layout: post title: "The Attacker" date: 2020-01-07 22:53:01 +0800
Computer Network Exploitation(CNE) is grounded in human nature.
1. Starting
2. Targeting
3. Initial Access
4. Persistence, Access Expansion, Exfiltration.
5. Detection
Stage 1: Targeting contains identification of the target network, the attack strategies and tactics necessary to exploit that network.
Stage 2: Initial Access contains of penetrating any defensive security and gaining the ability to run commands or other software on one of the target's computers or network devices.
Stage 3 : Persistence turns initial access into reoccurring access.
Stage 4: Expansion increasing access to a target network.
Stage 5: Exfiltration is the retrieval of wanted data from the target network.
Stage 6: Detection occurs when an operation is exposed to the target.
There is always someone with legitimate access and a means to use it.
Someone from outside the network can connect into the network. e.g. public web, or restricted.
Access control: "know", "have" and "virtual location".
Attacking method:
Someone from inside the network can connect to outside but the network is not accessible from the outside.
So attackers need an inside user to connect to the outside. e.g. e-mail.
Three basic approach: attachments, attacking the e-mail program, and malicious links.
First Generation Attachment: Executable program, install something in the background to grant access to the attacker. Simple, direct and effective.
Second Generation Attachment: Documents that contained the ability to run code. Send a copy to other e-mail addresses in the address book. Because of the "macro" feature of Microsoft Office.
Third Generation Attachment: Programs that do not seem like programs. Esoteric extensions e.g. .chm or .hta. E-mail filter updated to catch them.
Current Generation Attachment: Third-party application-specific documents, e.g. .doc, .xls, .pdf, .zip... use vulnerabilities of the application to execute the code.
Ideal Attack. Send specially crafted e-mail, corrupt the e-mail program, execute attacker-supplied code. Only need the user to preview or view the e-mail. Does not need the user to open the attachment.
Links bring the user to specifically designed websites to leverage vulnerabilities in web browsers or plug-ins.
Commandeer legitimate sites that the attacker knows or hopes a target user will visit. aka "Watering hole" attacks. The Attacker waits for the target to come to them. Same result as e-mail link-based attack except it does not need e-mail to direct the user.
Malicious thumb drives
Attack other network that the laptops connect to
Wireless access
Attack from smartphones
Social engineering
Physical access attack
...
How to restrict access:
Attacker's challenge: lecerage initial execution to circumvent host-based and network-based restrictions and establish command and control.
Some types of connections are allowed in and others allowed out. Each direction may have its own set of access controls, restictions and monitoring.
The attacker follows the path of least resistance, mixes and matches approaches for the greatest effect.
A network with no outside connectivity is commonly called an isolated network or an "air-gapped" network. This network is physically separated from the Internet.
The most secure network configuration possible to protect against outsider threats and the most inconvenient for sharing information or administering.
Attacker must breach physical security or trick, cajole, bribe, or blakmail users into doing it for them.
Air gap did not prevent the Stuxnet worm.
Attacker must find a way to be, to corrupt, or to compromise an insider in order to reduce the problem of physical access to one of insider threat security.
Ambitions will always exceed available resources. All ambitions are tempered by the constraints of reality.