Red Team Assessment
Red Team Assessment
PwC India
October 2019
Table of Contents
Section 1
Red Team Assessment- Concept & Purpose
Section 2
Who are the threat actors ?
Section 3
What are the threat vector ?
Section 4
Global cyber incidents
Section 5
Our Services
Section 6
Approach & Methodology
PwC PwC 2
1 Red team Assessment – Concept &
Purpose
PwC
PwC | Client 3
Red Team Assessment
• Red Team Assessment is an amalgamated and
comprehensive attacks assessment which covers various
threat vectors related to physical security, social
engineering, application penetration testing and both internal
and external network penetration testing.
Awareness
• Purpose behind a full fledged red team assessment is to reveal Assessing people awareness
by conducting attack
the possible opportunities for malicious hackers, oriented social engineering
activity
disgruntled employees and bad actors. realistic view and
understanding of testing of an organizations people,
technology, and process
Red Team
• Red Team assessment is fully an attack driven approach using Assessment
various Tools, Techniques and Procedures (TTP’s) where
every aspects of People, Process and Technology is Assessment Management
Assessing the security
technically assessed to gather a comprehensive insight of the Assessing the security
posture of an organization implementation process
such as patch management,
current security posture of an organization. by exploiting the flaws in
various security. vulnerability management
process
• Network Intrusion Attempts • Intrude and attack internal network from chosen locations
• Compromising hosts & stealing • Bypassing the existing Antivirus & Host intrusion detection system (HIDS)
sensitive Information Internal and gaining access to computer systems to obtain sensitive information.
• Internal DoS attacks • To Perform an internal DoS attack from compromised internal systems.
• By passing work station Security – • Exploits the vulnerable systems, moves laterally and gains enterprise admin
account credentials.
AV & HIDs
• Malicious USB drop Malware • Gaining access to the systems, inserting pen drives containing malware
& • Sending phishing emails with malicious attachments.
• Macro & Malware via e-mail
Wireless • Creating a rogue access point and gaining passwords.
• Rogue Access Point • Bypassing the wireless security controls and gaining access to the
attacks
• Wireless Network Intrusion Attempt organizations network
Physical
Vishing Social DoS/ DDos
Intrusion Pretexting
Engineering attack
Low
Exploitation
Privileges Lateral High
Threat actor compromises the
identified vulnerable system by Movement cycle Priv. Esc Privileges Lateral
exploiting the hosted services /
sending out malicious emails etc. Access the Movement cycle
assets by high
privileged
accounts.
Reconnaissance Internal Recon and Privilege Compromise Domain Access to crown jewels and exfiltration
Threat actor performs and initial Escalation Threat actor gathers Domain Threat actor gains access to critical assets
intelligence gathering using various Threat actor performs an internal Administrator credentials and gains such as Domain controllers, exchange
TTPs to gather information related to recon by mapping of the internal full privileged access to internal servers, file servers, critical infrastructure
application, mail addresses, server domain and elevates the current domain etc. and successfully Exfiltrates sensitive data.
configurations etc. privilege.
Red Team Assessment Services October 2019
PwC 8
Global Cyber Attacks
2 Your advisor will provide you with greater value if they understand your business and industry
environment, culture, and operations.
Deep understanding of •We know various industry operations, systems, and leading practices, and have extensive experience
security in various and expertise in red team and penetration testing services, privacy and security, breach notification, and
industries incident response planning.
•We have developed proprietary assessment tools, templates, and project documents that will
accelerate progress in many of the areas in scope and reduce effort and fees.
3 PwC has a comprehensive, tailored and well refined approach to conducting cyber attack simulations:
●Perform testing in a stealthy fashion that mimics real threat actors. We can adjust our testing to meet
your needs and test the effectiveness of your team’s incident response capabilities.
●Intelligent hacks that leverage configuration errors and exploit business logic flaws, rather than one-
Cyber Attack simulation click “zero-day” exploits. Automated tools and exploits will never identify business logic flaws in
applications that may result in exposure of sensitive data in your organization.
●We understand the “big picture” (root causes) and convey this in our work. Technical changes to
remediate security findings are only a small piece of the overall puzzle. We identify the root cause of each
finding, typically associated with people, processes, or technology, to help enable the prevention of
similar findings in the future.
External Assessment
Internal Infrastructure
Assessment Perform testing on externally facing systems identified
during the planning phase. Identified vulnerabilities will
Our team will assess the internal IT Malware/ External be exploited in order to gain access to sensitive data and
infrastructure using various TTP’s to Backdoor Assessment the internal network
compromise the internal IT domain to
gain access to crown jewels such as
exchange servers, Internal Applications,
Domain controllers etc. Red Team
Rouge Device Deployment Phishing / Spear Phishing attacks
PwC team will attempt to physically breach Using data gathered from reconnaissance, multiple
Rouge Phishing/
an organization's security controls and employees/ key personnel's would be targeted
Device Spear
deployed a custom device to gain access to Deployment Phishing using a tailored email designed to lure them into
the internal IT network and access the disclosing credentials or executing malicious file to
device from internet. gain initial foothold or sensitive information.
PwC
PwC | Client 12
Our Approach
Access to Crown
Jewels
Lateral
Servers and Movement
Adversary sends a customized email with
Access to Workstations
malicious attachments, links to lure the end Data Centre
Phishing Building
user and gains sensitive information, access
to the systems etc. Physical
Security
Breaches
Drops a malware responsible for
infecting the internal systems and
Malware
gather sensitive data to exfiltrate to
an externally hosted C&C server or infections Compromise
encrypts the data. endpoints and
Phishing User credentials
Insider Threat Critical
Infrastructure
Organization Infrastructure
Red Team Assessment Services October 2019
PwC
14
Key use Cases: physical Security Breach
Physical Intrusion
Confidential Dumpster Diving
Documents
Password harvesting
Social Engineering
October 2019
PwC
Key use Cases: phishing
Phishing Email Email-Filtering
Compromised User
(Anti-Virus/Spam)
Firewall
Attacker
October 2019
PwC
Methodology
Phase # Scenario Approach
Intelligence Gathering Passive reconnaissance on external identifying various relevant infrastrucutre inofrmations available on
(External) footprint of the domain infrastructure oublic internet.
Active reconnaissance on external Perform active queries like DNS Zone transfer, subdomain bruteforce,
environment of infrastructure nmap scans to identify information of external infrastructure of
Domain
Intelligence Gathering Identifying the internal Network Plugin a non-domain laptop to the network and do
(Internal) Range nslookup,Responder,Ping the passing gateway,Internal Ports
DC’s (Domain Controllers),DNS Zone transfer
Identification of common ports and Initiate Nmap scans for the top common ports such as
services 8000,8080,8009,445,3200-3299 etc. and analyse the scan results in
order to identify various services.
Vulnerability Analysis Identification of vulnerable services Import scanned results within the Metasploit database and use
various auxiliary modules in order to identify the exploitable systems
running with Tomcat, Jenkins, Boss etc..
Exploitation Attempt to exploit vulnerable Attempt brute force, weak password cracking, vulnerable service
services exploitation, to gain a foothold on the network and attempt to
compromise credentials on accessed computers utilizing memory
dumping techniques
Red Team Assessment Services October 2019
PwC 17
Methodology
Phase # Scenario Approach
Post Exploitation Identification of privileged user Utilize custom PowerShell Scripts and various tools to gather
(Discovery) accounts, user sessions, computers, information from active directory to perform attacks on it.
network segments, zones, critical
users, critical user groups.
Post Exploitation (Lateral Utilize identified paths of compromise Utilize exploitation tools for lateral movement, in order to laterally move
Movement) to target critical users and groups within the environment with compromised credentials.
Post Exploitation Utilize compromised credentials to Utilize compromised credentials to access critical applications, e.g.
(Pillaging) access critical applications SharePoint, Citrix, Exchange, etc..
Post Exploitation Identification of privileged user Utilize Powersploit, tools to identify the various information from active
(Discovery) accounts, user sessions, computers, directory to perform attacks on it
network segments, zones, critical
users, critical user groups.