More than a byte

More than a Byte

How hackers get privileged access to IT systems

More than a byteCybercrime is on the rise, and sensitive, corporate information is one of the top targets of external and internal attacks. Most organizations are prepared to protect their data with firewalls, IPS, IDS, DLP, IAM, SIEM and other systems, but they are not prepared for advanced, persistent threats.

It is no coincidence that several compliance regulations, such as PCI-DSS, specify rules for monitoring the activities of employees, especially those having privileged rights. The most costly and dangerous cyber- attacks are made by using privileged accounts, as these accounts have access to all sensitive information. No wonder privileged identities have emerged as the primary target for cyber-attacks and have been exploited to perpetrate the most destructive data breaches in recent years.

For this reason, BalaBit IT Security hosted a hacker competition last summer with the most-popular Hungarian IT security blog, Buhera Blog, and the professional, ethical hacking company, Silent Signal. The aim was to provide a framework, “Ghost in the Shell Control Box: The Ultimate Hacker Playground,” where anyone, such as university students or security professionals, could try to get privileged access to a sample IT system. The most successful players were awarded.

All the hackers’ activities were tracked by Shell Control Box, a privileged access monitoring appliance. This transparent device records activities in movie-like audit trails that can be searched and replayed. With Shell Control Box, it is possible to monitor what is happening in the IT system and prevent malicious user activities in real-time, either external or internal, and even those initiated by users with the highest privileges.

Our analysis is based on more than 17,000 high-quality, tamper-proof and confidential audit trail files (6.6 GB), recorded by Shell Control Box during the one-week competition. The audit trails can be used as evidence in cases of troubleshooting or forensics investigations.

The Ultimate Hacker Playground

The hackers’ playground, based on an existing, global, financial institution’s IT system, where exactly one server of a local subsidiary was copied with all IT services and security tools, consisted of four levels. The task was to get root access to the server on each level. The server ran a content management system, a project management system and a web management interface of a backend database, serving the CMS and PMS. A firewall was implemented with stricter restrictions than generally used, and the server was able to filter the most widespread, automated, offensive tools so that some basic intrusion prevention system and intrusion detection system functionalities were covered.

The Mission: Get Privileged Access

Organizers of the hacker competition tracked each user’s activities, and thanks to Shell Control Box, it is now possible to model the whole process of getting privileged rights from first entry to root access.

Nearly 400 hackers including engineering students, IT and IT security professionals, and employees of IT security vendors took part in the competition. Only a small percent used TOR anonymity networks, even though they knew their activities were tracked.

Nine percent of the hacker players were able to complete at least the first level and get privileged access to the target server. Six percent of the players were able to complete all four levels. Half of those who completed all four levels did so within 24 hours; the fastest player finished within 7 hours.

Methods for Breaking into the IT System

Compared to log-based forensics, the visualizing capability of Shell Control Box significantly reduced the time required to reconstruct the event. It can be seen that:

  • There were two possible ways to complete the first level of the hackers’ playground. Forty-five percent of the hackers were able to discover the vulnerability of the project management software. Sixty-two percent could upload files to the server through this vulnerability, and 7 percent could bypass the restrictions. (PHP files were not allowed to upload).
  • Another possible option was to get root access through the content management system. Nearly 25 percent of the hackers were able to notice a backup configuration file that was left behind in the system. Most wasted time trying to break the password database, although it was possible to add new users.
  • Another 32 percent used SQL injection to get information, preferring to use automated tools and web scanners. The most popular tools were SQLmap, SQL Power Injector and bsqlb.
  • In many cases, PHP shells were downloaded from untrusted sources, which meant that approximately 2 percent of the hackers used shells that “call home” and open a door for the creator of the shell. Using one of these untrusted shells, a Turkish robot could get into the IT system and upload the main page of their website[u1].

Although the vulnerabilities of the example company were immediately patched after being discovered, the fact is that it was copied from a real IT system. There was a time when such vulnerabilities existed in that IT system, and this gives us a reason to focus more on the security.

Lesson Learned

From the results of the hacker competition, you can see how easy it could be to get privileged access. This highlights the importance of monitoring the privileged users’ activities through the commonly-used, administrative protocols (SSH, RDP, HTTP, Citrix, VNC, Telnet) and differentiating the usual behavior from the unusual in real-time.

Although monitoring the actions of privileged users has become a key part of enterprise risk management, it is a challenging exercise. The following best practices can give a helping hand to mitigate the risks related to super users. To gain real benefits from a Privileged Activity Monitoring (PAM) solution:

Adopt the least-privilege principle. Give a user account only those privileges that are essential to that user’s work.

Use unlimited access only in emergency situations. Generally, system administrators do not need unlimited access to the systems they manage. Lock your super user accounts (root, admin, system, and so on), and use them only if absolutely needed.

Personalize every single account. Make personal accountability possible among privileged users. The first step is to minimize the number of shared accounts. The second rule is that sharedaccount passwords must not be shared. Then, go on with the elaboration of functional areas, detecting incompatibilities and segregating duties.

Limit the number of systems in scope for each person’s privileged accounts. System administrators should have super user privileges only on the systems that are needed, those consistent with business and operational needs. This is a common audit recommendation.

Build a central user monitoring infrastructure. Log management or SIEM solutions do not capture all the necessary information. The easiest way to eliminate these blind spots is to use a PAM solution that augments the existing logs by showing precisely what the user did as opposed to the technical results of what he did.

Implement an independent and transparent activity monitoring device. Implement an independent PAM tool that operates transparently and extracts the audit information directly from the communication between the client and the server. This prevents anyone from modifying the audited information—not even the administrator of the device can tamper with the encrypted audit trails.

Use strong authentication and authorization for privileged accounts. Where super user privileges are assigned to personal accounts, protect those accounts with strong authentication methods. To avoid accidental misconfiguration and other human error, certain PAMs support the 4-eyes authorization principle. This is achieved by requiring an “authorizer” to track administrator actions on the server.

Control remote access in detail. The most secure way is to control who can access what and when based on the protocol being used. With the right PAM solution, it is possible to control filetransfers and other unusual traffic. For example, protocol channels, such as disk sharing, port-forwards or file-transfers, can be allowed or denied based on the group-membership of the user or the time of day.

Prevent malicious actions in real-time. Advanced PAM solutions can monitor the traffic of remote connections in real time, and execute various actions if a certain pattern (for example, a suspicious command or text) appears in the command line or on the screen.

In case of risky user action, the device can send an email alert or immediately terminate the connection. For example, the connection can be blocked before a harmful administrator command, such as “delete,” is executed on the server.

Improve forensics with movie-like playback and fast search. Advanced PAM tools can replay recorded sessions just like a movie, and all actions of the users can be seen exactly as they appeared on the monitor. These tools enable fast forwarding during replays, searching for events via typed commands or pressing “Enter” and texts seen by the user. In case of any problems like database manipulation, unexpected shutdown, etc., the circumstances of the event are available in the audit trails; thus, the cause of the incident can be easily identified.

This article originally appeared in the December 2013 issue of Security Today.


  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity


New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3