Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM

Subscribers:
6,460
Published on ● Video Link: https://www.youtube.com/watch?v=S1m2DZ_evS8



Category:
Vlog
Duration: 50:29
7 views
1


Adversaries love leveraging legitimate functionality that lays dormant inside of Microsoft Windows for malicious purposes and often disguise their activity under the smoke screen of "normal administrator behavior." Over the last year, there has been a significant surge in the malicious use of Component Object Model (COM) objects as a "living off the land" approach to lateral movement. COM, a subsystem that has been around since the early days of Microsoft Windows, exposes interfaces and functionality within software objects and has the ability to share this functionality over the network via Distributed COM (DCOM). With over 20 years in existence and over a year of relative popularity among adversaries, one would imagine that network analysis and detection of DCOM attacks was old news. On the contrary, very few people understand the techniques, tools fail to properly parse the network protocol, and adversaries continue to successfully leverage it to further the compromise of networks. Needless to say, it's difficult to defend against techniques that the defenders don't understand.

This talk aims to address that knowledge gap by exploring DCOM as a lateral movement technique and provide a methodical walk through of the technique from both the attacker and defender perspectives. The audience will get a deep dive into:

•[D]COM 101

•How does an adversary choose a COM object for lateral movement

•NSM approaches with regards to DCOM (pros vs cons)

•Network protocol analysis of the attack using open source tools


Presenters:
Alex Sirr - Security Engineer, Gigamon
Alex Sirr (@DarkAl3x1s) is a recently graduated intern and a current member of the Gigamon Applied Threat Research (ATR). Alex has focused his research on network threat detection, tactical nerf battles, and security engineering work where he gets to prototype systems to operationally aid his team. He enjoys studying adversarial techniques and thinking creatively on how to defeat them. Alex is a graduate of the University of Washington where he studied Informatics with a focus on information assurance and cyber security and was a member of Batman's Kitchen, the UW CTF team. In his free time, he enjoys coding various side projects, cycling, and practicing Krav Maga. Warner - Principal Security Engineer, Gigamon
Justin Warner (@sixdub) is a Principal Security Engineer on the Applied Threat Research (ATR) team at Gigamon where he conducts threat research and develops network threat detection capabilities. Justin is an Air Force Academy graduate, former USAF Cyber Ops officer and former red team lead where he focused on adversary emulation operations against several fortune 100 companies as well a federal, state, and local government organizations. Justin has a passion for threat research, reverse engineering, and using his "free time" to spend time with his wife and daughter.

Black Hat - Europe - 2018
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-21When Everyone's Dog is Named Fluffy Black Hat - Europe - 2018
2021-12-21DeepPhish Simulating Malicious AI Black Hat - Europe - 2018
2021-12-21Locknote Conclusions and Key Takeaways from Black Hat Europe 2018
2021-12-21When Machines Can't Talk Black Hat - Europe - 2018
2021-12-21Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces
2021-12-21AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace
2021-12-21Where 2 Worlds Collide Bringing Mimikatz et al to UNIX
2021-12-21Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild
2021-12-21Attacking and Defending Blockchains From Horror Stories to Secure Wallets
2021-12-21Straight Outta VMware Modern Exploitation of the SVGA Device for Guest to Host Escapes
2021-12-21Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM
2021-12-21Attacking Hardware Systems Using Resonance and the Laws of Physics
2021-12-21The Last Line of Defense Understanding and Attacking Apple File System on iOS
2021-12-21Eternal War in XNU Kernel Objects Black Hat - Europe - 2018
2021-12-21Evolving Security Experts Among Teenagers Black Hat - Europe - 2018
2021-12-21No Free Charge Theorem 2 0 How to Steal Private Information from a Mobile Device Using a Powerbank
2021-12-21Off Path Attacks Against PKI Black Hat - Europe - 2018
2021-12-21How to Build Synthetic Persons in Cyberspace
2021-12-21Perception Deception Physical Adversarial Attack Challenges
2021-12-21BLEEDINGBIT Your APs Belong to Us Black Hat - Europe - 2018
2021-12-21Perfectly Deniable Steganographic Disk Encryption



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering