Here are the top 3 risks that we leveraged to penetrate into our customers’ networks in 2012. Each of these has been used to affect an irrecoverable infrastructure compromise during multiple engagements across a range of different customers. We flag a compromise “irrecoverable” when we’ve successfully taken administrative control over 60% or more of the network-connected assets. You’ll notice that these risks are more human-oriented than they are technology-oriented, thus demonstrating that your people are your greatest risk. While we certainly do focus on technological risks, they don’t fall into the top three categories.
The general methodology that we follow to achieve an irrecoverable infrastructure compromise is depicted below at a high-level.
- Gain entry via a single point (one of the 3 referenced below)
- Install custom backdoor (RADON our safe, undetectable, home-grown pseudo-malware)
- Identify and penetrate the domain controller (surprisingly easy in most cases)
- Extract and crack the passwords (we have pretty rainbows and access to this GPU cracker)
- Propagate the attack to the rest of the network (Distributed Metastasis)
Social Engineering is the art of manipulating people into divulging information or performing actions usually for the purpose of gaining access to a computer system or network connected resource. It is similar to […]