Penetration Testing mailing list archives
Re: Best attack strategy for a Red Team?
From: "sr." <staticrez () gmail com>
Date: Fri, 13 Mar 2009 10:53:40 -0400
Hello, I would definitely not stop at just a scan. Get as much information about the target network as possible, including zone transfers (if you can), this increases your attack surface, increasing your chances of success. As for which machines to attack first, see what you can do with the boxes with outdated software on them. You'll have more of a chance there as well. And don't rule out scanning the linux machines for netbios ports. this can be overlooked sometimes. Samba has been known to be exploitable. fabrizio On Tue, Mar 10, 2009 at 11:33 AM, Scott <opiesan () gmail com> wrote:
Lol. Thanks Chip. I'm learning from everyone that cares to reply to my question. I've used MSF a number of times although I've never gone to the level of adding code from other sources. Sorry about the mention of Brian's post. I didn't notice that was a direct reply to me and not the list. More than the tools to use, I'm looking for recommendations on when you would choose to take one path over another. For example, I've run a scan on the network and found a few Windows workstations, a Win 2k3 server, and a linux based DNS server. If I were coming in cold without the scan information and found the DNS server, I would try to do a zone transfer of the domain info to gain more insight into what systems the target network has. Since I have the scan data though, would you still probe the DNS data to gain any additional information or would you move on? Would you target the Windows machines or the linux box first? I assume that depends on the OS/Patch versions you've been able to determine so that you'd try to find the weakest point first and start there. I don't expect an exhaustive list of if/then scenarios since that would be too much to ask from anyone. I'm more looking for tried and true guidelines or recommended approaches that might be high level but keep the process moving. If that's unrealistic given the nature of pen testing that would be helpful to know as well. I'm tired of hearing the term "best practices" but that's along the lines of what I was thinking. Scott On Tue, Mar 10, 2009 at 10:11 AM, Chip Panarchy <forumanarchy () gmail com> wrote:Ah, you want education. Hacking=Learning not Hacking=Destroying !!! Okay, can't see Brian's post...SNIPAnyways, back on the topic of exploiting, the easiest (free) way to Exploit is; Metasploit (Use milw0rm to search for exploits, then Metasploit to perform the exploits) Very simple once you understand the idea. Others will probably be of more help. Though hopefully you would've learnt from conversing with me. Panarchy On Wed, Mar 11, 2009 at 12:41 AM, Scott <opiesan () gmail com> wrote:Thanks for the feedback Chris. The only problem with this approach stems from what Brian mentioned above. The goal isn't to destroy the student teams' systems because all that really teaches you is how to reinstall HW/SW. Consider it the softer side of attacking a system where we're supposed to get in and disable services, maintain access through installed backdoors, and generally exploit whatever vulnerabilities we can. Afterwards we go through a detailed debriefing with the student teams explaining the areas they were weak and strong so they can benefit from the experience gained on both sides of the fence. Some examples of past attacks were to compromise the VOIP server and reroute the team phones to the phone we had so that we could intercept their business inject calls. We later offered to "fix" their phones in exchange for 5 minutes of root access on one of their systems. Some of them turned us into the LE reps that were working in the game, some just flat out denied the offer. Another example was installing a program that, when launched, made it look like the computer was installing Windows ME on top of their Win 2k3 server. Those were the fun ones to watch and everyone got a laugh about it later while still learning something. This is an educational game that let's both sides get a taste of the real thing but through a controlled environment. As attackers we're learning as much as the students. Scott On Tue, Mar 10, 2009 at 7:42 AM, Chip Panarchy <forumanarchy () gmail com> wrote:Hi Sounds like fun. Since you say that you are the least experienced, go for the unexpected. Once again, I must promote the use of Neodymium Magnets. These are very small magnets, that have the same power has industrial magnets (very cheap). So if you want to, destroy there network, the above way will do the most damage, with the least chance of them knowing the method used. Maybe go for a bit of Social Engineering, or as I prefer to call it, Industrial Espionage. This could involve distracting them for a little while then placing some Neodymium Magnets under the desk where they have there laptop, Computer or Server running. Nice and simple, and you'd be thinking outside the square. Good Luck! Panarchy On Tue, Mar 10, 2009 at 4:55 AM, Scott <opiesan () gmail com> wrote:Howdy folks! I'm part of a Red Team for the Mid-Atlantic region CCDC competition (Collegiate Cyber Defense Competition). There are some pretty talented folks on the team and I'm arguably the least experienced (for now). The short version explanation is that teams of college students are tasked with operating and defending a "corporate" network of systems ranging from web, email, DB, MS Domain servers, VoIP, and normal workstations. They have to patch a wide variety of holes while keeping designated services available for scoring. The team with the most uptime wins. Meanwhile, the red team is busy attacking these services along with anything else we can get into and create havoc for the student teams. My question to all of you is what you would recommend for an attack strategy here. In previous competitions it's been challenging to know where to start as there are many options. Should I find a hole and dig in with backdoors, create new user accounts, take over the admin accounts and lock out the student teams??? Technically the red team is supposed to bring down or deny access to the services the students are scored on (primary objective). There's always more going than that however. I'd like to stay focused when we go into the 3 day event this month so I need a plan. How would you do it if you didn't know more than possibly what types of systems you'll find on the target networks? Thanks. Scott
Current thread:
- Best attack strategy for a Red Team? Scott (Mar 10)
- Message not available
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Re: Best attack strategy for a Red Team? Mike Acker (Mar 15)
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Message not available
- Message not available
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Message not available
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Re: Best attack strategy for a Red Team? sr. (Mar 15)
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Re: Best attack strategy for a Red Team? Adriel T. Desautels (Mar 12)
- Message not available
- Re: Best attack strategy for a Red Team? Adriel T. Desautels (Mar 15)
- <Possible follow-ups>
- Re: Best attack strategy for a Red Team? vijay . upadhyaya (Mar 12)
- Re: Best attack strategy for a Red Team? krymson (Mar 12)