Bypassing Cisco’s Sourcefire AMP endpoint solution

This article will demonstrate one of the key differences between NG AV endpoint protection and EDR solutions such as RSA NetWitness for Endpoints. In this article, we will demonstrate how Cisco’s endpoint protection solutions Sourcefire AMP is easily bypassed by performing a buffer overflow and in-memory post exploitation activities. This test was performed on a fully patched Windows 10 machine with an active MS Defender, MS Firewall, Cisco AMP & RSA NWE agent installed.

The setup used for this test was the following:

1

Windows 10 client protection verification

2

Vulnerable application is installed and running

3

Cisco SourceFire AMP does not find any issues on the clean machine

4

AMP tracking information does not highlight any suspicious activities

5

RSA NWE does not find any suspicious activities on the clean machine

6

Attacker – KALI setting up exploit & payload module

7

8

Running remote buffer overflow exploit

9

No alerting from either Cisco AMP or MS Defender…

15

Attacker runs additional post exploitation activities such as a keylogger

11

Attacker searches and downloads password.txt & creates a screenshot

12

Attacker performs a ARP network scan

13

Attacker start an interactive SHELL and runs WHOAMI & IPCONFIG commands

14

Still no alerting from either Cisco AMP or MS Defender…

15

Cisco AMP does not detect or notifies on exploit and post exploit activities….

23

16

Now let’s look at RSA NWE

17

1819202122

What would you prefer?…….

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s