Skip to content

Commit 3c6481e

Browse files
author
David Bors
committed
10-end-to-end-chapter/slides: add slides
Add slides for Chapter 10: End to End Attacks Signed-off-by: David Bors <borsdavid@proton.me>
1 parent 42e01aa commit 3c6481e

File tree

2 files changed

+127
-0
lines changed

2 files changed

+127
-0
lines changed
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
include ../../../../common/makefile/slides.mk
Lines changed: 126 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,126 @@
1+
---
2+
title: "SSS: Session: End-to-End Attack"
3+
revealOptions:
4+
background-color: 'aquamarine'
5+
transition: 'none'
6+
---
7+
8+
# End-to-End Attack
9+
10+
----
11+
12+
# End-to-End Attack
13+
14+
* Why is web so prevalent?
15+
* What represents each end in the title?
16+
17+
---
18+
19+
# Phases
20+
21+
* Reconnaissance
22+
* Weaponization and Gaining Access (RCE)
23+
* Maintaining access
24+
* Clearing tracks
25+
26+
---
27+
28+
## Reconnaissance
29+
30+
* Obtaining as much information as possible about the target
31+
* What types of mechanisms the target has in place, and also where the target is located
32+
33+
----
34+
35+
## Passive Reconnaissance
36+
37+
* Shodan, Censys, PublicWWW, Zoomeye, Google Dorks
38+
* Social Media for information about employees, their roles and daily habits
39+
* WHOIS lookup: collect domain registration info and IP addresses
40+
* SSL certificates lookup
41+
42+
----
43+
44+
## Active Reconnaissance
45+
46+
* nmap - mapping the topology of various hosts, servers, routers
47+
* gobuster - bruteforce URLs, DNS subdomains, virtual host names
48+
* wfuzz - bruteforce Web Applications, find dirs, servlets, scripts
49+
* openvas-scanner - vulnerability scanner
50+
51+
---
52+
53+
54+
## Weaponization
55+
56+
Start developing techninques to penetrate the target:
57+
58+
* phishing
59+
* software and hardware exploits
60+
* acquiring new malware
61+
62+
---
63+
64+
## Gaining Access
65+
66+
* An employee who fell into a phishing atack
67+
* Triggering known vulnerabilities
68+
69+
----
70+
71+
## Gaining Access
72+
73+
got root?
74+
75+
---
76+
77+
## Maintaining access
78+
79+
* creating new user accounts
80+
* editing firewall settings
81+
* turning on remote desktop access (RDP, VNC)
82+
* installing a backdoor (rootkits)
83+
* injecting existing running code (be creative)
84+
85+
---
86+
87+
## Clearing trakcs
88+
89+
* ALWAYS use **at least one** VPN, preferably with TOR
90+
* Change MAC address
91+
* Delete any files created, clear logs, modify timestamps
92+
93+
---
94+
95+
96+
## Finding targets in the wild
97+
98+
* Shodan, Censys, Zoomeye, etc.
99+
* Queries can be made to match ports, chunks of text in the response, response codes, etc.
100+
* Can use favicons to search, when you don't know what else to do (or there are a lot of honeypots)
101+
102+
---
103+
104+
## Testing hundreds of targets with one command
105+
106+
* One can use Nuclei to test hundred of targets with just one command
107+
* Directly redirect the output from sites like Shodan to Nuclei for complete automation
108+
* Use all their templates, or just the ones you want
109+
110+
---
111+
112+
## DEMO Time!
113+
114+
----
115+
116+
## Instance Vulnerable to a CVE
117+
118+
* Get initial access
119+
* Get root access
120+
* Gain persistence
121+
122+
---
123+
124+
## Q&A
125+
126+
Thank you for participating!

0 commit comments

Comments
 (0)