Living Off the Land Attack: Hackers Using Your Own Tools Against You

A living off the land attack is one of the sneakiest techniques in a ransomware operator's playbook — and in this episode, Dr. Mike Saylor breaks down exactly what it is, how it works, and what your organization can actually do about it.
Instead of bringing their own tools into your environment (which might trip your alarms), attackers just use what's already there. PowerShell. WMI. RDP. The same tools your admins run every single day. To your monitoring systems, it looks completely normal. That's the whole point.
Mike and Curtis cover why attackers prefer your tools over their own, how recon can quietly run for 30 to 90 days before the attack goes loud, and what defenders can actually do about it — removing admin privileges, system hardening, golden images, application whitelisting, and free tools like Nmap and Wireshark. There's also a match.com story involving organized crime and a wooden casket on someone's front porch that you really don't want to miss.
0:00 - Intro
1:21 - Welcome and Book Announcement
3:28 - What Is a Living Off the Land Attack?
5:38 - Real-World Example: Conti Ransomware and WMI
8:12 - Why Attackers Use Your Tools Instead of Their Own
13:05 - Admin Privileges: Best Practice vs. Reality
17:31 - The Louvre Heist Analogy
20:08 - Recon Phase: Low and Slow
24:16 - What Defenders Can Do
25:55 - RDP and Remote Access
29:48 - The Recon Timeline: 30-90 Days
30:48 - PowerShell and System Hardening
34:10 - Network Discovery Tools (Nmap and Wireshark)
37:37 - Application Whitelisting and Geo IP Blocking
42:08 - Action Items and Wrap-Up
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we're talking about living off the land attacks.
Speaker:And it's honestly, I think one of the sneakiest things that bad guys do, they
Speaker:get into your environment and instead of bringing their own tools, because
Speaker:you know they might trip your alarm systems, they use your tools against you.
Speaker:Things like PowerShell or WMI tools that you're likely already using.
Speaker:My co-author, Dr. Mike Saylor, breaks down how this works.
Speaker:Why it's so hard to detect and what you can actually do about it, I think, uh,
Speaker:there's a lot of value in this episode.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup, and I've been passionate about backup and recovery for over, can't
Speaker:believe it, 30 years ever since I had to tell my boss there were no backups of the
Speaker:production database that we had just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the backup wrap up.
Speaker:I'm your host, w Curtis Preston, AKA, Mr. Backup, and I have with me a
Speaker:guy who seems to laugh at my errors.
Speaker:Persona, Molly nios going Persona.
Speaker:I am good, Curtis.
Speaker:I nothing like with friends like this who needs enemies.
Speaker:Exactly.
Speaker:I just, I, I make, I make, I make mistakes.
Speaker:And you, well, honestly, I get, I get I like them too.
Speaker:I, it makes it, making me laugh.
Speaker:Makes me laugh.
Speaker:It's just funny that, uh, how long has the, has it, it been called the
Speaker:backup wrap up at least two years now.
Speaker:I think about, oh yeah, probably two years.
Speaker:And I still, my brain wants to say Backup centrals restore it all, which
Speaker:is the original name of the podcast.
Speaker:But, um, anyway, I don't know.
Speaker:Well, welcome to our, uh, pity party, Mike.
Speaker:Doctor Mike Saylor.
Speaker:How's it going?
Speaker:It is going well guys.
Speaker:Thanks for having me.
Speaker:My co-author on our lovely book, learning Ransomware Response and
Speaker:Recovery, which Mike, I understand you, you have some to show us.
Speaker:You don't have it hung yet, but there he is.
Speaker:The official.
Speaker:Framed copy of our book.
Speaker:Yeah, just hold it just like that.
Speaker:For the next, for the next half hour.
Speaker:Yeah.
Speaker:Very.
Speaker:Yeah.
Speaker:O'Reilly does that.
Speaker:They send you a copy when, uh, um.
Speaker:You know, when it's ready.
Speaker:And by the way, I just got a, I just got news from one of my folks
Speaker:on LinkedIn that the book said it's gonna be there on Tuesday.
Speaker:So they, you know, they ordered it in, they ordered it in January and uh,
Speaker:Amazon says it's gonna be there Tuesday.
Speaker:So, very exciting.
Speaker:Any,
Speaker:So for all our listeners, go out, order the book, listen, or then you can actually
Speaker:read what Curtis and Mike have been doing
Speaker:yeah.
Speaker:many, many, many, many months.
Speaker:Many, many months.
Speaker:And then give us a review on Amazon, uh, if you, if you like it,
Speaker:then come back
Speaker:yeah.
Speaker:come back to the podcast
Speaker:And comment.
Speaker:be going, no, because we'll be going more in depth into many of these topics.
Speaker:Yes, we will.
Speaker:Yes, we will.
Speaker:And today we're talking about something that honestly, I, I had, I had heard
Speaker:the, I had heard the term, but it wasn't, you know, given that I don't, uh, live
Speaker:that side of it the way you do, Mike.
Speaker:Um.
Speaker:The, um, this term living off land was something new to me.
Speaker:So, uh, I, why don't you give us a, do you have a story that kind of gives
Speaker:us an idea of what we're talking about when we talk about living off the land?
Speaker:Well, there's, there's lots of stories.
Speaker:Um, but living off the land is, is often part of some bigger,
Speaker:bigger campaign, bigger attack.
Speaker:Something you hear about in the news.
Speaker:You know, somebody got hacked, somebody had ransomware, somebody,
Speaker:you know, lost a bunch of data.
Speaker:the living off the land.
Speaker:Part of that was simply, um.
Speaker:Something that facilitated that attack to some degree.
Speaker:So, and, and from, as an auditor, an IT person, cyber person, you know, I
Speaker:harp on organizations all the time.
Speaker:Whatever you build, make it focused on whatever it's doing.
Speaker:so, you know, the other term for that is system hardening.
Speaker:You know, uh, delete things you, you don't need.
Speaker:Turn stuff off, you're not gonna use, close the port.
Speaker:Don't talk to things that you don't need to talk to.
Speaker:Um, those are all fruits of the land that a bad guy could use,
Speaker:uh, to facilitate an attack.
Speaker:Some of those you can't turn off, uh, like Windows Management as an example, or
Speaker:WMI, uh, the operating system needs that.
Speaker:Uh, there are other things like PowerShell, uh, whether it's a, a
Speaker:system that uses it or an admin that uses it for scripting, but story short.
Speaker:Uh, bad guys will figure out a way to circumvent the security controls you
Speaker:have that are looking for the deployment or installation of bad guy tools.
Speaker:they'll get through that, that filter, that gate, uh, by using
Speaker:tools that are native to the systems that they're attacking, uh, in
Speaker:order to facilitate their attack.
Speaker:Um, so.
Speaker:If
Speaker:So.
Speaker:there was a story in the book, you talked about a Seattle logistics firm, it was
Speaker:hit by a Conti ransomware, uh, variant.
Speaker:It was saying that it, it infected 60% of the firm servers and it, it was the
Speaker:same thing where it was, they somehow used the administrators, the, their
Speaker:administrative tools against them.
Speaker:Yep.
Speaker:So windows management and very powerful at, at deploying.
Speaker:Um.
Speaker:You know, code or, or malware across an environment, and especially if it's the
Speaker:admin or a service, running as an admin.
Speaker:I remember years ago we, we, uh, we responded to an incident where it
Speaker:was actually the, it was the security tool that was running, uh, a service
Speaker:with administrative privileges that was compromised by a bad guy.
Speaker:And they used the security tools itself, service that was running to, uh, to spread
Speaker:the, the malware across the environment.
Speaker:So Mike, just a clarification.
Speaker:you say living off the land, is it specifically just taking whatever
Speaker:tools are in an environment and using that in order to propagate your
Speaker:attack or to, uh, execute your attack?
Speaker:Or is it also, for instance, um.
Speaker:resources a as an example, someone might have had some virtual machines sitting
Speaker:around that they sort of forgot about from an inventory perspective or other
Speaker:things that might be deployed in a company that they're not, no longer tracking,
Speaker:doesn't get the latest security patches.
Speaker:Those sort of things that they then start to think about when you talk about land.
Speaker:It, it would definitely escalate to that if, if they have the
Speaker:time to identify those, but.
Speaker:Traditionally living off the land is, is services or applications,
Speaker:uh, resident on the machines they're attacking or using to attack.
Speaker:Now, as a bad guy, they, they find this, this, uh, this target
Speaker:host with all these goodies on it.
Speaker:but then they realize, well, this is the admin's computer, so if I do stuff from
Speaker:this computer, they may note, they may notice some latency or resource drain.
Speaker:so maybe they do some recon first, or they figure out a way to stand up a
Speaker:virtual machine in that environment.
Speaker:Uh, ideally using a dormant one instead of, you know, setting off some
Speaker:potential bells about creating a new one, but then migrate those tools or
Speaker:figure out if there's a way to, to, uh, uh, employ those tools on that
Speaker:virtual machine that's not being used.
Speaker:that's a, that would be a pretty good tactic.
Speaker:Yeah, I, it comes from, you know, the, the term, you know, for those
Speaker:of us that have been, uh, lived in either a suburb or urban environment
Speaker:or entire life, the concept of living off the land is that you're going.
Speaker:To literally live off of what is available.
Speaker:You know, that this term is, is an old term.
Speaker:It doesn't have anything to do or that originally didn't have anything to
Speaker:do with, uh, the world of computers.
Speaker:The idea is you're gonna live somewhere and you're going to
Speaker:use what is available on that.
Speaker:You know, that property in order to, uh, survive.
Speaker:And so I, I think, I think that's a perfect term.
Speaker:Uh, you know, think of like an episode of Survivor, uh, basically right?
Speaker:You're only allowed to use what's a avail, what's there, right?
Speaker:And so that's why, you know, they call this a living off the land because you're
Speaker:going to use, you know, you, meaning the, the attacker is going to use whatever
Speaker:tools are available to them and, and why.
Speaker:What, what's the purpose of that?
Speaker:Uh, Mike, meaning that, you know, why don't I want to, let's say I've got this
Speaker:great tool that does this amazing thing.
Speaker:Why wouldn't I, if I've got access to the environment, why wouldn't I just
Speaker:install this, this great tool that I have that does this cool thing?
Speaker:Why would I do this living off land?
Speaker:So there's a couple of layers of, uh, hopefully a couple of layers
Speaker:that organizations have in place.
Speaker:Uh, one of those is monitoring incoming payloads.
Speaker:Uh, so a file type.
Speaker:Well, and I guess that's the other part.
Speaker:How, how would you get that payload into the environment?
Speaker:Is that a, an attachment to a phishing email?
Speaker:Is it compromised credentials?
Speaker:Uh, in either case?
Speaker:Uh, payloads usually have a, a, you know, a good amount of baggage with them.
Speaker:It's not a, you know, it's not kilobytes.
Speaker:It's usually megabytes and sometimes, uh, multiple mega, you know, a hundred,
Speaker:400 megabytes of, of size, depending.
Speaker:Um.
Speaker:So the, the, the first layer is, or the first hurdle is how do
Speaker:I get it into the environment?
Speaker:The second one is, how do I get past all the filters, whether that's
Speaker:antivirus and malware, spam filter, et cetera, that's not gonna strip
Speaker:that attachment or that, that payload out of the, the communication.
Speaker:And then the last part of that is a lot of times, uh, ideally we would limit.
Speaker:Uh, a user's ability to install something on an endpoint, uh, to,
Speaker:uh, you know, a privileged account.
Speaker:Uh, so if, if, if you compromise the, you know, the receptionist, she shouldn't be
Speaker:a local admin, uh, so she shouldn't be able to, that account shouldn't be able
Speaker:to install stuff locally, that payload.
Speaker:So if you can craft your, your attack utilizing tools that are resident.
Speaker:You're simply connecting to the machine and running that stuff that's already
Speaker:installed and you're running it locally.
Speaker:The other benefit of running it locally, uh, is that a lot of times
Speaker:those services are already installed and using administrative privileges.
Speaker:Is it also true though, Mike, that I know you talked about how do you get the
Speaker:malware in or whatever the package is into the environment, like from an attacker's
Speaker:perspective, once they've sort of, like you mentioned PowerShell earlier, right?
Speaker:Once they sort of have a methodology to propagate the attack, to actually
Speaker:live off the land, that's something they can then replicate in other
Speaker:companies, organizations, and not just limit it to like one company, correct.
Speaker:Right.
Speaker:Yeah.
Speaker:So fundamentally windows and environments work the same.
Speaker:You know, there, there are some of the older ones have a few services and, and.
Speaker:Methods for communicating that are probably still enabled versus
Speaker:today's, um, I think there's a lot more network segmentation and
Speaker:some other things that, that are common today than there used to be.
Speaker:Uh, but for sure, if you can build a, an attack strategy in a Windows
Speaker:environment, um, you should be able to replicate that to some degree just
Speaker:about any, in any Windows network.
Speaker:When you were talking about the, the hurdles.
Speaker:W would another hurdle be even, even if you've got, you, you
Speaker:managed to download the file, you managed to get past the filters.
Speaker:Would there be additional filters required to actually execute this, uh, tool?
Speaker:If, if you're talking about some, yeah.
Speaker:Yeah.
Speaker:Um.
Speaker:a lot of environments would require administrative
Speaker:privileges in order to execute.
Speaker:So as an example, a normal user might not be able to run registry editor or
Speaker:even a command prompt or even change their desktop, you know, wallpaper.
Speaker:Um, and so, yeah, after, after you install it, you, you've also
Speaker:gotta figure out, you know, what privileges do you need to run it.
Speaker:Now I remember what I, now I remember what I forgot.
Speaker:You, you, you brought up a topic a couple of times and it's, it's outside
Speaker:of the scope of what I wanted to talk about today, but I thought we'd
Speaker:just talk a, talk about it, a little about it, and that is this concept
Speaker:of not allowing, uh, regular users to have admin on their own machines.
Speaker:I know that as best practice.
Speaker:The question is, is it common practice?
Speaker:Uh, whi which way that they do have admin practice.
Speaker:they do not have, that I, I know that it's best practice not to give Joe Schmo.
Speaker:You know that that shouldn't have admin, admin even on his local
Speaker:machine, even though that is.
Speaker:You know, inconvenient to him.
Speaker:Uh, we often talk about that security is, is inconvenient.
Speaker:Right?
Speaker:Right.
Speaker:So even though that's inconvenient, it's also inconvenient to the IT
Speaker:people because now that anytime Joe Schmo needs a new tool, we have
Speaker:to be the one to go install it.
Speaker:Which sounds amazing in terms of security, but it also sounds
Speaker:like a giant pain in the butt.
Speaker:What, uh, what, how common is it that people actually do this?
Speaker:Uh, that's, that's a, how common it is is difficult.
Speaker:But I can tell you in in regulated organizations, you know, those that
Speaker:have to be compliant with something.
Speaker:Uh, there is a, a control check for making sure that local, you
Speaker:know, users don't have, you know, um, more privileges than they need.
Speaker:Well, then organizations get around that by justifying the need for a user to
Speaker:have, uh, you know, admin privileges.
Speaker:And, and I see that even, um, and, and well, you know, mature.
Speaker:Uh, and secure environments.
Speaker:An engineer has local admin because he needs to run, you know, some kind
Speaker:of CAD software with, you know, the ability to manipulate memory and, you
Speaker:know, graphics and all this other stuff.
Speaker:Um, thinking, well, it's justified.
Speaker:Well, bad guys realize this too.
Speaker:So those are the users they're gonna target.
Speaker:They're not gonna target the receptionist, uh, you know, for, for the most part.
Speaker:Um.
Speaker:So it depends, uh, in, in smaller organizations where, you know, the,
Speaker:the, it, uh, you know, support doesn't want to have to answer the call to
Speaker:help someone install, you know, widget.
Speaker:Uh, they would much rather just give them the ability to do that and, and
Speaker:not have to take so many phone calls.
Speaker:Um, but in larger organizations that leads to what we call shadow it.
Speaker:You know, the, the ability to download and do stuff and make changes and build
Speaker:things without it being involved, well, that lends itself to more issues down the
Speaker:road with patch management and conflict and vulnerabilities and other things that
Speaker:it doesn't know about because they weren't involved with helping you do those things.
Speaker:And so, you know, restricting access and privilege is, is necessary in a large,
Speaker:um, user environment for a lot of reasons.
Speaker:Persona, do you?
Speaker:Go ahead.
Speaker:Security is one of those.
Speaker:Persona.
Speaker:You, you remember the, uh, the episode, the wifi is down
Speaker:Yep,
Speaker:one of our OG episodes, and they, that particular person said that they had,
Speaker:what was it, 450 SaaS applications.
Speaker:applications.
Speaker:Yeah.
Speaker:That just blew me away when they said that.
Speaker:Um.
Speaker:So Mike, this is all, um, like amazing, just learning about off the land attacks.
Speaker:How come it isn't talked about more often?
Speaker:Like it seems that this would be very common for a lot of the attack vectors and
Speaker:what guys are doing, but like Curtis, like you mentioned at the start of this, right?
Speaker:It's things, something you had really heard about.
Speaker:So it, it, it is, it's not the, it's not the sexy part of the attack.
Speaker:Right.
Speaker:So when you're telling a story, that's the part where people
Speaker:start to Yeah, absolutely.
Speaker:You know, that's the part of the, that's the part of the story where
Speaker:people's eyes kind of gloss over 'cause it gets pretty technical and
Speaker:it's not as exciting as, you know.
Speaker:They, they, they broke in and they, and then they, they made off with all the
Speaker:goods, uh, all that stuff in the middle.
Speaker:People just kind of get blurry about because it's, it's not the, it's not
Speaker:the, it's not the cause of the effect.
Speaker:It's the, it's the creamy feeling.
Speaker:that excites me sometimes, but, uh,
Speaker:I, if I, if I can make an analogy, there was recently this, uh, huge.
Speaker:Uh, uh, heist at the Louvre, right?
Speaker:Where, where the guys, and like I'm drawing an analogy where like the living
Speaker:off the land was like the yellow vests.
Speaker:Like they just pretended to be part of the crew.
Speaker:Uh, and so people just, they did, you know, it wasn't the
Speaker:sexy part that attacked that.
Speaker:They managed to just sort of look like they belong there and just sort of
Speaker:get in and out in the middle of broad daylight and steal the crown jewels.
Speaker:Um, yeah.
Speaker:many, are so many ties to, to the kinetic world with cyber,
Speaker:you know, all those analogies.
Speaker:Uh, I can, I've, I've done social engineering and, and red teaming and
Speaker:breaking into buildings for years and.
Speaker:All of that stuff is very similar.
Speaker:You know, as soon as I make it in a door a building, the first
Speaker:thing I target is the break room.
Speaker:And I get a cup of coffee.
Speaker:'cause somebody that's walking around with coffee less suspicious than someone
Speaker:that's wandering around aimlessly.
Speaker:Uh, and then, you know, if you've got a clipboard or a name badge or a
Speaker:notepad or whatever, I can tell you I started, I started breaking into
Speaker:buildings upon request, not, not
Speaker:Yeah,
Speaker:uh.
Speaker:understand.
Speaker:Man, 2004.
Speaker:So 22 years.
Speaker:Uh, and not once, never once has anybody stopped and asked me if I needed help
Speaker:or are you, who are you here to see?
Speaker:Or who are you or nothing?
Speaker:22 years.
Speaker:I, I, maybe I, people don't wanna talk to me, that's fine.
Speaker:But, but that's helped me be successful at social engineering.
Speaker:By the way, I love, I love your, I love it when you use fancy
Speaker:words like the kinetic world.
Speaker:I, I've never heard anyone call it the kinetic world before.
Speaker:You mean like the real world as opposed to the cyber world.
Speaker:and you can touch stuff.
Speaker:Okay.
Speaker:I've never, I've literally never heard the term kinetic.
Speaker:I, I know the term kinetic.
Speaker:Like,
Speaker:fall then?
Speaker:what's that?
Speaker:That's
Speaker:Where
Speaker:the,
Speaker:fall
Speaker:that's the virtual world.
Speaker:there's the kinetic, there's the kinetic, uh, matrix of, of things
Speaker:that supports the, the, the cyber.
Speaker:Uh, you know, and I guess you could, you could do analog
Speaker:and digital too, but, yeah,
Speaker:All right.
Speaker:I just, I just, I had to call that out.
Speaker:is, is in the kinetic world.
Speaker:What's that?
Speaker:The Nebuchadnezzar, the ship in
Speaker:Oh, right, right.
Speaker:It's in the kinetic world.
Speaker:Exactly.
Speaker:Exactly.
Speaker:Nice, nice, uh, deep reference there.
Speaker:So we, so this is about, we're, we're, we're in the environment, right?
Speaker:But basically we wanna spread around.
Speaker:We want to do stuff without being attacked, and the best, I'm
Speaker:sorry, without being detected.
Speaker:And so the best way to do that is to use tools that.
Speaker:Again, aren't being monitored because they're just part of the
Speaker:normal, uh, way of doing business.
Speaker:Does that sound about right?
Speaker:then.
Speaker:And, and you're right.
Speaker:And, and those tools can facilitate the different phases of an attack.
Speaker:So sometimes, uh, you know, those tools are used to do reconnaissance and,
Speaker:you know, the, the, the slow, the low and slow stuff, the stealthy stuff.
Speaker:'cause you don't want to get caught before you're able to, to really,
Speaker:you know, kick up your attack.
Speaker:So you do the, the reconnaissance stuff really quietly and then you use
Speaker:those tools to pull down, you know.
Speaker:The other parts of your attack.
Speaker:So maybe you've got payloads or, additional software like Mimi
Speaker:Cats as an example for credential harvesting and that kind of stuff.
Speaker:So you would, you would go slow and, and methodical first, and then once
Speaker:you figured out how you, what you need to do next or what your, you know,
Speaker:the, the, the environment looks like.
Speaker:you, you start to do more.
Speaker:You, you're more active and, and you take more risk.
Speaker:Uh, and that's where you would, you know, evolve your attack
Speaker:into, into different tools.
Speaker:Mike, how, what role does the, you know, like the level
Speaker:of credentials play in this?
Speaker:Um, you know, if you're doing a living off of the land attack,
Speaker:what role does, like the level of credentials that you're using play.
Speaker:Man, what do I always say?
Speaker:It depends, right?
Speaker:Um, so.
Speaker:You know what?
Speaker:I'm just gonna cut every time you ever say It depends.
Speaker:I'm gonna make a super cut and it'll be a four hour long video, but go ahead, Mike.
Speaker:Somebody did a meme, uh, where, where they took all the ums.
Speaker:Oh, it was, it was our intern program.
Speaker:So the interns were, were doing a presentation and we, we, we give
Speaker:them constructive feedback and they were using the filler words, the ums
Speaker:and the, and so somebody, somebody on one of the other interns did
Speaker:a compilation of all the ums and
Speaker:Wow.
Speaker:And so it was just a consistent, um, uh, uh.
Speaker:So your answer is, it depends.
Speaker:so it does depend, uh, and what I mean by that is it depends on the
Speaker:capabilities in the environment to monitor for weird stuff.
Speaker:So it would be weird for the receptionist to run PowerShell in an environment
Speaker:she's also a, you know, a computer science student or something like that.
Speaker:It would not be weird for an admin to be running these
Speaker:administratively related tools.
Speaker:Or scripts or uh, uh, activities.
Speaker:So in the cyber world, we have tools that do what are called
Speaker:user and behavioral user behavior.
Speaker:I'll get it right in a second.
Speaker:User and event behavior analytics or UEBA.
Speaker:a user, it creates a baseline, so type of user, type of device.
Speaker:And it, it tries to delineate between what's normal on these anomalies.
Speaker:So if you've got a. Even an admin account that doesn't use PowerShell
Speaker:very often if a bad guy compromises that environment and that admin
Speaker:account, now he's running PowerShell in some weird way that should, that
Speaker:could be flagged or should be flagged.
Speaker:But it depends on, depends on the capabilities in that environment.
Speaker:Now Windows inherently you, you can set up logging and alerting,
Speaker:but a lot of organizations don't.
Speaker:They don't, they don't wanna spend the time it's noisy.
Speaker:'cause Windows environments talk a lot.
Speaker:Uh, and then.
Speaker:Even if there is an alert that one or two or a few, it people are busy putting
Speaker:out fires and it's gonna be a day or a week before they go, Hey, there was this
Speaker:alert thing, that I need to look into.
Speaker:So it's a mess.
Speaker:Uh, but yeah, uh, there, there are ways of there identifying weird
Speaker:stuff based on the type of user, uh, that's conducting that activity.
Speaker:So, I know you talked about monitoring, alerting, Mike.
Speaker:there other things that.
Speaker:can do because with these living off the land attacks, it's already
Speaker:there, like all the tools are there that this person needs.
Speaker:so basically saying you're screwed if you're trying to protect these things
Speaker:and prevent these sort of attacks from using the tools that already exist.
Speaker:You are not, and.
Speaker:And, and it, it, it's just how much overhead do you wanna put
Speaker:on securing your environment?
Speaker:One of the things, just taking you back to another example of a resource
Speaker:that's available 24 7 that shouldn't be.
Speaker:And, and I'm, so I'm alluding to, you know, some of these administrative
Speaker:tools being available all the time, even if the administrator doesn't
Speaker:need it, remote access into your network from supporting vendors.
Speaker:Why is that available 24 hours a day if I don't currently need your help?
Speaker:It's because someone's too lazy to go turn off the modem and yeah, I said modem,
Speaker:or disable that VPN access or suspend that user account because it, it's,
Speaker:it creates overhead very similarly.
Speaker:can suspend services running on in our environment.
Speaker:We can turn off, uh, administrative services that aren't being used when
Speaker:they're not necessary, don't do that.
Speaker:And then ideally, um, because we don't do that, uh, you would wanna
Speaker:monitor for the use of those things.
Speaker:And a lot of organizations still think that we don't need that, or it's too
Speaker:expensive, or, you know, we don't have the skillset, you know, whatever the case is.
Speaker:There's always, there's excuses after excuses, but.
Speaker:Yeah, I think, I think this, we, we've talked about this, uh, and
Speaker:we're gonna give, we're gonna give a couple action items here.
Speaker:Uh, we've talked about, like, one of the things that comes up a lot is RDP, right?
Speaker:And that RDP is very, very useful.
Speaker:But RDP open all the time, and RDP, especially RDP, accessible via.
Speaker:The internet, right.
Speaker:Directly accessible via the internet is just, you're just, it's just,
Speaker:there's like asking for trouble.
Speaker:Right?
Speaker:Um, and so there are ways to turn it off and turn it on when you need it.
Speaker:Uh, and there's also, and, and, and you know, again,
Speaker:you, you, you, you alluded to.
Speaker:You alluded to, there's, there's a, there's a budget,
Speaker:uh, aspect of this, right?
Speaker:So there are remote access tools that are much more secure
Speaker:than RDP that you could enact.
Speaker:Uh, it, it's just, it's going to increase your costs, but perhaps
Speaker:increase your costs a little bit with a much higher level of security.
Speaker:I, I think it's a matter of like finding, finding that sweet spot, right?
Speaker:Where, where's the, some things I think we can do.
Speaker:Where it's, it's a, there's a little bit of hassle and I, I, I'll give another
Speaker:perfect example of something that you suggested back on a previous podcast
Speaker:that I enacted in my personal life.
Speaker:And that was using, um, you know, you, the idea was that don't have, uh, you
Speaker:know, when you, when you go into your bank, like don't have a bunch of other
Speaker:tabs open and all that kind of stuff.
Speaker:And, and the way I, and the way I. Decided to implement that was, if
Speaker:I do anything that's that level of security, I do it in a different browser.
Speaker:Right.
Speaker:Meaning a different brand of browser.
Speaker:Right.
Speaker:And, and then I, um, and since I use Chrome as like my main browser,
Speaker:I implemented a, uh, I, there's a tool that allows me to blacklist.
Speaker:Certain sites, right?
Speaker:Like Citibank, right?
Speaker:I can say if I ever, 'cause, 'cause I, I don't know if you
Speaker:know this, Mike, I forget stuff.
Speaker:I got CRS like a lot and I forget that I, that I told myself, I'm
Speaker:not gonna log into Citibank on my.
Speaker:Chrome browser.
Speaker:And so I do it.
Speaker:I'll type in, I'll type in citi.com, and Chrome will say, you know, you
Speaker:told us not to let you do that.
Speaker:And I'm like, oh yeah.
Speaker:And then I go over to Firefox minor level of inconvenience for
Speaker:a significant change in security.
Speaker:And I think it's a matter of finding those things for these
Speaker:living off the land, uh, attacks.
Speaker:Does that sound about right?
Speaker:It does.
Speaker:And if I could continue your bank analogy a little further.
Speaker:So your browser would be the living off the land part, especially
Speaker:if you save your password.
Speaker:Yeah.
Speaker:Uh, so that guy just has to compromise your machine and identify
Speaker:the browsers you use and then.
Speaker:Yeah, trial and error.
Speaker:Chrome doesn't work.
Speaker:Oh, Firefox does work.
Speaker:Oh, and you saved your password.
Speaker:So now I'm, I'm in your bank because I've used the resources
Speaker:available to me on your machine.
Speaker:Well, then the, the evolution of that activity would generate,
Speaker:you know, some kind of log, or event triggers in the bank, right?
Speaker:So somebody logged in at 2:00 AM from a different IP address than, you know, your.
Speaker:Recent IP addresses.
Speaker:Right.
Speaker:a, an email or a text message potentially related to that.
Speaker:if they buy stuff or change stuff, you should hopefully have
Speaker:alerting or events related to that.
Speaker:And if there's any transactions over a certain threshold, you should have
Speaker:alerting related to those things.
Speaker:Right.
Speaker:are the, those are the things.
Speaker:And just going back to the living off the land part.
Speaker:know, bad guys are gonna do reconnaissance first and be quiet, but then when
Speaker:they're ready to, to execute their, plan, they're not necessarily as up, uh, as
Speaker:concerned with how loud they're gonna be.
Speaker:'cause it's gonna happen very quickly.
Speaker:Hmm.
Speaker:Nice.
Speaker:So let's talk.
Speaker:Go ahead, prana.
Speaker:we, so Mike, I know you said that people will act fast.
Speaker:How far or how much time is taken usually in that first step of kind of scoping
Speaker:things out, using, uh, living off the land versus, okay, now I'm actually
Speaker:gonna execute and sort of run with it.
Speaker:And like you said, they don't care how loud it is.
Speaker:They're gonna make a bunch of noise, break a bunch of things, but
Speaker:they're trying to go as quickly as possible before they're detected.
Speaker:If I could write, it depends backwards so that it would show up the right
Speaker:way, I would, uh, but it depends.
Speaker:But like is it like 90% of the time is typically spent in the first phase
Speaker:and less time is spent in the second?
Speaker:Is that a fair assumption?
Speaker:and there, there are some good statistics around that.
Speaker:But yeah.
Speaker:As an example, a, an attack that could last four hours had probably 30 to 90
Speaker:days worth of reconnaissance ahead of it.
Speaker:Hmm.
Speaker:So, yeah, that's interesting.
Speaker:Um.
Speaker:So, uh, all right, well, let's talk about, we, PowerShell has come up a lot.
Speaker:What, what can we do with PowerShell and, you know, is there anything that's like
Speaker:the easy idea that I talked about earlier?
Speaker:Is there a way to easily disable and re-enable PowerShell when we need it?
Speaker:So of all the environments that I've, I've worked with or in.
Speaker:Very few of them use PowerShell very much.
Speaker:There's usually that one, that one admin, that one person that knows how to use it
Speaker:and that uses it because they're, they get it and then man, it makes life easy.
Speaker:Everybody else doesn't need it.
Speaker:And in a lot of cases, PowerShell is not necessarily required or
Speaker:needed across an entire environment.
Speaker:Hmm.
Speaker:You might just need it between your admin machine and Office 365 or
Speaker:those, or, or your server cluster, take it off of everything else.
Speaker:And, and that just, that goes back to hardening.
Speaker:So how do I harden my network?
Speaker:Well, you've first gotta understand your network, right?
Speaker:Know yourself.
Speaker:What, what do I, what am I responsible for?
Speaker:How do all these things work?
Speaker:What is their primary role?
Speaker:Hopefully you've got one machine for one role.
Speaker:We, we would call that a bastion host, like your web server's, just
Speaker:your web server, that's not also your financial server or your backup server.
Speaker:Uh, and then for, for those roles and that purpose of that machine, what's needed,
Speaker:what's necessary to, to support it.
Speaker:Like you don't need Bluetooth active on a production server.
Speaker:It doesn't need to be a web server unless it's a web server.
Speaker:You don't need.
Speaker:Uh, it doesn't need print server services running.
Speaker:so those are just examples of the services running.
Speaker:Well, now let's, let's look at all the, the, the overhead from a, a file and
Speaker:help, uh, you know, software perspective.
Speaker:Your server doesn't need Microsoft Solitaire and games.
Speaker:It doesn't need all the help.
Speaker:It doesn't need all the help files, it doesn't need templates.
Speaker:And, and all of the, the pre-installed.
Speaker:You know, garbage that the, the vendor, whether it's Dell or whoever, uh, so much
Speaker:that can be done to, to make a machine run more effectively and securely.
Speaker:If you can really understand what it's gonna do, and then
Speaker:take everything else off, turn it
Speaker:But Mike, that takes, but that takes work.
Speaker:it, it takes work.
Speaker:So again, it depends.
Speaker:So if, if I've got all these machines.
Speaker:And I spend the time to develop what I would call a, a golden image, right?
Speaker:So, um, I, I take one machine and I say, this is exactly how I want this done.
Speaker:Well create an image of that and apply it on the other, however many.
Speaker:And then for each one of those golden images, I can add back on top of
Speaker:that base golden image, the things that are particular to that server.
Speaker:So your, so your golden image is, is, is, uh, like in this case, uh,
Speaker:PowerShell is disabled everywhere.
Speaker:But then for that one person who needs PowerShell, you can turn it on.
Speaker:Correct.
Speaker:Yeah.
Speaker:And that's, that's great too because if you have an issue with that
Speaker:machine, re-apply the image, right?
Speaker:Uh,
Speaker:Hmm.
Speaker:Yeah.
Speaker:from scratch without having to figure out what broke and how to fix it.
Speaker:Is there, is there a way for us to figure out the tools, esp if we're,
Speaker:if we're, if we're trying to secure things for, you know, against a living
Speaker:off the land attack, is there a way to figure out the tools like PowerShell
Speaker:that are in use in our environment?
Speaker:By, by the use of, by looking at like the ports that they're using, for example.
Speaker:There are, um, and.
Speaker:And, and there's free tools.
Speaker:One's called Nmap, uh, another one's called Wireshark.
Speaker:Uh, so those are network protocol analyzers, so you can run
Speaker:that across your environment.
Speaker:It'll tell you by IP address.
Speaker:Here's the ports that are open and based on the, the
Speaker:default service for a given port, it'll, it'll give you a description of what it
Speaker:thinks might be running on that port.
Speaker:But bad guys are also pretty good, uh, at, at changing what ports are being
Speaker:used so that you're not suspicious of, uh, um, of network activity.
Speaker:Like we had an incident call on on Friday where a school district
Speaker:said, I think I'm getting hacked.
Speaker:I just shut my network down.
Speaker:right, well, let's look into that.
Speaker:Well, it was, uh.
Speaker:Um, expired certificates for a website, and then on the back
Speaker:end, the logs showed that,
Speaker:data was going out.
Speaker:Uh, iic ICMP data was going out to this, uh, AWS IP address.
Speaker:Well, ICMP by itself, not a bad thing, but to a, uh, an IP address that
Speaker:maybe doesn't have a good reputation.
Speaker:That could be a bad guy just sending, like intentionally changing what
Speaker:port they're sending data out so that it looks like ICMP, but maybe
Speaker:it's just low throttle, you know, throttled down data exfiltration, uh,
Speaker:turned out to be a false positive.
Speaker:It was actually their web filter for the school district.
Speaker:but, uh, we helped them learn something new that day.
Speaker:but bad guys do that.
Speaker:Uh, our, our engineers will exfil credentials over the DNS port
Speaker:because you can't block DNS.
Speaker:hardly anybody's, you know, monitoring that port.
Speaker:Right.
Speaker:you just do it slow and methodically, then you could, you could exfil quite a
Speaker:bit of data, uh, over a period of time.
Speaker:Yeah, I think we talked about that with when we had, um, uh, what's his name?
Speaker:Uh, Dwayne Persona.
Speaker:The Red Teamer.
Speaker:Yeah.
Speaker:When we had the red teamer on there, he talked a lot about, about the use of DNS.
Speaker:Um, you know, you gave me a memory back when my daughter was young and I was a
Speaker:little concerned about some of the traffic that I was seeing, uh, coming into.
Speaker:Um, the computer she was using and I went and I bought a SonicWall firewall, right.
Speaker:That had content filtering.
Speaker:And she came in the front, she came in the front, it was literally
Speaker:just sit, there was a box, a SonicWall box sitting on the couch.
Speaker:She walked in, she goes, SonicWall, what's that doing here?
Speaker:And I said, well, yeah, it's for this.
Speaker:She's like, they use that at the school.
Speaker:It won't let you do anything.
Speaker:And I'm like, yes.
Speaker:I was like.
Speaker:I bought the right one.
Speaker:Um, anyway, so the other, uh, so something you talked about with, um, this idea of
Speaker:that it was going to a place that maybe that isn't quite trusted, that brings
Speaker:up another concept of this idea, either either application, white listing or IP
Speaker:address, white listing in terms of is that another way that we can And, and, and it's
Speaker:another tool where it's, when you start, it's probably gonna be a giant pain.
Speaker:Right.
Speaker:If you say no applications are allowed to be used except for those
Speaker:that have been blessed by it, it's gonna really suck for a while.
Speaker:But is that, again, this goes back to the turning off, um, admin, is
Speaker:this a common practice as well?
Speaker:I.
Speaker:It is.
Speaker:And if you put the work in upfront, it's gonna be a little less headache.
Speaker:And what I mean by that is if, if you want to implement.
Speaker:You know, kind of white listing, black listing policies start
Speaker:with getting to know everybody.
Speaker:Like go sit with the engineers, go sit with the accounting and executives
Speaker:and find out what they're using, or do some of your own homework.
Speaker:You know, there's logs out there.
Speaker:Uh, but go, go talk to them about what you want to do and, and the, the purpose,
Speaker:like we're, we're doing this to, to make things, uh, safer, but it also helps us
Speaker:reduce risk and problems with computers and, you know, all that good stuff.
Speaker:So help me understand.
Speaker:What you need to do your job, and then I'm gonna use that to, to develop a
Speaker:plan to, to make us all safe and, and, you know, better, better, you know,
Speaker:better running and, uh, environment and computers with fewer problems.
Speaker:So you really have to do that research upfront where you're looking at
Speaker:the, the things that are being used.
Speaker:And again, you can do, you can use the network monitoring tool to do that.
Speaker:These are the things that are happening.
Speaker:What's that?
Speaker:I've got another, another example of that and, and.
Speaker:Yeah, how you, how you do this.
Speaker:Uh, and, and by this I mean this exercise of, of understanding what
Speaker:your business needs or what the, your employees need to do their job.
Speaker:a lot of times it just, no, nobody spends time on an exercise like that
Speaker:until there's smoke or fire, right?
Speaker:And then, and then we're like, well, what caused it?
Speaker:Why did this happen?
Speaker:How did you let this get this bad?
Speaker:You know, that kind of thing.
Speaker:And, and really, if you, if you.
Speaker:understand security and whether that's physical security or cyber, it's gotta
Speaker:start with understanding what you're protecting and how this whole place works.
Speaker:A good example of that would be a school district.
Speaker:Schools in Texas primarily don't care to have network connections to
Speaker:China unless you've got like some sister school and there's a program
Speaker:over there and this kind of thing.
Speaker:the most part, we don't communicate with China.
Speaker:Uh, a a a public school in Texas.
Speaker:So why are we allowing traffic from China to even reach our network?
Speaker:Right?
Speaker:So there's that.
Speaker:Alright, well then, uh, uh, a bigger kind of, more interesting story is I
Speaker:had a friend that worked for match.com as their IT security person, and they
Speaker:didn't do any geo IP blocking at the firewall and they were getting hit
Speaker:millions of times a day from overseas.
Speaker:And a lot of those, the intent was to create fake female profiles in the
Speaker:application, uh, for the only purpose of phishing, um, personal email addresses
Speaker:out of the male members of match.com that they could then spam those male
Speaker:me, those male uh, members', personal emails with, uh, pornography links.
Speaker:And those bad guys were making millions of dollars a day through phished pornography
Speaker:link clicks because of bots on the dating site that were coming from overseas.
Speaker:And the moment, I'll tell you how bad this was, the moment that they
Speaker:implemented geo IP blocking@max.com,
Speaker:The traffic to 10%.
Speaker:well, uh, from an organized crime perspective, this is how bad it was.
Speaker:Uh, you know, they were just kind of a, uh, an introverted kind of nobody.
Speaker:They just did their job and went home and played Xbox, you know, that kind of thing.
Speaker:And one day they went home after having implemented geo ip blocking.
Speaker:It did, it had such an impact on the organized crime ring
Speaker:that was running this thing.
Speaker:they had actually shipped a wooden casket and it was propped up on their front porch
Speaker:that told them to undo the GOIP blocking.
Speaker:Oh
Speaker:That doesn't sound good.
Speaker:That's the dark side, you know.
Speaker:Um, so, uh, all right.
Speaker:Well, I, we could, we could talk about this all day, but I, I, I, I
Speaker:think we get, you know, identify.
Speaker:Things that you need to, you know, that your organization needs to get the job
Speaker:done, places that your organization needs to communicate with to get the job done.
Speaker:Investigate all that stuff and then start investigating, locking things down, right?
Speaker:Turning off applications that aren't being used, turning off regions that are, that,
Speaker:that we have no reason communicating with.
Speaker:And, um, and, and consider application white listing, uh, you
Speaker:know, and, and no administrative privileges on machines, right?
Speaker:Unless, unless that.
Speaker:Person needs and I'll, I'll tell one final story about this.
Speaker:Going back a hundred years when I was consulting at a certain
Speaker:communication company and um.
Speaker:I, we had determined, or I had figured out that, that all their
Speaker:engineering team had, um, admin route on their Unix workstations.
Speaker:And I talked to the boss.
Speaker:I was like, there is no reason that they need route on
Speaker:their, on their workstations.
Speaker:And so I went around and I. I changed the root password.
Speaker:The, uh, each of them had a use, like, let's say the user ID was Curtis.
Speaker:There was a user ID called Curtis Zero that had a UID of zero, which was
Speaker:basically root and they had that password.
Speaker:And I went around and I removed that entry and I rebooted the machine, right?
Speaker:And, um, one of the guys was really, really angry and, um.
Speaker:He was like, well, you know when you reboot the machine, like the
Speaker:license manager doesn't come back up.
Speaker:And I go, well, if the license manager needs to come back up when you reboot the
Speaker:machine, why don't you just put it in the startup file so that it reboots or so it
Speaker:restarts when they reboot the machine.
Speaker:He says, I don't know how to do that.
Speaker:And that's her is why you don't have root.
Speaker:And I actually like your, your story about the, the Unix environment
Speaker:because, um, you could, you can take away people's and, and I and I, and I
Speaker:will also promote this, even if you're an admin, run your machine as admin,
Speaker:Right,
Speaker:machine as a normal user and then elect to run applications as admin.
Speaker:You just have to put your credentials in every time,
Speaker:right.
Speaker:save you.
Speaker:So similar to the Unix environment, you know, you, you, you run as a normal user
Speaker:and then you pseudo to, to route when you need to use, and that also creates a
Speaker:log, uh, an audit log of If everybody's using Curtis Zero, then no one, there's
Speaker:no accountability for who did what.
Speaker:It just says Curtis zero.
Speaker:That was actually my nickname in high school.
Speaker:Curtis Hero.
Speaker:Anyway.
Speaker:All right.
Speaker:Well, thank you very much, Mike.
Speaker:Uh, and everyone thank you persona again.
Speaker:No, this was good.
Speaker:Yeah.
Speaker:All right.
Speaker:That is a wrap.







