Hacker 101

advertisement
Hacker 101: Anatomy of an Attack
Course: CS3511 Web Security
Lecturer: Dr. Simon Foley
Dr. William Fitzgerald
www.williamfitzgerald.net
Security Group,
Department of Computer Science,
University College Cork,
Ireland.
September, 2011
William Fitzgerald, CS3511, Sept. 2011.
1 / 53
Disclaimer
⊲ Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
William Fitzgerald or any affliliation associated with him or
his research/teaching is NOT responsible in anyway for
information in this slide-set used for malicious purposes.
This lecture and its contents is soley about education.
In no circumstances should any person conduct, carry out
and/or try to perform the contained techniques without the
approval from Network & Security infrastructure owners.
Hacking/Cracking should only be conducted by professional
security analysts.
William Fitzgerald, CS3511, Sept. 2011.
2 / 53
Overview of this Lecture
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Introduction & insight to hacking techniques.
Understand phases of an attack (so they can be
countered!).
Introduction to some auditing and exploitation
technologies.
Importance of security.
What you will not become after this lecture:
Hacker.
Security Expert.
William Fitzgerald, CS3511, Sept. 2011.
3 / 53
Hacker Classification
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Black Hats:
⊲
Extraordinary skill set.
Malicious Activities.
aka Cracker.
White Hats:
Ethical Hacker skill set.
Defend Malicious Activities.
aka Security Analyst.
Grey Hats:
Offensive & Defensive
William Fitzgerald, CS3511, Sept. 2011.
4 / 53
Hacker Alphabet
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
A
D
G
J
M
P
S
V
Y
=
=
=
=
=
=
=
=
=
4 or
|)
9 or
j
/\/\
p or
5
\/
% or
@
6
or |\/|
|0
’/
B
E
H
K
N
Q
T
W
Z
=
=
=
=
=
=
=
=
=
|3 or 8 or 6
3
|-|
|<
/\/ or |\|
&
7
\/\/
z
C
F
I
L
O
R
U
X
=
=
=
=
=
=
=
=
(
|=
1
|_
0
|2
|_|
x
you’ve been hacked = ’/0u’v3 833|\| h4(k3d
William Fitzgerald, CS3511, Sept. 2011.
5 / 53
Anatomy of an Attack
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
William Fitzgerald, CS3511, Sept. 2011.
6 / 53
Footprinting
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Footprinting
⊲
William Fitzgerald, CS3511, Sept. 2011.
7 / 53
Footprinting Objective
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Preparatory phase where a hacker seeks to gain as much
information as possible before attacking the target/victim.
Passive Footprinting: googling, job postings, ...
Active Footprinting: social engineering (the act of
manipulating people into performing actions or divulging
confidential information), ...
90% profiling & 10% actually attacking!
Rattle the door knobs.
⊲
William Fitzgerald, CS3511, Sept. 2011.
8 / 53
Footprinting Techniques
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Find target external & internal URLs.
Extract DNS information.
Get archive of website.
Perform whois lookup for target details.
Search target for news, press releases, whitepapers
“People Search” personal information on employees:
(d.o.b)
Analyse target infrastructure by looking at jobs postings.
Mirror site for off-site scanning.
William Fitzgerald, CS3511, Sept. 2011.
9 / 53
Footprinting Tool-Box
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
nslookup
Sam Spade
dnsstuff.com
traceroute
whois
metagoofil
burp-suite
Google cache
WayBackMachine
William Fitzgerald, CS3511, Sept. 2011.
10 / 53
Example 1: Footprint by Profiling Web Archive Data
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Gain access to (potentially sensitive) information that is no
longer available on a target Website.
Example tools:
WayBackMachine
Google Cache
William Fitzgerald, CS3511, Sept. 2011.
11 / 53
Example 1: Footprint by Profiling Web Archive Data
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Example:
WikiLeaks Offline.
William Fitzgerald, CS3511, Sept. 2011.
11 / 53
Example 1: Footprint by Profiling Web Archive Data
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
WikiLeaks archived by Google
Important or sensitive information may have been
inadvertently posted and later removed!
⊲
William Fitzgerald, CS3511, Sept. 2011.
11 / 53
Example 1: Footprint by Profiling Web Archive Data
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
WikiLeaks archived by WayBackMachine
Important or sensitive information may have been
inadvertently posted and later removed!
⊲
William Fitzgerald, CS3511, Sept. 2011.
11 / 53
Example 2: Footprint by Profiling Infrastructure via Job Posts
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
ACC Bank IT job post
- Oracle 9i and RAC
⊲
William Fitzgerald, CS3511, Sept. 2011.
- Mircosoft platforms.
12 / 53
Example 2: Footprint by Profiling Infrastructure via Job Posts
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
TSB Bank IT job post
Java
⊲
William Fitzgerald, CS3511, Sept. 2011.
.net framework
12 / 53
Example 2: Footprint by Profiling Infrastructure via Job Posts
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Development Environment:
Visual Basic, C++, Java, Lotus Notes/Domino, WAP,
HTML, ASP, Cobol, DB/2, SQL, CICS,IMS,DL/1, Oracle,
Sybase.
Hardware Environment:
- IBM mainframes: OS/390, MVS, CICS, IMS, DB/2.
- NT, Cisco Routers, OS/2, X25.
William Fitzgerald, CS3511, Sept. 2011.
12 / 53
Example 3: Footprint by Profiling Infrastructure via Crime Search
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Examine court proceedings.
Usually reveals what an individual did.
Thus, provides an indication of network infrastructure.
Example court proceeding repositories
www.cybercrime.gov
www.courts.ie
William Fitzgerald, CS3511, Sept. 2011.
13 / 53
Example 5: Footprint by Whois and DNS Lookups
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
IP addresses, net-blocks.
Name and MX servers.
IT personnel.
domain:
descr:
admin-c:
tech-c:
renewal:
status:
nserver:
nserver:
nserver:
nserver:
nserver:
nserver:
source:
person:
nic-hdl:
source:
person:
nic-hdl:
source:
William Fitzgerald, CS3511, Sept. 2011.
ucc.ie
University College Cork
JFM1-IEDR
HGO1-IEDR
14-September-2010
Active
ns.ucc.ie 143.239.1.1
nsext2.ucc.ie 143.239.1.25
ns1.tcd.ie
auth-ns1.ucd.ie
ns.isi.edu
ns1.surfnet.nl
IEDR
John F. Murphy
JFM1-IEDR
IEDR
Henry G. O’Keeffe
HGO1-IEDR
IEDR
14 / 53
Example 5: Footprint by Whois and DNS Lookups
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
IP addresses, net-blocks.
Name and MX servers.
IT personnel.
Registrant:
Browse the World, Ltd
Nassau House, Nassau Street
Dublin 2
Dublin, Leinster Dublin 2
Domain Name: BROWSEIRELAND.COM
Created on: 11-Feb-97
Expires on: 02-Jun-10
Last Updated on: 01-Jun-10
Administrative Contact:
Galligan, Roger roger@iol.ie
Browse the World, Ltd
Nassau House, Nassau Street
Dublin 2
Dublin, Leinster Dublin 2
Tel: 16711111
Fax -Technical Contact:
Galligan, Roger roger@iol.ie
William Fitzgerald, CS3511, Sept. 2011.
14 / 53
Example 5: Footprint by Whois and DNS Lookups
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
IP addresses, net-blocks.
Name and MX servers.
IT personnel.
DNS query results for a 4c.ucc.ie
Name
Type
TTL
4c.ucc.ie
A
86400
Value
143.239.201.140
DNS query results for mx 4c.ucc.ie
Name
Type
TTL
Value
4c.ucc.ie
MX
86400
4c.ucc.ie
MX
86400
20 mail9.ucc.ie.
20 mail8.ucc.ie.
DNS query results for a mail9.ucc.ie
Name
Type
TTL
Value
mail9.ucc.ie
A
86192
143.239.1.39
William Fitzgerald, CS3511, Sept. 2011.
14 / 53
Example 6: Footprint by Employee Search
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Learn information such as Date of Birth (passwords).
Social engineering.
Blackmail.
William Fitzgerald, CS3511, Sept. 2011.
15 / 53
Example 6: Footprint by Employee Search
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Learn information such as Date of Birth (passwords).
Social engineering.
Blackmail.
Name
Age
John Murphy 45
William Fitzgerald, CS3511, Sept. 2011.
Previous Cities
Wheeling IL
Indianapola IA
Pittsburg PA
DOB
Y
Phone
Y
Address
Y
Avg. Income
Y
Avg. Home Value
Y
Relatives
Cameran
Thomas
Marybeth
15 / 53
Example 6: Footprint by Employee Search
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Learn information such as Date of Birth (passwords).
Social engineering.
Blackmail.
William Fitzgerald, CS3511, Sept. 2011.
15 / 53
Example 6: Footprint by Employee Search
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Knowing a home address may be used to
Tiger-kidnap.
Stalk.
Force remote administration login (access private data)!
William Fitzgerald, CS3511, Sept. 2011.
15 / 53
Example 7: Footprint by Satellite Search
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Area Layout.
Open Doors.
Smokers Area.
William Fitzgerald, CS3511, Sept. 2011.
16 / 53
Example 8: Footprint by Monitoring Targets by IP Cam’s
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Why would one want to control access to security camera?
Most IP-based camera’s have little or no security.
Gain knowledge of what the target has or has not!
Google URL spidering and indexing. For example:
- “Live view - / - AXIS”,
- “indexFrame.html axis”,
- “/home/homeJ.html”.
IMPORTANT: I nor UCC advocates searching for and/or exploiting IP-based camera’s. These examples are for
educational purposes only.
William Fitzgerald, CS3511, Sept. 2011.
17 / 53
Example 8: Footprint by Monitoring Targets by IP Cam’s
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Example of “indexFrame.html” unsecured camera search.
⊲
William Fitzgerald, CS3511, Sept. 2011.
17 / 53
Example 8: Footprint by Monitoring Targets by IP Cam’s
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Texaco may have secured its IP cameras but the business
across the road has not!
⊲
William Fitzgerald, CS3511, Sept. 2011.
- could use to remotely profile ATM cash drop-offs!
17 / 53
Example 8: Footprint by Monitoring Targets by IP Cam’s
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Malware uses motion sensors in exploited IP camera to
notify when the owner of the house is away.
⊲
William Fitzgerald, CS3511, Sept. 2011.
17 / 53
Example 9:Footprint with a Criminal and Debt Search
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Blackmail.
Bribe.
William Fitzgerald, CS3511, Sept. 2011.
18 / 53
Example 10: Footprinting with Document Metadata
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Metagoofil
Extract metadata of public documents
(pdf,doc,xls,ppt,odp,ods) from target website.
Potential usernames useful for preparing bruteforce attacks
on ftp, pop3, vpn, . . . .
Extract disclosed PATHs in the metadata
- Guess OS.
- Network names.
- Shared resources.
Extracts MAC address from Microsoft Office documents.
- Guess hardware used.
William Fitzgerald, CS3511, Sept. 2011.
19 / 53
Example 10: Footprinting with Document Metadata
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Software application used and possible system user names.
python metagoofil.py -d 4c.ucc.ie -l 70 -f all -o 4c.html -t ucc
⊲
mimetype - application/vnd.ms-powerpoint
paragraph count - 89
title - Ongoing Supply Chain Optimization Research
word count - 453
creator - Christopher
date - 2004-02-10T18:42:06Z
generator - Microsoft PowerPoint
creation date - 2004-01-22T12:46:41Z
mimetype - application/vnd.ms-powerpoint
paragraph count - 41
title - Hybrid Search Techniques for Multiple Sequence Alignment (MSA)
word count - 297
creator - Prestwich
date - 2004-06-10T12:04:40Z
generator - Microsoft PowerPoint
creation date - 2004-06-05T18:55:32Z
William Fitzgerald, CS3511, Sept. 2011.
19 / 53
Example 10: Footprinting with Document Metadata
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Disclosed path (could have been to a network share to exams).
python metagoofil.py -d SANITISED.ucc.ie -l 70 -f all -o SANITISED.html -t ucc
mimetype - application/msword
revision history - Revision #9: Author ’SANITISED’ worked on ’C:\Documents and Settings\SANITISED\
My Documents\Lectures\cs607\exams\examCS607summer2003.doc’
revision history - Revision #8: Author ’SANITISED’ worked on ’C:\Documents and Settings\SANITISED\
My Documents\Lectures\cs607\exams\examCS607summer2003.doc’
revision history - Revision #7: Author ’SANITISED’ worked on ’C:\Documents and Settings\SANITISED\
Application Data\Microsoft\Word\AutoRecovery save of examPlusAnswerscs607summer2003.asd’
revision history - Revision #6: Author ’SANITISED’ worked on ’C:\Documents and Settings\SANITISED\
My Documents\Lectures\cs607\exams\examPlusAnswerscs607summer2003.doc’
revision history - Revision #5: Author ’SANITISED’ worked on ’C:\Documents and Settings\SANITISED\
My Documents\Lectures\cs607\exams\examPlusAnswerscs607summer2003.doc’
revision history - Revision #4: Author ’SANITISED’ worked on ’C:\Documents and Settings\SANITISED\
My Documents\Lectures\cs607\exams\examPlusAnswerscs607summer2003.doc’
language - U.S. English
paragraph count - 6
line count - 25
title - Coliste na hOllscoile, Corcaigh
word count - 533
page count - 1
creator - SANITISED
date - 2003-10-07T12:48:00Z
character count - 3039
generator - Microsoft Word 9.0
last saved by - SANITISED
creation date - 2003-10-07T12:40:00Z
template - Normal.dot
William Fitzgerald, CS3511, Sept. 2011.
19 / 53
Example 10: Footprinting with Document Metadata
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Garda information leakage.
python metagoofil.py -d garda.ie -l 100 -f pdf -o g2010.html -t g2010
⊲
Total results for pdf: 97
Total authors found (potential users):
Author(Don)Don
Author()Don
Author(Don)
Author()
QuarkXPress\252: AdobePS 8.5.1
Paul
Author(Alan Morgan)
Author(Gary Wade)
Author(G5)
Gary Wade
Author(s0755559)
Author()David Barry
Author(prepress)
Author(garda)
QuarkXPress(R) 7.3
Who is Alan Morgan?
William Fitzgerald, CS3511, Sept. 2011.
19 / 53
Example 10: Footprinting with Document Metadata
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Garda Review, Volume 31 No. 10, Yearbook 2003.
⊲
William Fitzgerald, CS3511, Sept. 2011.
19 / 53
Example 10: Footprinting with Document Metadata
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Garda Review, Volume 31 No. 10, Yearbook 2003.
⊲
William Fitzgerald, CS3511, Sept. 2011.
19 / 53
Scanning
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Scanning
⊲
William Fitzgerald, CS3511, Sept. 2011.
20 / 53
Scanning Objective
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Detection live systems (specific IP addresses).
Operating systems.
Service discovery.
...
⊲
William Fitzgerald, CS3511, Sept. 2011.
21 / 53
Scanning Techniques
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Ping Sweep.
TCP/UDP Port Scan.
Fingerprint OS Detection.
Banner Grab.
...
⊲
William Fitzgerald, CS3511, Sept. 2011.
22 / 53
Scanning Tool-Box
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
nmap: Network and Service Mapper.
Banner Grab via telnet or netcat.
Nessus: Network Vulnerability Scanner seeks bugs in
software.
fping, hping.
GFI LANGuard.
...
⊲
William Fitzgerald, CS3511, Sept. 2011.
23 / 53
Example 1: Scan with Nmap Port Scanner
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
nmap 4c.ucc.ie lists possible unsecure services.
2010-09-21 14:51 IST
Interesting ports on 4c.ucc.ie (143.239.201.140):
Not shown: 987 filtered ports
PORT
STATE SERVICE
22/tcp
open ssh
25/tcp
open smtp
80/tcp
open http
110/tcp open pop3
139/tcp open netbios-ssn
143/tcp open imap
443/tcp open https
445/tcp open microsoft-ds
901/tcp open samba-swat
993/tcp open imaps
995/tcp open pop3s
3306/tcp open mysql
8080/tcp open http-proxy
William Fitzgerald, CS3511, Sept. 2011.
24 / 53
Example 2: Scan with Banner Grabing
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Discovery of Web server type (inc version) and hosting OS.
telnet www.cs.ucc.ie 80
Trying 143.239.211.230...
Connected to csweb.ucc.ie.
Escape character is ’^]’.
HEAD / HTTP/1.0
HTTP/1.1 200 OK
Date: Wed, 22 Sep 2010 08:43:03 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Connection: close
Content-Type: text/html
telnet 4c.ucc.ie 80
Trying 143.239.201.140...
Connected to 4c.ucc.ie.
Escape character is ’^]’.
HEAD / HTTP/1.0
HTTP/1.1 200 OK
Date: Wed, 22 Sep 2010 08:41:56 GMT
Server: Apache/2.2.11 (Fedora)
Last-Modified: Mon, 09 Aug 2010 18:29:18 GMT
ETag: "354822-7a-48d6831c5bb80"
Accept-Ranges: bytes
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8
William Fitzgerald, CS3511, Sept. 2011.
25 / 53
Example 3: Scan with Netcraft
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
OS
Linux
http://uptime.netcraft.com
Server
Last changed IP address
Apache/2.2.11 (Fedora) 21-Sep-2010 143.239.201.140
William Fitzgerald, CS3511, Sept. 2011.
Netblock Owner
Campus Network
26 / 53
Example 4: Scan with Nikto Web Scanner
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Web scanner.
Checks for 6100 potentially dangerous files/CGIs.
Checks for outdated versions of over 1000 servers.
...
⊲
William Fitzgerald, CS3511, Sept. 2011.
27 / 53
Example 4: Scan with Nikto Web Scanner
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
--------------------------------------------------------------------------+ Target IP:
143.239.211.230
+ Target Hostname:
www.cs.ucc.ie
+ Target Port:
80
+ Start Time:
2010-09-22 13:51:28
--------------------------------------------------------------------------+ Server: Apache
+ Retrieved x-powered-by header: PHP/5.2.8
+ robots.txt contains 12 entries which should be manually viewed.
+ OSVDB-637: Enumeration of users is possible by requesting ~username (responds with ’Forbidden’ for
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE
+ DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library
+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
+ /index.php/\"><script><script>alert(document.cookie)</script><: eZ publish v3 and prior allow Cros
+ OSVDB-3233: /mailman/listinfo: Mailman was found on the server.
+ OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitiv
+ OSVDB-3092: /demo/: This may be interesting...
+ OSVDB-3092: /downloads/: This might be interesting...
+ OSVDB-3092: /ideas/: This might be interesting...
+ OSVDB-3092: /new/: This might be interesting...
+ OSVDB-3092: /stats/: This might be interesting...
+ OSVDB-3092: : This might be interesting... possibly a system shell found.
+ OSVDB-3093: /squirrelmail/src/read_body.php: This might be interesting... has been seen in web log
+ OSVDB-3233: /cgi-bin/printenv: Apache 2.0 default script is executable and gives server environmen
+ OSVDB-3233: /cgi-bin/test-cgi: Apache 2.0 default script is executable and reveals system informat
+ OSVDB-3233: /test.php: PHP is installed, and a test script which runs phpinfo() was found. This gi
+ OSVDB-3268: /icons/: Directory indexing found.
+ OSVDB-3233: /jsp-examples/: Apache Java Server Pages documentation.
+ OSVDB-3233: /icons/README: Apache default file found.
+ 6417 items checked: 1 error(s) and 26 item(s) reported on remote host
+ End Time:
2010-09-22 13:52:02 (34 seconds)
---------------------------------------------------------------------------
William Fitzgerald, CS3511, Sept. 2011.
27 / 53
Example 4: Scan with Nikto Web Scanner
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
System knowledge, for example the existence of a SQUID proxy
that can also become a target.
http://www.cs.ucc.ie/cgi-bin/printenv
⊲
DOCUMENT_ROOT="/www/docs"
GATEWAY_INTERFACE="CGI/1.1"
HTTP_ACCEPT="text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"
HTTP_ACCEPT_CHARSET="ISO-8859-1,utf-8;q=0.7,*;q=0.7"
HTTP_ACCEPT_ENCODING="gzip,deflate"
HTTP_ACCEPT_LANGUAGE="en-us,en;q=0.5"
HTTP_CACHE_CONTROL="max-age=259200"
HTTP_CONNECTION="keep-alive"
HTTP_HOST="www.cs.ucc.ie"
HTTP_VIA="1.1 nemo.ucc.ie:80 (squid/2.7.STABLE7)"
PATH="/usr/local/texlive/2010/bin/x86_64-linux:/usr/local/texlive/2010/bin/x86_64-linux:/usr/local/b
QUERY_STRING=""
REMOTE_ADDR="143.239.75.235"
REMOTE_PORT="50242"
REQUEST_METHOD="GET"
REQUEST_URI="/cgi-bin/printenv"
SCRIPT_FILENAME="/usr/local/httpd-2.0.61/cgi-bin/printenv"
SCRIPT_NAME="/cgi-bin/printenv"
SERVER_ADDR="143.239.211.230"
SERVER_ADMIN="webmaster@cs.ucc.ie"
SERVER_NAME="www.cs.ucc.ie"
SERVER_PORT="80"
SERVER_PROTOCOL="HTTP/1.0"
SERVER_SIGNATURE=""
SERVER_SOFTWARE="Apache"
William Fitzgerald, CS3511, Sept. 2011.
27 / 53
Example 4: Scan with Nikto Web Scanner
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
--------------------------------------------------------------------------+ Target IP:
143.239.201.140
+ Target Hostname:
4c.ucc.ie
+ Target Port:
80
+ Start Time:
2010-09-22 13:36:25
--------------------------------------------------------------------------+ Server: Apache/2.2.11 (Fedora)
+ robots.txt retrieved but it does not contain any ’disallow’ entries (which is odd).
+ ETag header found on server, inode: 3491874, size: 122, mtime: 0x48d6831c5bb80
+ Apache/2.2.11 appears to be outdated (current is at least Apache/2.2.16). Apache 1.3.42 and 2.0.63
+ OSVDB-637: Enumeration of users is possible by requesting ~username (responds with ’Forbidden’ for
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE
+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
+ Retrieved x-powered-by header: PHP/5.2.9
+ /examples/servlets/index.html: Apache Tomcat default JSP pages present.
+ /cgi-bin/Count.cgi: This may allow attackers to execute arbitrary commands on the server
+ OSVDB-3720: /examples/jsp/snp/snoop.jsp: Displays information about page retrievals, including oth
+ OSVDB-3268: /downloads/: Directory indexing found.
+ OSVDB-3092: /downloads/: This might be interesting...
+ OSVDB-3092: /info/: This might be interesting...
+ OSVDB-3268: /software/: Directory indexing found.
+ OSVDB-3092: /web/: This might be interesting...
+ OSVDB-3092: /manual/: Web server manual found.
+ OSVDB-3093: /webmail/src/read_body.php: This might be interesting... has been seen in web logs fro
+ OSVDB-3268: /icons/: Directory indexing found.
+ OSVDB-3268: /manual/images/: Directory indexing found.
+ OSVDB-3233: /icons/README: Apache default file found.
+ OSVDB-3092: /bb/: This might be interesting... potential country code (Barbados)
+ /webmail/src/configtest.php: Squirrelmail configuration test may reveal version and system info.
+ 6417 items checked: 1 error(s) and 23 item(s) reported on remote host
+ End Time:
2010-09-22 13:36:53 (28 seconds)
---------------------------------------------------------------------------
William Fitzgerald, CS3511, Sept. 2011.
27 / 53
Example 4: Scan with Nikto Web Scanner
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
http://4c.ucc.ie/info provided access to a (non-public) file
containing the 4C staff phone and office directory.
⊲
This information could have been more sensitive!
William Fitzgerald, CS3511, Sept. 2011.
27 / 53
Example 4: Scan with Nikto Web Scanner
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
4C Web server recording client IP and client browser type.
http://4c.ucc.ie/examples/jsp/snp/snoop.jsp
Request Information
JSP Request Method: GET
Request URI: /examples/jsp/snp/snoop.jsp
Request Protocol: HTTP/1.0
Servlet path: /jsp/snp/snoop.jsp
Path info: null
Query string: null
Content length: 0
Content type: null
Server name: 4c.ucc.ie
Server port: 80
Remote user: null
Remote address: 143.239.75.235
Remote host: 143.239.75.235
Authorization scheme: null
Locale: en_US The browser you are using is Mozilla/5.0
(X11; U; Linux i686; en-US; rv:1.9.2.22) Gecko/20110905
Ubuntu/10.10 (maverick) Firefox/3.6.22
Note, can spoof your browser type. For example Mozilla addon:
http://chrispederick.com/work/user-agent-switcher/
William Fitzgerald, CS3511, Sept. 2011.
27 / 53
Example 5: Scan with Nessus Scanner
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Vulnerability scanner .
⊲
William Fitzgerald, CS3511, Sept. 2011.
Configuration auditing.
Asset profiling.
Sensitive data discovery.
Vulnerability analysis of your security posture.
28 / 53
Example 5: Scan with Nessus Scanner
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Discovered Web server vulnerabilities, one may now try exploit.
⊲
William Fitzgerald, CS3511, Sept. 2011.
28 / 53
Example 5: Scan with Nessus Scanner
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Discovered Web camera Web server vulnerabilities.
⊲
William Fitzgerald, CS3511, Sept. 2011.
28 / 53
Example 6: Nessus Logs Found Online!
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Sometimes you don’t have to perform the scan yourself!
Vulnerability found on port ftp (21/tcp)
It was possible to disable the remote FTP server by connecting to it
about 3000 times, with one connection at a time.
⊲
William Fitzgerald, CS3511, Sept. 2011.
29 / 53
Exploit The System
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Gain Access
⊲
William Fitzgerald, CS3511, Sept. 2011.
30 / 53
Gaining Access Objective
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Penetration phase.
Previous steps provide enough information to make an
attempt to gain access.
Gain access/exploit over LAN, Internet, physical.
...
⊲
William Fitzgerald, CS3511, Sept. 2011.
31 / 53
Gaining Access Techniques
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Direct use of ready made exploits.
Malware.
Password eavesdropping.
File share brute force.
Password file grab.
Buffer Overflows.
...
William Fitzgerald, CS3511, Sept. 2011.
32 / 53
Gaining Access Tool-Box
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Metasploit:
platform for developing, testing, and using exploit
code.
⊲
Wireshark: Wired & Wireless Sniffer.
pwdump2.
l0phtcrack.
...
William Fitzgerald, CS3511, Sept. 2011.
33 / 53
Example 1: Gain Access with Catalogue of Exploits
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Direct use of pre-made exploits from hacker repositories.
⊲
William Fitzgerald, CS3511, Sept. 2011.
34 / 53
Example 2: Gain Access with Metasploit Framework
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Metasploit is penetration testing framework.
Verify patch installations.
⊲
William Fitzgerald, CS3511, Sept. 2011.
35 / 53
Example 2: Gain Access with Metasploit Framework
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
An example:
Choose exploit.
⊲
William Fitzgerald, CS3511, Sept. 2011.
35 / 53
Example 2: Gain Access with Metasploit Framework
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Choose exploit target system.
⊲
William Fitzgerald, CS3511, Sept. 2011.
35 / 53
Example 2: Gain Access with Metasploit Framework
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Choose payload.
⊲
William Fitzgerald, CS3511, Sept. 2011.
35 / 53
Example 2: Gain Access with Metasploit Framework
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Execute payload.
⊲
William Fitzgerald, CS3511, Sept. 2011.
35 / 53
Example 2: Gain Access with Metasploit Framework
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
System exploited.
⊲
William Fitzgerald, CS3511, Sept. 2011.
35 / 53
Maintaining Access
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Maintain Access
⊲
William Fitzgerald, CS3511, Sept. 2011.
36 / 53
Maintaining Access Objective
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Back door.
Install trapdoors to get back into the sysem.
Trojans.
RAT’s.
Rootkits.
William Fitzgerald, CS3511, Sept. 2011.
37 / 53
Maintaining Access Techniques
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Privilege Escalation.
Rogue user accounts.
Install remote services: rootkits, RATs etc.
Install monitoring mechanisms: keyloggers.
Replace applications with custom trojans.
Spyware.
Patch the system
William Fitzgerald, CS3511, Sept. 2011.
38 / 53
Maintaining Access Tool-Box
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Psexec.
Remoexec.
Backorifice.
Spytech.
Ghostkeylogger.
Winzapper.
Porgenic Mail Construction Kit (PMT).
Reverse HTTP server shell.
Loki ICMP tunnelling.
Spector.
William Fitzgerald, CS3511, Sept. 2011.
39 / 53
Example 1: Maintain Access with Malware Frameworks
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
William Fitzgerald, CS3511, Sept. 2011.
40 / 53
Example 1: Maintain Access with Malware Frameworks
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Terabitvm and VirusJPS
⊲
William Fitzgerald, CS3511, Sept. 2011.
40 / 53
Example 1: Maintain Access with Malware Frameworks
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Necro
⊲
William Fitzgerald, CS3511, Sept. 2011.
40 / 53
Example 2: Maintain Access with Homemade Malware
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
A binder is a program that will take two executable files
and combine them together.
⊲
William Fitzgerald, CS3511, Sept. 2011.
41 / 53
Example 3: Maintain Access with Keylogger
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
Physical Keylogger.
⊲
William Fitzgerald, CS3511, Sept. 2011.
42 / 53
Example 3: Maintain Access with Keylogger
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
William Fitzgerald, CS3511, Sept. 2011.
42 / 53
Covering Your Tracks
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
Cover Tracks
⊲
William Fitzgerald, CS3511, Sept. 2011.
43 / 53
Covering Tracks Objectives
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
Hide from legitimate Administrators.
⊲
William Fitzgerald, CS3511, Sept. 2011.
44 / 53
Covering Tracks Techniques
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
⊲
Steganography
- Hide (encrypt) src code, criminal instructions.
- Hidden partition.
Clear Logs: history, events, recent docs, etc.
Rootkits: hide processes etc.
William Fitzgerald, CS3511, Sept. 2011.
45 / 53
Example 1: Cover Tracks with Steganography
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
Steganography applications conceal information in other,
seemingly innocent media.
Steganography works by replacing bits of useless or unused
data in regular computer files (such as graphics, sound,
text, HTML, network traffic) with bits of different, invisible
information.
This hidden information can be plain text, cipher text, or
images.
⊲
William Fitzgerald, CS3511, Sept. 2011.
46 / 53
Example 1: Cover Tracks with Steganography
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
steghide.
Payment was recieved.
The source code for the Stuxnet worm can be found at rapidshare.com
File name is 5tuxn3t2010.rar
Password is Iran
⊲
steghide embed -cf zebras.jpg -ef stego.txt
steghide extract -sf zebras.jpg
William Fitzgerald, CS3511, Sept. 2011.
47 / 53
Example 1: Cover Tracks with Steganography
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
Invisible Secrets.
⊲
William Fitzgerald, CS3511, Sept. 2011.
47 / 53
Example 2: Cover Tracks by Erasing Logs
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
Windows OS.
⊲
William Fitzgerald, CS3511, Sept. 2011.
48 / 53
Example 2: Cover Tracks by Erasing Logs
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
Windows OS.
⊲
William Fitzgerald, CS3511, Sept. 2011.
48 / 53
Example 2: Cover Tracks by Erasing Logs
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
⊲
Linux OS.
SRM(1)
NAME
srm - secure remove (secure_deletion toolkit)
SYNOPSIS
srm [-d] [-f] [-l] [-l] [-r] [-v] [-z] files
DESCRIPTION
srm is designed to delete data on mediums in a secure manner which can not be
recovered by thiefs, law enforcement or other threats. The wipe algorythm is based
on the paper "Secure Deletion of Data from Magnetic and Solid-State Memory" presented
at the 6th Usenix Security Symposium by Peter Gutmann, one of the leading civilian
cryptographers.
William Fitzgerald, CS3511, Sept. 2011.
48 / 53
Example 2: Cover Tracks by Erasing Logs
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
⊲
Some Erasers leave a log of wiped logs!
Disable logging when gaining access and enable it
afterwords.
Rootkits.
# Apply to target system as follows:
C:\>auditpol \\192.168.1.7 /disable
William Fitzgerald, CS3511, Sept. 2011.
48 / 53
Example 3: Cover Tracks with Hidden Processes
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your
Tracks
Summary
A rootkit is software that enables continued privileged
access to a computer, while actively hiding its presence
from administrators by subverting standard operating
system functionality or other applications.
⊲
William Fitzgerald, CS3511, Sept. 2011.
49 / 53
Summary
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
⊲
Anatomy of an attack.
Malware Frameworks.
Pentesting Frameworks.
Final Note:
- This lecture is for educational purposes ONLY.
William Fitzgerald, CS3511, Sept. 2011.
50 / 53
A One Stop Shop Pentest Tool
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
William Fitzgerald, CS3511, Sept. 2011.
51 / 53
A One Stop Shop Pentest Tool
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
BackTrack categories its tools, for example:
Information Gathering, Vulnerability Assessment, Exploitation Tools, Privilege Escalation, Maintaining Access,
Reverse Engineering, RFID Tools, Stress testing, Forensics, Reporting Tools, Services and Miscellaneous
William Fitzgerald, CS3511, Sept. 2011.
51 / 53
Words of Wisdom!
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
William Fitzgerald, CS3511, Sept. 2011.
52 / 53
Disclaimer
Objectives
Background
Attack Anatomy
Footprinting
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Summary
William Fitzgerald, CS3511, Sept. 2011.
53 / 53
Download