SlideShare a Scribd company logo
2010: and still bruteforcing
OWASP Webslayer


Christian Martorella
July 18th 2010
Barcelona
Who am I

Manager Auditoria
CISSP, CISA, CISM, OPST, OPSA,CEH
OWASP WebSlayer Project Leader
FIST Conference, Presidente
Edge-Security.com
Brute force attack

 Is a method to determine an unknown value by
 using an automated process to try a large
 number of possible values.
2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain
What can be bruteforced?
 Credentials (HTML Forms and HTTP)
 Session identifiers (session id’s)
 Predictable resource location (directories and files)
 Variable values
 Cookies
 WebServices methods (rest)
Where?

Headers
Forms (POST)
URL (GET)
Authentication (Basic, NTML)
How?
Dictionary attack
Search attack (all possible combinations of a
character set and a given length)
Rule based search attack (use rules to generate
candidates)
Why 2010 and still bruteforcing?


 In 2007 Gunter Ollmann proposed a series of
 countermeasures to stop automated attack tools.
Countermeasures

Block HEAD requests
Timeouts and thresholds
Referer checks
Tokens
Countermeasures
Turing tests (captchas)
Honeypot links
One time links
Custom messages
Token resource metering (Hashcash)
Countermeasures
Workarounds
Workarounds
Captcha breakers
Workarounds
Distributing scanning source traffic

                        Proxy
                        HTTP
                          1

                        Proxy
  Attacker                            Target
                        HTTP
                          ...

                        Proxy
                        HTTP
                          N
Workarounds
Distributing scanning on different targets


                           Target-server-1



     Attacker              Target-server-2



                           Target-server-3
Workarounds
Diagonal scanning (different username/password
each round)
Horizontal scanning (different usernames for
common passwords)
Three dimension ( Horizontal,Vertical or Diagonal +
Distributing source IP)
Four dimensions ( Horizontal, Vertical or Diagonal +
time delay)
2011 and still bruteforcing - OWASP Spain
2010...


114.000 emails
https://dcp2.att.com/OEPClient/openPage?ICCID=NUMBER&IMEI=0
2010...
                 Access Any Users Photo Albums




http://www.facebook.com/album.php?aid=-3&id=1508034566&l=aad9c
aid=-3 (-3 for every public profile album)
id=0123456789
l=? (all we know is its 5 characters from the 0123456789abcdef range)
2010...
•The 500 worst passwords list
•Alyssa banned passwords list
•Cain’s list of passwords
•Conficker’s list
•The English dictionary
•Faithwriters banned passwords list
•Hak5’s list
•Hotmail’s banned passwords list
•Myspace’s banned passwords list
•PHPbb’s compromised list
•RockYou’s compromised list
•Twitter’s banned passwords list
2010...
2010...
                                   Webservices
                                                 OK:0:username
 http://l33.login.scd.yahoo.com/
                                                 ERROR:101:Invalid
config/isp_verify_user?
                                                 Password
l=USERNAME&p=PASSWORD
                                                 ERROR:102:Invalid
                                                 Login
2010...
                             Password bruteforce




                                                       946 tries


python wfuzz.py -c -z file -f wordlists/common.txt --hc 200 -
d"email=securik@gmail.com&input_password=FUZZ&timezone=1" "https://www.tuenti.com/?
m=Login&func=do_login"
Tools


Automated scanning tools are designed to take full
advantage of the state-less nature of the HTTP
protocol and insecure development techniques.
Tools




  Evolution of WFUZZ
Webslayer

The main objective is to provide to the security tester
a tool to perform highly customized brute force
attacks on web applications, and a useful results
analysis interface. It was designed thinking in the
professional tester.
Webslayer
Webslayer

Predictable credentials (HTML Forms and HTTP)

Predictable sessions identifier (cookies,hidden fields, url)

Predictable resource location (directories and files)

Variables values and ranges

Cookies

WebServices methods

Traversals, Injections, Overflows, etc
Webslayer

 Encodings: 15 encodings supported

 Authentication: supports Ntml and Basic (known or guess)

 Multiple payloads: you can use 2 payloads in different parts

 Proxy support (authentication supported)

 Multithreads

 Multiple filters for improving the performance and for producing cleaner
 results
Webslayer

Predictable resource location: Recursion, common extensions, non standard
code detection, (Huge collection of dictionaries)

Advanced payload generation

Live filters

Session saving/restoring

Integrated browser (webKit)

Full page screenshot
Resource location prediction

 Based on the idea of Dirb (Darkraver)

 Custom dictionaries of know resources or common passwords

    Servers: Tomcat,Websphere,Weblogic,Vignette,etc

    Common words: common (950), big (3500), spanish

    CGIs (vulnerabilities)

    Webservices

    Injections (SQL, XSS, XML,Traversals)
2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain
Payload Generation

Payload generator:
 Usernames

 Credit Card numbers

 Permutations

 Character blocks

 Ranges

 Files

 Pattern creator and regular expression (encoders)
2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain
Demo
Advanced uses

Sweep an entire range with a common dictionary


HTTP://192.168.1.FUZZ/FUZ2Z
FUZZ: RANGE [1-254]
FUZ2Z: common.txt
Advanced uses

Scanning through proxies


                          me ----> Server w/proxy ---->LAN

wfuzz -x serverip:53 -c -z range -r 1-254 --hc XXX -t 5 http://10.10.1.FUZZ

-x set proxy
--hc is used to hide the XXX error code from the results, as machines w/o webserver
will fail the request.
Future features

 Time delay between request
 Multiple proxies (distribute attack)
 Diagonal scanning (mix dictionaries)
?
Contact

cmartorella _at_s21sec.com
cmartorella_at_edge-security.com
http://twitter.com/laramies
http://laramies.blogspot.com
http://www.edge-security.com
References
http://www.owasp.org/index.php/Testing_for_Brute_Force_(OWASP-AT-004)

http://projects.webappsec.org/Predictable-Resource-Location

http://projects.webappsec.org/Credential-and-Session-Prediction

http://projects.webappsec.org/Brute-Force

http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html

http://gawker.com/5559346/

http://tacticalwebappsec.blogspot.com/2009/09/distributed-brute-force-attacks-against.html

http://praetorianprefect.com/archives/2010/06/114000-ipad-owners-the-script-that-harvested-their-
e-mail-addresses/

http://www.securitybydefault.com/2009/07/no-no-uses-captchas-ni-ningun-otro.html

http://nukeit.org/facebook-hack-access-any-users-photo-albums/

More Related Content

PDF
A fresh new look into Information Gathering - OWASP Spain
PPTX
LD4 Wikidata Affinity Group - Shorthouse
KEY
Tactical Information Gathering
PDF
Big Data Analytics course: Named Entities and Deep Learning for NLP
PDF
Apache Solr, il motore di ricerca enterprise open source
PPTX
The Semantic Web #4 - RDF (1)
PPTX
The Semantic Web #3 - URI
PDF
An introduction to Semantic Web and Linked Data
A fresh new look into Information Gathering - OWASP Spain
LD4 Wikidata Affinity Group - Shorthouse
Tactical Information Gathering
Big Data Analytics course: Named Entities and Deep Learning for NLP
Apache Solr, il motore di ricerca enterprise open source
The Semantic Web #4 - RDF (1)
The Semantic Web #3 - URI
An introduction to Semantic Web and Linked Data

What's hot (20)

PPTX
Sindice warehousing meetup
PPTX
What happened to the Semantic Web?
PDF
Harnessing The Power of Search - Liferay DEVCON 2015, Darmstadt, Germany
PPTX
Semantic Web, e-commerce
PPTX
The Semantic Web #5 - RDF (2)
PDF
Linked Data and Tools
PDF
An introduction to Semantic Web and Linked Data
PDF
Liferay Search: Best Practices to Dramatically Improve Relevance - Liferay Sy...
PPT
(Re-) Discovering Lost Web Pages
PDF
Tom Critchlow - Data Feed SEO & Advanced Site Architecture
PDF
when the link makes sense
PPTX
Knowledge Integration in Practice
PPT
Metadata first, ontologies second
PPTX
Semantic Search on the Rise
PPTX
Semantic search: from document retrieval to virtual assistants
PDF
How to build your own google
PPT
Web3uploaded
PPTX
Making things findable
PPT
Corrib.org - OpenSource and Research
PDF
Wimmics Overview 2021
Sindice warehousing meetup
What happened to the Semantic Web?
Harnessing The Power of Search - Liferay DEVCON 2015, Darmstadt, Germany
Semantic Web, e-commerce
The Semantic Web #5 - RDF (2)
Linked Data and Tools
An introduction to Semantic Web and Linked Data
Liferay Search: Best Practices to Dramatically Improve Relevance - Liferay Sy...
(Re-) Discovering Lost Web Pages
Tom Critchlow - Data Feed SEO & Advanced Site Architecture
when the link makes sense
Knowledge Integration in Practice
Metadata first, ontologies second
Semantic Search on the Rise
Semantic search: from document retrieval to virtual assistants
How to build your own google
Web3uploaded
Making things findable
Corrib.org - OpenSource and Research
Wimmics Overview 2021
Ad

Viewers also liked (7)

PDF
All your data are belong to us - FIST Conference 2007
PDF
Wfuzz for Penetration Testers
PDF
Playing in a Satellite environment
PDF
A journey into Application Security
PDF
OSINT 2.0 - Past, present and future
PDF
Python for Penetration testers
PDF
Offensive OSINT
All your data are belong to us - FIST Conference 2007
Wfuzz for Penetration Testers
Playing in a Satellite environment
A journey into Application Security
OSINT 2.0 - Past, present and future
Python for Penetration testers
Offensive OSINT
Ad

Similar to 2011 and still bruteforcing - OWASP Spain (20)

PDF
Abraham aranguren. legal and efficient web app testing without permission
PDF
Romulus OWASP
PDF
Legal and efficient web app testing without permission
PDF
Silent web app testing by example - BerlinSides 2011
PDF
The Web Application Hackers Toolchain
PDF
Workshop on Network Security
PDF
TriplePlay-WebAppPenTestingTools
PPTX
Web Application Penetration Testing Introduction
PDF
Web Security - Introduction
PDF
Web Security - Introduction v.1.3
PDF
BruCon 2011 Lightning talk winner: Web app testing without attack traffic
PPTX
Cybersecurity cyberlab1
PDF
Web Security Gateway Test
PPTX
Convincing Developers to take Cross-Site Scripting Seriously
KEY
DVWA BruCON Workshop
PDF
CNIT 129S: Ch 4: Mapping the Application
PPTX
Web application vulnerability assessment
PDF
DEFCON 23 - Jason Haddix - how do i shot web
PDF
Web Application Penetration Testing.pdf
PPT
Abraham aranguren. legal and efficient web app testing without permission
Romulus OWASP
Legal and efficient web app testing without permission
Silent web app testing by example - BerlinSides 2011
The Web Application Hackers Toolchain
Workshop on Network Security
TriplePlay-WebAppPenTestingTools
Web Application Penetration Testing Introduction
Web Security - Introduction
Web Security - Introduction v.1.3
BruCon 2011 Lightning talk winner: Web app testing without attack traffic
Cybersecurity cyberlab1
Web Security Gateway Test
Convincing Developers to take Cross-Site Scripting Seriously
DVWA BruCON Workshop
CNIT 129S: Ch 4: Mapping the Application
Web application vulnerability assessment
DEFCON 23 - Jason Haddix - how do i shot web
Web Application Penetration Testing.pdf

Recently uploaded (20)

PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
project resource management chapter-09.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
A comparative analysis of optical character recognition models for extracting...
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
Heart disease approach using modified random forest and particle swarm optimi...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
DP Operators-handbook-extract for the Mautical Institute
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Encapsulation theory and applications.pdf
Tartificialntelligence_presentation.pptx
TLE Review Electricity (Electricity).pptx
Group 1 Presentation -Planning and Decision Making .pptx
WOOl fibre morphology and structure.pdf for textiles
Encapsulation_ Review paper, used for researhc scholars
Zenith AI: Advanced Artificial Intelligence
NewMind AI Weekly Chronicles - August'25-Week II
Accuracy of neural networks in brain wave diagnosis of schizophrenia
project resource management chapter-09.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf

2011 and still bruteforcing - OWASP Spain