.com/es/labstools/foca-2/index.html |
--[ 5 - Entering the network ]-------------------------------------------------- |
There are various ways to get a foothold. Since the method I used against |
Hacking Team is uncommon and a lot more work than is usually necessary, I'll |
talk a little about the two most common ways, which I recommend trying first. |
----[ 5.1 - Social Engineering ]------------------------------------------------ |
Social engineering, specifically spear phishing, is responsible for the |
majority of hacks these days. For an introduction in Spanish, see [1]. For |
more information in English, see [2] (the third part, "Targeted Attacks"). For |
fun stories about the social engineering exploits of past generations, see |
[3]. I didn't want to try to spear phish Hacking Team, as their whole business |
is helping governments spear phish their opponents, so they'd be much more |
likely to recognize and investigate a spear phishing attempt. |
[1] http://www.hacknbytes.com/2016/01/apt-pentest-con-empire.html |
[2] http://blog.cobaltstrike.com/2015/09/30/advanced-threat-tactics-course-and-notes/ |
[3] http://www.netcomunity.com/lestertheteacher/doc/ingsocial1.pdf |
----[ 5.2 - Buying Access ]----------------------------------------------------- |
Thanks to hardworking Russians and their exploit kits, traffic sellers, and |
bot herders, many companies already have compromised computers in their |
networks. Almost all of the Fortune 500, with their huge networks, have some |
bots already inside. However, Hacking Team is a very small company, and most |
of it's employees are infosec experts, so there was a low chance that they'd |
already been compromised. |
----[ 5.3 - Technical Exploitation ]-------------------------------------------- |
After the Gamma Group hack, I described a process for searching for |
vulnerabilities [1]. Hacking Team had one public IP range: |
inetnum: 93.62.139.32 - 93.62.139.47 |
descr: HT public subnet |
Hacking Team had very little exposed to the internet. For example, unlike |
Gamma Group, their customer support site needed a client certificate to |
connect. What they had was their main website (a Joomla blog in which Joomscan |
[2] didn't find anything serious), a mail server, a couple routers, two VPN |
appliances, and a spam filtering appliance. So, I had three options: look for |
a 0day in Joomla, look for a 0day in postfix, or look for a 0day in one of the |
embedded devices. A 0day in an embedded device seemed like the easiest option, |
and after two weeks of work reverse engineering, I got a remote root exploit. |
Since the vulnerabilities still haven't been patched, I won't give more |
details, but for more information on finding these kinds of vulnerabilities, |
see [3] and [4]. |
[1] http://pastebin.com/raw.php?i=cRYvK4jb |
[2] http://sourceforge.net/projects/joomscan/ |
[3] http://www.devttys0.com/ |
[4] https://docs.google.com/presentation/d/1-mtBSka1ktdh8RHxo2Ft0oNNlIp7WmDA2z9zzHpon8A |
--[ 6 - Be Prepared ]----------------------------------------------------------- |
I did a lot of work and testing before using the exploit against Hacking Team. |
I wrote a backdoored firmware, and compiled various post-exploitation tools |
for the embedded device. The backdoor serves to protect the exploit. Using the |
exploit just once and then returning through the backdoor makes it harder to |
identify and patch the vulnerabilities. |
The post-exploitation tools that I'd prepared were: |
1) busybox |
For all the standard Unix utilities that the system didn't have. |
2) nmap |
To scan and fingerprint Hacking Team's internal network. |
3) Responder.py |
The most useful tool for attacking windows networks when you have access to |
the internal network, but no domain user. |
4) Python |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.