#Veeam Community Edition Install on server 2022 for the #Ransomware Lab
Backup and Replication License Agreement goes brrr
I ACCEPT
Now here is the default config
Installing all the things! This installs PostgreSQL 15.1
I've been in this industry basically my whole life and I still don't know what some of these phrases actually mean but as you install it, you get Marketing :)
"ENTERPRISE GRADE".. marketing people should use a dictionary etc. this doesn't make sense as a phrase to anyone ;) but… twitter.com/i/web/status/1…
ok weeeeeeeeeeeeeeeeeee we have the product installed!
Now in a biz env. we would normally want a resource forest. We could have made this a domain controller for the lab but workgroup mode so we will be accepting the risk of sending NTLM authentication. We are however NOT… twitter.com/i/web/status/1…
ok let's go tweeps! PROTECT all teh things with @Veeam !
Ok we need to update some components quickly (this was fast)
(they aren't paying me nor did they ask me to write any of this stuff, I just like the software) but it's nice to be able to get pricing quickly, for larger deployments you will need to go through the human sales process
ok so we have one backup repo, I've just added another disk so I'm going to make a new REPO
we can now add a REPO on the new data disk (e:\)
oh ooops i'm sleepy and on autopilot, we want to use a REFS file system with 64K cluster sizes for this! (not NTFS)
now this is in the lab and i'm doing this fast. think about your storage! i'm just gonna use the new virtual disk i just made for this demo
now we need to create a protection group, we are configuring bits and bops (in a not great way on purpose) i'm also doing the DC first because it has the right ports open and i've not domain joined the members yet :D
deployment goes brrrrr
sorry forgot to NOT exclude VMs.. essentially i want to treat this like a physical
ok we have now deployed the agent from the veeam console and then rebooted the domain controller! #winning
look frens we haz a Domain Controller backed up! wooohoo!
now let's get some tea and think about what else we need to do!
so let's do a quick sketch. This is what we have simulated (so far)
I can't stress this enough, with most backup products and solutions you can fuck urself by domain joining components or by leaving management interfaces available and having keepass or whatever password storage mechanisms compromised. I know of lots of orgs who have mASSIVE XLS… twitter.com/i/web/status/1…
but it's so easy to do. take people who:
> are time constrained
> are not trained
> are not given specialist security training
> do not have good leadership and management support
and you will get a recipe for a disaster that may come in many shapes and forms!
now back to the scenario.. we want to ensure we know what can go wrong, but also what can go right! so far we have just setup a workgroup server with REFS storage, but what other options are there? A hardened LINUX repo! cloud object storage! backup copies!
ok let's #ransomware some servers! (in a lab of mine not for real coz it's NASTY!)
VMs go BRRRRR
But wait... we are gonna look at how we can PROTECT, RESPOND and RECOVER! I'm going to deploy @Veeam to help me (coz I like the product, it rocks!)
to start with I'm going to just do some PREP. We are going to need to think about Initial Access then Escalation to Domain Admin and then RAMPAGE!
I'm gonna thread some stuff whilst I build.. I'm going to start with using @VMware workstation PRO. I might do some stuff with the RACK mounted servers but let's see.
The idea management need to not really understand computer science and security in depth is probably partly why our world has such a shit cyber security posture! If you think management decisions should be made as n uninformed zombie please think again… same as… twitter.com/i/web/status/1…
I’m assuming the people that think this:
A) have not led and managed teams (fixed or project based) and
B) have a CISSP and not much else
😂😂😂😂😂
Part of the reason it’s such a mess is because people leading didn’t know what they were doing. If you have ever worked with people that don’t know what they are doing and they are in charge it’s a fucking nightmare!
ok my day plan has changed! time to make a tea and then I think I'm going to do some work on SECURITY ORGANISATIONAL DESIGN for orgs that have:
> HERITAGE (people used to call this LEGACY)
and
> PRODUCT!
now remember the first rules of org design are there are NO RULES of org DESIGN! but there are good vs bad ideas! there are also a million different different ways orgs organize their businesses so this is not ever going to fit an org (if it does it's luck!) but it's some food… twitter.com/i/web/status/1…
now i'm sketching on the fly here...
We need to think about
CHANGE THE BUSINESS
RUN THE BUSINESS
and then we have
the PROJECT vs PRODUCT scenario...
some notes on thoughts about the STATE OF CYBER in 2023
I might write a rpeort based on attack surface mapping data and incidents to back this up so it’s more than just: oh that guy Dan doesn’t know what he’s on about
But you don’t have to be Einstein to know what I’m saying isn’t bollocks.
the CISSP does not teach people to manage or lead, it's a fucking memory test....
i'm not sure how the "infosec" world doesn't understand this, but then I look at what has been created with weak ass digital security everywhere and compliance obsessed orgs who have shit postures and it all kind of makes sense...
a big failure from my pov
I don't really care about the CISSP, it's the outcomes that I see i care about, it's the focus of my rage because I think it's part of the problem.