400 likes | 548 Views
WELCOME!. Hacking Uncovered: VMware ® Advanced VMware® Security The Latest Threats and Tools. Presented by Duane Anderson of VMTraining – CPTS, CEH, CPTE, CDFE, CWSE, CISSO, CVE, CVSE and Security+. Cool Offer!.
E N D
WELCOME! • Hacking Uncovered: VMware® • Advanced VMware® Security The Latest Threats and Tools Presented by Duane Anderson of VMTraining – CPTS, CEH, CPTE, CDFE, CWSE, CISSO, CVE, CVSE and Security+
Cool Offer! • Free Drawing for 1 seat in the VMware Advanced Security Class with Firebrand.
What are you in for? Hold On! • vSphere Just Another Layer to Attack? • Recent Cases involving VMware • Pen Testing Methodology • Gueststealer • TomCat Zero Day • Directory Traversal • VASTO • Mitigation Techniques • 3rd Party Mitigation Tools
What is Happening today? • VMware – 80% of the Market Share • Do the Tools used in Pen Testing work with virtualization? • Are there hacks being designed just for VMware? • What is this costing us?
Time to Discuss • What are the main security concerns associated with virtualization in general? • Segregation of Duties • Accounting/Logging • New API’s • VMsafe • vStorage • vNetwork • VMsafe Virtual Appliances • Plug-Ins • Share Resources – can they be attacked? • Memory, CPU, Datastore
VMCI http://pubs.vmware.com/vmci-sdk/VMCI_intro.html
Time to Discuss • Threats • Perceived • Known • Risks • Probability • Potential Impact
Some Vulnerabilities • Secunia Historic Advisories • ESX 4.x • ESXi 4.x • vCenter Server 4.x • nvd.nist.gov • Over 40 Vulnerabilities for VMware Products • McAfee Threats • VMware • ESX Server Heap Buffer Overflow • vCenter Update Manager CSS • vCenter Update Manager Directory Traversal
Methodology • This does not change, regardless of the environment being tested. • Information Gathering • Scanning • Enumeration • Penetration • Fail • Start Over or tell them great job • Succeed • Escalate Privileges • Steal Data or Leave proof of hack • Cover Tracks • Leave Backdoors
Tools…. • Google • NMAP – Since v4.8 • Ettercap • Cain and Abel • Metasploit • Claudio Criscione • VASTO – Virtualization ASsessmentTOolkit
Scanning for ESX • We have to find the systems first. • Just like any other service, ESX has its own tells. • NMAP – will give you what you need. • Lets see this in action!
SSL request SSL reply (Real Self Signed Cert) SSL reply (Fake certificate) SSL request F&JLMDHGST*KU P)JDGH$FDSD@ How we understand Fake Certificate Injection to work. • ARP Cache Poisoning will allow us to perform a successful SSL crack! • The hacking tools will create fake certificates. • Two simultaneous SSL connections are established. One between the victim and the hacker, the other between the hacker and the real server. • The communication process starts on port 443 and once the SSL authentication has been established VMware moves the communication to port 902. Stop Copy & Alter ESX Sever Cleartext
Stealing the Password • VIC Client Login
Screenshots • You are still vulnerable even if you use vCenter. • I can offer this: • Once the above password is stolen you can login to the host with the vpxuser and above password.
vSphere Client Communication Client Server GET /client/clients.xml 1 AutoUpdate URL RetrieveServiceInstance 2 ServiceInstance RetrieveServiceStatus 3 Status GET /client/clients.xml 4 Autoupdate URL Login
TrendMicro Deep Security • Trend Micro Deep Security provides advanced security for physical, virtual, and cloud servers and virtual desktops. • Modules • Agentless Malware Detection for VMs • Deep Packet Inspection • Intrusion Detection and Prevention • Web Application and Protection • Application Control • Bidirectional Stateful Firewall • Integrity Monitoring • Log Inspection
In-depth Look – *Authors Picks Catbird Catbird TrustZones® policy-based security envelope for virtual infrastructures and the cloud. Enforces protection and measures compliance across virtual clusters and data centers. • Catbird virtual security appliance performs several functions: • Hypervisor auditing • Virtual network IPS • Network segmentation and access control • Vulnerability management • Multi-tenant security • Reports to management console
Catbird – continuous compliance • Catbird appliances collect data and enforce policies • Appliances report events to management console • Management console analyses events andcorrelates to compliance framework
VMware Advanced Security • Course Introduction and Methodology • Penetration Testing 101 • Primer and Reaffirming our Knowledge • Security Architecture, vCPU, vMemory • Routing and the vNetwork • vStorage – Architecture and Security Implementations • Hardening the Virtual Machines • Hardening the Host • Hardening Virtual Center • Virtualizing your DMZ • 3rd Party Mitigation Tools • Putting it all Together
vSphere 4.1 Ultimate Bootcamp • Course Intro & Methodology • Virtualization Overview • Planning & Installing ESX/ESXi4 • Using Tools to Administer a VMware Environment • Configuring Networking • Configuring Storage • vCenter Server 4 and Licensing • VM Creation and Configuration & Snapshots • Security and Permissions • Server and VM Monitoring • Advanced ESX and vCenterManagement • Patching and Upgrading ESX/ESXi • Disaster Recovery and Backup 50 Hours of Training – 6.5 Classes in ONE