Tactical Exploitation WindowsUNIX-1
Tactical Exploitation WindowsUNIX-1
Abstract
Penetration testing often focuses on individual vulnerabilities and services, but the quickest
ways to exploit are often hands on and with unique techniques. This four-day course introduces
a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination
of new tools and lesser-known techniques, attendees will learn how hackers compromise
systems without depending on standard exploits. The class alternates between lectures and
hands-on testing, providing attendees with an opportunity to try the techniques discussed.
In the first half of the course, this course uses a unique approach to compromising Windows
environments without relying on traditional exploits. In the first half of this course, students will
become proficient in the skills necessary to compromise Windows environments using the
same methods as real-world attackers rather than compliance-based penetration testing
techniques. Skills to be covered include: host recon, network recon, and credential hijacking as
well as tricks for taking advantage of configuration and design flaws.
The first portion of the course focuses primarily on Windows and Windows internals and how
to leverage them. Host and network recon, privilege escalation, credential stealing and passing,
persistence, and lateral movement techniques will be covered in depth. Once finished with the
course, students will have a foundation on how Windows attacks actually happen and how to
secure against them from the post-exploitation stage.
In the second half of the course, the focus will shift from compromising Windows based
networks to a true production level UNIX environment. Attendees will receive in-depth
exploitation techniques for becoming root in any UNIX environment and abusing these newly
found resources for unique lateral movement techniques. Students will learn complete
domination of a true production Windows/UNIX environment.
Our unique approach to compromising Unix environments without relying on traditional
exploits. In the second session, students will become proficient in the skills necessary to
compromise Unix environments using the same methods as real-world attackers rather than
compliance-based penetration testing techniques. Skills to be covered include: host recon,
network recon, and credential hijacking, and students will learn how to take advantage of
configuration and design flaws. This course focuses primarily on Linux, Solaris, and FreeBSD/OS
X. SSH, Kerberos, kernel modules, file sharing, privilege escalation, home directories, and
logging all will be covered in depth. Once finished with this course, students will have a
foundation on how attacks on Unix actually happen and how to secure against them from the
post-exploitation stage
Learning Objectives
Windows Topics Covered:
Course Outline
• Course Introduction
o Offensive Concepts
o Important Files
o Useful Scripts
o sudo, sudoers
o Leveraging Trusts
o Unix Authentications
o Overview of NFS
o “Securing” NFS
• Kerberos
o Overview
o Basic Commands
o Kerberos Tickets
o Kerberos Caching
o .k5login
o Hijacking Kerberos
• SSH
o SSH-Agent
o Master Mode
• X11
o What X11 is
o X11 Security
o Xauth, Xdotool
• LD_PRELOAD
o Overview
o Dynamic Libraries
o Using LD_PRELOAD
o Hijacking rand()
• PAM Trojaning
o Overview
o Attack Paths
o PAM Modules
o PAM Configuration
o Overview
o System Enumeration
▪ Installed Software
▪ Event Logs
▪ System Logon
▪ PuTTY
▪ Terminal Services
▪ Run
▪ WMI
▪ Selfhash
o Browser Recon
▪ Decrypting TLS
• Getting root
▪ Viewing ACLs
o Insecure Services
▪ Overview
▪ Integrity Levels
o Path Exploitation
o PowerUp
▪ ShellExecuteW
• Mimikatz
o Overview
o Useful Commands
o Automating Mimikatz
o Minidump
o MScache
• System Persistency
o Overview
o Registry Persistency
o Terminal Services
o Sticky Keys
▪ How to Exploit
o Service Manipulation
▪ Service Executables
o Volume Shadows
▪ VSS Overview
• Network Recon
o Overview of SAMBA
o SMB
o Network Accessories
▪ Null sessions
▪ Enumeration Examples
o Search.vbs
o SIDS, RIDS
o Netvol, sysvol & Gettting GPOs
o Shares
• Lateral Movement
o Methods to Lateral
▪ Windows Tokens
o PsExec
▪ Metasploit Example
o WMI
o Cross Pollination
REQUIREMENTS
We provide a windows based virtual machine for each student to connect to via the Remote
Desktop Protocol (RDP). All exercises are performed in that environment.