Penetration Testing mailing list archives

Re: Best attack strategy for a Red Team?


From: "Adriel T. Desautels" <ad_lists () netragard com>
Date: Thu, 12 Mar 2009 19:50:59 -0400

Really,
Ok then, all you evil blackhat hackers, why don't you share all of your information with us defenders so that we can protect against your ohday!

        See the point now?  ;)

On Mar 12, 2009, at 6:44 PM, Mike Acker wrote:

Adriel,

No offence but I don't see the point... Defenders should
have access to the same information that attackers do. I
say a public forum is is the perfect place. It just
separates the people who do their own research and go the
extra step if they are that interested in the field, as
they should be. I also know, many of the students started
reading books a year ahead they were so exciting about
participating. I'm sure many will disagree, but information
should be free.

Why should defenders lack attackers tools and information?
makes no sense.

What next, get off my lawn...

On Tue, 10 Mar 2009 14:11:07 -0400
Scott <opiesan () gmail com> wrote:
That's a good point. I've tried posting this to some
private forums
but there was no response. It's an acceptable risk the
student teams
could be members of this list and this seemed like the
best resource
for feedback on the topic. Frankly, I'm probably the
least of their
worries given the skill set of the other attack team
members. Social
Engineering has been harder to pull off since the teams
all know what
we look like but it's worked a few times before. Thank
you for the
feedback.

Scott

On Tue, Mar 10, 2009 at 12:44 PM, Adriel T. Desautels
<ad_lists () netragard com> wrote:
Well,
       For starters I wouldn't ask about it in public
forum. How do you know
if the defenders are reading this email list or not? If
you take public
advice who's to say that they won't build the defense
first?

       That said, use Social Engineering to start... it
works if you do it
right.


On Mar 9, 2009, at 1:55 PM, Scott wrote:

Howdy folks!

I'm part of a Red Team for the Mid-Atlantic region
CCDC competition
(Collegiate Cyber Defense Competition). There are some
pretty talented
folks on the team and I'm arguably the least
experienced (for now).
The short version explanation is that teams of college
students are
tasked with operating and defending a "corporate"
network of systems
ranging from web, email, DB, MS Domain servers, VoIP,
and normal
workstations. They have to patch a wide variety of
holes while keeping
designated services available for scoring. The team
with the most
uptime wins. Meanwhile, the red team is busy attacking
these services
along with anything else we can get into and create
havoc for the
student teams.

My question to all of you is what you would recommend
for an attack
strategy here. In previous competitions it's been
challenging to know
where to start as there are many options. Should I
find a hole and dig
in with backdoors, create new user accounts, take over
the admin
accounts and lock out the student teams??? Technically
the red team is
supposed to bring down or deny access to the services
the students are
scored on (primary objective). There's always more
going than that
however. I'd like to stay focused when we go into the
3 day event this
month so I need a plan.

How would you do it if you didn't know more than
possibly what types
of systems you'll find on the target networks? Thanks.

Scott





       Adriel T. Desautels
       ad_lists () netragard com
       --------------------------------------

       Subscribe to our blog
       http://snosoft.blogspot.com








        Adriel T. Desautels
        ad_lists () netragard com
        --------------------------------------

        Subscribe to our blog
        http://snosoft.blogspot.com




Current thread: