March 16, 2026

Living Off the Land Attack: Hackers Using Your Own Tools Against You

Living Off the Land Attack: Hackers Using Your Own Tools Against You
Apple Podcasts podcast player badge
Spotify podcast player badge
Castro podcast player badge
RSS Feed podcast player badge
Apple Podcasts podcast player iconSpotify podcast player iconCastro podcast player iconRSS Feed podcast player icon

A living off the land attack is one of the sneakiest techniques in a ransomware operator's playbook — and in this episode, Dr. Mike Saylor breaks down exactly what it is, how it works, and what your organization can actually do about it.

Instead of bringing their own tools into your environment (which might trip your alarms), attackers just use what's already there. PowerShell. WMI. RDP. The same tools your admins run every single day. To your monitoring systems, it looks completely normal. That's the whole point.

Mike and Curtis cover why attackers prefer your tools over their own, how recon can quietly run for 30 to 90 days before the attack goes loud, and what defenders can actually do about it — removing admin privileges, system hardening, golden images, application whitelisting, and free tools like Nmap and Wireshark. There's also a match.com story involving organized crime and a wooden casket on someone's front porch that you really don't want to miss.

0:00 - Intro

1:21 - Welcome and Book Announcement

3:28 - What Is a Living Off the Land Attack?

5:38 - Real-World Example: Conti Ransomware and WMI

8:12 - Why Attackers Use Your Tools Instead of Their Own

13:05 - Admin Privileges: Best Practice vs. Reality

17:31 - The Louvre Heist Analogy

20:08 - Recon Phase: Low and Slow

24:16 - What Defenders Can Do

25:55 - RDP and Remote Access

29:48 - The Recon Timeline: 30-90 Days

30:48 - PowerShell and System Hardening

34:10 - Network Discovery Tools (Nmap and Wireshark)

37:37 - Application Whitelisting and Geo IP Blocking

42:08 - Action Items and Wrap-Up

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we're talking about living off the land attacks.

Speaker:

And it's honestly, I think one of the sneakiest things that bad guys do, they

Speaker:

get into your environment and instead of bringing their own tools, because

Speaker:

you know they might trip your alarm systems, they use your tools against you.

Speaker:

Things like PowerShell or WMI tools that you're likely already using.

Speaker:

My co-author, Dr. Mike Saylor, breaks down how this works.

Speaker:

Why it's so hard to detect and what you can actually do about it, I think, uh,

Speaker:

there's a lot of value in this episode.

Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.

Speaker:

Backup, and I've been passionate about backup and recovery for over, can't

Speaker:

believe it, 30 years ever since I had to tell my boss there were no backups of the

Speaker:

production database that we had just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the backup wrap up.

Speaker:

I'm your host, w Curtis Preston, AKA, Mr. Backup, and I have with me a

Speaker:

guy who seems to laugh at my errors.

Speaker:

Persona, Molly nios going Persona.

Speaker:

I am good, Curtis.

Speaker:

I nothing like with friends like this who needs enemies.

Speaker:

Exactly.

Speaker:

I just, I, I make, I make, I make mistakes.

Speaker:

And you, well, honestly, I get, I get I like them too.

Speaker:

I, it makes it, making me laugh.

Speaker:

Makes me laugh.

Speaker:

It's just funny that, uh, how long has the, has it, it been called the

Speaker:

backup wrap up at least two years now.

Speaker:

I think about, oh yeah, probably two years.

Speaker:

And I still, my brain wants to say Backup centrals restore it all, which

Speaker:

is the original name of the podcast.

Speaker:

But, um, anyway, I don't know.

Speaker:

Well, welcome to our, uh, pity party, Mike.

Speaker:

Doctor Mike Saylor.

Speaker:

How's it going?

Speaker:

It is going well guys.

Speaker:

Thanks for having me.

Speaker:

My co-author on our lovely book, learning Ransomware Response and

Speaker:

Recovery, which Mike, I understand you, you have some to show us.

Speaker:

You don't have it hung yet, but there he is.

Speaker:

The official.

Speaker:

Framed copy of our book.

Speaker:

Yeah, just hold it just like that.

Speaker:

For the next, for the next half hour.

Speaker:

Yeah.

Speaker:

Very.

Speaker:

Yeah.

Speaker:

O'Reilly does that.

Speaker:

They send you a copy when, uh, um.

Speaker:

You know, when it's ready.

Speaker:

And by the way, I just got a, I just got news from one of my folks

Speaker:

on LinkedIn that the book said it's gonna be there on Tuesday.

Speaker:

So they, you know, they ordered it in, they ordered it in January and uh,

Speaker:

Amazon says it's gonna be there Tuesday.

Speaker:

So, very exciting.

Speaker:

Any,

Speaker:

So for all our listeners, go out, order the book, listen, or then you can actually

Speaker:

read what Curtis and Mike have been doing

Speaker:

yeah.

Speaker:

many, many, many, many months.

Speaker:

Many, many months.

Speaker:

And then give us a review on Amazon, uh, if you, if you like it,

Speaker:

then come back

Speaker:

yeah.

Speaker:

come back to the podcast

Speaker:

And comment.

Speaker:

be going, no, because we'll be going more in depth into many of these topics.

Speaker:

Yes, we will.

Speaker:

Yes, we will.

Speaker:

And today we're talking about something that honestly, I, I had, I had heard

Speaker:

the, I had heard the term, but it wasn't, you know, given that I don't, uh, live

Speaker:

that side of it the way you do, Mike.

Speaker:

Um.

Speaker:

The, um, this term living off land was something new to me.

Speaker:

So, uh, I, why don't you give us a, do you have a story that kind of gives

Speaker:

us an idea of what we're talking about when we talk about living off the land?

Speaker:

Well, there's, there's lots of stories.

Speaker:

Um, but living off the land is, is often part of some bigger,

Speaker:

bigger campaign, bigger attack.

Speaker:

Something you hear about in the news.

Speaker:

You know, somebody got hacked, somebody had ransomware, somebody,

Speaker:

you know, lost a bunch of data.

Speaker:

the living off the land.

Speaker:

Part of that was simply, um.

Speaker:

Something that facilitated that attack to some degree.

Speaker:

So, and, and from, as an auditor, an IT person, cyber person, you know, I

Speaker:

harp on organizations all the time.

Speaker:

Whatever you build, make it focused on whatever it's doing.

Speaker:

so, you know, the other term for that is system hardening.

Speaker:

You know, uh, delete things you, you don't need.

Speaker:

Turn stuff off, you're not gonna use, close the port.

Speaker:

Don't talk to things that you don't need to talk to.

Speaker:

Um, those are all fruits of the land that a bad guy could use,

Speaker:

uh, to facilitate an attack.

Speaker:

Some of those you can't turn off, uh, like Windows Management as an example, or

Speaker:

WMI, uh, the operating system needs that.

Speaker:

Uh, there are other things like PowerShell, uh, whether it's a, a

Speaker:

system that uses it or an admin that uses it for scripting, but story short.

Speaker:

Uh, bad guys will figure out a way to circumvent the security controls you

Speaker:

have that are looking for the deployment or installation of bad guy tools.

Speaker:

they'll get through that, that filter, that gate, uh, by using

Speaker:

tools that are native to the systems that they're attacking, uh, in

Speaker:

order to facilitate their attack.

Speaker:

Um, so.

Speaker:

If

Speaker:

So.

Speaker:

there was a story in the book, you talked about a Seattle logistics firm, it was

Speaker:

hit by a Conti ransomware, uh, variant.

Speaker:

It was saying that it, it infected 60% of the firm servers and it, it was the

Speaker:

same thing where it was, they somehow used the administrators, the, their

Speaker:

administrative tools against them.

Speaker:

Yep.

Speaker:

So windows management and very powerful at, at deploying.

Speaker:

Um.

Speaker:

You know, code or, or malware across an environment, and especially if it's the

Speaker:

admin or a service, running as an admin.

Speaker:

I remember years ago we, we, uh, we responded to an incident where it

Speaker:

was actually the, it was the security tool that was running, uh, a service

Speaker:

with administrative privileges that was compromised by a bad guy.

Speaker:

And they used the security tools itself, service that was running to, uh, to spread

Speaker:

the, the malware across the environment.

Speaker:

So Mike, just a clarification.

Speaker:

you say living off the land, is it specifically just taking whatever

Speaker:

tools are in an environment and using that in order to propagate your

Speaker:

attack or to, uh, execute your attack?

Speaker:

Or is it also, for instance, um.

Speaker:

resources a as an example, someone might have had some virtual machines sitting

Speaker:

around that they sort of forgot about from an inventory perspective or other

Speaker:

things that might be deployed in a company that they're not, no longer tracking,

Speaker:

doesn't get the latest security patches.

Speaker:

Those sort of things that they then start to think about when you talk about land.

Speaker:

It, it would definitely escalate to that if, if they have the

Speaker:

time to identify those, but.

Speaker:

Traditionally living off the land is, is services or applications,

Speaker:

uh, resident on the machines they're attacking or using to attack.

Speaker:

Now, as a bad guy, they, they find this, this, uh, this target

Speaker:

host with all these goodies on it.

Speaker:

but then they realize, well, this is the admin's computer, so if I do stuff from

Speaker:

this computer, they may note, they may notice some latency or resource drain.

Speaker:

so maybe they do some recon first, or they figure out a way to stand up a

Speaker:

virtual machine in that environment.

Speaker:

Uh, ideally using a dormant one instead of, you know, setting off some

Speaker:

potential bells about creating a new one, but then migrate those tools or

Speaker:

figure out if there's a way to, to, uh, uh, employ those tools on that

Speaker:

virtual machine that's not being used.

Speaker:

that's a, that would be a pretty good tactic.

Speaker:

Yeah, I, it comes from, you know, the, the term, you know, for those

Speaker:

of us that have been, uh, lived in either a suburb or urban environment

Speaker:

or entire life, the concept of living off the land is that you're going.

Speaker:

To literally live off of what is available.

Speaker:

You know, that this term is, is an old term.

Speaker:

It doesn't have anything to do or that originally didn't have anything to

Speaker:

do with, uh, the world of computers.

Speaker:

The idea is you're gonna live somewhere and you're going to

Speaker:

use what is available on that.

Speaker:

You know, that property in order to, uh, survive.

Speaker:

And so I, I think, I think that's a perfect term.

Speaker:

Uh, you know, think of like an episode of Survivor, uh, basically right?

Speaker:

You're only allowed to use what's a avail, what's there, right?

Speaker:

And so that's why, you know, they call this a living off the land because you're

Speaker:

going to use, you know, you, meaning the, the attacker is going to use whatever

Speaker:

tools are available to them and, and why.

Speaker:

What, what's the purpose of that?

Speaker:

Uh, Mike, meaning that, you know, why don't I want to, let's say I've got this

Speaker:

great tool that does this amazing thing.

Speaker:

Why wouldn't I, if I've got access to the environment, why wouldn't I just

Speaker:

install this, this great tool that I have that does this cool thing?

Speaker:

Why would I do this living off land?

Speaker:

So there's a couple of layers of, uh, hopefully a couple of layers

Speaker:

that organizations have in place.

Speaker:

Uh, one of those is monitoring incoming payloads.

Speaker:

Uh, so a file type.

Speaker:

Well, and I guess that's the other part.

Speaker:

How, how would you get that payload into the environment?

Speaker:

Is that a, an attachment to a phishing email?

Speaker:

Is it compromised credentials?

Speaker:

Uh, in either case?

Speaker:

Uh, payloads usually have a, a, you know, a good amount of baggage with them.

Speaker:

It's not a, you know, it's not kilobytes.

Speaker:

It's usually megabytes and sometimes, uh, multiple mega, you know, a hundred,

Speaker:

400 megabytes of, of size, depending.

Speaker:

Um.

Speaker:

So the, the, the first layer is, or the first hurdle is how do

Speaker:

I get it into the environment?

Speaker:

The second one is, how do I get past all the filters, whether that's

Speaker:

antivirus and malware, spam filter, et cetera, that's not gonna strip

Speaker:

that attachment or that, that payload out of the, the communication.

Speaker:

And then the last part of that is a lot of times, uh, ideally we would limit.

Speaker:

Uh, a user's ability to install something on an endpoint, uh, to,

Speaker:

uh, you know, a privileged account.

Speaker:

Uh, so if, if, if you compromise the, you know, the receptionist, she shouldn't be

Speaker:

a local admin, uh, so she shouldn't be able to, that account shouldn't be able

Speaker:

to install stuff locally, that payload.

Speaker:

So if you can craft your, your attack utilizing tools that are resident.

Speaker:

You're simply connecting to the machine and running that stuff that's already

Speaker:

installed and you're running it locally.

Speaker:

The other benefit of running it locally, uh, is that a lot of times

Speaker:

those services are already installed and using administrative privileges.

Speaker:

Is it also true though, Mike, that I know you talked about how do you get the

Speaker:

malware in or whatever the package is into the environment, like from an attacker's

Speaker:

perspective, once they've sort of, like you mentioned PowerShell earlier, right?

Speaker:

Once they sort of have a methodology to propagate the attack, to actually

Speaker:

live off the land, that's something they can then replicate in other

Speaker:

companies, organizations, and not just limit it to like one company, correct.

Speaker:

Right.

Speaker:

Yeah.

Speaker:

So fundamentally windows and environments work the same.

Speaker:

You know, there, there are some of the older ones have a few services and, and.

Speaker:

Methods for communicating that are probably still enabled versus

Speaker:

today's, um, I think there's a lot more network segmentation and

Speaker:

some other things that, that are common today than there used to be.

Speaker:

Uh, but for sure, if you can build a, an attack strategy in a Windows

Speaker:

environment, um, you should be able to replicate that to some degree just

Speaker:

about any, in any Windows network.

Speaker:

When you were talking about the, the hurdles.

Speaker:

W would another hurdle be even, even if you've got, you, you

Speaker:

managed to download the file, you managed to get past the filters.

Speaker:

Would there be additional filters required to actually execute this, uh, tool?

Speaker:

If, if you're talking about some, yeah.

Speaker:

Yeah.

Speaker:

Um.

Speaker:

a lot of environments would require administrative

Speaker:

privileges in order to execute.

Speaker:

So as an example, a normal user might not be able to run registry editor or

Speaker:

even a command prompt or even change their desktop, you know, wallpaper.

Speaker:

Um, and so, yeah, after, after you install it, you, you've also

Speaker:

gotta figure out, you know, what privileges do you need to run it.

Speaker:

Now I remember what I, now I remember what I forgot.

Speaker:

You, you, you brought up a topic a couple of times and it's, it's outside

Speaker:

of the scope of what I wanted to talk about today, but I thought we'd

Speaker:

just talk a, talk about it, a little about it, and that is this concept

Speaker:

of not allowing, uh, regular users to have admin on their own machines.

Speaker:

I know that as best practice.

Speaker:

The question is, is it common practice?

Speaker:

Uh, whi which way that they do have admin practice.

Speaker:

they do not have, that I, I know that it's best practice not to give Joe Schmo.

Speaker:

You know that that shouldn't have admin, admin even on his local

Speaker:

machine, even though that is.

Speaker:

You know, inconvenient to him.

Speaker:

Uh, we often talk about that security is, is inconvenient.

Speaker:

Right?

Speaker:

Right.

Speaker:

So even though that's inconvenient, it's also inconvenient to the IT

Speaker:

people because now that anytime Joe Schmo needs a new tool, we have

Speaker:

to be the one to go install it.

Speaker:

Which sounds amazing in terms of security, but it also sounds

Speaker:

like a giant pain in the butt.

Speaker:

What, uh, what, how common is it that people actually do this?

Speaker:

Uh, that's, that's a, how common it is is difficult.

Speaker:

But I can tell you in in regulated organizations, you know, those that

Speaker:

have to be compliant with something.

Speaker:

Uh, there is a, a control check for making sure that local, you

Speaker:

know, users don't have, you know, um, more privileges than they need.

Speaker:

Well, then organizations get around that by justifying the need for a user to

Speaker:

have, uh, you know, admin privileges.

Speaker:

And, and I see that even, um, and, and well, you know, mature.

Speaker:

Uh, and secure environments.

Speaker:

An engineer has local admin because he needs to run, you know, some kind

Speaker:

of CAD software with, you know, the ability to manipulate memory and, you

Speaker:

know, graphics and all this other stuff.

Speaker:

Um, thinking, well, it's justified.

Speaker:

Well, bad guys realize this too.

Speaker:

So those are the users they're gonna target.

Speaker:

They're not gonna target the receptionist, uh, you know, for, for the most part.

Speaker:

Um.

Speaker:

So it depends, uh, in, in smaller organizations where, you know, the,

Speaker:

the, it, uh, you know, support doesn't want to have to answer the call to

Speaker:

help someone install, you know, widget.

Speaker:

Uh, they would much rather just give them the ability to do that and, and

Speaker:

not have to take so many phone calls.

Speaker:

Um, but in larger organizations that leads to what we call shadow it.

Speaker:

You know, the, the ability to download and do stuff and make changes and build

Speaker:

things without it being involved, well, that lends itself to more issues down the

Speaker:

road with patch management and conflict and vulnerabilities and other things that

Speaker:

it doesn't know about because they weren't involved with helping you do those things.

Speaker:

And so, you know, restricting access and privilege is, is necessary in a large,

Speaker:

um, user environment for a lot of reasons.

Speaker:

Persona, do you?

Speaker:

Go ahead.

Speaker:

Security is one of those.

Speaker:

Persona.

Speaker:

You, you remember the, uh, the episode, the wifi is down

Speaker:

Yep,

Speaker:

one of our OG episodes, and they, that particular person said that they had,

Speaker:

what was it, 450 SaaS applications.

Speaker:

applications.

Speaker:

Yeah.

Speaker:

That just blew me away when they said that.

Speaker:

Um.

Speaker:

So Mike, this is all, um, like amazing, just learning about off the land attacks.

Speaker:

How come it isn't talked about more often?

Speaker:

Like it seems that this would be very common for a lot of the attack vectors and

Speaker:

what guys are doing, but like Curtis, like you mentioned at the start of this, right?

Speaker:

It's things, something you had really heard about.

Speaker:

So it, it, it is, it's not the, it's not the sexy part of the attack.

Speaker:

Right.

Speaker:

So when you're telling a story, that's the part where people

Speaker:

start to Yeah, absolutely.

Speaker:

You know, that's the part of the, that's the part of the story where

Speaker:

people's eyes kind of gloss over 'cause it gets pretty technical and

Speaker:

it's not as exciting as, you know.

Speaker:

They, they, they broke in and they, and then they, they made off with all the

Speaker:

goods, uh, all that stuff in the middle.

Speaker:

People just kind of get blurry about because it's, it's not the, it's not

Speaker:

the, it's not the cause of the effect.

Speaker:

It's the, it's the creamy feeling.

Speaker:

that excites me sometimes, but, uh,

Speaker:

I, if I, if I can make an analogy, there was recently this, uh, huge.

Speaker:

Uh, uh, heist at the Louvre, right?

Speaker:

Where, where the guys, and like I'm drawing an analogy where like the living

Speaker:

off the land was like the yellow vests.

Speaker:

Like they just pretended to be part of the crew.

Speaker:

Uh, and so people just, they did, you know, it wasn't the

Speaker:

sexy part that attacked that.

Speaker:

They managed to just sort of look like they belong there and just sort of

Speaker:

get in and out in the middle of broad daylight and steal the crown jewels.

Speaker:

Um, yeah.

Speaker:

many, are so many ties to, to the kinetic world with cyber,

Speaker:

you know, all those analogies.

Speaker:

Uh, I can, I've, I've done social engineering and, and red teaming and

Speaker:

breaking into buildings for years and.

Speaker:

All of that stuff is very similar.

Speaker:

You know, as soon as I make it in a door a building, the first

Speaker:

thing I target is the break room.

Speaker:

And I get a cup of coffee.

Speaker:

'cause somebody that's walking around with coffee less suspicious than someone

Speaker:

that's wandering around aimlessly.

Speaker:

Uh, and then, you know, if you've got a clipboard or a name badge or a

Speaker:

notepad or whatever, I can tell you I started, I started breaking into

Speaker:

buildings upon request, not, not

Speaker:

Yeah,

Speaker:

uh.

Speaker:

understand.

Speaker:

Man, 2004.

Speaker:

So 22 years.

Speaker:

Uh, and not once, never once has anybody stopped and asked me if I needed help

Speaker:

or are you, who are you here to see?

Speaker:

Or who are you or nothing?

Speaker:

22 years.

Speaker:

I, I, maybe I, people don't wanna talk to me, that's fine.

Speaker:

But, but that's helped me be successful at social engineering.

Speaker:

By the way, I love, I love your, I love it when you use fancy

Speaker:

words like the kinetic world.

Speaker:

I, I've never heard anyone call it the kinetic world before.

Speaker:

You mean like the real world as opposed to the cyber world.

Speaker:

and you can touch stuff.

Speaker:

Okay.

Speaker:

I've never, I've literally never heard the term kinetic.

Speaker:

I, I know the term kinetic.

Speaker:

Like,

Speaker:

fall then?

Speaker:

what's that?

Speaker:

That's

Speaker:

Where

Speaker:

the,

Speaker:

fall

Speaker:

that's the virtual world.

Speaker:

there's the kinetic, there's the kinetic, uh, matrix of, of things

Speaker:

that supports the, the, the cyber.

Speaker:

Uh, you know, and I guess you could, you could do analog

Speaker:

and digital too, but, yeah,

Speaker:

All right.

Speaker:

I just, I just, I had to call that out.

Speaker:

is, is in the kinetic world.

Speaker:

What's that?

Speaker:

The Nebuchadnezzar, the ship in

Speaker:

Oh, right, right.

Speaker:

It's in the kinetic world.

Speaker:

Exactly.

Speaker:

Exactly.

Speaker:

Nice, nice, uh, deep reference there.

Speaker:

So we, so this is about, we're, we're, we're in the environment, right?

Speaker:

But basically we wanna spread around.

Speaker:

We want to do stuff without being attacked, and the best, I'm

Speaker:

sorry, without being detected.

Speaker:

And so the best way to do that is to use tools that.

Speaker:

Again, aren't being monitored because they're just part of the

Speaker:

normal, uh, way of doing business.

Speaker:

Does that sound about right?

Speaker:

then.

Speaker:

And, and you're right.

Speaker:

And, and those tools can facilitate the different phases of an attack.

Speaker:

So sometimes, uh, you know, those tools are used to do reconnaissance and,

Speaker:

you know, the, the, the slow, the low and slow stuff, the stealthy stuff.

Speaker:

'cause you don't want to get caught before you're able to, to really,

Speaker:

you know, kick up your attack.

Speaker:

So you do the, the reconnaissance stuff really quietly and then you use

Speaker:

those tools to pull down, you know.

Speaker:

The other parts of your attack.

Speaker:

So maybe you've got payloads or, additional software like Mimi

Speaker:

Cats as an example for credential harvesting and that kind of stuff.

Speaker:

So you would, you would go slow and, and methodical first, and then once

Speaker:

you figured out how you, what you need to do next or what your, you know,

Speaker:

the, the, the environment looks like.

Speaker:

you, you start to do more.

Speaker:

You, you're more active and, and you take more risk.

Speaker:

Uh, and that's where you would, you know, evolve your attack

Speaker:

into, into different tools.

Speaker:

Mike, how, what role does the, you know, like the level

Speaker:

of credentials play in this?

Speaker:

Um, you know, if you're doing a living off of the land attack,

Speaker:

what role does, like the level of credentials that you're using play.

Speaker:

Man, what do I always say?

Speaker:

It depends, right?

Speaker:

Um, so.

Speaker:

You know what?

Speaker:

I'm just gonna cut every time you ever say It depends.

Speaker:

I'm gonna make a super cut and it'll be a four hour long video, but go ahead, Mike.

Speaker:

Somebody did a meme, uh, where, where they took all the ums.

Speaker:

Oh, it was, it was our intern program.

Speaker:

So the interns were, were doing a presentation and we, we, we give

Speaker:

them constructive feedback and they were using the filler words, the ums

Speaker:

and the, and so somebody, somebody on one of the other interns did

Speaker:

a compilation of all the ums and

Speaker:

Wow.

Speaker:

And so it was just a consistent, um, uh, uh.

Speaker:

So your answer is, it depends.

Speaker:

so it does depend, uh, and what I mean by that is it depends on the

Speaker:

capabilities in the environment to monitor for weird stuff.

Speaker:

So it would be weird for the receptionist to run PowerShell in an environment

Speaker:

she's also a, you know, a computer science student or something like that.

Speaker:

It would not be weird for an admin to be running these

Speaker:

administratively related tools.

Speaker:

Or scripts or uh, uh, activities.

Speaker:

So in the cyber world, we have tools that do what are called

Speaker:

user and behavioral user behavior.

Speaker:

I'll get it right in a second.

Speaker:

User and event behavior analytics or UEBA.

Speaker:

a user, it creates a baseline, so type of user, type of device.

Speaker:

And it, it tries to delineate between what's normal on these anomalies.

Speaker:

So if you've got a. Even an admin account that doesn't use PowerShell

Speaker:

very often if a bad guy compromises that environment and that admin

Speaker:

account, now he's running PowerShell in some weird way that should, that

Speaker:

could be flagged or should be flagged.

Speaker:

But it depends on, depends on the capabilities in that environment.

Speaker:

Now Windows inherently you, you can set up logging and alerting,

Speaker:

but a lot of organizations don't.

Speaker:

They don't, they don't wanna spend the time it's noisy.

Speaker:

'cause Windows environments talk a lot.

Speaker:

Uh, and then.

Speaker:

Even if there is an alert that one or two or a few, it people are busy putting

Speaker:

out fires and it's gonna be a day or a week before they go, Hey, there was this

Speaker:

alert thing, that I need to look into.

Speaker:

So it's a mess.

Speaker:

Uh, but yeah, uh, there, there are ways of there identifying weird

Speaker:

stuff based on the type of user, uh, that's conducting that activity.

Speaker:

So, I know you talked about monitoring, alerting, Mike.

Speaker:

there other things that.

Speaker:

can do because with these living off the land attacks, it's already

Speaker:

there, like all the tools are there that this person needs.

Speaker:

so basically saying you're screwed if you're trying to protect these things

Speaker:

and prevent these sort of attacks from using the tools that already exist.

Speaker:

You are not, and.

Speaker:

And, and it, it, it's just how much overhead do you wanna put

Speaker:

on securing your environment?

Speaker:

One of the things, just taking you back to another example of a resource

Speaker:

that's available 24 7 that shouldn't be.

Speaker:

And, and I'm, so I'm alluding to, you know, some of these administrative

Speaker:

tools being available all the time, even if the administrator doesn't

Speaker:

need it, remote access into your network from supporting vendors.

Speaker:

Why is that available 24 hours a day if I don't currently need your help?

Speaker:

It's because someone's too lazy to go turn off the modem and yeah, I said modem,

Speaker:

or disable that VPN access or suspend that user account because it, it's,

Speaker:

it creates overhead very similarly.

Speaker:

can suspend services running on in our environment.

Speaker:

We can turn off, uh, administrative services that aren't being used when

Speaker:

they're not necessary, don't do that.

Speaker:

And then ideally, um, because we don't do that, uh, you would wanna

Speaker:

monitor for the use of those things.

Speaker:

And a lot of organizations still think that we don't need that, or it's too

Speaker:

expensive, or, you know, we don't have the skillset, you know, whatever the case is.

Speaker:

There's always, there's excuses after excuses, but.

Speaker:

Yeah, I think, I think this, we, we've talked about this, uh, and

Speaker:

we're gonna give, we're gonna give a couple action items here.

Speaker:

Uh, we've talked about, like, one of the things that comes up a lot is RDP, right?

Speaker:

And that RDP is very, very useful.

Speaker:

But RDP open all the time, and RDP, especially RDP, accessible via.

Speaker:

The internet, right.

Speaker:

Directly accessible via the internet is just, you're just, it's just,

Speaker:

there's like asking for trouble.

Speaker:

Right?

Speaker:

Um, and so there are ways to turn it off and turn it on when you need it.

Speaker:

Uh, and there's also, and, and, and you know, again,

Speaker:

you, you, you, you alluded to.

Speaker:

You alluded to, there's, there's a, there's a budget,

Speaker:

uh, aspect of this, right?

Speaker:

So there are remote access tools that are much more secure

Speaker:

than RDP that you could enact.

Speaker:

Uh, it, it's just, it's going to increase your costs, but perhaps

Speaker:

increase your costs a little bit with a much higher level of security.

Speaker:

I, I think it's a matter of like finding, finding that sweet spot, right?

Speaker:

Where, where's the, some things I think we can do.

Speaker:

Where it's, it's a, there's a little bit of hassle and I, I, I'll give another

Speaker:

perfect example of something that you suggested back on a previous podcast

Speaker:

that I enacted in my personal life.

Speaker:

And that was using, um, you know, you, the idea was that don't have, uh, you

Speaker:

know, when you, when you go into your bank, like don't have a bunch of other

Speaker:

tabs open and all that kind of stuff.

Speaker:

And, and the way I, and the way I. Decided to implement that was, if

Speaker:

I do anything that's that level of security, I do it in a different browser.

Speaker:

Right.

Speaker:

Meaning a different brand of browser.

Speaker:

Right.

Speaker:

And, and then I, um, and since I use Chrome as like my main browser,

Speaker:

I implemented a, uh, I, there's a tool that allows me to blacklist.

Speaker:

Certain sites, right?

Speaker:

Like Citibank, right?

Speaker:

I can say if I ever, 'cause, 'cause I, I don't know if you

Speaker:

know this, Mike, I forget stuff.

Speaker:

I got CRS like a lot and I forget that I, that I told myself, I'm

Speaker:

not gonna log into Citibank on my.

Speaker:

Chrome browser.

Speaker:

And so I do it.

Speaker:

I'll type in, I'll type in citi.com, and Chrome will say, you know, you

Speaker:

told us not to let you do that.

Speaker:

And I'm like, oh yeah.

Speaker:

And then I go over to Firefox minor level of inconvenience for

Speaker:

a significant change in security.

Speaker:

And I think it's a matter of finding those things for these

Speaker:

living off the land, uh, attacks.

Speaker:

Does that sound about right?

Speaker:

It does.

Speaker:

And if I could continue your bank analogy a little further.

Speaker:

So your browser would be the living off the land part, especially

Speaker:

if you save your password.

Speaker:

Yeah.

Speaker:

Uh, so that guy just has to compromise your machine and identify

Speaker:

the browsers you use and then.

Speaker:

Yeah, trial and error.

Speaker:

Chrome doesn't work.

Speaker:

Oh, Firefox does work.

Speaker:

Oh, and you saved your password.

Speaker:

So now I'm, I'm in your bank because I've used the resources

Speaker:

available to me on your machine.

Speaker:

Well, then the, the evolution of that activity would generate,

Speaker:

you know, some kind of log, or event triggers in the bank, right?

Speaker:

So somebody logged in at 2:00 AM from a different IP address than, you know, your.

Speaker:

Recent IP addresses.

Speaker:

Right.

Speaker:

a, an email or a text message potentially related to that.

Speaker:

if they buy stuff or change stuff, you should hopefully have

Speaker:

alerting or events related to that.

Speaker:

And if there's any transactions over a certain threshold, you should have

Speaker:

alerting related to those things.

Speaker:

Right.

Speaker:

are the, those are the things.

Speaker:

And just going back to the living off the land part.

Speaker:

know, bad guys are gonna do reconnaissance first and be quiet, but then when

Speaker:

they're ready to, to execute their, plan, they're not necessarily as up, uh, as

Speaker:

concerned with how loud they're gonna be.

Speaker:

'cause it's gonna happen very quickly.

Speaker:

Hmm.

Speaker:

Nice.

Speaker:

So let's talk.

Speaker:

Go ahead, prana.

Speaker:

we, so Mike, I know you said that people will act fast.

Speaker:

How far or how much time is taken usually in that first step of kind of scoping

Speaker:

things out, using, uh, living off the land versus, okay, now I'm actually

Speaker:

gonna execute and sort of run with it.

Speaker:

And like you said, they don't care how loud it is.

Speaker:

They're gonna make a bunch of noise, break a bunch of things, but

Speaker:

they're trying to go as quickly as possible before they're detected.

Speaker:

If I could write, it depends backwards so that it would show up the right

Speaker:

way, I would, uh, but it depends.

Speaker:

But like is it like 90% of the time is typically spent in the first phase

Speaker:

and less time is spent in the second?

Speaker:

Is that a fair assumption?

Speaker:

and there, there are some good statistics around that.

Speaker:

But yeah.

Speaker:

As an example, a, an attack that could last four hours had probably 30 to 90

Speaker:

days worth of reconnaissance ahead of it.

Speaker:

Hmm.

Speaker:

So, yeah, that's interesting.

Speaker:

Um.

Speaker:

So, uh, all right, well, let's talk about, we, PowerShell has come up a lot.

Speaker:

What, what can we do with PowerShell and, you know, is there anything that's like

Speaker:

the easy idea that I talked about earlier?

Speaker:

Is there a way to easily disable and re-enable PowerShell when we need it?

Speaker:

So of all the environments that I've, I've worked with or in.

Speaker:

Very few of them use PowerShell very much.

Speaker:

There's usually that one, that one admin, that one person that knows how to use it

Speaker:

and that uses it because they're, they get it and then man, it makes life easy.

Speaker:

Everybody else doesn't need it.

Speaker:

And in a lot of cases, PowerShell is not necessarily required or

Speaker:

needed across an entire environment.

Speaker:

Hmm.

Speaker:

You might just need it between your admin machine and Office 365 or

Speaker:

those, or, or your server cluster, take it off of everything else.

Speaker:

And, and that just, that goes back to hardening.

Speaker:

So how do I harden my network?

Speaker:

Well, you've first gotta understand your network, right?

Speaker:

Know yourself.

Speaker:

What, what do I, what am I responsible for?

Speaker:

How do all these things work?

Speaker:

What is their primary role?

Speaker:

Hopefully you've got one machine for one role.

Speaker:

We, we would call that a bastion host, like your web server's, just

Speaker:

your web server, that's not also your financial server or your backup server.

Speaker:

Uh, and then for, for those roles and that purpose of that machine, what's needed,

Speaker:

what's necessary to, to support it.

Speaker:

Like you don't need Bluetooth active on a production server.

Speaker:

It doesn't need to be a web server unless it's a web server.

Speaker:

You don't need.

Speaker:

Uh, it doesn't need print server services running.

Speaker:

so those are just examples of the services running.

Speaker:

Well, now let's, let's look at all the, the, the overhead from a, a file and

Speaker:

help, uh, you know, software perspective.

Speaker:

Your server doesn't need Microsoft Solitaire and games.

Speaker:

It doesn't need all the help.

Speaker:

It doesn't need all the help files, it doesn't need templates.

Speaker:

And, and all of the, the pre-installed.

Speaker:

You know, garbage that the, the vendor, whether it's Dell or whoever, uh, so much

Speaker:

that can be done to, to make a machine run more effectively and securely.

Speaker:

If you can really understand what it's gonna do, and then

Speaker:

take everything else off, turn it

Speaker:

But Mike, that takes, but that takes work.

Speaker:

it, it takes work.

Speaker:

So again, it depends.

Speaker:

So if, if I've got all these machines.

Speaker:

And I spend the time to develop what I would call a, a golden image, right?

Speaker:

So, um, I, I take one machine and I say, this is exactly how I want this done.

Speaker:

Well create an image of that and apply it on the other, however many.

Speaker:

And then for each one of those golden images, I can add back on top of

Speaker:

that base golden image, the things that are particular to that server.

Speaker:

So your, so your golden image is, is, is, uh, like in this case, uh,

Speaker:

PowerShell is disabled everywhere.

Speaker:

But then for that one person who needs PowerShell, you can turn it on.

Speaker:

Correct.

Speaker:

Yeah.

Speaker:

And that's, that's great too because if you have an issue with that

Speaker:

machine, re-apply the image, right?

Speaker:

Uh,

Speaker:

Hmm.

Speaker:

Yeah.

Speaker:

from scratch without having to figure out what broke and how to fix it.

Speaker:

Is there, is there a way for us to figure out the tools, esp if we're,

Speaker:

if we're, if we're trying to secure things for, you know, against a living

Speaker:

off the land attack, is there a way to figure out the tools like PowerShell

Speaker:

that are in use in our environment?

Speaker:

By, by the use of, by looking at like the ports that they're using, for example.

Speaker:

There are, um, and.

Speaker:

And, and there's free tools.

Speaker:

One's called Nmap, uh, another one's called Wireshark.

Speaker:

Uh, so those are network protocol analyzers, so you can run

Speaker:

that across your environment.

Speaker:

It'll tell you by IP address.

Speaker:

Here's the ports that are open and based on the, the

Speaker:

default service for a given port, it'll, it'll give you a description of what it

Speaker:

thinks might be running on that port.

Speaker:

But bad guys are also pretty good, uh, at, at changing what ports are being

Speaker:

used so that you're not suspicious of, uh, um, of network activity.

Speaker:

Like we had an incident call on on Friday where a school district

Speaker:

said, I think I'm getting hacked.

Speaker:

I just shut my network down.

Speaker:

right, well, let's look into that.

Speaker:

Well, it was, uh.

Speaker:

Um, expired certificates for a website, and then on the back

Speaker:

end, the logs showed that,

Speaker:

data was going out.

Speaker:

Uh, iic ICMP data was going out to this, uh, AWS IP address.

Speaker:

Well, ICMP by itself, not a bad thing, but to a, uh, an IP address that

Speaker:

maybe doesn't have a good reputation.

Speaker:

That could be a bad guy just sending, like intentionally changing what

Speaker:

port they're sending data out so that it looks like ICMP, but maybe

Speaker:

it's just low throttle, you know, throttled down data exfiltration, uh,

Speaker:

turned out to be a false positive.

Speaker:

It was actually their web filter for the school district.

Speaker:

but, uh, we helped them learn something new that day.

Speaker:

but bad guys do that.

Speaker:

Uh, our, our engineers will exfil credentials over the DNS port

Speaker:

because you can't block DNS.

Speaker:

hardly anybody's, you know, monitoring that port.

Speaker:

Right.

Speaker:

you just do it slow and methodically, then you could, you could exfil quite a

Speaker:

bit of data, uh, over a period of time.

Speaker:

Yeah, I think we talked about that with when we had, um, uh, what's his name?

Speaker:

Uh, Dwayne Persona.

Speaker:

The Red Teamer.

Speaker:

Yeah.

Speaker:

When we had the red teamer on there, he talked a lot about, about the use of DNS.

Speaker:

Um, you know, you gave me a memory back when my daughter was young and I was a

Speaker:

little concerned about some of the traffic that I was seeing, uh, coming into.

Speaker:

Um, the computer she was using and I went and I bought a SonicWall firewall, right.

Speaker:

That had content filtering.

Speaker:

And she came in the front, she came in the front, it was literally

Speaker:

just sit, there was a box, a SonicWall box sitting on the couch.

Speaker:

She walked in, she goes, SonicWall, what's that doing here?

Speaker:

And I said, well, yeah, it's for this.

Speaker:

She's like, they use that at the school.

Speaker:

It won't let you do anything.

Speaker:

And I'm like, yes.

Speaker:

I was like.

Speaker:

I bought the right one.

Speaker:

Um, anyway, so the other, uh, so something you talked about with, um, this idea of

Speaker:

that it was going to a place that maybe that isn't quite trusted, that brings

Speaker:

up another concept of this idea, either either application, white listing or IP

Speaker:

address, white listing in terms of is that another way that we can And, and, and it's

Speaker:

another tool where it's, when you start, it's probably gonna be a giant pain.

Speaker:

Right.

Speaker:

If you say no applications are allowed to be used except for those

Speaker:

that have been blessed by it, it's gonna really suck for a while.

Speaker:

But is that, again, this goes back to the turning off, um, admin, is

Speaker:

this a common practice as well?

Speaker:

I.

Speaker:

It is.

Speaker:

And if you put the work in upfront, it's gonna be a little less headache.

Speaker:

And what I mean by that is if, if you want to implement.

Speaker:

You know, kind of white listing, black listing policies start

Speaker:

with getting to know everybody.

Speaker:

Like go sit with the engineers, go sit with the accounting and executives

Speaker:

and find out what they're using, or do some of your own homework.

Speaker:

You know, there's logs out there.

Speaker:

Uh, but go, go talk to them about what you want to do and, and the, the purpose,

Speaker:

like we're, we're doing this to, to make things, uh, safer, but it also helps us

Speaker:

reduce risk and problems with computers and, you know, all that good stuff.

Speaker:

So help me understand.

Speaker:

What you need to do your job, and then I'm gonna use that to, to develop a

Speaker:

plan to, to make us all safe and, and, you know, better, better, you know,

Speaker:

better running and, uh, environment and computers with fewer problems.

Speaker:

So you really have to do that research upfront where you're looking at

Speaker:

the, the things that are being used.

Speaker:

And again, you can do, you can use the network monitoring tool to do that.

Speaker:

These are the things that are happening.

Speaker:

What's that?

Speaker:

I've got another, another example of that and, and.

Speaker:

Yeah, how you, how you do this.

Speaker:

Uh, and, and by this I mean this exercise of, of understanding what

Speaker:

your business needs or what the, your employees need to do their job.

Speaker:

a lot of times it just, no, nobody spends time on an exercise like that

Speaker:

until there's smoke or fire, right?

Speaker:

And then, and then we're like, well, what caused it?

Speaker:

Why did this happen?

Speaker:

How did you let this get this bad?

Speaker:

You know, that kind of thing.

Speaker:

And, and really, if you, if you.

Speaker:

understand security and whether that's physical security or cyber, it's gotta

Speaker:

start with understanding what you're protecting and how this whole place works.

Speaker:

A good example of that would be a school district.

Speaker:

Schools in Texas primarily don't care to have network connections to

Speaker:

China unless you've got like some sister school and there's a program

Speaker:

over there and this kind of thing.

Speaker:

the most part, we don't communicate with China.

Speaker:

Uh, a a a public school in Texas.

Speaker:

So why are we allowing traffic from China to even reach our network?

Speaker:

Right?

Speaker:

So there's that.

Speaker:

Alright, well then, uh, uh, a bigger kind of, more interesting story is I

Speaker:

had a friend that worked for match.com as their IT security person, and they

Speaker:

didn't do any geo IP blocking at the firewall and they were getting hit

Speaker:

millions of times a day from overseas.

Speaker:

And a lot of those, the intent was to create fake female profiles in the

Speaker:

application, uh, for the only purpose of phishing, um, personal email addresses

Speaker:

out of the male members of match.com that they could then spam those male

Speaker:

me, those male uh, members', personal emails with, uh, pornography links.

Speaker:

And those bad guys were making millions of dollars a day through phished pornography

Speaker:

link clicks because of bots on the dating site that were coming from overseas.

Speaker:

And the moment, I'll tell you how bad this was, the moment that they

Speaker:

implemented geo IP blocking@max.com,

Speaker:

The traffic to 10%.

Speaker:

well, uh, from an organized crime perspective, this is how bad it was.

Speaker:

Uh, you know, they were just kind of a, uh, an introverted kind of nobody.

Speaker:

They just did their job and went home and played Xbox, you know, that kind of thing.

Speaker:

And one day they went home after having implemented geo ip blocking.

Speaker:

It did, it had such an impact on the organized crime ring

Speaker:

that was running this thing.

Speaker:

they had actually shipped a wooden casket and it was propped up on their front porch

Speaker:

that told them to undo the GOIP blocking.

Speaker:

Oh

Speaker:

That doesn't sound good.

Speaker:

That's the dark side, you know.

Speaker:

Um, so, uh, all right.

Speaker:

Well, I, we could, we could talk about this all day, but I, I, I, I

Speaker:

think we get, you know, identify.

Speaker:

Things that you need to, you know, that your organization needs to get the job

Speaker:

done, places that your organization needs to communicate with to get the job done.

Speaker:

Investigate all that stuff and then start investigating, locking things down, right?

Speaker:

Turning off applications that aren't being used, turning off regions that are, that,

Speaker:

that we have no reason communicating with.

Speaker:

And, um, and, and consider application white listing, uh, you

Speaker:

know, and, and no administrative privileges on machines, right?

Speaker:

Unless, unless that.

Speaker:

Person needs and I'll, I'll tell one final story about this.

Speaker:

Going back a hundred years when I was consulting at a certain

Speaker:

communication company and um.

Speaker:

I, we had determined, or I had figured out that, that all their

Speaker:

engineering team had, um, admin route on their Unix workstations.

Speaker:

And I talked to the boss.

Speaker:

I was like, there is no reason that they need route on

Speaker:

their, on their workstations.

Speaker:

And so I went around and I. I changed the root password.

Speaker:

The, uh, each of them had a use, like, let's say the user ID was Curtis.

Speaker:

There was a user ID called Curtis Zero that had a UID of zero, which was

Speaker:

basically root and they had that password.

Speaker:

And I went around and I removed that entry and I rebooted the machine, right?

Speaker:

And, um, one of the guys was really, really angry and, um.

Speaker:

He was like, well, you know when you reboot the machine, like the

Speaker:

license manager doesn't come back up.

Speaker:

And I go, well, if the license manager needs to come back up when you reboot the

Speaker:

machine, why don't you just put it in the startup file so that it reboots or so it

Speaker:

restarts when they reboot the machine.

Speaker:

He says, I don't know how to do that.

Speaker:

And that's her is why you don't have root.

Speaker:

And I actually like your, your story about the, the Unix environment

Speaker:

because, um, you could, you can take away people's and, and I and I, and I

Speaker:

will also promote this, even if you're an admin, run your machine as admin,

Speaker:

Right,

Speaker:

machine as a normal user and then elect to run applications as admin.

Speaker:

You just have to put your credentials in every time,

Speaker:

right.

Speaker:

save you.

Speaker:

So similar to the Unix environment, you know, you, you, you run as a normal user

Speaker:

and then you pseudo to, to route when you need to use, and that also creates a

Speaker:

log, uh, an audit log of If everybody's using Curtis Zero, then no one, there's

Speaker:

no accountability for who did what.

Speaker:

It just says Curtis zero.

Speaker:

That was actually my nickname in high school.

Speaker:

Curtis Hero.

Speaker:

Anyway.

Speaker:

All right.

Speaker:

Well, thank you very much, Mike.

Speaker:

Uh, and everyone thank you persona again.

Speaker:

No, this was good.

Speaker:

Yeah.

Speaker:

All right.

Speaker:

That is a wrap.