Skip to content

mzet-/z-field-manual

Repository files navigation

CNE Field Manual

Computer Network Exploitation Field Guide

Introduction and purpose of this guide.

Glossary

For the purpose of this publication following terms are used:

CNE - Computer Network Exploitation. Term adopted from US DoD. Types of enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary information systems or networks.

Field manual - term adopted from US Military. Field manuals contain detailed information and how-tos for procedures important to soldiers serving in the field.

Z Field manual - field manual developed and maintained by Z-Labs that contains detailed information and how-tos for precedures important to red team operators / penetration testers serving / working in the field of cyber security.

Attack trees -

Attack graphs -

Kill Chain -

Tactic -

TTP -

MITRE ATT&CK -

NSA/CSS Cyber Threat Framework -

TIBER EU -

Strategic Assumptions

On strategical level we're usually communicating with the stakeholders (e.g. organization's executives) regarding cyber security in terms of a risk.

Risk = threats x vulnerabilities x assets

Conceptually breaking down red teaming process:

  1. We study the behavior of known cyber threat actors to understand the threats they colud pose.
  2. We study the customer's environment (people, processes, technology) and business to understand under what threat model they operate.
  3. We analyze, adapt, refine and design the TTPs (tactics, techniques, procedures) that could be used by our customer's adversaries.
  4. We develop and run adversarial operations to simulate highly probable, sophisticated and realistic attacks tailored specifically for the target organization.

Operational Considerations

Operation Planning

1. Identify biggest risks for your target
2. Set goal(s): objectives to accomplish based on identified risks

Goals

List of typical goals (typically affecting victim's data CIA triad):

Goals

Operation Preparation

1. Consider level of OPSSEC required
2. Preapre attack infrastructure
3. Initiate preliminary research on your target (adhering to required OPSEC level)

Infrastructure preparation:

Red team infrastructure - preparing and managing cloud-based attack infrstructure.

Arch Linux - preparation and deployment of universal computing node (Arch Linux) on various platforms.

Service deployments - deploying disposable HTTP services for the purpose of attack operation.

Running an Operation

1. Determine a set of tactical objectives required to achieve your operational goal(s)
2. Achieve required tactical objective(s)
3. Choose feasible combination of techniques to achieve given tactical objective

Tactical Objectives

Intelligence Gathering

Collection of discovery techniques and associated procedures commonly used during various stages of intrusion lifecycle.

OSINT Discovery

Network Discovery

Active Directory (AD) Discovery

[ Cloud Discovery ]

Services Discovery: HTTP-based | All other

Getting Foothold

Repository of techniques and associated procedures (in a form of attack trees) used for gaining initial foothold in target network environment.

Getting Inside Attack Tree

Attack (sub) trees:

TODO

Expanding Influence

Repository of techniques and associated procedures (in a form of attack trees) used for accomplishing operational goals in target network environment.

Expanding Influence Attack Tree

Attack (sub) trees:

[ Escalating Windows domain privileges ]

[ Window host privilege escalation ]

[ Linux/UNIX host privilege escalation ]

Survivability

Collection of techniques and associated procedures (from following categories: Persistence, C2, Evasion) used to support and maintain undisturbed operation workflow.

Securing Foothold

Cheat Sheets

What goes wrong in software: Web-based applications

[ What goes wrong in software: Native applications ]

Known RCE collection

Auditing code

Command line fu: [ oneliners ] | [ UNIX cli ] | Windows cli

Scripting building blocks

Payloads

[ Network pivoting ]

SSH

Metasploit