SlideShare a Scribd company logo
System
Penetration
Keamanan Jaringan
D3 Teknik Telekomunikasi
System Penetration
• What do I mean by System Penetration?
The act of successfully breaching security on a
remote computer system in order to gain some
form of control access.
 So, what is Metasploit Framework?
 First we need to learn some basic concepts before
understanding what the Metasploit Framework is and what it is
capable of providing.
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Many Attack Vectors!
• Gaining access to a secured system can be a difficult task that requires skill
and maybe luck. However, we have also have plenty of simple techniques,
commonly used today, to achieve the same result. Such include;
• AuthenticationAttacks
• Password guessing using common strings or using default passwords
• Ex: Wireless Routers have default passwords  Majority don’t change this!!!
• Ex: Windows Administrator Account are often blank
• Password Brute Force Attack
• These method has become extremely fast with the of Rainbow Tables!
• Rainbow tables pre-computed tables of password hashes.
• Social EngineeringAttacks
• To influence someone into divulging confidential information using techniques.
• Ex: Phishing Attacks
• A malicious user who impersonates him or herself as trustworthy a entity
• SQL Injection Attacks
• To inject unexpected malformed SQL into a query in order to manipulate the database in
unintended ways.
• Ex: Injection of SQL to spit out information from certain tables
• Ex: Inject an administrator account for yourself
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Many Attack Vectors!
• However, one of the most dangerous and yet a very
effective attack used by malicious users today are
Software Exploitation Attacks!
Software Exploitation Attacks can be used to gain
access to unauthorized systems, leverage user
account privileges, crash systems or provide
installation of malicious software (such as Spyware,
Virus’s, Trojans, Adware, etc.) without the
awareness of the other party.
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Understanding S.E. Attacks.
• First, let’s understand basics.
“The word vulnerability, in computer security, refers to a weakness in a
system allowing an attacker to violate the confidentiality, integrity, availability,
access control, consistency or audit mechanisms of the system or the data
and applications it hosts”
• To Software Developers, a bug is synonymous to a vulnerability.
• Ex: Errors in program’s source code or flawed program design
• Buffer overflows
• Memory leaks
• Dead locks
• Arithmetic overflow
• Accessing protected memory (Access Violation)
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Understanding S.E. Attacks
• Regardless though which type of software bug we are
speaking of, they are used as the foundation to form an
exploit.
• Therefore, an exploit is a security attack on a vulnerability.
• In other words (again), an exploit attacking a vulnerability is generating an
event that the application/program/OS is not programmed/designed to recover
successfully and therefore the result is a system that discontinues to function
correctly
• How will this give us access to a secured System?
Ans: It won’t.
• Each exploit can be designed to meet the methodology of your
attack.
• Ex: An attacker exploits an IDS to reboot it or crash it before he/she
launches a further attack to avoid detection.
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Understanding Payloads
• However, Exploits have more potential!
• They are commonly used to install system malware or gain
system access or recruit client machines into an existing ‘botnet’.
• This is accomplished with the help of a payload
• The payload is a sequence of code that is executed when the vulnerability is
triggered
• To make things clear, an Exploit is really broken up into two parts, like so;
EXPLOIT = Vulnerability + Payload;
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Understanding Payloads
• The payload is usually written in Assembly Language
• Platform and OS dependant.
• A Win32 payload will not work in Linux (even if we are exploiting the
same bug)
• Big Endian, Small Endian Architectures
• Different payload types exist and they accomplish different tasks
• exec  Execute a command or program on the remote system
• download_exec  Download a file from a URL and execute
• upload_exec  Upload a local file and execute
• adduser  Add user to system accounts
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Understanding Payloads
• However, the most common payload type used with exploits
are shellcodes or aka shell payloads.
• These payloads are very useful because they provide the attacker an
interactive shell that can be used to completely control the system
remotely
• The term is inherited from Unix  /bin/sh
• For Win OS’s, shells actually refer to command prompt  cmd.exe
• There are two different types of shell payloads;
• Bind Shells  A socket is created, a port is bound to it and when an a
connection is established to it, it will spawn a shell.
• Reverse Shells  Instead of creating a listening socket, a connection is
created to a predefined IP and Port and a shell is then shoveled to the
Attacker.
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Metasploit Framework
What is the Metasploit Framework?
• According to the Metasploit Team;
“The Metasploit Framework is a platform for writing, testing, and using
exploit code. The primary users of the Framework are professionals
performing penetration testing, shellcode development, and vulnerability
research.”
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Understanding MSF
• The MSF is not only an environment for exploit development
but also a platform for launching exploits on real-world
applications. It is packaged with real exploits that can provide
real damage if not used professionally.
• The fact that MSF is an open-source tool and provides such a
simplified method for launching dangerous attacks, it has and
still is attracting wannabe hackers and script kiddies that do
no more than create additional problems on networks and
system.
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Snort Introduction
• A problem exists will large networks 
• Without proper equipment, it becomes more difficult for
Administrators and Analyst's to continuously keep track of the
security and integrity of their network. This is true because larger
network have more potential areas to be targeted and therefore
detection of attacks become a challenging task.
• What are Network Intrusion Detection System’s?
• This is proper equipment
• It is technology that has been designed to automatically detect
malicious content on a network and provide the administrator
with a response in the event of a problem.
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Understanding Snort
• Simply, Snort is an open-source Intrusion Detection System (IDS)
and an Intrusion Prevention System (IPS) technology.
• Meaning it will monitor our networks traffic for malicious content to
determine if there is a problem and it will also take immediate
action if it detects a problem
• Snort can perform real-time analysis on packet streams to detect many
variations of attacks and probes. Such attacks and probes include, as
listed on snorg.org, are buffer overflows, stealth port scans, CGI attacks,
SMB probes, OS fingerprinting attempts, and much more.
• Snort is also a real-time alerting agent.
• Example: Snort can be configured to send Bob an e-mail when a
low-priority attack is detected but send Joe a pager notification when
a high-priority attack is detected.
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Snort Installation/Configuration
• Installation easy!
• Requires WinPcap libraries
• However, configuration is not so easy
• Required manual modifications to snort.conf
• Difficult to debug
• IDScenter makes snort configuration much easier!
• http://www.engagesecurity.com/products/idscenter/
• In a nutshell, IDScenter is a front-end GUI for the snort.conf configuration file
• IDScenter also includes;
• snort.conf testers
• No worries about syntax
• Alert file viewer 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
IDScenter Configurations
Figure: IDScenter Main Panel1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
IDScenter Configurations
Figure: Initialize Environment Variables1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
IDScenter Configurations
Figure: Added Bleeding Edge Threats Rulesets
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
The Attack Experiment
Goal:
• To conduct a Software Exploitation Attack using
Metasploit Framework against a Victim machine
in order to gain system access
• To make things interesting, the Victim’s machine
will also have Snort running locally as an IDS in
order to see how it reacts to the attack.
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Network Topology and Hardware
Configurations/Details
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Software Details
• Victim (*No anti-virus or similar scanner is running on this machine)
• Operating System: Windows XP Professional 5.1.2600,
Service Pack 2 (not fully updated)
• Snort 2.7.0
• Attacker
• Operating System: Slackware Linux via BackTrack 2 ,
Bootable Live CD
• Metasploit Framework 3.0 – Beta Development Release
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Vulnerability Details
• Microsoft Security Bulletin - MS06-001
Vulnerability in Graphics Rendering Engine Could
Allow Remote Code Execution (912919)
• Originally posted on January 5, 2006
• However, it was running wild as a 0-Day vulnerability for a couple weeks
• The heart of the vulnerability was within ‘Graphics Rendering Engine’ of the
OS; where a problem would occur whenever it handled corrupted Windows
Metafile images. This is was not typical buffer overflow problem but merely a
flaw in the design.
• At the time, it was an extremely critical vulnerability!
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Conducting the Attack
Figure: Booting up Backtrack
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Conducting the Attack
Figure: Metasploit Command Line Interface
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Conducting the Attack
Figure: Exploit Initialization
Figure: Exploit Selection
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Conducting the Attack
Figure: Payload Selection1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Conducting the Attack
Figure: Module and Payload Configuration
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Conducting the Attack
Figure: Attack launched using ‘exploit’ command
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Conducting the Attack
Figure: Victim Exploited1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Conducting the Attack
Figure: Successful attack opens remote control session
Figure: Active sessions
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Conducting the Attack
Figure: System Access !
Figure: ‘ipconfig’ executed on Victim’s machine
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Figure: Attack and the effects of it detected by Snort
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
References
[1] “Software Bug”URL: http://en.wikipedia.org/wiki/Computer_bug
[2] “Computer Security”URL: http://en.wikipedia.org/wiki/Computer_security
[3] “Exploit (computer security)”URL: http://en.wikipedia.org/wiki/Exploit_(computer_security)
[4] “BackTrack Security Live CD” URL: http://www.remote-exploit.org/
[5] “Metasploit Framework”URL: http://www.metasploit.com/
[6] “Snort” URL: http://www.snort.org/
[7] “WinPcap” URL: http://www.winpcap.org/
[8] “IDScenter” URL: http://www.engagesecurity.com/products/idscenter/
[9] ” Bleeding Edge Threats” URL: http://www.bleedingthreats.net/
[10] “Microsoft Security Bulletin MS06-001” URL:
http://www.microsoft.com/technet/security/bulletin/MS06-001.mspx
1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
Thank You

More Related Content

PPT
Network security and protocols
PPTX
Security Attack Analysis for Finding and Stopping Network Attacks
PDF
Linux Security Quick Reference Guide
PDF
Chapter 10 wireless hacking [compatibility mode]
PPTX
Network defenses
PPTX
Network Security & Ethical Hacking
PPTX
640-554 IT Certification and Career Paths
PDF
Ceh v5 module 05 system hacking
Network security and protocols
Security Attack Analysis for Finding and Stopping Network Attacks
Linux Security Quick Reference Guide
Chapter 10 wireless hacking [compatibility mode]
Network defenses
Network Security & Ethical Hacking
640-554 IT Certification and Career Paths
Ceh v5 module 05 system hacking

What's hot (20)

PDF
Ceh v5 module 10 session hijacking
PPT
Windows network
PDF
CISSP Week 7
PPT
Ch04 Network Vulnerabilities and Attacks
PPT
Day3 Backup
PDF
CNIT 123: Ch 4: Footprinting and Social Engineering
PDF
IoT security zigbee -- Null Meet bangalore
PPTX
Dealing with legacy code
PPT
Honeypots - Tracking the Blackhat Community
PDF
8 Authentication Security Protocols
PPT
Ch08 Microsoft Operating System Vulnerabilities
PDF
CNIT 123: Ch 3: Network and Computer Attacks
PPT
Intruders
PPT
Reconnaissance & Scanning
PPTX
Cyber security tutorial2
PPT
Hacking tutorial
PDF
Ceh v5 module 21 cryptography
PDF
Firewall notes
PDF
CNIT 123 Ch 1: Ethical Hacking Overview
PDF
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Ceh v5 module 10 session hijacking
Windows network
CISSP Week 7
Ch04 Network Vulnerabilities and Attacks
Day3 Backup
CNIT 123: Ch 4: Footprinting and Social Engineering
IoT security zigbee -- Null Meet bangalore
Dealing with legacy code
Honeypots - Tracking the Blackhat Community
8 Authentication Security Protocols
Ch08 Microsoft Operating System Vulnerabilities
CNIT 123: Ch 3: Network and Computer Attacks
Intruders
Reconnaissance & Scanning
Cyber security tutorial2
Hacking tutorial
Ceh v5 module 21 cryptography
Firewall notes
CNIT 123 Ch 1: Ethical Hacking Overview
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Ad

Viewers also liked (20)

PDF
10 tk3193-firewall 2
PDF
07 tk 1073 layer transport
PDF
Ceh v5 module 15 hacking wireless networks
PDF
Chapter 5 firewall
PDF
Digital forensic upload
PDF
Chapter 1 pendahuluan
PPTX
Modul 4 - Keamanan Jaringan Komputer
PPTX
Modul 5 - Keamanan Jaringan Komputer
PPTX
Modul 7 - Keamanan Jaringan Komputer
PPTX
Modul 3 - Keamanan Jaringan Komputer
PDF
Chapter 7 security web
PPTX
Modul 2 - Komunikasi Data
PPTX
Modul 3 - Komunikasi Data
PPT
Keamanan Jaringan - Pertemuan 6
PPTX
Modul 1 - Komunikasi Data
PDF
Chapter 2 sistem operasi
PDF
Modul metasploit
PPTX
Modul 1 - Pendahuluan Keamanan Jaringan Komputer
PDF
Jurnal metasploit(revisi)
PPTX
Modul 4 - Komunikasi Data
10 tk3193-firewall 2
07 tk 1073 layer transport
Ceh v5 module 15 hacking wireless networks
Chapter 5 firewall
Digital forensic upload
Chapter 1 pendahuluan
Modul 4 - Keamanan Jaringan Komputer
Modul 5 - Keamanan Jaringan Komputer
Modul 7 - Keamanan Jaringan Komputer
Modul 3 - Keamanan Jaringan Komputer
Chapter 7 security web
Modul 2 - Komunikasi Data
Modul 3 - Komunikasi Data
Keamanan Jaringan - Pertemuan 6
Modul 1 - Komunikasi Data
Chapter 2 sistem operasi
Modul metasploit
Modul 1 - Pendahuluan Keamanan Jaringan Komputer
Jurnal metasploit(revisi)
Modul 4 - Komunikasi Data
Ad

Similar to Chapter 9 system penetration [compatibility mode] (20)

PPTX
Metasploit
ODP
CISSP Week 14
PDF
Exploits Attack on Windows Vulnerabilities
PPTX
Introduction to penetration testing
PPTX
Security Threats and Vulnerabilities-2.pptx
PPTX
presentation_security_1510578971_320573.pptx
PPTX
Program security
PPT
Software security (vulnerabilities) and physical security
PPT
Software Security (Vulnerabilities) And Physical Security
PDF
Secure coding guidelines
PPTX
Finalppt metasploit
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PPTX
Introduction to cyber security
PDF
01_Metasploit - The Elixir of Network Security
PPTX
Metasploit
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PDF
Cyber Security for Critical Infrastructure
PDF
The Security Of Information Security
PDF
Unit 6_keylogger_Spywares_virus_worms.pdf
PPTX
chap-1 : Vulnerabilities in Information Systems
Metasploit
CISSP Week 14
Exploits Attack on Windows Vulnerabilities
Introduction to penetration testing
Security Threats and Vulnerabilities-2.pptx
presentation_security_1510578971_320573.pptx
Program security
Software security (vulnerabilities) and physical security
Software Security (Vulnerabilities) And Physical Security
Secure coding guidelines
Finalppt metasploit
Advanced Persistent Threats (APTs) - Information Security Management
Introduction to cyber security
01_Metasploit - The Elixir of Network Security
Metasploit
Intrusion Detection Systems and Intrusion Prevention Systems
Cyber Security for Critical Infrastructure
The Security Of Information Security
Unit 6_keylogger_Spywares_virus_worms.pdf
chap-1 : Vulnerabilities in Information Systems

More from Setia Juli Irzal Ismail (20)

PDF
Petunjuk assessmen Kajian 3 - Attack defense
PDF
Minggu 2-2 Praktikum Instalasi RouterOS pada Virtualisasi-2.pdf
PDF
Introduction to self-Supervised learning - kuliah machine learning STEI ITB
PDF
Materi lanjutan Deep Learning S1 Telekomunikasi - STEI ITB
PDF
Slide materi pengantar kuliah Deep Learning STEI ITB
PDF
slide-share.pdf
PDF
slide-lp3i-final.pdf
PDF
society50-jul-share.pdf
PDF
57 slide presentation
PDF
Panduan Proyek Akhir D3 Teknologi Komputer Telkom University
PDF
Sosialisasi kurikulum2020
PDF
Welcoming maba 2020
PDF
Slide jul apcert agm 2016
PDF
Tugas besar MK Keamanan Jaringan
PDF
PDF
PDF
03 keamanan password
PDF
02 teknik penyerangan
PDF
01a pengenalan keamanan jaringan upload
PDF
Kajian3 upload
Petunjuk assessmen Kajian 3 - Attack defense
Minggu 2-2 Praktikum Instalasi RouterOS pada Virtualisasi-2.pdf
Introduction to self-Supervised learning - kuliah machine learning STEI ITB
Materi lanjutan Deep Learning S1 Telekomunikasi - STEI ITB
Slide materi pengantar kuliah Deep Learning STEI ITB
slide-share.pdf
slide-lp3i-final.pdf
society50-jul-share.pdf
57 slide presentation
Panduan Proyek Akhir D3 Teknologi Komputer Telkom University
Sosialisasi kurikulum2020
Welcoming maba 2020
Slide jul apcert agm 2016
Tugas besar MK Keamanan Jaringan
03 keamanan password
02 teknik penyerangan
01a pengenalan keamanan jaringan upload
Kajian3 upload

Recently uploaded (20)

PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Classroom Observation Tools for Teachers
PPTX
Pharma ospi slides which help in ospi learning
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
master seminar digital applications in india
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Trump Administration's workforce development strategy
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chinmaya Tiranga quiz Grand Finale.pdf
Anesthesia in Laparoscopic Surgery in India
Classroom Observation Tools for Teachers
Pharma ospi slides which help in ospi learning
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Final Presentation General Medicine 03-08-2024.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
2.FourierTransform-ShortQuestionswithAnswers.pdf
A systematic review of self-coping strategies used by university students to ...
O5-L3 Freight Transport Ops (International) V1.pdf
master seminar digital applications in india
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Microbial disease of the cardiovascular and lymphatic systems
Trump Administration's workforce development strategy
human mycosis Human fungal infections are called human mycosis..pptx

Chapter 9 system penetration [compatibility mode]

  • 2. System Penetration • What do I mean by System Penetration? The act of successfully breaching security on a remote computer system in order to gain some form of control access.  So, what is Metasploit Framework?  First we need to learn some basic concepts before understanding what the Metasploit Framework is and what it is capable of providing. 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 3. Many Attack Vectors! • Gaining access to a secured system can be a difficult task that requires skill and maybe luck. However, we have also have plenty of simple techniques, commonly used today, to achieve the same result. Such include; • AuthenticationAttacks • Password guessing using common strings or using default passwords • Ex: Wireless Routers have default passwords  Majority don’t change this!!! • Ex: Windows Administrator Account are often blank • Password Brute Force Attack • These method has become extremely fast with the of Rainbow Tables! • Rainbow tables pre-computed tables of password hashes. • Social EngineeringAttacks • To influence someone into divulging confidential information using techniques. • Ex: Phishing Attacks • A malicious user who impersonates him or herself as trustworthy a entity • SQL Injection Attacks • To inject unexpected malformed SQL into a query in order to manipulate the database in unintended ways. • Ex: Injection of SQL to spit out information from certain tables • Ex: Inject an administrator account for yourself 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 4. Many Attack Vectors! • However, one of the most dangerous and yet a very effective attack used by malicious users today are Software Exploitation Attacks! Software Exploitation Attacks can be used to gain access to unauthorized systems, leverage user account privileges, crash systems or provide installation of malicious software (such as Spyware, Virus’s, Trojans, Adware, etc.) without the awareness of the other party. 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 5. Understanding S.E. Attacks. • First, let’s understand basics. “The word vulnerability, in computer security, refers to a weakness in a system allowing an attacker to violate the confidentiality, integrity, availability, access control, consistency or audit mechanisms of the system or the data and applications it hosts” • To Software Developers, a bug is synonymous to a vulnerability. • Ex: Errors in program’s source code or flawed program design • Buffer overflows • Memory leaks • Dead locks • Arithmetic overflow • Accessing protected memory (Access Violation) 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 6. Understanding S.E. Attacks • Regardless though which type of software bug we are speaking of, they are used as the foundation to form an exploit. • Therefore, an exploit is a security attack on a vulnerability. • In other words (again), an exploit attacking a vulnerability is generating an event that the application/program/OS is not programmed/designed to recover successfully and therefore the result is a system that discontinues to function correctly • How will this give us access to a secured System? Ans: It won’t. • Each exploit can be designed to meet the methodology of your attack. • Ex: An attacker exploits an IDS to reboot it or crash it before he/she launches a further attack to avoid detection. 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 7. Understanding Payloads • However, Exploits have more potential! • They are commonly used to install system malware or gain system access or recruit client machines into an existing ‘botnet’. • This is accomplished with the help of a payload • The payload is a sequence of code that is executed when the vulnerability is triggered • To make things clear, an Exploit is really broken up into two parts, like so; EXPLOIT = Vulnerability + Payload; 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 8. Understanding Payloads • The payload is usually written in Assembly Language • Platform and OS dependant. • A Win32 payload will not work in Linux (even if we are exploiting the same bug) • Big Endian, Small Endian Architectures • Different payload types exist and they accomplish different tasks • exec  Execute a command or program on the remote system • download_exec  Download a file from a URL and execute • upload_exec  Upload a local file and execute • adduser  Add user to system accounts 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 9. Understanding Payloads • However, the most common payload type used with exploits are shellcodes or aka shell payloads. • These payloads are very useful because they provide the attacker an interactive shell that can be used to completely control the system remotely • The term is inherited from Unix  /bin/sh • For Win OS’s, shells actually refer to command prompt  cmd.exe • There are two different types of shell payloads; • Bind Shells  A socket is created, a port is bound to it and when an a connection is established to it, it will spawn a shell. • Reverse Shells  Instead of creating a listening socket, a connection is created to a predefined IP and Port and a shell is then shoveled to the Attacker. 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 10. Metasploit Framework What is the Metasploit Framework? • According to the Metasploit Team; “The Metasploit Framework is a platform for writing, testing, and using exploit code. The primary users of the Framework are professionals performing penetration testing, shellcode development, and vulnerability research.” 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 11. Understanding MSF • The MSF is not only an environment for exploit development but also a platform for launching exploits on real-world applications. It is packaged with real exploits that can provide real damage if not used professionally. • The fact that MSF is an open-source tool and provides such a simplified method for launching dangerous attacks, it has and still is attracting wannabe hackers and script kiddies that do no more than create additional problems on networks and system. 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 12. Snort Introduction • A problem exists will large networks  • Without proper equipment, it becomes more difficult for Administrators and Analyst's to continuously keep track of the security and integrity of their network. This is true because larger network have more potential areas to be targeted and therefore detection of attacks become a challenging task. • What are Network Intrusion Detection System’s? • This is proper equipment • It is technology that has been designed to automatically detect malicious content on a network and provide the administrator with a response in the event of a problem. 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 13. Understanding Snort • Simply, Snort is an open-source Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) technology. • Meaning it will monitor our networks traffic for malicious content to determine if there is a problem and it will also take immediate action if it detects a problem • Snort can perform real-time analysis on packet streams to detect many variations of attacks and probes. Such attacks and probes include, as listed on snorg.org, are buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. • Snort is also a real-time alerting agent. • Example: Snort can be configured to send Bob an e-mail when a low-priority attack is detected but send Joe a pager notification when a high-priority attack is detected. 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 14. Snort Installation/Configuration • Installation easy! • Requires WinPcap libraries • However, configuration is not so easy • Required manual modifications to snort.conf • Difficult to debug • IDScenter makes snort configuration much easier! • http://www.engagesecurity.com/products/idscenter/ • In a nutshell, IDScenter is a front-end GUI for the snort.conf configuration file • IDScenter also includes; • snort.conf testers • No worries about syntax • Alert file viewer 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 15. IDScenter Configurations Figure: IDScenter Main Panel1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 16. IDScenter Configurations Figure: Initialize Environment Variables1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 17. IDScenter Configurations Figure: Added Bleeding Edge Threats Rulesets 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 18. The Attack Experiment Goal: • To conduct a Software Exploitation Attack using Metasploit Framework against a Victim machine in order to gain system access • To make things interesting, the Victim’s machine will also have Snort running locally as an IDS in order to see how it reacts to the attack. 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 19. Network Topology and Hardware Configurations/Details 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 20. Software Details • Victim (*No anti-virus or similar scanner is running on this machine) • Operating System: Windows XP Professional 5.1.2600, Service Pack 2 (not fully updated) • Snort 2.7.0 • Attacker • Operating System: Slackware Linux via BackTrack 2 , Bootable Live CD • Metasploit Framework 3.0 – Beta Development Release 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 21. Vulnerability Details • Microsoft Security Bulletin - MS06-001 Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (912919) • Originally posted on January 5, 2006 • However, it was running wild as a 0-Day vulnerability for a couple weeks • The heart of the vulnerability was within ‘Graphics Rendering Engine’ of the OS; where a problem would occur whenever it handled corrupted Windows Metafile images. This is was not typical buffer overflow problem but merely a flaw in the design. • At the time, it was an extremely critical vulnerability! 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 22. Conducting the Attack Figure: Booting up Backtrack 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 23. Conducting the Attack Figure: Metasploit Command Line Interface 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 24. Conducting the Attack Figure: Exploit Initialization Figure: Exploit Selection 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 25. Conducting the Attack Figure: Payload Selection1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 26. Conducting the Attack Figure: Module and Payload Configuration 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 27. Conducting the Attack Figure: Attack launched using ‘exploit’ command 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 28. Conducting the Attack Figure: Victim Exploited1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 29. Conducting the Attack Figure: Successful attack opens remote control session Figure: Active sessions 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 30. Conducting the Attack Figure: System Access ! Figure: ‘ipconfig’ executed on Victim’s machine 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 31. Figure: Attack and the effects of it detected by Snort 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa
  • 32. References [1] “Software Bug”URL: http://en.wikipedia.org/wiki/Computer_bug [2] “Computer Security”URL: http://en.wikipedia.org/wiki/Computer_security [3] “Exploit (computer security)”URL: http://en.wikipedia.org/wiki/Exploit_(computer_security) [4] “BackTrack Security Live CD” URL: http://www.remote-exploit.org/ [5] “Metasploit Framework”URL: http://www.metasploit.com/ [6] “Snort” URL: http://www.snort.org/ [7] “WinPcap” URL: http://www.winpcap.org/ [8] “IDScenter” URL: http://www.engagesecurity.com/products/idscenter/ [9] ” Bleeding Edge Threats” URL: http://www.bleedingthreats.net/ [10] “Microsoft Security Bulletin MS06-001” URL: http://www.microsoft.com/technet/security/bulletin/MS06-001.mspx 1/15/2015D3 Teknik Telekomunikasi_Sanggup, Mampu, Bisa