All Good Suggestions. To answer Erik's question on scoring per my experience
last week at the NYC CTF.

Red Team members were required to run a script on the comrpomised system
once it was compromised to gain a point for the hack. They were encouraged
to take data but no DDOS were allowed. However, they could take down systems
towards the end of the day (although they would not getting points for doing
so but the blue team would gain points for systems down - more points are
bad for blue).

Blue Team Members with the lowest score won. They needed to keep systems and
services online. If compromised they could regain (subtract some points) if
they were able to get the systems online quickly and accurately report data
loss to the FBI field office. (Paul and Renald actually did a good job
destroying the team that won but because they were able to restore and start
over (DR) they regained their lead.

So with that said while tools (both preventative and reactive) would
certainly help the blue team, I think the most important thing is to be
organized, have a plan, have the expertise (one person for linux, one for
windows, one for web apps/databases, and one for networking), and know when
to say we are screwed lets implement our DR plan. And ss Erik pointed out
lock down the systems!

Some command line and gooyee tools could certainly have helped with this but
would be no substitute for experience and organization. Scripting command
line stuff and GPO's would certainly help in a large environment (have quite
of bit of experience there) but in an exercise like this it may just slow a
team down (better to do it manually since there were only a handful of
systems).

So AV, log monitoring, best practices (i.e. all of Erik's preventative
suggestions and more), and things like TCSTools switchblade for incident
response would all be helpful. I'm wondering if the questions of what tools
is the right question. Maybe the question is what best practices?

Just My 2 1/2 cents.



On Tue, Jul 28, 2009 at 1:21 PM, Erik Harrison <[email protected]> wrote:

> beyond a lot of the great reactive or visibility driven suggestions already
> provided, and assuming this is in a lab environment (i hope) - harden the
> crap out of the server. standard fare, remove/disable unnecessary services,
> change default service accounts to low priv. add manual ntfs permissions
> across the filesystem *and registry* to limit that account's access. patch
> the os, apps, services, any web software (just assuming they're gonna give
> you joomla w/ 1500 plugins and modules to make it utterly impossible to
> win). move db passwords in the code into an included file ../ out of the
> main web directory, deny writes to all web directories for the duration of
> the scenario so no webshells can be uploaded, fix outbound connections at
> the firewall (host and upstream), switch services to listen only on
> 127.0.0.1, blah blah blah.. the list goes on
>
> how are you measuring successful intrusion? what's the jackpot for red? you
> could just be a bastard, and move or delete that file :D lock it away in a
> truecrypt volume protected by keys and passphrases.
>
>
> On Tue, Jul 28, 2009 at 12:56 PM, Tim Mugherini <[email protected]>wrote:
>
>> Very Nice. Does Autopatcher allow you to manually copy over patches
>> (already have many downloaded)?
>>
>> To add some:
>>
>> Again Sysinternals Tools: Process Monitor, PSTools, TCPView
>> Kiwi Syslog Server & Viewer or comparable, Mandiant Highlighter
>> Nessus - Home Feed of course
>> Dumpsec - NTFS File Permission dumper
>> Your favorite free sniffer - Wireshark, etc..
>> MRTG - Router bandwidth monitoring
>> AVG or other decent free AV
>> Snort
>>
>>
>>
>>
>>
>> On Tue, Jul 28, 2009 at 11:05 AM, Carlos Perez <
>> [email protected]> wrote:
>>
>>> 8 GB stick  prepared with autopatcher http://www.autopatcher.com/
>>> http://www.autopatcher.com/ I would have patches for all versions of
>>> windows.  <http://www.autopatcher.com/>I would also place portable
>>> firefox, and xamp in case i need to migrate an apache LAMP server to an
>>> updated version since I have seen a trend of putting apache on windows in
>>> this competition, also place several pre-made security templates for use
>>> with GPO or local application, URLscan installer and pre-made urlscan.ini
>>> files. Komodo free firewall installer and the NSA cisco templates, acl
>>> templates, Nipper for checking the cisco equipment config quickly and some
>>> pvaln sample configs. Keepass for password storage and generation.
>>>
>>> that is what comes now to mind.
>>>
>>>
>>> On Tue, Jul 28, 2009 at 8:54 AM, John Strand <[email protected]> wrote:
>>>
>>>> Please! PSW land! Share your Blue Team tactics!
>>>> What tools, scripts, and techniques do you use as part of Incident
>>>> Response and Blue Team Activities?
>>>>
>>>> I have sat in on one to many Red/Blue/CTF games where the Red team gets
>>>> Core, Canvas, Metasploit, Nessus, Satan, Sara, Cain and Able, Ettercap,
>>>> Dsniff, Hydra, 0phcrack, Nmap, BT4 and various torture techniques 
>>>> (including
>>>> IronGeek's rubber hoses) and the the Blue team gets....
>>>>
>>>> "An un-patched Windows 2000 box and a slew of un-patched software!!!!!''
>>>>
>>>> Please see the following video for reference:
>>>>
>>>> http://www.youtube.com/watch?v=Y77n--Af1qo
>>>>
>>>> Yea..  Thats right.... As of today the Blue Team is what you get
>>>> assigned to when you are caught stuffing peas up your nose.
>>>>
>>>> This stops today!!!
>>>>
>>>> There are a few rules.  Tricks and scripts must be able to run at the
>>>> command line of your operating system of choice and all tools must be
>>>> freeware or open source.
>>>>
>>>> Thats it!!!
>>>>
>>>> Look, the Blue Team *can* rock!!!  So please share your tricks.
>>>>
>>>> I am going to collect and add to them so we have a solid list and this
>>>> will serve as the playbook for the Blues going forward.
>>>>
>>>> Be expecting this on the PDC site soon.
>>>>
>>>> strandjs
>>>>
>>>> _______________________________________________
>>>> Pauldotcom mailing list
>>>> [email protected]
>>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>>> Main Web Site: http://pauldotcom.com
>>>>
>>>
>>>
>>> _______________________________________________
>>> Pauldotcom mailing list
>>> [email protected]
>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>> Main Web Site: http://pauldotcom.com
>>>
>>
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>>
>
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to