IIS Tilde Enumeration (re)Exploited
- Micah Hoffman
- Wednesday, March 19th, 7:15pm - 8:15pm
You have just performed a vulnerability scan of a system or maybe you received someone else's scan results. Noticing several low risk vulnerabilities, you wonder, "Could I exploit one of these lows and discover it is really a high risk issue?" In penetration tests and vulnerability scans, low risk issues sometimes do not get the scrutiny and follow-up testing that they deserve.
We'll examine the IIS Tilde Enumeration vulnerability, review current methods of exploitation and then examine a new tool, tilde_enum, that can help you turn this low risk vulnerability into a high!
Micah Hoffman has been working in the information field for over 15 years supporting federal government, commercial and internal customers in their searches to discover and quantify information security weaknesses within their organizations. He leverages years of hands-on, real-world penetration testing and incident response experience to provide unique solutions to his customers. Micah holds GIAC's GAWN, GWAPT, and GPEN certifications as well as the CISSP.
Micah is an active member in the NoVAHackers group, has written Recon-ng and Nmap testing tool modules and enjoys tackling issues with the Python scripting language. When not working, teaching, or learning Micah can be found hiking or backpacking on the many park trails in Maryland. Catch him on Twitter @WebBreacher.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
|General Session - Welcome to SANS||Jason Fossen||Monday, March 17th, 8:15am - 8:45am||Special Events|
|Windows Exploratory Surgery with Process Hacker||Jason Fossen||Monday, March 17th, 7:15pm - 9:15pm||Keynote|
|Vendor Showcase||—||Tuesday, March 18th, 10:30am - 10:50am||Vendor Event|
|Vendor Showcase||—||Tuesday, March 18th, 12:30pm - 1:15pm||Vendor Event|
|Vendor Showcase||—||Tuesday, March 18th, 3:00pm - 3:20pm||Vendor Event|
|Real-World Risk -- What Incident Responders Can Leverage from IT Operations||Eric Conrad||Tuesday, March 18th, 7:15pm - 8:15pm||SANS@Night|
|Social Engineering for Pentesters||Dave Shackleford||Tuesday, March 18th, 8:15pm - 9:15pm||SANS@Night|
|SANS Technology Institute Open House||Seth Misenar||Wednesday, March 19th, 7:15pm - 7:45pm||Special Events|
|IIS Tilde Enumeration (re)Exploited||Micah Hoffman||Wednesday, March 19th, 7:15pm - 8:15pm||SANS@Night|
|GIAC Program Overview||Seth Misenar||Wednesday, March 19th, 7:45pm - 8:15pm||Special Events|
|Continuous Ownage: Why you Need Continuous Monitoring||Seth Misenar||Wednesday, March 19th, 8:15pm - 9:15pm||SANS@Night|
|The 13 Absolute Truths of Security||Keith Palmgren||Thursday, March 20th, 7:15pm - 8:15pm||SANS@Night|
|Detecting Deception: If Someone Was Lying To You, Would You Know It?||Michael Murr||Thursday, March 20th, 8:15pm - 9:15pm||SANS@Night|
|Code Injection||Jake Williams||Friday, March 21st, 7:15pm - 8:15pm||SANS@Night|